Sie sind auf Seite 1von 31

Describe three basic principles of navigation design.

Compare and contrast four types of menus.

Think about the system that your university currently uses for career services and pretend that
you are in charge of replacing the system with a new one. Describe how you would decide on the
computing architecture for the new system, using the criteria presented in this chapter. What
information will you need to find o

See Full Question And Answer at solutionrank.com

Consider a Web form that a student would use to input student information and rèsumè
information into a career services application at your university. Sketch out how this form would
look and identify the fields that the form would include. What types of validity checks would
you use to make sure that the correct inf

Develop the interface standards (omitting the interface template) for the DFD in Exercise I in
Chapter 5.

I helped a university department develop a small decision support system to analyze and rank
students who applied to a specialized program. Some of the information was numeric and could
easily be processed directly by the system (e.g., grade point average, standardized test scores).
Other information required the facul

Describe five types of outputs.

How can different parts of the interface be consistent?

See Full Question And Answer at solutionrank.com

What is the purpose of creating a logical process model and then a physical process model?

Explain the difference between a symmetric encryption algorithm and an asymmetric encryption
algorithm.

Describe the types of cultural and political requirements and how they may influence
architecture design.

Draw an ISD for the DFD in exercise C in Chapter 5.

The members of a systems development project team have gone out for lunch together, and as
often happens, the conversation has turned to work. The team has been working on the
development of the user interface design, and so far, work has been progressing smoothly. The
team should be completing work on the interface pr

See Full Question And Answer at solutionrank.com


Explain three principles in the design of outputs.

Explain the difference between concurrent multilingual systems and discrete multilingual
systems.

Visit the Web home page for your university and navigate through several of its Web pages.
Evaluate the extent to which they meet the six design principles.

How can a system be designed to be used by both experienced and first-time users?

Why is using a top-down modular approach useful in program design?

See Full Question And Answer at solutionrank.com

Compare and contrast check boxes and radio buttons. When would you use one versus the other?

What is white space, and why is it important?

Why is input validation important?

Describe the basic process of user interface design.

Create a program specification for module 1.2.3.2, compute amount due, on the structure chart
shown in Figure 10-13. QUESTION: On the basis of your specification, are there any changes to
the structure chart that you wouldrecommend?

See Full Question And Answer at solutionrank.com

In "Your Turn 9.7" you probably used menus. Design the navigation system again, using a
command language.

What information is found on the physical DFD that is not included on the logical DFD?

You have been selected to find the best client-server computing architecture for a Web-based
order entry system that is being developed for L.L. Bean. Write a short memo that describes to
the project manager your reason for selecting an n-tiered architecture over a two-tiered
architecture. In the memo, give some idea o

1. What process would you use to identify your choice of a first round athletic draft? 2. Is
choosing athletes any different from hiring any other kind of employee? 3. Why do you think
these techniques first appeared in baseball, rather than hockey or basketball? 4. Why would
teams be reluctant to discuss how they u

Design a navigation system for a form into which users must enter information about customers,
products, and orders. For all three information categories, users will want to change, delete, find
one specific record, and list all records.
See Full Question And Answer at solutionrank.com

What are three fundamental parts of most user interfaces?

Draw an ISD for the DFD in Exercise E in Chapter 5.

Using the Web (or past issues of computer industry magazines, such as Computerworld), locate a
system that runs in a server-based environment. On the basis of your reading, why do you think
the company chose that computing environment?

1. What are the privacy and security issues with Google Latitude? 2. If users can lie about the IR
location, is this tool very effective? 3. What are the advantages of using an LBS? 4. If you want
to use Google Latitude, what could you do to protect your privacy from someone whom you do
not want to be able to locate

Identify the different departments in a company and why they must work together to achieve
success.

See Full Question And Answer at solutionrank.com

Describe artificial intelligence, and identify its five main types.

1. Suggest three reasons for the blow out in costs for the myki system? 2. Why would a system
like this cost $494 million to develop if all went well?

