Which is a more efficient way to determine the optimal number of multiplications in a matrix chain multiplication problem: enumerating all the ways of parenthesizing the product and computing the...
For programmed I/O, Figure 7.5 indicates that the processor is stuck in a wait loop doing status checking of an I/O device. To increase efficiency, the I/O software could be written so that the...
Consider the failed attempt of Alice to get Bob's public key in Fig. 8-23. Suppose that Bob and Alice already share a secret key, but Alice still wants Bob's public key. Is there now a way to get it...
Apply Porter's value chain model to Dell (www.dell.com). What is Dell's competitive strategy? Who are Dell's major competitors? Describe Dell's business model. Describe the tasks that Dell must...
A portable operating system is one that can be ported from one system architecture to another without any modification. Explain why it is infeasible to build an operating system that is completely...
Suppose you have a chess program that can evaluate 1 million nodes per second. Decide on a compact representation of a game state for storage in a transposition table. About how many entries can you...
Suppose you are told that the business process in Figure 3-13 has a negative margin. Explain what that means. Suppose the margin of some business process is a negative $1 million. If costs are...
Locate the prototype currently proposed for use in one of MRE's departments. Suggest a few modifications that would make this prototype even more responsive to the unit's needs.
Consider a fixed partitioning scheme with equal-size partitions of 216 bytes and a total main memory size of 224 bytes. A process table is maintained that includes a pointer to a partition for each...
1. According to Visible Analyst, functional decomposition diagrams (FDDs) involve top-down business planning decisions, and should be the starting point for modeling business functions and processes....
Find the transfer function for Y(s)/R(s) for the idle-speed control system for a fuel-injected engine as shown in Figure P2.33. K, Fuel gain K, Speed command Air bypass Manifold Dynamics G ls) Gs(s)...
Suppose half of all the transactions in a clothes shop purchase jeans, and one third of all transactions in the shop purchase T-shirts. Suppose also that half of the transactions that purchase jeans...
Consider the alternative of increasing the value delivered by existing rental personnel. The text suggests possibly renting more kinds of equipment or selling items of use to guests who are renting...
The case features technology developed by Brand Protect (www.brandprotect.com); competitors include Mark- Monitor (www.markmonitor.com) and Name Protect (www.cscprotectbrands.com).Visit their Web...
An important metric in this area considered by companies is the Total Cost of Ownership (TCO) of their IT assets. Go online and research what TCO is and how it is related to IT asset management. How...
Distinguish between a control module, subordinate module, and library module on a structure chart. Can a particular module be all three? Why or why not?
Suppose you manage the buyers at AllRoad and you have been asked to help determine the requirements for a new vendor selection information system. As you think about those requirements, you wonder...
Consider the SQL query select p.a1 from p, r1, r2 where p.a1 = r1.a1 or p.a1 = r2.a1. Under what conditions does the preceding query select values of p.a1 that are either in r1 or in r2? Examine...
A major public university graduates approximately 10,000 students per year, and its development office has decided to build a Web-based system that solicits and tracks donations from the university's...
Why would a systems analyst have to act as a translator? What groups might be involved?
Write the proper sequence of activities in the design of a video rental database. (The initial ERD was shown in Figure 9.9.) The design must support all rental activities, customer payment tracking,...
What decisions have to be made to develop a field specification?
Write queries in XQuery on the bibliography DTD fragment as shown below to do the following. a. Find all authors who have authored a book and an article in the same year. b. Display books and...
Compare and contrast an information change management strategy with a political change management strategy. Is one better than the other?
Using the descriptions of the attributes given in the figure, convert the ERD shown in Figure into a dependency diagram that is in at least 3NF.
The table structure shown in Table P6.6 contains many unsatisfactory components and characteristics. For example, there are several multivalued attributes, naming conventions are violated, and some...
Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invoice number as a parameter. The INV_SUBTOTAL is the sum of the...
Using OLAP Query 1 shown in Figure 9.11 (based on data from Figure 9.7) as a starting point, give an example that illustrates a pivot operation.
Develop a physical DFD that models the process of grocery shopping, from the time you write down a shopping list until the time you store purchased groceries in your home. Construct your DFD as a...
Discuss the issues the project manager must consider when assigning programming tasks to the programmers.
Identify the syntactically incorrect statements in the following: 1. Loop intX = intX + 1 Do While intX < 100 2. Do lstOutput.Items.Add("Hello") intX = intX + 1 While intCount < 10 3. Loop Until intX...
This exercise develops a space-efficient variant of the forward'backward algorithm described in Figure. We wish to compute P (X k?e l; t) for k = 1... t. This will be done with a divide-and-conquer...
Explain why it makes sense to first go through the normalization process and then denormalize.
