a. Please indicate if the following statements are true or false. (i) Let A be the set of all actions and S the set of states for some MDP. Assuming that |A| < < |S|, one iteration of value iteration...
Transportation researchers are trying to improve traffic in the city but, in order to do that, they first need to estimate the location of each of the cars in the city. They need our help to model...
What is the purpose of risk management? Outline the risks you faced on the first day of college. Have any of these risks changed since then?
Think of an online retailer youve recently used or considered using for a purchase. Why is good design of that retailers interface important for the retailer? Visit the online retailer and evaluate...
Consider the following PCFG for simple verb phrases: 0.1 : V P Verb 0.2 : V P Copula Adjective 0.5 : V P Verb the Noun 0.2 : V P V P Adverb 0.5 : Verb is 0.5 : Verb shoots 0.8 : Copula is 0.2...
Which method of representing quantities involves discrete steps?
The IT manager at Pitt Fitness wants to secure the database using a method that includes processing logic to periodically change and synchronize with passwords stored on the database. Which of the...
Pitt Fitness is now routinely creating backups of their database. They store them on a server and have a number of backup files that need to be deleted. Which of the following files is the correct...
Which of the following data integrity constraints would ensure Pitt Fitness has a consistent method to record customer phone numbers? a. Format (Input Mask) b. Legal values c. Data type d. Validation...
The IT manager at Pitt Fitness is creating a backup of the company database. What is the best location for storing the backup? a. At the Downtown location b. Next to the current database for easy...
Suppose Pitt Fitness were using an enterprise-level DBMS when a thunderstorm caused a brief power loss to the database, stopping a class registration entry in midstream. When the power was fully...
Valerie has just found a cookie on the ground. She is concerned that the cookie contains raisins, which she really dislikes but she still wants to eat the cookie. If she eats the cookie and it...
Pitt Fitnesss IT person backs up the database every day at the end of business hours. After completing their evening classes, customers register for classes for the upcoming week. Assume that a...
Popular classes at Pitt Fitness fill up almost immediately. What database technique would work well to determine which people should be admitted into a popular class based on when they requested...
The new DBA at Pitt Fitness is working on catalog services in Microsoft Access. This employee has published an internal report on the database schema, but the managers receiving this report are...
GitHub and BitBucket are popular websites for . a. Hosting projects that use the Git language for version control b. Completing full-stack web app projects c. Posting technical questions and...
Which of the following changes to a database would most likely require the most rework to existing programs and queries? a. Adding a new field to a table b. Creating a new index c. Changing...
Which of the following is not a constraint on the primary key field for a table? a. There may be no null values. b. All values must be unique. c. All values must have a matching value in the foreign...
Pitt Fitness would like to analyze their options for an in-house database versus a cloud database-as-a-service. What are the benefits to moving their database to the cloud?
Which SQL statement would give user cyclone1 the ability to select, insert, update, or delete records from the Students table? a. GRANT SELECT, INSERT on STUDENTS to cyclone1 b. GRANT ALL on STUDENTS...
Which feature potentially helps you recover data in an Access database? a. Journaling b. Incremental backups c. Two-step locking d. Compact and repair
Data consistency means . a. Allowing two or more users to access the database at the same time b. Giving each user a consistent view of the data including changes c. Using properties such as the...
Which of the following tables could be considered a composite entity in an ERM and a junction table in an E-R diagram? a. ClassInstructors b. Instructors c. Customers d. Classes
Which of the following tables could be considered a composite entity in an ERM and a junction table in an E-R diagram? a. Classes b. Instructors c. Reservations d. Customers
What is the relationship between the tables Classes and Customers? a. One to one b. One to many c. Many to many d. The tables arent related.
What is the relationship between the tables Instructors and Classes? a. One to one b. One to many c. Many to many d. The tables arent related.