1. Draw a diagram of the supply chain for a fish fillet from the ocean to the restaurant table in
Japan. Then include the flow of information into the picture. Describe where IT is used to enable
the supply chain. How might its supply chain give Sanford a competitive advantage? 2.
Compared to a standard manufacturing

Do you think a data warehouse is appropriate for DSI? Why or why not? Figure 8-9 implies that
data marts require the existence of a data warehouse, but this is not always the case. DSI could
construct a data mart containing in-bound logistic and manufacturing data without a data
warehouse. In this case, the data mart w

Consider this question from a business intelligence perspective. a. What might Shoppers Drug
Mart or a grocery chain do with data that correlates a particular customer to that customer’s
purchases over time? b. What information can such data provide? Assume that the data include
not only the customer’s identity,

See Full Question And Answer at solutionrank.com

1. What might have happened to Apple if its top executives had not supported investment in
iPads? 2. Why would it be unethical for Apple to sell its iTunes customer information to other
businesses? 3. Evaluate the effects on Apple's business if it failed to secure its customer
information and all of it was accidental

Research the IT architecture at your university or college. Is there an available IT architecture


and do you have enterprise architects? What IT architectural issues can you see developing and
how would you manage them?

1. Australia Post has had to change the way it operates over the 200 years it has been in business.
What are the disruptive technologies Australia Post has had to deal with? 2. How did Australia
Post respond? 3. Why would an online retailer partner with Australia Post rather than with a
competitor? 4. How does Aust

Explain the different wireless network categories.

Distance learning is an application of inter organizational information systems. Although it may


seem odd to label students as organizations, they are customers, in the same sense that
consumers are customers in B2C e-commerce systems. a. Draw a process diagram of a regular,
non-distance learning class. Label the act

See Full Question And Answer at solutionrank.com

If you ask users why they did not participate in requirements specification some of the common
responses include the following. a. “I wasn’t asked.” b. “I didn’t have time.”
c. “They were talking about a system that would be here in 18 months, and I’m just
worried about getting the order out the door

Define the relationship between operating system software and utility software.

1. Criticism of this tablet relates to its slowness and its non-agile touch screen. Will this affect
the marketability of this product? 2. Do you think a smartphone or a tablet would be a better way
of satisfying user demand for features?

Describe Web 3.0 and the next generation of online business.

Identify the different media types found in networks.

See Full Question And Answer at solutionrank.com

1. Choose one of the companies described and explain how it could use a chief information
officer (CIO), chief technology officer (CTO) and chief privacy officer (CPO) to improve
business. 2. Why is information technology important to an organisation like McDonald's? 3.
Which of Porter's five forces is most importan

List the common input, output and communication devices.

Describe business process management and its value to an organisation.


Using the knowledge you have gained from this chapter, summarize the roles that you think
users should take during an information systems development project. What responsibilities do
users have? How closely should they work with the IS team? Who is responsible for stating
requirements and constraints? Who is responsib

Describe the three Business 2.0 tools for collaborating.

See Full Question And Answer at solutionrank.com

Mary Keeling owns and operates Carbon Creek Gardens, a retailer of trees, garden plants,
perennials, annual flowers, and bulbs. “The Gardens,” as her customers call it, also sells
bags of soil, fertilizer, small garden tools, and garden sculptures. Mary started the business 14
years ago and it has grown steadily.

Describe the seven phases of the systems development life cycle.

Consider two car repair shops. One is newly renovated, has a bright, clean reception/office area
at the front of the shop and standard company overalls for all employees. It has just invested in a
new computer application that integrates the parts ordering, repair and service cost estimate, and
accounting. Next door, t

Describe the information age and differences among data, information, business intelligence and
knowledge.

Identify the challenges of business mobility.

See Full Question And Answer at solutionrank.com

Explain topology and the different types found in networks.

Identify the challenges of a connected world.

Compare the four categories of e-business models.

Describe the characteristics of infrastructure architecture.

Identify the five challenges associated with e-business.

See Full Question And Answer at solutionrank.com

1. In your opinion, will millions, perhaps billions of dollars be wasted in unnecessary compliance
with Sarbanes-Oxley and the Budget Measures Act? 2. In the long run, will these acts hamper
North American corporations that must compete internationally against corporations that are not
burdened by them? Will they ulti
Explain project management, the triple constraints, and the project stakeholder's and executive
sponsor's roles in choosing strategic projects.