One of the purchasing managers is interested in the impact of product prices on the sale of products of each brand. Write a query to display the brand name, brand type, average price of products of...
Create an E-R diagram for FAME based on the enterprise data model you developed in 1-52. Clearly state any assumptions you made in developing the diagram.
Should a use case be prepared for every item on the event-response list? Why or why not?
A database is stored on ten 9-GB RAID 1 LUNs. A cascade three-site remote replication solution involving a synchronous and disk-buffered solution has been chosen for disaster recovery. All the LUNs...
Three Ethical Scenarios Whether youre an employer or an employee, you should know what your rights are when it comes to Internet use in the workplace. Mark Grossman, a Florida attorney who...
Conversion Strategies the city of London has been well known for its many historic sites, live theater, and heavy traffic. In spite of a sophisticated underground subway system known locally as the...
Sky View Aerial Photography offers a wide range of aerial photographic, video, and infrared imaging services. The company has grown from its early days of snapping pictures of client houses to its...
Name a company for which you would like to work. Using Figure 8-6 as a guide, describe, as specifically as you can, how that company could use social media. Include community type, specific focus,...
Punch cards, keyboards, bar code scanners-the trend is clear. Input devices have continued to promote faster and more accurate data entry. Key to this advance is capturing data at their source, and...
Describe the major phases in the systems development life cycle (SDLC).
Reread pages 264-265 of Chapter 10 about the SDLC process. List tasks to perform and assess whether you could perform each task. If you cannot perform that task, describe how you could outsource that...
How can the DBA function be placed within the organization chart? What effect(s) will such placement have on the DBA function?
Create a process diagram in BPMN to show Groupons Sales process.
Relate the time complexity of LRTA* to its space complexity.
A system has a block diagram as shown in Figure AP2.2. Determine the transfer function T(s) = Y2(s) / R1(s) It is desired to decouple Y2(s) from R1(s) by obtaining T(s) = 0. Select G5(s) in terms of...
What is meant by the characteristics of fan-in and fan-out? What are their roles in structure chart quality?
Examine the set of relations in Figure 4-39. What normal form are these in? How do you know this? If they are in 3NF, convert the relations into an EER diagram. What assumptions did you have to make...
Suppose that you work at AllRoad Parts and Kelly tells you that she doesnt believe that cheap, elastic provisioning of servers is possible. There has to be a catch somewhere, she says. Write a...
After some further analysis, you discover that the commission field in the Policies table is updated yearly to reflect changes in the annual commission paid to agents on existing policies. Would...
Check out CEO Express (www.ceoexpress.com), a to prated Web portal for busy executives. See Figure. The site provides links to top U.S. and international newspapers, business and technology...
How would you assess the quality of Internet research results?
You and a few of your classmates decided to become entrepreneurs. You came up with a great idea for a new mobile phone application that you think will make lots of money. Your business plan won...
Describe the circumstances in which you would choose to use embedded SQL rather than SQL alone or only a general-purpose programming language.
Modern automated highways are being implemented around the world. Consider two highway lanes merging into a single lane. Describe a feedback control system carried on the automobile trailing the lead...
Suppose that a system has 5000 objects and 100 domains at some time. 1% of the objects are accessible (some combination of r, w and x) in all domains, 10% are accessible in two domains, and the...
Given the full joint distribution shown in Figure, calculate the following: a. P (toothache) b. P (Cavity) c. P (Toothache ?cavity) d. P (Cavity ? toothache V catch). toothache toothache mcatch catch...
Do you see any justifiable opportunities to denormalize the tables? If so, provide appropriate justification and create a new denormalized schema. Do you need to update your ER diagram based on these...
A GT cell will machine the components for a family of parts. The parts come in several different sizes and the cell will be designed to quickly change over from one size to the next. This will be...
Suppose we wish not only to increment a counter but also to reset it to zero (i.e., make all bits in it 0). Show how to implement a counter as an array of bits so that any sequence of n INCREMENT and...
Write SQL queries to answer the following questions: a. Which students have an ID number that is less than 50000? b. What is the name of the faculty member whose ID is 4756? c. What is the smallest...
In this exercise, we will explore the use of local search methods to solve TSPs of the type defined in Exercise 4.8. a. Devise a hill-climbing approach to solve TSPs. Compare the results with optimal...
Represent the ownerships and permissions shown in this UNIX directory listing as a protection matrix. (Note: asw is a member of two groups: users and devel; gmw is a member only of users.) Treat each...
Consider Jakes processes in the opening vignette of this chapter. a. Create a BPMN for the Burger Assembly process. b. Write a procedure for how the in-store employee inputs a customer order on the...
Given a directed graph G = (V, E), explain how to create another graph G = (V, E) such that (a) G has the same strongly connected components as G, (b) G has the same component graph as G, and (c) E...
