Top Selling Computer science Questions

How is the increased use of smartphones and tablets, with their smaller screen size, affecting user interface design practices? Starting with a context diagram, draw as many nested DFDs as you consider necessary to represent all of the details of the system described in the following narrative. In drawing these diagrams, if... Read the narratives below and follow the directions for each. If you discover that the narrative is incomplete, make up reasonable explanations to complete the story. Supply these extra explanations... Develop a context diagram and as many nested DFDs as you consider necessary to represent all the details of the training logistics system described in the following narrative. If you discover that... At a local bank, loan officers must evaluate loan applications before approving or denying them. During this evaluation process, many factors regarding the loan request and the applicants background... Consider the ER diagram in Figure 3.21, which shows a simplified schema for an airline reservations system. Extract from the ER diagram the requirements and constraints that produced this schema. Try... Consider the foreign-key constraint from the dept name attribute of instructor to the department relation. Give examples of inserts and deletes to these relations that can cause a violation of the... Draw an EER diagram for a game of chess as described in Exercise 4. 24. Focus on persistent storage aspects of the system. For example, the system would need to retrieve all the moves of every game... Figure 4.12 shows an example of an EER diagram for a small-private-airport database; the database is used to keep track of airplanes, their owners, airport employees, and pilots. From the... Consider a MAIL_ORDER database in which employees take orders for parts from customers. The data requirements are summarized as follows: The mail order company has employees, each identified by a... What trade-offs do write-optimized indices pose as compared to B+-tree indices? Design a database for an airline. The database must keep track of customers and their reservations, flights and their status, seat assignments on individual flights, and the schedule and routing of... Consider the ER design for the MAIL_ORDER database that was modeled using a tool like ERwin or Rational Rose in Laboratory Exercise 3.32. Using the SQL schema generation feature of the modeling tool,... Does it make sense for FAME to use enterprise keys? If so, create the appropriate enterprise keys and revise the relational schema accordingly. In a normalized database, all customer information is stored in a Customer table, invoices are stored in an Invoice table, and related account manager information in an Employee table. Suppose a... Discuss the potential advantages, technical challenges, and disadvantages of using cloud-based database provisioning. Which of the following is not a database security issue? a. Providing data integrity b. Recovering lost data c. Providing normalization d. Providing encryption If a table contains no repeating groups, but a column depends on part of the tables key, the table is _____ in normal form. a. First b. Second c. Third d. Fourth A nested query is a query within a query. More specifically, a nested query is a parenthesized query whose result can be used as a value in a number of places, such as instead of a relation. Specify... When you place a table into third normal form, you have eliminated __________ . a. Transitive dependencies b. Partial key dependencies c. Repeating groups d. All of the above When you place a table into first normal form, you have eliminated ________ . a. Transitive dependencies b. Partial key dependencies c. Repeating groups d. All of the above Problems with database design are caused by irregularities known as __________ . a. Glitches b. Anomalies c. Bugs d. Abnormalities The unnecessary repetition of data is called data __________ . a. Amplification b. Echoing c. Redundancy d. Mining The process of designing and creating a set of database tables that satisfies the users needs and avoids potential problems is _____ . a. Purification b. Normalization c. Standardization d.... Specify queries a, b, c, and d of Exercise 8.17 in both tuple and domain relational calculus. Exercise 8.17 Consider the AIRLINE relational database schema shown in Figure 5.8, which was described in... What update anomalies occur in the EMP_PROJ and EMP_DEPT relations of Figures 14.3 and 14.4? Figures 14.3 Figures 14.4 Redundancy MP DEPT Ename Smith, John B. Wong, Franklin T. Zelaya, Alicia J.... The most common reason to construct a one-to-one relationship between two tables is ________ . a. To save money b. To save time c. For security purposes d. So that neither table is considered inferior Specify queries a, b, c, e, f, i, and j of Exercise 8.16 in both tuple and domain relational calculus. Exercise 8.16 Specify the following queries on the COMPANY relational database schema shown in... When a column that is not a key in a table contains an attribute that is a key in a related table, the column is called a ____________ . a. Foreign key b. Merge column c. Internal key d. Primary... Heartland Medical Clinic maintains a database to keep track of patients. One table can be described as: tblPatients(patientId, name, address, primaryPhysicianCode). Another table contains physician... When using the UML to describe a single system, most designers would use __________ . a. A single type of diagram b. At least three types of diagrams c. Most of the available types of diagrams d. All... You use a ________ diagram when you want to emphasize the files, database tables, documents, and other components used by a systems software. a. State machine b. Component c. Deployment d. Use case Consider the AIRPORT database described in Exercise 4.21. Specify a number of operations/methods that you think should be applicable to that application. Specify the ODL classes and methods for the... Consider