1. Why do you think this situation has occurred? 2. Who has been harmed (if anyone), or is this a
“victimless” situation? 3. Are the registration procedures adequate? What changes, if any,
would you recommend? 4. What action should be taken by Roark, the university, or the
publisher? Does it matter where the re

Figure 11-3 shows illustrates the links between industry structure, competitive strategy, value
chains, business processes and information systems. As we have learned in this chapter, there
can be misalignment between strategy and information systems. In your opinion, where do things
go wrong and how do organizations g

Demonstrate how a company can add value by using Porter's value chain analysis.

See Full Question And Answer at solutionrank.com

COBIT is just one method for developing a document to support IT governance. Identify reasons
why companies would choose not to use COBIT for an information systems audit. Search the
web for at least one more method and develop a comparison of COBIT with the method you
have found. What are the benefits of using the new

Explain how IS governance and IS audit are related. Can a firm complete an IS audit without
having IS governance in place? Can IS governance exist without an IS Audit?

1. Did new media help the political winners, or were those who won more aware of the new
media? 2. Apart from those described in the case, are there other new media which could be
employed in a political campaign? 3. Comment on whether conventional methods will continue
to be used for those voters who do not have ac

Choose one of the following basic business processes: inventory management, operations,
manufacturing, HR management, or accounting/financial management. Use the Internet to
identify three vendors that license a product to support that process. Compare offerings from the
three vendors as follows. a. Determine differen

Compare the two types of network architectures.

See Full Question And Answer at solutionrank.com

Governance at Pacific Blue Cross 1. What are the various roles of decision-making participants
at PBC? 2. How important is communication and buy-in to implementing the new system? 3.
Can you think of reasons why an organization would resist governance processes? 4. What
challenges may exist in the system? 5. Are t
1. Whittlesea needs to achieve a balance between short-term expenditure and long-term service
provision which is reflected in their implementation principles. How well do you think these
principles currently align with this need? What, if anything, would you change or add to the
principles to improve the outcomes obtai

Identify the benefits of a connected world.

1. Is social media a passing fad, or a valuable new way of managing communication? Why? 2.
Do you agree that investments in social media are more likely to provide a higher return on
investment than spending on traditional media? Why or why not? 3. Two way dialogues are
mentioned as an important consideration in rel

Assume that you are a project manager charged with developing the implementation plan to
switch from driving on the right side of the road to the left. Which conversion approach would
you use and why?

See Full Question And Answer at solutionrank.com

The list below shows a set of customers that a company has and their RFM scores. Answer the
following questions using information from the list. a. Which of the customers should the
company focus their marketing efforts on? Justify your answer. b. Which of the customers brings
the most money to the organization? How

The goal of IS governance is to improve the benefits of an organization’s IT investment over


time. However, people who are accountable for governance usually do not manage directly but
rather sit on a corporate board that oversees the company’s operations. What mechanisms
can the board use to improve the benefits a

Demonstrate the value of business process modeling, and compare As-Is and To-Be models.

Explain systems thinking and how management information systems enable business
communications.

1. One of the problems with DIA's baggage system was inadequate testing. Why is testing
important to a project's success? Why do so many projects decide to skip testing? 2. Evaluate the
different systems development methodologies. Which one would have most significantly
increased the chances of the project's success?

See Full Question And Answer at solutionrank.com

Explain the three different types of outsourcing, along with their benefits and challenges.

Explain how a set of If/Then rules could be used to select a supplier. Give an example of five
rules that would be pertinent to this problem. Given the nature of a dive shop’s product, and
the size and culture of the organization, do you think it’s likely that the shop would embrace
an expert system? What about Car

1. Identify the different computer categories and explain their potential business uses. 2. Explain
the difference between primary and secondary storage.

1. Do you think that Australian Vintage made the correct decision when it contracted a technical
consultancy to oversee its application integration? Why or why not? 2. Part of the business
process redevelopment involved decoupling some existing systems. Discuss why this would have
been a good idea. 3. How could data

1. How is WTC using telecommunication and network technologies to improve its competitive
advantage in the professional sports broadcasting industry? 2. Describe the different types of
network architectures WTC is using. 3. Explain the role TCP/IP plays in the broadcast of the
Ironman Triathlon World Championship. 4

See Full Question And Answer at solutionrank.com

1. Define capital, human capital, and social capital. Explain how these terms differ. 2. How does
the expression “It’s not what you know, but who you know that matters” pertain to the
terms you defined in step 1. 3. Do you, personally, agree with the statement in item 2? Form your
own opinion before discussing

Classify the different operational support systems, managerial support systems and strategic
support systems, and explain how managers can use these systems to make decisions and gain
competitive advantages.

