For each of the following requirements, identify the best choice of degree of durability in a remote backup system: a. Data loss must be avoided but some loss of availability may be tolerated. b....
In typical clientserver systems the server machine is much more powerful than the clients; that is, its processor is faster, it may have multiple processors, and it has more memory and disk capacity....
What form of parallelism (interquery, interoperation, or intraoperation) is likely to be the most important for each of the following tasks? a. Increasing the throughput of a system with many small...
Every year the Loebner prize is awarded to the program that comes closest to passing a version of the Turing test. Research and report on the latest winner of the Loehner prize. What techniques does...
Surely animals, humans, and computers cannot be intelligentthey can do only what their constituent atoms are told to do by the laws of physics. Is the latter statement true, and does it imply the...
Both the performance measure and the utility function measure how well an agent is doing. Explain the difference between the two.
This exercise explores the differences between agent functions and agent programs. a. Can there be more than one agent program that implements a given agent function? Give an example, or show why one...
Let us examine the rationality of various vacuum-cleaner agent functions. a. Show that the simple vacuum-cleaner agent function described in Figure is indeed rational tinder the assumptions listed....
Explain why problem formulation must follow goal formulation.
Consider a state space where the start state is number 1 and the successor function for state n returns two states, numbers 2n and 2n + 1. a. Draw the portion of the state space for states 1 to 15....
We said that we would not consider problems with negative path costs. In this exercise, we explore this in more depth. a. Suppose that actions can have arbitrarily large negative costs; explain why...
Solve the crypt arithmetic problem in Figure by hand, using backtracking, forward checking, and the MRV and least-constraining-valueheuristics. F) R T WO + T W O FOUR ( (X2 (, (b)
Consider the following procedure for choosing moves in games with chance nodes; Generate some die-roll sequences (say, 50) down to a suitable depth (say, 8). With known die rolls, the game tree...
Represent the following sentences in first-order logic, using a consistent vocabulary (which you must define): a. Some students took French in spring 2001. b. Every student who takes French passes...
In this exercise, we will consider the implementation of search algorithms in Prolog. Suppose that successor (X, Y) is true when state Y is a successor of state X; and that goal (X) is true when X is...
From Horses are animals: it follows that The head of a horse is the head of animal. Demonstrate that this inference is valid by carrying out the following steps: a. Translate the premise and the...
In the blocks world we were forced to introduce two STRIPS actions, Move and Move to Table, in order to maintain the clear predicate properly. Show how conditional effects can be used to represent...
Consider the family of linear Gaussian networks, as illustrated. a. In a two-variable network, let X1 he the parent of X2, let X1 have a Gaussian prior, and let P (X2, X1) be a linear Gaussian...
The probit distribution defined, describes the probability distribution for a Boolean child, given a single continuous parent. a. How might the definition be extended to cover multiple continuous...
This exercise is concerned with the variable elimination algorithm in Figure. a. Section 14.4 applies variable elimination t the query P (Burglary?JohnCalls = true, Mary Calls = true). Perform the...
Consider the 4 x 3 world shown in Figure. a. Implement an environment simulator for this environment, such that the specific geography of the environment is easily altered. Some code for doing this...
Suppose you are running a learning experiment on a new algorithm. You have a data set consisting of 2 examples of each of two classes. Yon plan to use leave-one-nut cross-validation. As a baseline,...
Recall from that there are 22n distinct Boolean functions of n inputs. How many of these are representable by a threshold perceptron?
Consider the sentence ?Someone walked slowly to the supermarket? and the following lexicon: Pronoun ? someone V ? walked Adv ? slowly Prep ? to Det ? the Noun ? supermarket Which of the following...
Define project management.
Build a Gantt chart based on the following list of tasks and dependencies to build and test a screen form for a new system. Identify the criticalpath. Task ID Description Duration [days Predecessor...
You are a team leader of four systems analysts. You have one analyst who has never done a structured walkthrough of her work. How would you help the analyst to get started? How would you ensure that...
1. Now consider the way the project was probably initiated. To what extent is the project the result of (a) An opportunity, (b) A problem, or (c) A directive? 2. Many of the system users (such as...
Interpret and explain the use case diagram in Figure. Explain the various roles of those using the system and the functions that each role requires. Explain the relationships and the ways the use...
In Chapter 7, Thinking Critically exercises 7, 8, and 10, you developed a system sequence diagram for Add a new vehicle to an existing policy. You were also provided a list of classes. Based on the...
Compare the strengths and weaknesses of using a DFD to define inputs with using a system sequence diagram to define inputs. Which do you like the best? Why?
Assume the same facts as presented in the Chapter 8 Reliable Pharmaceutical case. Also assume that you are the project manager for the selected vendors development team. Your company, Rx Tech Sys,...
In Chapter 7, you developed a use case diagram, a fully developed use case description, and a system sequence diagram for the use cases add a seller and Record a book order. In Chapter 11 you...
A library makes an excellent information systems model. It serves as a very large information storage facility with text, audio, and video data archives. Look up the definitions for each term listed...
What are some of the toughest management challenges in developing IT solutions to solve business problems and meet new business opportunities?
Consider the virtual reality technologies employed by Procter & Gamble and described in this case. Break into small groups and brainstorm applications of these types of technologies for companies in...
Refer to the Real World Case on speech recognition in health care in the chapter. Although these and other technologies are becoming more prevalent in health care, doctors have traditionally been...
What are several important computer hardware developments that you expect to happen in the next 10 years? How will these affect the business use of computers?
The case talks about electronic medical or health records systems. These are slowly becoming standard in many hospitals and clinics, both private and public. Go online and search for reports of these...