the following relation: TRIP (Trip_id, Start_date, Cities_visited, Cards_used) This relation refers to business trips made by company salespeople. Suppose the TRIP has a single Start_date... Develop an activity diagram that illustrates how to throw a party. Specify the following views as queries in XQuery on the company XML schema shown in Figure 13.5. a. A view that has the department name, manager name, and manager salary for every department b. A... Why do spurious tuples occur in the result of joining the EMP_PROJ1 and EMP_ LOCS relations in Figure 14.5 (result shown in Figure 14.6)? Figure 14.5 Figure 14.6 Ssn Pnumber Hours Pname Plocation... How does Apache Spark differ from Hadoop? Why does an information gap still exist despite the surge in data in most firms? Visit an organization that has implemented a database approach and interview individuals there about the security measures they take routinely. Evaluate each of the following at the organization: a.... Consider the ER diagram in Figure 3.24. Assume that a course may or may not use a textbook, but that a text by definition is a book that is used in some course. A course may not use more than five... Specify the following queries in SQL on the COMPANY relational database schema shown in Figure 5.5. Show the result of each query if it is applied to the COMPANY database in Figure 5.6. a. Retrieve... At a top level, what are the main design variables in a multicore organization? Consider that the EMPLOYEE tables constraint EMPSUPERFK as specified in Figure 6.2 is changed to read as follows: CONSTRAINT EMPSUPERFK FOREIGN KEY (Super_ssn) REFERENCES EMPLOYEE(Ssn) ON DELETE... Let the language L be accepted by the transition graph T and let L not contain the word ba. We want to build a new TG that accepts exactly L and the word ba. (i) One suggestion is to draw an edge... Consider the class definitions of Programming Exercise 5 in Chapter 14,Reusing Code in C++. If you havent yet done that exercise, do so now.Then do the following: Write a program that uses standard... Show the result of each of the sample queries in Section 8.5 as it would apply to the database state in Figure 5.6. Figure 5.6 MPLOYE Sen 123456789 1965-01-09 731 Fondren, Houston, TX M 30000... Write a function with an old-style interface that has this prototype: int reduce(long ar[], int n); The actual arguments should be the name of an array and the number of elements in the array.The... Consider the AIRLINE relational database schema shown in Figure 5.8, which describes a database for airline flight information. Each FLIGHT is identified by a Flight_number, and consists of one or... Let L be some regular language in which all the words happen to have an even length. Let us de fine the new language Twist(L) to be the set of all the words of L twisted, where by twisted we mean the... Consider the LIBRARY relational database schema shown in Figure 8.14, which is used to keep track of books, borrowers, and book loans. Referential integrity constraints are shown as directed arcs in... Repeat Laboratory Exercises 8.34 through 8.38 in domain relational calculus (DRC) by using the DRC interpreter. Exercises 8.34 Specify and execute the following queries in relational algebra (RA)... Consider the following functional dependencies: Applicant_ID S Applicant_Name Applicant_ID S Applicant_Address Position_ID S Position_Title Position_ID S Date_Position_Opens Position_ID S Department... Suppose that several secondary indexes exist on nonkey fields of a file, implemented using option 3 of Section 17.1.3; for example, we could have secondary indexes on the fields Department_code,... Review the guidelines for attaining usability of forms and reports in Table 10-9. Consider an online form you might use to register a guest at a hotel. For each usability factor, list two examples of... Consider the design of a registration system for a hotel. Following the design specification items in Figure 11-2, briefly describe the relevant users, tasks, and displays involved in such a system.... Explain that some software development problems result in software that is difficult or impossible to deploy in a secure fashion. There are at least two dozen problem areas or categories in software... The body of a method is enclosed in __________. a. Curly braces { } b. Square brackets [] c. Parentheses () d. Quotation marks "" Write a short C++ function to count the number of nodes in a circularly linked list. Add a function size() to our C++ implementation of a singly link list. Can you design this function so that it runs in O(1) time? Describe how to implement a capacity-limited stack, which uses the functions of a capacity-limited deque to perform the functions of the stack ADT in ways that do not throw exceptions when we attempt... If we implemented the stack S from the previous problem with an array, as described in this chapter, then what is the current value of the top member variable? Give a complete pseudo-code description of the recursive merge-sort algorithm that takes an array as its input and output. Adapt Algorithms 17.2 and 17.3, which outline search and insertion procedures for a B + -tree, to a B-tree. Algorithm 17.2. Searching for a Record with Search Key Field Value K, Using a B + -Tree n ... Describe an algorithm for counting the number of left external nodes in a binary tree, using the Binary tree ADT. Write a method that searches a numeric array for a specified value. The method should return the subscript of the element containing the value if it is found in the array. If the value is not found,... Write programs that implement Algorithms 15.4 and 15.5. Algorithm 15.4 Relational Synthesis into 3NF with Dependency Preservation and Nonadditive Join Property Input: A universal relation R and a set... Consider the COMPANY database described in Figure 5.6. Using the syntax of Oracle triggers, write active rules to do the following: a. Whenever an employees project assignments are changed, check if... Suppose that the