Explain the value of business processes for a company and differentiate between customer-facing
and business-facing process.

Describe and compare the different roles and responsibilities in information technology.

1. How has Amazon used technology to revamp the bookselling industry? 2. Is Amazon using
disruptive or sustaining technology to run its business? 3. How is Amazon using intranets and
extranets to run its business? 4. How could Amazon use kiosks to improve its business? 5. What
is Amazon's e-business model? 6. How

See Full Question And Answer at solutionrank.com

Explain the importance of decision making for managers at each of the three primary
organisation levels, along with the associated decision characteristics.

Describe the eight categories of computers by size.

Explain Web 2.0 and identify its four characteristics.


1. How hard would it be for BuyATab to sign its first customer?

Summarise the different software development methodologies

See Full Question And Answer at solutionrank.com

Describe the advantages of e-business.

Suppose you work for the university and have access to student, class, professor, department, and
grade data. Assume the student data includes students’ home address, high school, and prior
post-secondary performance (if any). Describe an unsupervised data mining technique that could
be used to predict college applic

Define critical success factors (CSFs) and key performance indicators (KPIs), and explain how
managers use them to measure the success of MIS projects.

Email or Free mail? 1. What are the benefits and risks that Provident faces when considering
maintaining their own email system or moving to services such as Gmail? 2. How is email
different, if at all, from other technology or non-technology services such as telephone systems
or regular mail? 3. How should a comp

Explain how Business 2.0 is helping communities network and collaborate.

See Full Question And Answer at solutionrank.com

Describe the seven e-business tools for connecting and communicating.

Identify the three primary areas associated with information infrastructure.

Compare Porter's three generic strategies.

Describe market-basket analysis and explain how a grocery store could perform such an analysis
using its club card data. Suppose the lift of high-quality dog food and premium cheese is 3.4.
Explain what this means. Describe four possible ways that Shoppers could use this information.
As a team, rank the four possibilit

1. Explain how reporting systems could be helpful to you. 2. Show the structure of one or two
reports that you could use to identify poorly selling models. How would you structure the reports
to identify different sales trends in different regions? 3. For one of your reports, write a
description of your requirements

See Full Question And Answer at solutionrank.com

1. Will e-books, as read on a Kindle or other e-reader, eventually phase out the conventional
print book? Why or why not? 2. Kindle is designed just for reading. Other tablet computers such
as the Apple iPad or Samsung Galaxy can perform all the other functions of a computer in
addition to being an e-reader. Is there

Explain enterprise architecture and its three primary types.

Suppose you lose your company laptop at an airport. What is more valuable the laptop or the
data? Under what circumstances should you now focus on updating your resume?

Compare disruptive and sustaining technologies, and explain how the internet and www caused
business disruption.

Differentiate between business process improvements, streamlining and reengineering.

See Full Question And Answer at solutionrank.com

Explain why competitive advantages are temporary.

1. What do you think is Chantelle’s biggest asset to an employer? 2. How would you decide
how and when to change jobs? 3. How have jobs and careers changed in the past 20 years? (Hint:
How many employers have your parents worked for? How many do you anticipate working for?)
4. How well do you think Chantelle’s j

1. What do you understand by carbon footprint and how can IT play a role in reducing carbon
footprints? 2. What is Green IT? What are the benefits of Green IT? 3. How did Softsource
benefit from introducing its green IT data centre? 4. What are the main drivers that motivate
organisations to adopt Green IT? What wa

Describe the two primary diagrams most frequently used in project planning.

Suppose Akbar’s company, noted earlier in the chapter introduction, is located in a hurricane
zone and that it has been given 36 hours’ warning that a serious, category 4 hurricane is
headed its way. a. List all the information systems assets that are in danger. b. For each asset in
your list in a, describe an ap

See Full Question And Answer at solutionrank.com

1. TradeMe has become a very successful company, consistently making a profit from its C2C
activities. What is TradeMe's e-business model and why has it been so successful? 2. Other
major websites, such as Amazon.com and Yahoo, have entered the e-marketplace with far less
success than TradeMe. How has TradeMe been abl

Find the cheapest way possible to purchase your own credit report. Several sources to check are
equifax.com, experion.com, and transunion.com. a. Search for guidance on how best to review
your credit records. Summarize what you learn. b. What actions should you take if you find
errors in your credit report? c. Defin
Explain the different wireless network business applications.

