The first statement that follows assigns a string to variable people, whereas the subsequent four assignments split people into various arrays. For each of these statements, draw the memory cell...
What are Michael Porter's three strategies for successfully competing in the marketplace?
1. A point-of-sale (POS) system slows down service by reading the universal product codes (UPCs) on items in your shopping cart. True or False? 2. Organizations use social networking sites to give...
The sample table below shows 11 of the students enrolled in an MIS course. Organize the data in a relational format, and use Microsoft Access to list all ACC majors, all ACC majors with a GPA higher...
What are two reasons for the failure of an EIS?
What are two features of the robot named Cozmo?
What are five categories of NLP systems?
What is 2100 (mod 5)?
Write a recursive method that returns the number of 1's in the binary representation of N. Use the fact that this is equal to the number of 1's in the representation of N/2, plus 1, if N is odd.
Order the following functions by growth rate: N, N, N1.5, N2, N logN, N log logN, N log2 N, N log(N2), 2/N, 2N, 2N/2, 37, N2 logN, N3. Indicate which functions grow at the same rate.
a. Write an array implementation of self-adjusting lists. In a self-adjusting list, all insertions are performed at the front. A self-adjusting list adds a find operation, and when an element is...
Efficiently implement a stack class using a singly linked list, with no header or tail nodes.
Keys 1, 2, . . . , 2k 1 are inserted in order into an initially empty AVL tree. Prove that the resulting tree is perfectly balanced.
Design a recursive linear-time algorithm that tests whether a binary tree satisfies the search tree order property at every node.
Write a method that takes as input a binary search tree, T, and two keys k1 and k2, which are ordered so that k1 k2, and prints all elements X in the tree such that k1 Key(X) k2. Do not assume any...
Implement a hopscotch hash table and compare its performance with linear probing, separate chaining, and cuckoo hashing.
Merge the two leftist heaps in Figure 6.58. 11 (10 12 17 (18) 11 21 18 15 (31)
Show that the expected depth of the kth smallest element in a large complete heap (you may assume N = 2k 1) is bounded by log k.
We are given an array that contains N numbers. We want to determine if there are two numbers whose sum equals a given number K. For instance, if the input is 8, 4, 1, 6, and K is 10, then the answer...
Assume that the Hamiltonian cycle problem is NP-complete for undirected graphs. a. Prove that the Hamiltonian cycle problem is NP-complete for directed graphs. b. Prove that the unweighted simple...
The baseball card collector problem is as follows: Given packets P1, P2, . . . , PM, each of which contains a subset of the year's baseball cards, and an integer K, is it possible to collect all the...
a. Give an example where Dijkstra's algorithm gives the wrong answer in the presence of a negative edge but no negative-cost cycle. b. Show that the weighted shortest-path algorithm suggested in...
a. Use the exponentiation algorithm to prove that 2340 1 (mod 341). b. Show how the randomized primality test works for N = 561 with several choices of A.
A convex polygon is a polygon with the property that any line segment whose endpoints are on the polygon lies entirely within the polygon. The convex hull problem consists of finding the smallest...
Show that if the symbols are sorted by frequency, Huffman's algorithm can be implemented in linear time.
What are the most common types of computer-based information systems used in business organizations today? Give an example of each.
Identify at least six characteristics of valuable information.
What is a knowledge management system? Give an example.
Describe the "ideal" automated vehicle license plate renewal system for the drivers in your state. Describe the input, processing, output, and feedback associated with this system.
What is the total cost of ownership?
A video movie rental store is using a relational database to store information on movie rentals to answer customer questions. Each entry in the database contains the following items: Movie ID No....
Instant messaging is being widely used today. Describe how this technology could be used in a business setting. Are there any drawbacks or limitations to using instant messaging in a business setting?
Your company is about to develop a new Web site. Describe how you could use Web services for your site.
Identify and briefly describe three m-commerce applications you or a friend have used.
Assume that you are the owner of a large landscaping firm serving hundreds of customers in your area. Identify the kinds of customer information you would like to have captured by your firm's CRM...
You are the new head of corporate security for a large Fortune 1000 company and are alarmed at the number of laptop computers your firm's employees lose each month. What actions would you take to cut...
