One of the most difficult aspects of using the single location approach to installation is choosing an appropriate location. What factors should be considered in picking a pilot site?
Specify the following views as queries in XQuery on the company XML schema shown in Figure 13.5. a. A view that has the department name, manager name, and manager salary for every department b. A...
Consider the ER diagram in Figure 3.24. Assume that a course may or may not use a textbook, but that a text by definition is a book that is used in some course. A course may not use more than five...
Specify the following queries in SQL on the COMPANY relational database schema shown in Figure 5.5. Show the result of each query if it is applied to the COMPANY database in Figure 5.6. a. Retrieve...
Visit the website for an IT magazine and find an article that discusses business cases. Summarize the article and what you learned from it.
List three characteristics each of traditional and web-based development.
Many financial tools are developed using Microsoft Excel. Identify three applications built using Excel, and describe how they are used in an organization.
How does cloud computing support Web 2.0 applications?
Which symbol is not used in a context diagram?
Specify the following queries in relational algebra on the database schema given in Exercise 5.14: a. List the Order# and Ship_date for all orders shipped from Warehouse# W2. b. List the WAREHOUSE...
Consider the following functional dependencies: Applicant_ID S Applicant_Name Applicant_ID S Applicant_Address Position_ID S Position_Title Position_ID S Date_Position_Opens Position_ID S Department...
Repeat Laboratory Exercises 8.34 through 8.38 in domain relational calculus (DRC) by using the DRC interpreter. Exercises 8.34 Specify and execute the following queries in relational algebra (RA)...
Consider the design of a registration system for a hotel. Following the design specification items in Figure 11-2, briefly describe the relevant users, tasks, and displays involved in such a system....
What has been the impact of the Internet on system architecture?
Suppose that several secondary indexes exist on nonkey fields of a file, implemented using option 3 of Section 17.1.3; for example, we could have secondary indexes on the fields Department_code,...
What is client/server architecture?
What are the three functions that every business information system must carry out, irrespective of system architecture?
What are three emerging trends in user interface design?
Go to the Internet and find commercial websites that demonstrate each of the common errors listed in Table 11-15. Table 11-15. Error Description Avoid opening a new browser window when a user clicks...
What is output security?
What are the seven habits of successful interface designers?
Why is a transparent interface desirable?
What is SaaS?
List two reasons offshoring may be risky.
Why would a company choose in-house software development?
Adapt Algorithms 17.2 and 17.3, which outline search and insertion procedures for a B + -tree, to a B-tree. Algorithm 17.2. Searching for a Record with Search Key Field Value K, Using a B + -Tree n ...
How is the increased use of smartphones and tablets, with their smaller screen size, affecting user interface design practices?
Write programs that implement Algorithms 15.4 and 15.5. Algorithm 15.4 Relational Synthesis into 3NF with Dependency Preservation and Nonadditive Join Property Input: A universal relation R and a set...
Consider the COMPANY database described in Figure 5.6. Using the syntax of Oracle triggers, write active rules to do the following: a. Whenever an employees project assignments are changed, check if...
Suppose that the system crashes before the [read_item, T 3 , A] entry is written to the log in Figure 22.1(b). Will that make any difference in the recovery process? Figure 22.1(b) (b) A BCD 30 15 40...
What other or additional information should be collected on a System Service Request (see Figure 14-2) for maintenance? Figure 14-2 Pine Valley Furniture System Service Request REQUESTED BY Juanita...
Consider the foreign-key constraint from the dept name attribute of instructor to the department relation. Give examples of inserts and deletes to these relations that can cause a violation of the...
What trade-offs do write-optimized indices pose as compared to B+-tree indices?
Design a database for an airline. The database must keep track of customers and their reservations, flights and their status, seat assignments on individual flights, and the schedule and routing of...
Fill in the blanks below to complete the following Apache Spark program which computes the number of occurrences of each word in a file. For simplicity we assume that words only occur in lowercase,...
Does it make sense for FAME to use enterprise keys? If so, create the appropriate enterprise keys and revise the relational schema accordingly.
Design a collection of database tables for an online store from which you intend to sell products you handcraft. The data you need to store includes the following attributes: Product number Product...
When using the UML to describe a single system, most designers would use __________ . a. A single type of diagram b. At least three types of diagrams c. Most of the available types of diagrams d. All...
You use a ________ diagram when you want to emphasize the files, database tables, documents, and other components used by a systems software. a. State machine b. Component c. Deployment d. Use case
How does Apache Spark differ from Hadoop?