Describe the six major categories of hardware, and provide an example of each.

Explain the three components of a sustainable enterprise infrastructure along with their business
benefits.

See Full Question And Answer at solutionrank.com

1. Why did the development team pilot the Explorer project on the Sunshine Coast mainland
rather than Fraser Island?

Describe Porter's Five Forces Model and explain each of the five forces.

List and describe the four components that differentiate networks.

Explain how project stakeholders choose strategic projects.

Explain the business benefits associated with successful software development.

See Full Question And Answer at solutionrank.com

Explain how this team uses the shared whiteboard to generate minutes. What are the advantages
of this technique?

Having completed one or both tutorials, make two suggestions about how: a. SAP could make its
software easier to use. b. the tutorial(s) could be improved to help new students learn about
processes and SAP.

Select any of the main activities or subactivities in the Sales process and: a. Specify what event
triggers this activity to occur. b. Identify what activity follows this activity. c. For one data entry
item, describe what would happen in the rest of the process if that entry was erroneous. d. For
one data entry it

1. What are the advantages for an airline of using a revenue management system? 2. Are revenue
management systems a competitive advantage or simply a new necessity for doing business in
the airline industry today? 3. What other industries could benefit from the use of a revenue
management system? 4. How could an ai

Identify the environmental impacts associated with MIS.

See Full Question And Answer at solutionrank.com

Is dog fooding a structured or a dynamic process? List possible objectives of dog fooding
processes.
Re-read the “MIS in Use” case to refresh your memory of the Edoc HELM system. a.
Using Figure 2.1 as a guide, draw the paper-based process described in the case. b. Now draw
the process after HELM was introduced. c. What are the major differences between the two
processes? d. What are the improvements that ha

Consider the 12 categories of vulnerability in Figure 12-14. Describe the three most serious
vulnerabilities to each of the following businesses: a. CBI b. Your university c. A neighborhood
accounting firm

High Touch—High Tech 1. What challenges are created when providing anywhere, anytime
services? 2. What business and technology issues would be faced by an organization that wants
to have a complete view of its customers? 3. Can you think of any examples where a lack of
information or failure to consider the infor

Describe the three categories of applications software. Give an example of each.

See Full Question And Answer at solutionrank.com

Which aspects of Office 365 described here could have value to you when accomplishing student
team projects? Explain why they add value compared to what you are currently doing.

Summarize the advantages to this team of using SharePoint.

What does your score on this exercise suggest?

Distance learning is an application of inter organizational information systems. Although it may


seem odd to label students as organizations, they are customers, in the same sense that
consumers are customers in B2C e-commerce systems. a. Draw a process diagram of a regular,
non-distance learning class. Label the acti

Apply the value chain model to a video game developer, such as Electronic Arts (www.EA.com).
What is its competitive strategy? Describe the tasks Electronic Arts must accomplish for each of
the primary value chain activities. How do EA’s competitive strategy and the nature of its
business influence the general charac

See Full Question And Answer at solutionrank.com

Is email different from postal or telephone services? Is it more like a postcard, where privacy
should not be assumed?

Assess your own stock of social capital. What activities around campus would help you increase
your social capital? What social media apps could you use to increase your social capital?
1. What are the advantages of this technology? 2. How does this technology allow John Deere to
compete against lower-cost manufacturers and producers? 3. Are there any other advantages to
using this technology? What adaptation and extensions would increase the advantage?

Assume that you have been asked to prepare a computer hardware budget. Your company has
identified three classes of computer user. Class A employees use the computer for email, Web
browsing, Internet connectivity, and limited document writing. Class B employee’s use the
computer for all of the activities of Class A,

OLTP systems are focused on providing three things: (1) efficient data input, (2) reliability, and
(3) effective processing of a single transaction at a time. Use the knowledge you have gained to
contrast these OLTP design principles with the design of OLAP systems. Do you see why the
two types of systems requi

See Full Question And Answer at solutionrank.com

How likely are the vulnerabilities you identified in question 12-3? If you were the owner or a
senior manager in these organizations, which of the items you described in questions 12-4
through 12-7 would you implement? Justify your answer.