Recall that for a standard HMM the Elapse Time update and the Observation update are of the respective forms: P(X t | e 1:t1 ) = xt1 P(X t | x t1 )P(x t1 | e 1: t1 ) P(X t | e 1:t ) P(X t | e 1:t1...
By the year 2021, the European Union will have a database of fingerprints, photographs for facial recognition, passport numbers and birth dates of all its 350 million citizens. Data that are...
What is the relationship between the tables Classes and Reservations? a. One to one b. One to many c. Many to many d. The tables arent related.
What field(s) in the Customers table would be the most appropriate for a CustomerName index? a. LastName b. LastName and FirstName c. LastName, FirstName, and BirthDate d. CustomerID
For the table Customers (CustomerID, LastName, FirstName, StreetAddress, City, State, ZipCode, EmailAddress, PhoneNumber, BirthDate), which of the following is a secondary key? a. LastName, FirstName...
Suppose you are the architect being hired. What questions would you ask about the company with which youre interviewing, related to the areas listed in Section 25.2? Try to answer this question from...
For the table Customers (CustomerID, LastName, FirstName, StreetAddress, City, State, ZipCode, EmailAddress, PhoneNumber, BirthDate), which field is a foreign key? a. LastName b. CustomerID c. There...
For the table Customers (CustomerID, LastName, FirstName, StreetAddress, City, State, ZipCode, EmailAddress, PhoneNumber, BirthDate), which field is the primary key field? a. LastName b. BirthDate c....
Which of the following is not a feature that Access uses to demonstrate and leverage the power of one-to-many relationships? a. Subdatasheets b. Lookup properties c. Automatically refreshing related...
Western Digital, a developer of storage devices and solutions, has grown dramatically since it was established in 1970. Based in San Jose, California, they employ more than 61,000 with locations...
In 1919 Lionel Langley opened his first bakery store, which he named after his wife, Lilly. Initially he sold only breads, cakes, and flour to his customers. Through the years, the business expanded...
Megan Simpson, manager of western regional sales at the Whitefield Company, requested that the IS department develop a sales force communication and tracking system that would enable her to better...
In the Relationships window of the JC Consulting database, which primary key field does not participate in a one-to-many relationship? a. ProjectLineItemID b. ProjectID c. TaskID d. All primary key...
Which of the following best describes the Zips table in DBDL if City is often used for sorting? a. Zips (City, Zip) PK Zip SK City b. Zips (City, Zip) PK Zip c. Zips (City, Zip) PK Zip FK City d....
Select two of the implementation size user stories you developed in Exercise 2. Develop a set of acceptance criteria for each of these user stories. Data from Exercises 2 Select one of the epic user...
Alex Schuster began Pine Valley Furniture (PVF) as a hobby. Initially, Alex would build custom furniture in his garage for friends and family. As word spread about this quality craftsmanship, he...
Select one of the epic user stories you developed in Exercise 1 that you believe has high value to the organization. Break this user story into implementation size user stories. Data from Exercises...
American Labs provides lab testing services for a variety of clients, mostly doctors offices and other small medical businesses throughout the Midwest. Clients send test vials containing blood...
Few niches crashed more spectacularly during Web 1.0 than the pet sector. In 2000, over just nine months, Pets.com managed to raise a jaw-dropping $82.5 million in an IPO, air a $1.2 million Super...
Using Table 7-1 as a guide, develop a script of at least ten questions you would ask during an interview of the customer-order processing department manager at Pine Valley Furniture. Assume the focus...
As the lead analyst on the Hoosier Burger project, you have been busy collecting, structuring, and evaluating the new systems requirements. During a Monday morning meeting with Bob and Thelma, the...
A huge retail store must carefully manage its inventory levels. Stock-outs (where there is none of an item on a shelf) can cause missed sales, while too much inventory costs the company money in...
Evergreen Nurseries offers a wide range of lawn and garden products to its customers. Evergreen Nurseries conducts both wholesale and retail operations. Although the company serves as a wholesaler to...