Why does an information gap still exist despite the surge in data in most firms?
Visit an organization that has implemented a database approach and interview individuals there about the security measures they take routinely. Evaluate each of the following at the organization: a....
At a top level, what are the main design variables in a multicore organization?
Let the language L be accepted by the transition graph T and let L not contain the word ba. We want to build a new TG that accepts exactly L and the word ba. (i) One suggestion is to draw an edge...
Listing 4.6 illustrates a problem created by following numeric input with line-oriented string input. How would replacing this: cin.getline(address,80); with this: cin >> address; affect the working...
Consider the class definitions of Programming Exercise 5 in Chapter 14,Reusing Code in C++. If you havent yet done that exercise, do so now.Then do the following: Write a program that uses standard...
Write a function with an old-style interface that has this prototype: int reduce(long ar[], int n); The actual arguments should be the name of an array and the number of elements in the array.The...
Rewrite the Stock class, as described in Listings 10.7 and 10.8 in Chapter 10 so that it uses dynamically allocated memory directly instead of using string class objects to hold the stock names. Also...
Redo Listing 7.7, modifying the three array-handling functions to each use two pointer parameters to represent a range. The fill_array() function, instead of returning the actual number of items...
Modify the Vector class header and implementation files (Listings 11.13 and 11.14) so that the magnitude and angle are no longer stored as data components. Instead, they should be calculated on...
Many state lotteries use a variation of the simple lottery portrayed by Listing 7.4. In these variations you choose several numbers from one set and call them the field numbers. For example, you...
Do Programming Exercise 1 from Chapter 9 but replace the code shown there with an appropriate golf class declaration. Replace setgolf(golf &, const char*, int) with a constructor with the appropriate...
Here is part of a program that reads keyboard input into a vector of string objects, stores the string contents (not the objects) in a file, and then copies the file contents back into a vector of...
Let L be some regular language in which all the words happen to have an even length. Let us de fine the new language Twist(L) to be the set of all the words of L twisted, where by twisted we mean the...
Consider the TooBig functor in Listing 16.15.What does the following code do, and what values get assigned to bo? bool bo = TooBig(10)(15); One functor (f100) is a declared object, and the second...
Compared to an array, a linked list features easier addition and removal of elements but is slower to sort.This raises a possibility: Perhaps it might be faster to copy a list to an array, sort the...
Modify Listing 16.9 (vect3.cpp) as follows: Heres a sample run of the program in Listing 16.9: Enter book title (quit to quit): The Cat Who Can Teach You Weight Loss Enter book rating: 8 Enter book...
Modify Listing 15.11 so that the two exception types are classes derived from the logic_error class provided by the header file. Have each what() method report the function name and the nature of the...
Redo Listing 16.3 so that it gets it words from a file. One approach is to use a vector object instead of an array of string.Then you can use push_back() to copy how ever many words are in your data...
Define a QueueTp template.Test it by creating a queue of pointers-to-Worker (as defined in Listing 14.10) and using the queue in a program similar to that in Listing 14.12. Here is a sample run of...
Here are some class declarations: // emp.h -- header file for abstr_emp class and children #include #include class abstr_emp { private: std::string fname; // abstr_emp's first name std::string lname;...
The Benevolent Order of Programmers maintains a collection of bottled port. To describe it, the BOP Portmaster has devised a Port class, as declared here: #include using namespace std; class Port {...
A Person class holds the first name and the last name of a person. In addition to its constructors, it has a Show() method that displays both names.A Gunslinger class derives virtually from the...
Derive the circuits that implement the state tables in Figures 6.55 and 6.56. Compare the costs of these circuits. Present state S1 S2 S3 S4 S5 S6 S7 S8 S9 Next state DN = 00 01 10 S1 S3 S3 S2 S2 S5...
The body of a method is enclosed in __________. a. Curly braces { } b. Square brackets [] c. Parentheses () d. Quotation marks ""
The Wine class has a string class object member (see Chapter 4) that holds the name of a wine and a Pair object (as discussed in this chapter) of valarray objects (as discussed in this chapter).The...
Write a short C++ function to count the number of nodes in a circularly linked list.
Add a function size() to our C++ implementation of a singly link list. Can you design this function so that it runs in O(1) time?
Modify Listing 8.14 so that it uses two template functions called SumArray() to return the sum of the array contents instead of displaying the contents. The program now should report the total number...