Make an informal diagram of the four main actors: the Customer (Philly Bikes), Sales (Sue), the
Warehouse (Wally), and Accounting (Ann). Draw arrows that show the data that flows between
each of the actors during this process. Number the arrows and include on each arrow what data
are included in the message.

What other IS (social media, smartphones, and so on) could Groupon use to improve its
Promotion or Sales process?

Singing Valley Resort is a top-end (rooms cost from $400 to $2500 per night), 50-unit resort
located high in the mountains of Colorado. Singing Valley prides itself on its beautiful location,
it’s relaxing setting, and its superb service. The resort’s restaurant is highly rated and has
an extensive list of exceptio

Create a process diagram in BPMN for the spa that shows activities from contacting Groupon for
the first time through the end of the spa’s promotion.

See Full Question And Answer at solutionrank.com

Which of the analysis options in this exercise will provide Mary the best value? If you owned
Carbon Creek Gardens and you were going to implement just one of these applications, which
would you choose? Why?

Suppose you manage a group of seven employees in a small business. Each of your employees
wants to be connected to the Internet. Consider two alternatives: • Alternative A: Each
employee has his or her own modem and connects individually to the Internet • Alternative B:
The employees’ computers are connected us

Should these forms of communication service be regulated? If so, how and by whom?

Running at the Speed of the Web: The Running Room 1. Do you think The Running Room
would be as successful as it is if it didn’t have a website? In other words, is the
company’s website a critical component for success, or simply a nice”extra” for its
customers? 2. Could the Running Room provide the same cust

You have decided to start up a web-based business. You are considering what you need to make
it happen. a. Explain the steps you would take in assigning a domain name for your website. b.
Use the web to find the options available for ISPs to host your website. Find at least three
different options and explore the dif

See Full Question And Answer at solutionrank.com

What are the objectives of each process in Questions 1 and 2? Label each as either an effective or
efficient objective.

1. Identify the value chain involved in a obtaining a new bicycle from winter borne Custom
Bicycles. Can you identify the primary activities that create value for the customer when
purchasing a new bike? 2. What information systems do you think could be used to support these
primary activities? 3. Check out the compa

Network Effects, Increasing Returns, and Lock In 1. How do the challenges faced by Stantec
differ from those faced by other industries? 2. What are the implications of this case for
companies that develop new software tools? How could adoption barriers be reduced? 3. Are
there any examples of “inferior” techno

Visit www.kiwiexperience.com and click “Pass map.” Select a variety of activities in the
Adrenalin, Nature, and Kiwi Culture menus. Find a pass that would allow you to participate in
all of your selected activities. a. Evaluate this user interface. Describe its strengths and
weaknesses. b. Summarize the ways in w

Do people who use free email systems understand the implications of the tradeoffs that they have
made?

See Full Question And Answer at solutionrank.com

In your own words, define dog fooding. Do you think dog fooding is likely to predict product
success? Why or why not? When would dog fooding not predict product success?
Search the Internet for the term Open Office. Explain what Open Office is. How do users obtain
it? How much does it cost? Given this information, why do you think companies use Microsoft
Office rather than Open Office? Why do you?

Samantha Green owns and operates Twigs Tree Trimming Service. Recall from Chapter 3 that
Samantha has a degree from a forestry program, and recently opened her business in Winnipeg.
Her business consists of many one-time operations (e.g., removing a tree or stump), as well as
recurring services (e.g., trimming customer

This chapter introduced the concept of Business Process Management (BPM). In the discussion,
three methods for improving business processes were listed: Total Quality Management (TQM),
Six Sigma, and Lean Production. Do the following with your team: a. Choose one of the methods
listed above. Create a definition of the

Explain how you think Office 365 contributes to the efficiency of the development team. How
might it contribute to the quality of this text.

See Full Question And Answer at solutionrank.com

One concern of a business is fraud. One fraud technique is to create customers who are not
customers but who are co-conspirators. The conspirator inside the business credits the account of
the coconspirator for payments that were never actually received. For this fraud scheme to work,
who at CBI has to take part? How c

Using the same four main actors, this time show with the arrows how the material (the bikes)
moves.