Pet owners often have difficulty locating petsitters for their pets, boarding their pets, or just getting the pets to the veterinarian. Recognizing these needs, Gladys Murphy decided to open Pet...
How would you write the DBDL for the five tables in the student-advisor-assignments.accdb Access database?
Why is a help desk function critical to system development? Discuss its interrelationship with the problem management and reporting system.
During your time as a Pine Valley Furniture intern, you have learned much about the systems analysis and design process. You have been able to observe Jim Woo as he serves as the lead analyst on the...
As college students in the 1970s, Bob and Thelma Mellankamp often dreamed of starting their own business. While on their way to an economics class, Bob and Thelma drove by Myrtles Family Restaurant...
Pine Valley Furnitures Customer Tracking System project is now ready to move into the systems design phase. You are excited because this phase involves designing the new systems forms, reports, and...
Match each of the key terms above with the definition that best fits it. Systems development methodology ____ The complex organizational process whereby computerbased information systems are...
Match each of the key terms above with the definition that best fits it. Systems development life cycle (SDLC) ____ The complex organizational process whereby computerbased information systems are...
Match each of the key terms above with the definition that best fits it. Systems analyst ____ The complex organizational process whereby computerbased information systems are developed and...
Match each of the key terms above with the definition that best fits it. Rational Unified Process (RUP) ____ The complex organizational process whereby computerbased information systems are developed...
Match each of the key terms above with the definition that best fits it. Planning ____ The complex organizational process whereby computerbased information systems are developed and maintained. ____...
Match each of the key terms above with the definition that best fits it. Physical design ____ The complex organizational process whereby computerbased information systems are developed and...
Match each of the key terms above with the definition that best fits it. Object-oriented analysis and design (OOAD) ____ The complex organizational process whereby computerbased information systems...
Match each of the key terms above with the definition that best fits it. Object class ____ The complex organizational process whereby computerbased information systems are developed and maintained....
Match each of the key terms above with the definition that best fits it. Object ____ The complex organizational process whereby computerbased information systems are developed and maintained. ____...
Which operations can isolate a field in a word? 1. AND 2. A shift left followed by a shift right
For a given function, which programming language likely takes the most lines of code? Put the three representations below in order. 1. Java 2. C 3. MIPS assembly language
Match each of the key terms above with the definition that best fits it. Maintenance ____ The complex organizational process whereby computerbased information systems are developed and maintained....
Match each of the key terms above with the definition that best fits it. Logical design ____ The complex organizational process whereby computerbased information systems are developed and maintained....
Given the importance of registers, what is the rate of increase in the number of registers in a chip over time? 1. Very fast: They increased as fast as Moores law, which predicted doubling the number...
Match each of the key terms above with the definition that best fits it. Inheritance ____ The complex organizational process whereby computerbased information systems are developed and maintained....
Match each of the key terms above with the definition that best fits it. Information systems analysis and design ____ The complex organizational process whereby computerbased information systems are...
What is the decimal value of this 64-bit twos complement number? 1111 1111 11111111 1111 11111111 1111 11111111 1111 11111111 11111111 1000 2)-8 3) -16, 4) 18,446,744,073,709,551.608. What is the...
What MIPS instruction does this represent? Choose from one of the four options below. op rs 8 00 rt 9 rd 10 shamt funct 0 34 1. sub $t0, $t1,$t2 2. add $t2, $t0, $t1 3. sub $t2, $t1, $t0 4. sub $t2,...
Match each of the key terms above with the definition that best fits it. Implementation ____ The complex organizational process whereby computerbased information systems are developed and maintained....
Match each of the key terms above with the definition that best fits it. Design ____ The complex organizational process whereby computerbased information systems are developed and maintained. ____...
Which of the following statements about C and Java are generally true? 1. C programmers manage data explicitly, while its automatic in Java. 2. C leads to more pointer bugs and memory leak bugs than...