Refer to your answer to Problem and Exercise 2-44 in Chapter 2. Develop entity clusters for this E-R diagram and redraw the diagram using the entity clusters. Explain why you chose the entity...
Refer to your answer to Problem and Exercise 3-24. Develop entity clusters for this E-R diagram and redraw the diagram using the entity clusters. Explain why you chose the entity clusters you used.
A project team has estimated the costs associated with the development and maintenance of a new system. One approach requires a more complete design and will result in a slightly higher design and...
Assume that your project team has been working for three months to complete the systems design of a new Web-based customer ordering system. Two possible options seem to meet all users' needs. The...
Draw an EER diagram for the following problem using this text's EER notation, the Visio notation, or the subtypes inside supertypes notation, as specified by your instructor. A nonprofit organization...
Companies in Canada are racing to see who can motivate Canadians to start paying at the register with their cell phones. You are probably familiar with MasterCard's PayPass technology that allows...
The Public Safety office at Millennium College maintains a list of parking tickets issued to vehicles parked illegally on the campus. Table 4-6 shows a portion of this list for the fall semester....
The use of information systems saves workers and businesses countless hours of tedious labor. Still, users of information systems often become frustrated with the system's inability to grasp simple...
System development projects get started for a variety of reasons. Often, they are intended to support a company's strategic plans. Other times they are launched out of necessity, such as to comply...
The president of the Specialty Paint Corp. gets the idea to work with a local beer brewer to produce an invisible beer can (as an anti-litter measure). The president tells her legal department to...
What is the difference, if any, between the demodulator part of a modem and the coder part of a codec? (After all, both convert analog signals to digital ones.)
What is the minimum overhead to send an IP packet using PPP? Count only the overhead introduced by PPP itself, not the IP header overhead.
A large number of consecutive IP address are available starting at 198.16.0.0. Suppose that four organizations, A, B, C, and D, request 4000, 2000, 4000, and 8000 addresses, respectively, and in that...
In our example transport primitives of Fig. 6-2, LISTEN is a blocking call. Is this strictly necessary? If not, explain how a non-blocking primitive could be used. What advantage would this have over...
A person's e-mail address is his or her login name @ the name of a DNS domain with an MX record. Login names can be first names, last names, initials, and all kinds of other names. Suppose that a...
A weak entity set can always be made into a strong entity set by adding to its attributes the primary key attributes of its identifying entity set. Outline what sort of redundancy will result if we...
Design a generalizationspecialization hierarchy for a motor-vehicle sales company. The company sells motorcycles, passenger cars, vans, and buses. Justify your placement of attributes at each level...
Consider the representation of a ternary relationship using binary relationships as described in Section 2.4.3 (shown in Figure b) a. Show a simple instance of E, A, B, C, RA, RB, and RC that cannot...
Consider as shown below, and suppose that authors could also appear as top level elements. What change would have to be done to the relational schema? similar PCDATA declarations for year,...
Write a query in XQuery on the XML representation as shown below to find the total balance, across all accounts, at each branch. A-101 Downtown 500 A-102 Perryridge 400 A-201 Brighton 900 Johnson...
Are reflex actions (such as moving your hand away from a hot stove) rational? Are they intelligent?
For each of the following agents, develop a PEAS description of the task environment: a. Robot soccer player, b. Internet book-shopping agent; c. Autonomous Mars rover; d. Mathematicians...
The vacuum environments in the preceding exercises have all been deterministic. Discuss possible agent programs for each of the following stochastic versions: a. Murphys Law twenty-five percent of...
Show that the 8-puizle states are divided into two disjoint sets, such that no state in one set can be transformed into a state in the other set by any number of moves. Devise a procedure that will...
Does a finite state space always lead to a finite search tree? How about a finite state space that is a tree? Can you be more precise about what types of state spaces always lead to finite search...
The heuristic path algorithm is a best-first search in which the objective function is f(n) = (2 w) g(n) + wh(n). For what values of w is this algorithm guaranteed o be optimal? (You may assume that...
