Draw the associations that are described by the business rules that follow. Include the multiplicities for each relationship. A patient must be assigned to only one doctor, and a doctor can have one...
Marcia Wilson owns and operates Marcia's Dry Cleaning, which is an upscale dry cleaner in a well-to-do suburban neighborhood. Marcia makes her business stand out from the competition by providing...
Anonymous transactions on the Internet can have a dark side. Research each of the terms below on the Web. Prepare a one-page report for each term researched. Your paper should describe the problem...
Describe the six steps in a typical preliminary investigation. Why should an analyst be careful when using the word problem?
Using a method of your choice, verify each of the equivalences inFigure. (a AB) = (BA a) commutativity of A (a v B) = (B V a) commutativity of v ((a ^ 3) A7) = (a^ (BA)) associativity of A ((a V B) v...
What types of data pollution/cleansing problems might occur with the Fitchwood OLTP system data?
What is the difference between a context diagram and diagram 0? Which symbol is not used in a context diagram?
Create a subclass of BinaryTree whose nodes have fields for storing preorder, post-order, and in-order numbers. Write recursive methods preOrderNumber(), inOrderNumber(), and postOrderNumbers() that...
Michael (from Problem 4) also assembles packages of camping kits. Each kit is a group of separate products that are sold as a package. Each package (called a PRODUCT) is built using many parts, which...
Consider the modified redistribution scheme for B+-trees described in page 463. What is the expected height of the tree as a function of n?
Refer to the Real World Case on Microsoft, SiCortex, and Others in the chapter. Does the ability of virtualization technology to provide developers with multiple combinations of operating systems and...
Describe the major elements and issues with waterfall development.
The linear model of a phase detector (phase-lock loop) can be represented by Figure P6.7 [9].The phase-lock systems are designed to maintain zero difference in phase between the input carrier signal...
Construct a support vector machine that computes the XOR function. It will be convenient to use values of 1 and 1 instead of I and 0 for the inputs and for the outputs. So an example looks like ([1....
Is it possible that when a user clicks on a link with Netscape, a particular helper is started, but clicking on the same link in Internet Explorer causes a completely different helper to be started,...
1. What are the business benefits of taking the time and effort required to create and operate data warehouses such as those described in the case? Do you see any disadvantages? Is there any reason...
What are the six common steps needed to access databases from a typical program?
Let r be a relation of degree n. How many different projections of r are there?
1. What is the business value of these global system developments for the companies mentioned in the case? How did they achieve these benefits? What were the major obstacles they had to overcome? 2....
Develop an EER model for the following situation using the traditional EER notation, the Visio notation, or the subtypes inside supertypes notation, as specified by your instructor: An international...
Suppose that your university is having a dramatic increase in enrollment and is having difficulty finding enough seats in courses for students so that they can take courses required for graduation....
Distinguish between logical process models and physical process models.
Throughout the 1960s, 1970s, and 1980s, the U.S. Army automated its installations ("army bases," in civilian terms). Automation was usually a local effort at each of the more than 100 bases. Although...
In what ways does using an electronic spreadsheet package provide you with the capabilities of a decision support system?
Should companies scrap their existing ERP implementations and start from scratch again, or should they keep trying to make their existing investments pay off? What are the advantages and...
Define a class, subclass, and superclass, and provide three examples of each.
What is an evaluation model? How would you create a weighted evaluation model?
Create an ER model for each of the following descriptions: (a) A large organization has several parking lots, which are used by staff. (b) Each parking lot has a unique name, location, capacity, and...
Create a set of use cases for the following health club membership system: When members join the health club, they pay a fee for a certain length of time. Most memberships are for one year, but...
Show how to express the single-source shortest-paths problem as a product of matrices and a vector. Describe how evaluating this product corresponds to a Bellman-Ford-like algorithm (see Section...
Describe a technique you use to help you complete the activity Get to class on time. What are some tools you use with the technique?
Create the physical data model for the relational schema you developed in Chapter 4 (and potentially modified in 5-56 above), clearly indicating data types, primary keys, and foreign keys.
Pretend that you are a project manager for a bank developing software for automated teller machines (ATMs). Develop a unit test plan for the user interface component of the ATM.
Is the vacation daemon part of the user agent or the message transfer agent? Of course, it is set up using the user agent, but does the user agent actually send the replies? Explain your answer.
Define a use case and a use case diagram, and prepare a sample of each.