Match each of the key terms above with the definition that best fits it. Application software ____ The complex organizational process whereby computerbased information systems are developed and...
Match each of the key terms above with the definition that best fits it. Integration testing ____ A testing technique in which participants examine program code for predictable language-specific...
Add the following instructions to the computer of Sec 7-3 (EA is the effective address). Write the symbolic microprogram for each routine as in Table 7-2. (Note that AC must not change in value...
Which of the advantages of an interpreter over a translator do you think was most important for the designers of Java? 1. Ease of writing an interpreter 2. Better error messages 3. Smaller object...
True or false: Because the register file is both read and written on the same clock cycle, any MIPS datapath using edge-triggered writes must have more than one copy of the register file.
Write down the binary bit pattern assuming a format similar to that employed by the DEC PDP-8 (the leftmost 12 bits are the exponent stored as a twos complement number, and the rightmost 24 bits are...
Calculate A (B + C) by hand, assuming A, B, and C are stored in the modified 16-bit NVIDIA format described in 3.11.2 (and also described in the text). Assume 1 guard, 1 round bit, and 1 sticky bit,...
When silicon chips are fabricated, defects in materials (e.g., silicon) and manufacturing errors can result in defective circuits. A very common defect is for one signal wire to get broken and always...
1. True or false: Since the jump instruction does not depend on the register values or on computing the branch target address, it can be completed during the second state, rather than waiting until...
NVIDIA has a half format, which is similar to IEEE 754 except that it is only 16 bits wide. The leftmost bit is still the sign bit, the exponent is 5 bits wide and stored in excess-56 format, and the...
Add NOP instructions to the code below so that it will run correctly on a pipeline that does not handle data hazards. addi $s0, $s1, 5 add $s2, $s0, $s1 addi $s3, $s0, 15 add $s4, $s2, $s1
Examine the difficulty of adding a proposed lwi.drd, rsl, rs2 (Load With Increment) instruction to MIPS. Interpretation: Reg[rd] = Mem[Reg[rs1] + Reg[rs2]] 1. Which new functional blocks (if any) do...
When we use gcc to compile combine3 with command-line option -02, we get code with substantially better CPE performance than with -01: We achieve performance comparable to that for combine4, except...
For a write-back, write-allocate cache, assuming 30% of replaced data cache blocks are dirty, what are the minimal read and write bandwidths needed for a CPI of 2? Consider the following program and...
Write a query to display the customer code, balance, and total purchases for each customer. Total purchase is calculated by summing the line subtotals (as calculated in Problem 12) for each customer....
In the following table, does all the data conform to empno name?
Two clerks at Pitt Fitness need to update an address in the Access database for the customer Min Jee Choi. One clerk sees a note about updating the address and begins to edit Min Jees record. At the...
The new IT person hired by Pitt Fitness is becoming familiar with the database and requests the database schema. How can you generate the schema from the current Access database? a. Click the All...
The Pitt Fitness program director wants to list customer last names and first names along with the classes they are taking. He creates a query using the Customers and Classes tables. In the query...
I. C has many statements for decisions and loops, while MIPS has few. Which of the following do or do not explain this imbalance? Why? 1. More decision statements make code easier to read and...
I. Which of the following statements about characters and strings in C and Java are true? 1. A string in C takes about half the memory as the same string in Java. 2. Strings are just an informal...
I. What is the range of addresses for conditional branches in MIPS (K = 1024)? 1. Addresses between 0 and 64 K1 2.Addresses between 0 and 256 K1 3.Addresses up to about 32 K before the branch to...
How many of the five classic components of a computershown in Figures 4.1 and 4.2 include? Figure 4.1 Figure 4.2 PC Add Address Instruction Instruction memory Add Data Register # Registers Register...
I. Which of the following is correct for a load instruction? Refer to Figure 4.10. a.MemtoReg should be set to cause the data from memory to be sent to the register file. b.MemtoReg should be set to...