system crashes before the [read_item, T 3 , A] entry is written to the log in Figure 22.1(b). Will that make any difference in the recovery process? Figure 22.1(b) (b) A BCD 30 15 40... Write a program that creates a String Array List. Continually prompt the user for Strings to add to the list until the user enters a sentinel value. Display the Strings in a single line separated by... Cludadwy Chairs sells a patented seat that spectators can take to youth soccer games. The seat folds so it is small enough to fit in the glove box of most vehicles. The company operates a factory in... Fill in the blanks below to complete the following Apache Spark program which computes the number of occurrences of each word in a file. For simplicity we assume that words only occur in lowercase,... Drilling often accounts for one-third to two-thirds of the total cost in the search for fluid. Advances in drilling technology can reduce these costs substantially. The key point is redesigning the... Create an index on the CustomerID column of the Customer_T and Order_T table in Figure 4-4. Figure 4-4 A CustomerID 4 A + + G + + 14 + f Record: H E 16:0 A OrderID # 3 Record: 14 Customer_T... Kratz Computer Repair maintains a database that contains a table of information about each repair job the company agrees to perform. The jobs table is described as: tblJobs(jobId, dateStarted,... Edgerton Insurance Agency sells life, home, health, and auto insurance policies. The agency maintains a database containing a table that holds policy dataeach record contains the policy number, the... Design a collection of database tables for an online store from which you intend to sell products you handcraft. The data you need to store includes the following attributes: Product number Product... When you join the Benevolent Order of Programmers, you can be known at BOP meetings by your real name, your job title, or your secret BOP name. Write a program that can list members by real name, by... Listing 4.6 illustrates a problem created by following numeric input with line-oriented string input. How would replacing this: cin.getline(address,80); with this: cin >> address; affect the working... Java is architecturally _________________. a. Neutral b. Oriented c. Specific d. Abstract Rewrite the Stock class, as described in Listings 10.7 and 10.8 in Chapter 10 so that it uses dynamically allocated memory directly instead of using string class objects to hold the stock names. Also... Enhance the String class declaration (that is, upgrade string1.h to string2.h) by doing the following: a. Overload the + operator to allow you to join two strings into one. b. Provide a stringlow()... Repeat Exercise R-14.7 for the adjacency list representation, as described in the chapter. Exercise R-14.7 Give pseudo-code for performing the operation insert edge(u,v,x) in O(1) time using the... A complex number has two parts: a real part and an imaginary part. One way to write an imaginary number is this: (3.0, 4.0). Here 3.0 is the real part and 4.0 is the imaginary part. Suppose a =... Modify the Vector class header and implementation files (Listings 11.13 and 11.14) so that the magnitude and angle are no longer stored as data components. Instead, they should be calculated on... You can describe a simple list as follows: The simple list can hold zero or more items of some particular type. You can create an empty list. You can add items to the list. You can determine whether... Do Programming Exercise 1 from Chapter 9 but replace the code shown there with an appropriate golf class declaration. Replace setgolf(golf &, const char*, int) with a constructor with the appropriate... Here is a header file: // golf.h -- for pe9-1.cpp const int Len = 40; struct golf { char fullname[Len]; int handicap; }; // non-interactive version: // function sets golf structure to provided name,... What changes would need be made to Listing 7.15 so that the functions fill() and show() use reference parameters? Heres a sample run: Enter Spring expenses: 212 Enter Summer expenses: 256 Enter Fall... This exercise provides practice in writing functions dealing with arrays and structures. The following is a program skeleton. Complete it by providing the described functions: #include using... What is multiprogramming? Redo Listing 7.15 without using the array class. Do two versions: a. Use an ordinary array of const char * for the strings representing the season names, and use an ordinary array of double for the... Redo Listing 7.7, modifying the three array-handling functions to each use two pointer parameters to represent a range. The fill_array() function, instead of returning the actual number of items... Many state lotteries use a variation of the simple lottery portrayed by Listing 7.4. In these variations you choose several numbers from one set and call them the field numbers. For example, you... Here is part of a program that reads keyboard input into a vector of string objects, stores the string contents (not the objects) in a file, and then copies the file contents back into a vector of... Consider a simple thermostat that turns on a furnace when the temperature is at least 3 degrees below the setting, and turns off a furnace when the temperature is at least 3 degrees above the... Write an essay on the relationship between evolution and one or more of autonomy, intelligence, rationality, and learning. The resurgence of interest in AI in the 2010s is often attributed to deep learning. Explain what deep learning is, how it relates to AI as a whole, and where the core technical ideas actually... Investigate the state of the art for domestic robots: what can be done (with what assumptions and restrictions on the environment) and what problems remain unsolved? Where is research most needed? Consider the TooBig functor in Listing 16.15.What does the following code do, and what values get assigned to bo? bool bo = TooBig(10)(15); One functor (f100) is a declared object, and the second...
Showing 4900 - 5000 of 5000