The standard http URL assumes that the Web server is listening on port 80. However, it is possible for a Web server to listen to some other port. Devise a reasonable syntax for a URL accessing a file...
Effective control of insulin injections can result in better lives for diabetic persons. Automatically controlled insulin injection by means of a pump and a sensor that measures blood sugar can be...
Some Tiny College staff employees are information technology (IT) personnel. Some IT personnel provide technology support for academic programs. Some IT personnel provide technology infrastructure...
RAID systems typically allow you to replace failed disks without stopping access to the system. Thus, the data in the failed disk must be rebuilt and written to the replacement disk while the system...
Susan, president of MOTO, Inc., a human resources management firm, is reflecting on the client management software system her organization purchased four years ago. At that time, the firm had just...
Historically, what types of applications have moved quickly to client/server database systems? What types have moved more slowly, and why? What do you think will happen in the future to the ratio of...
Describe the common components needed to create a Web-based application.
A high-performance aircraft, shown in Figure DP7.1(a), uses the ailerons, rudder, and elevator to steer through a three-dimensional flight path [20]. The pitch rate control system for a fighter...
The direct utility estimation method in Section 21.2 uses distinguished terminal states to indicate the end of a trial. How could it be modified for environments with discounted rewards and no...
Create a set of use cases for the following system: A Video Store (AVS) runs a series of fairly standard video stores. Before a video can be put on the shelf, it must be catalogued and entered into...
Modify your algorithm from Exercise 24.3-6 to run in O ((V + E) lg W ) time. (Hint: How many distinct shortest-path estimates can there be in V - S at any point in time?)
Explain what is the problem with this implementation of the one-writer many-readers problem? int readcount; Semaphore mutex, wrt; // shared and initialized to 0 // shared and initialized to 1; //...
Complete the use cases for the dentist office system in exercise B by identifying the steps and the data flows within the use cases.
Suppose that a process on a DFD is numbered 4.3.2. What level diagram contains this process? What is this process's parent process?
The ABC Car Service & Repair Centers are owned by the SILENT car dealer; ABC services and repairs only SILENT cars. Three ABC Car Service & Repair Centers provide service and repair for the entire...
Create a use case diagram that would illustrate the use cases for the following system: A Real Estate Inc. (AREI) sells houses. People who want to sell their houses sign a contract with AREI and...
Draw an ERD for the following situation. (State any assumptions you believe you have to make in order to develop a complete diagram.) Also, draw a data model for this situation using the tool you...
In Fig. 6-29 we saw that in addition to the 32-bit Acknowledgement field, there is an ACK bit in the fourth word. Does this really add anything? Why or why not?
Develop two use scenarios for a Web site that sells some retail products (e.g., books, music, clothes).
Suppose an organization uses VPN to securely connect its sites over the Internet. Is there a need for a user, Jim, in this organization to use encryption or any other security mechanism to...
Barbara Halifax wrote her boss that she was still considering many potential approaches to the customer support system development project. She is still completing the project planning phase, so not...
For the DAC model discussed in Section 15.3, an alternative representation of the protection state is a directed graph. Each subject and each object in the protection state is represented by a node...
Why are ERP upgrades so complex and expensive? What role does ERP customization, if any, play in this process? Go online and research other examples discussing ERP upgrades. Can you discern a pattern...
The system development project team at Birdie Masters golf schools has been working on defining the architecture design for a new system. The major focus of the project is a networked school location...
Assume the following burst-time pattern for a process: 6, 4, 6, 4, 13, 13, 13, and assume that the initial guess is 10. Produce a plot similar to those of Figure. 10 8 6 o_ Simple average Observed...
The library case study described in Exercise 12.14 is extended to include the fact that the library has a significant stock of books that are no longer suitable for loaning out. These books can be...
The automatic control of an airplane is one example that requires multiple-variable feedback methods. In this system, the attitude of an aircraft is controlled by three sets of surfaces: elevators, a...
Prove that for any pair of vertices u and v and any capacity and flow functions c and f, we have cf (u, v) + cf (v, u) = c(u, v) + c(v, u).
Create a use case diagram for the system described next: Owners of apartments fill in information forms about the rental units they have available (e.g., location, number of bedrooms, monthly rent),...
Construct by hand a neural network that computes the XOR function of two inputs. Make sure to specify what sort of units you are using.
Decades ago, programmers trying to conserve valuable storage space shortened year values to two digits. This shortcut created what became known as the "Y2K" problem or "millennium bug" at the turn of...