XBRL stands for extensible Business Reporting Language, and it is one of the family of XML languages that is becoming standard for business communication across companies. Among other uses, the...
The legal and regulatory environment of the health care industry has changed significantly in recent times. How does this affect technology development and implementation in these organizations. Go...
Ms. Sapper, a marketing manager in a global accounting firm, was this years coordinator for her firms annual partner meeting. With 400 partners from around the world, Sapper faced daunting...
How can Internet technologies be involved in improving a process in one of the functions of business? Choose one example and evaluate its business value.
1. What are some of the business benefits of the technologies described in the case? Provide several examples beyond the mere automation of transaction-oriented processes. 2. Do you think the...
The CRM implementations in this case highlight the critical importance of information about customers, their preferences and activities, and how to use it to understand and develop better marketing...
Refer to the real-world example about copying CDs and music downloading in the chapter. Is copying music CDs an ethical practice? How about Internet music downloading? Explain.
Compare and contrast BPA, BPI, and BPR. Which is most risky? Which has the greatest potential value?
Describe two special issues that may be important to list on a system request.
The Spyware Problem Web surfers may feel anonymous as they use the Internet, but that feeling isnt always justified. IP addresses, cookies, site log-in procedures, and credit card purchases all help...
List two intangible benefits. Describe how these benefits can be quantified.
Explain the net present value and return on investment for a cost-benefit analysis. Why would these calculations be used?
Reread the "Your Turn 1-2" box (Implementing a Satellite Data Network). Create a list of the stakeholders that should be considered in a stakeholder analysis of this project.
How might the Internet, intranets, and extranets affect the business drivers or requirements responsible for a companys use of global IT, as shown in Figure? Give several examples to illustrate...
Describe the major elements and issues with system prototyping.
Compare and contrast extreme programming and throwaway prototyping.
I conducted a case study at Carlson Hospitality, a global leader in hospitality services, encompassing more than 1300 hotel, resort, restaurant, and cruise ship operations in 79 countries. One of its...
Describe the differences between a technical lead and a functional lead. How are they similar?
Describe three types of standards, and provide examples of each.
What belongs in the project binder? How is the project binder organized?
In 1997, Oxford Health Plans had a computer problem that caused the company to overestimate revenue and underestimate medical costs. Problems were caused by the migration of its claims processing...
Discuss problem analysis as an analysis strategy. What are the strengths and limitations of this technique?
Compare and contrast duration analysis and activity based costing. What role do these activities play as analysis strategies?
How can informal benchmarking contribute to requirements determination?
One of the most common mistakes made by new analysts is to confuse functional and nonfunctional requirements. Pretend that you received the following list of requirements for a sales system:...
Discuss how the analyst knows how to stop decomposing the process model into more and more levels of detail.
Why would one use a decision tree and/or decision table in a process description?
How can you make a DFD easier to understand?
Describe the three-step process of creating an intersection entity.
What is a CRUD matrix? How does it relate to process models and data models?
A large direct health and insurance medical provider needed an enterprise information management (EIM) system to enable enterprise wide information management and to support the effective use of data...
Suppose that your university were interested in creating a new course registration system that could support Web-based registration. QUESTION: What should the university consider when determining...
Distinguish between a traditional ASP and a provider of software as a service. What are the pros and CMS of each solution approach?
Think about the course registration system in your university. First, develop a set of nonfunctional requirements as if the system were to be developed today. Consider the operational requirements,...
What is meant by the term scalable? What is its importance in architecture selection?
Explain the term Virtualization.
Describe cloud computing and how it is impacting architecture choices.
What is meant by system value? Explain how various systems can have a different value to the organization.
What is the purpose of the hardware and software specification?
What do you think are the most important security issues for a system?
Pretend that you have been charged with the task of redesigning the interface for the ATM at your local bank. Develop an interface standard that includes metaphors, objects, actions, icons, and a...
Design a navigation system for a form into which users must enter information about customers, products, and orders. For all three information categories, users will want to change, delete, find one...
Why is content awareness important?
How can different parts of the interface be consistent?
Why are interface standards important?
How can you prevent mistakes?
Describe five types of messages.
What is context-sensitive help? Does your word processor have context-sensitive help?
Explain three principles in the design of inputs.
Why is capturing data at the source important?
Why is input validation important?
When would you use electronic reports rather than paper reports, and vice versa?
What do you think are three common mistakes that novice analysts make in interface design?
How would you improve the form inFigure? EMPLOYEE PERSONNEL REPORI UNIVIRSITY (W GEORGIA DOCURENT MO r DEPARTMENT PHONE | LEGE OR DIVISION D (C) DRRENT CP, PREVIOS DATE SOC.SEC H STREET OR ROUTE No....
Ask Jeeves (www.askjeeves.com) is an Internet search engine that uses natural language. Experiment with it and compare it with search engines that use key words.
What does a data couple depict on a structure chart? A control couple?
It is preferable for a control couple to flow in one particular direction on the structure chart. Which direction is preferred, and why?
What is meant by the characteristic of module cohesion? What is its role in structure chart quality?
Identify the kinds of coupling that are represented in the followingsituations: Customer Customer Customer Record Address City, State. ZIP Record PRINT MAILING LIST PRINT MAILING LIST PRINT MAILING...
Create a program specification for module 1.1.3.1 on the structure chart inFigure. 10 DF D Dagam Pronote Tunen Soarch and Fom tavel 13.1 12.3 From Use Cases and 1232 11.3 Soloct Tune Gathar into
Create a program specification for module 1.2.3.4 on the structure chart in Figure. romote 1.2.1 Fron Use Cases and 1232 1.233 123 Gathor 1132 Solact Tuns