1. What are the primary benefits realized by Edoc’s use of HELM software? 2. Could HELM
also result in increased revenue? Explain your answer. 3. Can you think of other benefits that
might arise from the use of the software? For example, experienced dispatchers in the industry
are difficult to find. Could the syst

This case implies that the frequent acquisition and disposition of tourism brands poses problems
for information systems. Summarize what you think those problems might be. Consider all five
components of an information system. To what extent does standardizing on a single
development platform solve those problems? Whic

1. What implications WiMax have for existing established traditional telephone companies. 2.
Beyond television, what other new capabilities could be enabled by this technological
innovation? 3. What are the differences, if any, between the implications of this technology for
Canada versus other industrialized countri

See Full Question And Answer at solutionrank.com


The following two tables could be used to store the data in Figure 5-15 in a database.
ChoirMember (LastName, FirstName, Email, Phone, Part) MusicalWork (NameOfWork,
Composer, Part, CopyNumber) This notation means there are two tables, one named
ChoirMember and a second named MusicalWork. The ChoirMember table has fiv

What other educational processes can Twitter support? What are the objectives of these
processes, and how does Twitter help achieve them?

To learn phishing fundamentals, visit


www.microsoft.com/protect/fraud/phishing/symptoms.aspx. To see recent examples of phishing
attacks, visit www.fraudwatchinternational.com/phishing-alerts/. a. Using examples from these
links, describe how phishing works. b. Explain why a link that appears to be legitimate, such a

Reread the two examples at the beginning of the chapter that involved Target and Netflix.
Specify the process that BI improves at each firm and a second process that BI could support.
Explain the measures you would use to demonstrate how the BI example would improve the
effectiveness or efficiency of the process.

1. Are the social media sites that Mabel’s Labels uses Information Systems? 2. What do you
think are the benefits to Mabel’s Labels of joining and participating in their various social
media sites? What are the costs? 3. Can larger companies do the same social media marketing
and promotion that Mabel’s Labels c

See Full Question And Answer at solutionrank.com

Describe how Groupon’s IS supports this process.

1. Where are the main markets for Locarna’s systems? 2. What problem does Locarna solve?
3. How important are systems such as Locarna’s? 4. How have recent technological changes
affected or enabled Locarna’s business? 5. Are there groups or environments that would
resist the type of analysis that Locarna pro

Describe the best possible application of an OLAP tool at Carbon Creek. Can it be used to solve
the lost customer problem? Why or why not? What is the best way, if any, for Mary to use
OLAP at Carbon Creek? If none, explain why.

Reread the opening scenario. CBI owns the computers, and workers should be productive with
their time, but how did you react to the story? Do you think that CBI should know how
employees use the network? Is it ethical to snoop on employee behavior? Assume that CBI wants
to collect data on network misuse. Suggest measur

Search the Web using the words Google My Maps and follow the links to learn how to make
your own maps. Then create a map of your own. Does My Maps have all the features of a social
media app?
See Full Question And Answer at solutionrank.com

How well does Twitter support the class discussion process?

Suppose you are in charge of designing the university golf course’s Facebook page. Describe
three features that the golf course could put on its page (e.g., a link to tee time reservations).
Explain what process would be improved at the golf course with each new feature and specify a
measure you would use to assess t

Describe a potential data safeguard for each of the vulnerabilities you identified in your answer
to question 12-3. If no data safeguard is appropriate to a business, explain why. a. CBI b. Your
university c. A neighborhood accounting firm

Go to Wikipedia. Read the “About Wikipedia” page and the “Collaborative Writing”
page. Make a diagram that shows the process of creating and updating a Wikipedia page. Is page
creation and editing a process with an effectiveness goal or efficiency goal? What measures
could be used to assess improvement in the p

Describe how each of the organizations in question 12-3 should prepare for security incidents. a.
CBI b. Your university c. A neighborhood accounting firm

See Full Question And Answer at solutionrank.com

1. How serious a problem is duplicate information to the financial services industry? Is it more
serious for some industries than others? (Hint: How much of an issue is it for the health
industry?) 2. Are there any other costs to Vancity when duplicate information is sent to
customers? 3. What are the various challe

How does the data storage trend affect your university? What types of data are growing the
fastest? Of these, what amount is generated by students? By classroom activities? By
administration? By research?