Explain why an index is useful only if there is sufficient variety in the values of an attribute.
Explain why the process for generating predecessors in backward search does not need to add the literals that are negative effects of the action.
What is the difference between an operational environment and a test environment?
Figure 7-12 lists objectives and measures that the managers at CBI determined for the Procurement process. What objectives and measures would you suggest for the university? What objectives and...
Develop a unit test plan for the calculator program in Windows (or a similar program for the Mac or UNIX).
Extend the vocabulary from Section 8.4 to define addition for n-bit binary numbers. Then encode the description of the four-bit adder in Figure and pose the queries needed to verify that it is in...
Many companies are undergoing server virtualization. This is the concept of putting multiple "virtual" servers onto one physical device. The payoffs can be significant: fewer servers, less...
Even after SAP is implemented, input errors can still be made. What kinds of errors can Wally, Sue, and Ann still make? Describe a particularly harmful mistake that each can make and how the process...
Represent the following seven sentences using and extending the representations developed in the chapter: a. Water is a liquid between 0 and 100 degrees. b. Water boils at 100 degrees. c The water in...
The following two tables could be used to store the data in Figure 5-17 in a database. Choir Member (Last Name, First Name, Email, Phone, Part) Musical Work (Name of Work, Composer, Part, Copy...
Consider the problem of finding large itemsets. a. Describe how to find the support for a given collection of itemsets by using a single scan of the data. Assume that the itemsets and associated...
Explain how this team uses alerts. Summarize the advantages of using alerts.
In the model underlying Fig. 6-4, it is assumed that packets may be lost by the network layer and thus must be individually acknowledged. Suppose that the network layer is 100 percent reliable and...
Many companies plan really well, yet few translate strategy into action. Do you think this statement is true? Why or why not?
Is the primary purpose of requirements determination to discover facts or to discover opinions? Explain your answer.
Refer to the Real World Case on Kimberly-Clark and virtual reality in the chapter. Is the company fixing something that was not broken? Explain.
Suggest how storage for elements can be allocated and deal located within the hash table itself by linking all unused slots into a free list. Assume that one slot can store a flag and either one...
Describe a data dictionary and list the types of information it contains.
Suppose that we wish to maintain the transitive closure of a directed graph G = (V, E) as we insert edges into E. That is, after each edge has been inserted, we want to update the transitive closure...
Consider the problem of separating N data points into positive and negative examples using a linear separator. Clearly, this can always be done for N = 2 points on a line of dimension d = 1,...
Draw a level 0 data flow diagram (DFD) for the Of-the-Month Club system in Exercise I, Chapter 4.
For your answers to the following Problems and Exercises from prior chapters, transform the EER diagrams into a set of relational schemas, diagram the functional dependencies, and convert all the...
1. Do you agree with the plans by Starbucks to offer time limited free Wi-Fi to customers? Do you think free Wi-Fi would be enough to instill that kind of loyalty? Based on the experiences of the...
Create a set of use cases for the following system: Of-the-Month Club (OTMC) is an innovative young firm that sells memberships to people who have an interest in certain products. People pay...
Suppose you are a part-time student assistant in the computer lab at your school. Janet Jacobs, the IT department chair, recently announced that a CASE tool will be installed on the lab network. Her...
Pine Valley Furniture wants you to help design a data mart for analysis of sales. The subjects of the f data mart are as follows: Salesperson..Attributes: Salespersons, Years with PVFC,...
Suggest how to implement RB-INSERT efficiently if the representation for red-black trees includes no storage for parent pointers.
Suppose that you are the analyst charged with developing a new system to help senior managers make better strategic decisions. What requirements gathering techniques will you use? Describe in detail...
Compare and contrast direct conversion and parallel conversion.
Consider the deletion of record 5 from the file as shown below compare the relative merits of the following techniques for implementing the deletion: a. Move record 6 to the space occupied by record...
Identify whether the following structures are transaction or transform and explain the reasoning behind your answers. Control Menu Display Control Menu Screen Add User Modify Borrow Limit Remove User...
Figure is an activity diagram for the use case Enter new patient information in the dental clinic system. Do the following: a. Develop a first-cut sequence diagram, which only includes the actor and...
Suppose we generate a training set from a decision tree and then apply decision-tree learning to that training set. Is it the case that the learning algorithm will eventually return the correct tree...
Both the search and the insertion time for a B-tree are a function of the height of the tree. We would like to develop a measure of the worst-case search or insertion time. Consider a B-tree of...