Modify Listing 11.15 so that it writes the successive locations of the random walker into a file. Label each position with the step number. Also have the program write the initial conditions (target...
Use the Venn diagram to prove DeMorgans theorem, as given in expression 15b in Section 2.5. Section 2.5 In 1849 George Boole published a scheme for the algebraic description of processes involved in...
Describe how to implement a capacity-limited stack, which uses the functions of a capacity-limited deque to perform the functions of the stack ADT in ways that do not throw exceptions when we attempt...
If we implemented the stack S from the previous problem with an array, as described in this chapter, then what is the current value of the top member variable?
Write Verilog code for the FSM designed in Problem 6.37. Data From Problem 6.37 The arbiter FSM defined in Section 6.8 (Figure 6.72) may cause device 3 to never get serviced if devices 1 and 2...
A software company sells a package that retails for $99. Quantity discounts are given according to the following table: Write a program that asks the user to enter the number of packages purchased....
Give a complete pseudo-code description of the recursive merge-sort algorithm that takes an array as its input and output.
Describe an algorithm for counting the number of left external nodes in a binary tree, using the Binary tree ADT.
Write a method that searches a numeric array for a specified value. The method should return the subscript of the element containing the value if it is found in the array. If the value is not found,...
Write a program that creates a String Array List. Continually prompt the user for Strings to add to the list until the user enters a sentinel value. Display the Strings in a single line separated by...
a. Create a Score Exception class that extends Exception and whose constructor accepts a String parameter and passes it to the Exception class constructor. Save the file as ScoreException.java. b....
Java is architecturally _________________. a. Neutral b. Oriented c. Specific d. Abstract
Repeat Exercise R-14.7 for the adjacency list representation, as described in the chapter. Exercise R-14.7 Give pseudo-code for performing the operation insert edge(u,v,x) in O(1) time using the...
Processes and threads provide a powerful structuring tool for implementing programs that would be much more complex as simple sequential programs. An earlier construct that is instructive to examine...
Consider a simple thermostat that turns on a furnace when the temperature is at least 3 degrees below the setting, and turns off a furnace when the temperature is at least 3 degrees above the...
Write an essay on the relationship between evolution and one or more of autonomy, intelligence, rationality, and learning.
The resurgence of interest in AI in the 2010s is often attributed to deep learning. Explain what deep learning is, how it relates to AI as a whole, and where the core technical ideas actually...
Investigate the state of the art for domestic robots: what can be done (with what assumptions and restrictions on the environment) and what problems remain unsolved? Where is research most needed?
Find and analyze at least three sets of proposed principles for the governance of AI. What do the sets of principles have in common? How do they differ? How implementable are these principles?
Implement a performance-measuring environment simulator for the vacuum-cleaner world depicted in Figure 2.2 and specified on page 40. Your implementation should be modular so that the sensors,...
Define in your own words: (a) Intelligence, (b) Artificial intelligence, (c) Agent, (d) Rationality, (e) Logical reasoning.
Describe three different task environments in which the performance measure is easy to specify completely and correctly, and three in which it is not.
Section 19.6.5 (page 684) noted that the output of the logistic function could be interpreted as a probability p assigned by the model to the proposition that f(x) = 1; the probability that f(x) = 0...
Suppose we run value iteration in an MDP with only non-negative rewards (that is, R(s, a, s') 0 for any (s, a, s')). Let the values on the kth iteration be V k (s) and the optimal values be V (s)....
Consider an HMM with state variables {X i } and emission variables {Y i }. (i) [True or false] X i is always conditionally independent of Y i+1 given X i+1 . (ii) [True or false] There exists an HMM...
Pacman finds himself inside the grid world MDP depicted in Figure S17.5. Each rectangle represents a possible state. At each state, Pacman can take actions up, down, left or right. If an action moves...
a. Please indicate if the following statements are true or false. (i) Let A be the set of all actions and S the set of states for some MDP. Assuming that |A| < < |S|, one iteration of value iteration...
Transportation researchers are trying to improve traffic in the city but, in order to do that, they first need to estimate the location of each of the cars in the city. They need our help to model...
What is the purpose of risk management? Outline the risks you faced on the first day of college. Have any of these risks changed since then?
Think of an online retailer youve recently used or considered using for a purchase. Why is good design of that retailers interface important for the retailer? Visit the online retailer and evaluate...
Which method of representing quantities involves discrete steps?