In Poor Richards Almanac, Benjamin Franklin penned the familiar lines: For the want of a nail the shoe was lost, for the want of a shoe the horse was lost, for the want of a horse the rider was lost,...
Write the sequence of micro-operations required for the bus structure of Figure 15.6 to add a number to the AC when the number is a. An immediate operand b. A direct-address operand c. An...
a. Normalize the Bank Accounts Table to 1NF by increasing the number of records in the existing table. b. Normalize the Bank Accounts Table to 1NF by creating a new separate table in addition to the...
Use the narratives in Chapter 1 and above to identify the typical outputs (reports and displays) the various stakeholders might want to retrieve from your database. Now, revisit the E-R diagram you...
To get around the problem of sequence numbers wrapping around while old packets still exist, one could use 64-bit sequence numbers. However, theoretically, an optical fiber can run at 75 Tbps. What...
Marcus Weber, IS project manager at ICAN Mutual Insurance Co., is reviewing the staffing arrangements for his next major project, the development of an expert system-based underwriters assistant....
What types of data transformations might be needed in order to build the Fitchwood data mart?
Suppose that we are given a key k to search for in a hash table with positions 0, 1, ..., m - 1, and suppose that we have a hash function h mapping the key space into the set {0, 1, ..., m -1. The...
What are input masks? What are validation rules? Why are they important?
Suppose your team owns and manages one of these ISVs. You learn that more and more of your clients are choosing SaaS cloud services like Google for email, rather than setting up local email servers....
A fundamental cryptographic principle states that all messages must have redundancy. But we also know that redundancy helps an intruder tell if a guessed key is correct. Consider two forms of...
A system is shown in Fig. E2.29(a). (a) Determine G(s) and H(s) of the block diagram shown in Figure E2.29(b) that are equivalent to those of the block diagram of Figure E2.29(a). (b) Determine...
The engine, body, and tires of a racing vehicle affect the acceleration and speed attainable [9]. The speed control of the car is represented by the model shown in Figure E5.2. (a) Calculate the...
Describe a way to reassemble IP fragments at the destination.
Consider the snapshot of the Linear Hashing index shown in Figure 11.7. Assume that a bucket split occurs whenever an overflow page is created. In figure 11.7 1. What is the maximum number of data...
Consider a 100,000-customer video server, where each customer watches two movies per month. Half the movies are served at 8 P.M. How many movies does the server have to transmit at once during this...
1. What are the benefits that result from implementing the technologies described in the case? How are those different for hospitals, doctors, insurance companies and patients? Provide examples of...
Get all pairs of supplier numbers, Sx and Su say, such that Sx and Sy supply exactly the same set of parts each. Note for simplicity, you might want to use the original suppliers-and-parts data-base...
Using the Crows Foot methodology, create an ERD that can be implemented for a medical clinic, using at least the following business rules: a. A patient can make many appointments with one or more...
1. What problems were Scotts Miracle Gro facing? 2. Which software was used to analyze data collected by Scotts? 3. How does a software tool such as Luminoso analyze data? 4. What are some strategic...
What are some problems associated with using packaged software? How can these problems be minimized?
Give an O (V + E)-time algorithm to compute the component graph of a directed graph G = (V, E). Make sure that there is at most one edge between two vertices in the component graph your algorithm...
Consider the relational database of Figure. Give an expression in the relational algebra for each request: a. Modify the database so that Jones now lives in Newtown. b. Give all employees of First...
Sawmill operators are in the business of turning trees into lumber. Products include boards, plywood, and veneer. For as long as there have been sawmills, there have been sawmill operators who have...
Helen Jarvis wants to determine the most important customers for Home Office products. She requests a listing of total dollar sales year-to-date for each customer who bought these products, as...
Refer to the Real World Case on companies using smartphones in the chapter. Do you think smaller companies like Lloyd's Construction are ready for large-scale implementations of technology in their...
Consider a single-platter disk with the following parameters: rotation speed: 7200 rpm; number of tracks on one side of platter: 30,000; number of sectors per track: 600; seek time: one ms for every...
What is ISO, and why is it important to a systems developer?
Describe the two steps to data storage design.
Visit www.lie-nielsen.com or www.sephora.com. On the site you chose, find links to social networking sites. In what ways are those sites sharing their social capital with you? In what ways are they...
List and briefly describe the three basic approaches to program development order. What are the advantages and disadvantages of each?
Consider the two tables shown in Figure 6.37: Figure 6.37 Relations SALES_REP and TERRITORY a. If a DBMS enforces an UPDATE RESTRICT option on the referential integrity constraint between SALES_REP...
A transfer machine has six stations that function as follows: In addition, transfer time = 0.18 min. Average downtime per occurrence = 8.0 min. A total of 20,000 parts must be processed through the...