Prove each of the following statements: a. Breadth-first search is a special case of uniform-cost search. b. Breadth-first search, depth-first search, and uniform-cost search are special cases of...
Consider the following logic puzzle: In five houses, each with a different color, live 5 persons of different nationalities, each of whom prefer a different brand of cigarette, a different drink, and...
This exercise looks into the relationship between clauses and implication sentences. a. Show that the clause (P1 V . . . V Pm VQ) iS logically equivalent to the implication sentence (P1 . . . Pm)...
Prove the following assertions about planning graphs: a. A literal that does not appear in the final level of the graph cannot he achieved. b. The level cost of a literal in a serial graph is no...
List and briefly describe the characteristics that an analyst examines when choosing or defining the deployment environment.
Develop a use case diagram for the university library system. Part a. Based on the following descriptions; list the use cases and actors. Patrons have access to the library information to search for...
To review your skills in developing a class diagram, develop a domain model class diagram, including associations and multiplicities, based on the following narrative. A clinic with three dentists...
Given the following list of classes and relationships for the previous car insurance system, list the preconditions and the post conditions for the Add a new vehicle to an existing policy use case....
The right side of Figure shows a system that simulates the manufacture of computer chips. The equations in the simulation system are based on statistical probabilities of failures in the...
How does the use of the Internet, intranets, and extranets by companies today support their business processes and activities?
Small businesses have been slower to integrate information technology into their operations than larger companies. Break into small groups with your classmates to discuss the reasons for this state...
How could a business use information technology to increase switching costs and lock in its customers and suppliers? Use business examples to support your answers.
How could a business use Internet technologies to form a virtual company or become an agile competitor?
What is the business value driving so many companies to install and extend intranets rapidly throughout their organizations?
Refer to the Real World Case on telepresence in the chapter. What seems to be the difference between videoconferencing and telepresence? Given the discussion on the latter in the case, does...
What are the most important HR applications a company should offer to its employees via a Web-based system? Why?
How could sales force automation affect salesperson productivity, marketing management, and competitive advantage?
How do you think the possession or access to certain information shapes the political dynamics of organizations? Do you believe companies should be open about widespread access to information, or...
What are several business decisions that you will have to make as a manager that have both ethical and IT dimensions? Give examples to illustrate your answer.
Remote Point of Sales in Mexico Melissa and Rook Nelson, co-owners of Skydive Chicago, shut down their northern operations in mid- December each year. With heavy cloud cover and frigid temperatures,...
Refer to the Real World Case on the globalization challenges faced by CIOs in the chapter. All those mentioned are CIOs from headquarters who went abroad, but there is no mention of CIOs from...
What are the six general skills all project team members should have?
What are the major roles on a project team?
Describe the principal steps in the planning phase. What are the major deliverables?
Describe the principal steps in the design phase. What are the major deliverables?
Describe the principal steps in the implementation phase. What are the major deliverables?
Describe the four steps of business process management. Why do companies adopt BPM as a management strategy?
What is the purpose of an approval committee? Who is usually on this committee?
Social Engineering An employee who needs permission to access an electronic workspace, database, or other information systems resource typically fills in a request form and obtains approval from the...
Describe a "risky" project in terms of technical feasibility. Describe a project that would not be considered risky.
Select a computer-aided software engineering (CASE) tooleither one that you will use for class, a program that you own, or a tool that you can examine over the Web. Create a list of the capabilities...
Some companies hire consulting firms to develop the initial project plans and manage the project, but use their own analysts and programmers to develop the system. Why do you think some companies do...
Pretend that your instructor has asked you and two friends to create a Web page to describe the course to potential students and provide current class information (e.g., syllabus, assignments,...
In April 1999, one of Capital Blue Cross' health-care insurance plans had been in the field for three years, but hadn't performed as well as expected. The ratio of premiums to claims payments wasn't...
Suppose that you are an analyst for the ABC Company, a large consulting firm with offices around the world. The company wants to build a new knowledge management system that can identify and track...
Pretend that the career services office at your university wants to develop a system that collects student rsums and makes them available to students and recruiters over the Web. Students should be...
Why is document analysis useful? What insights into the organization can it provide?
What role does iteration play in developing use cases?