Whereas the golf course deals directly with consumers, CBI, the bicycle wholesaler, deals with
retailers that then sell to consumers. How does this change the way CBI uses social media?
Specify processes at CBI that can be supported by social media and measures that will assess
improvements.

Consider Carrie’s Custom Clothing company described at the start of this chapter. Assume
that Carrie uses one system to collect information about her customers, another spreadsheet to
collect information about her suppliers, a Word document to create her invoices, and some
accounting software to record her revenues a

Search the Web using the words Office 365 and read about this Microsoft product. Which social
media characteristics are evident? Do you think this approach will be successful for Microsoft?
See Full Question And Answer at solutionrank.com

Describe the best possible application of RFM analysis at Carbon Creek. Can it be used to solve
the lost customer problem? Why or why not? What is the best way, if any, for Mary to use RFM
at Carbon Creek? If none, explain why.

Explore the social media links on the kiwiexperience.com home page. a. What are you initial
reactions? Does the layout and concept invite you to participate and provide your own content?
b. This Web site, and its use of social media, supports the promotion process for thl. What other
thl processes do the Web site and

Is there a difference between what Google is doing and how spam filters work?

Reread the opening vignettes regarding CBI at the beginning of Chapters 7 and 8. Using that
information as a background, generate a two- to three-page document that summarizes the
security management activities that CBI should practice. Consider each of the vulnerabilities in
Figure 12-14. As you write the document, ke

In this chapter, we say that questions are more important than answers. Look at Figures 11-12,
11-13, and 11-14 and write down questions you have that might reveal patterns in the data shown
in these figures.

See Full Question And Answer at solutionrank.com

Suppose you work for the university and have access to student, class, professor, department, and
grade data. Suppose you want to determine whether grade inflation exists, and, if so, where it
seems to be the greatest. Describe a reporting system that would produce evidence of grade
inflation. How would you structure t

Explain Figure 4-14. Search the Internet for an example of horizontal and vertical market
software (other than those mentioned in this chapter). Search as well for the product
QuickBooks. Briefly describe the functions of that product. What operating system(s) does it
require? Suppose you wish to install and use QuickB

Choose one of the following basic business processes: inventory management, operations,
manufacturing, HR management, or accounting/financial management. Use the Internet to
identify three vendors that license a product to support that process. Compare offerings from the
three vendors as follows. a. Determine differen

Visit Digg, Delicious, and Quora. Prepare a report or presentation to the class that explains the
site, which social media characteristics are evident, and what personal or business process the
site can support.

Explain the relationship of value and cost according to the Porter model. When does it make
sense to add cost to a business process?
See Full Question And Answer at solutionrank.com

Watch the video “A Vision of Students Today” (www.youtube.com/watch?


v=dGCJ46vyR9o). Discuss this video with your group and identify three ways that courses could
be designed to improve the way students engage in the course. Be as specific as possible and be
prepared to share your ideas with the class.

“Outlook on Human Resources in the ICT Labour Market: 2008–2015” suggests that
ICT workers need to have several core skills. a. What are these key skills? b. Identify ways that a
student could best obtain these skills. c. Do you believe a business student can work effectively
in the ICT industry? Would a bus

Describe a potential technical safeguard for each of the vulnerabilities you identified in your
answer to question 12-3. a. CBI b. Your university c. A neighborhood accounting firm

The following sayings about data and information are often used in business to convey an
important idea. As you read these, select three and write down how they could be used to convey
an idea from this chapter: “If you want a green suit, turn on a green light.” “You
don’t fatten the pig by weighing it.” â

1. Consider the 5 components of an information system provided in Figure 1-1 in Chapter 1.


Which of these components was the reason for the lack of success in the first round of ERP
implementation at DPT? 2. What do you think is the most important component in the success of
DPT’s ERP in the second implementation?

See Full Question And Answer at solutionrank.com

1. ICS Courier focused on business-to-business customers, servicing law firms, insurance


companies, and accounting and medical offices. How did the fact that drivers arrived
consistently at the same place and time support the strategy of specialization? 2. Why would
offering package through its website support the spe

Apply the value chain model to a video game retail company, such as EB Games
(www.EBGames.com). What is its competitive strategy? Describe the tasks EB Games must
accomplish for each of the primary value chain activities. How do EB Games’ competitive
strategy and the nature of its business influence the general chara

Mary wants to know when she’s lost a customer. One way to help her would be to produce a
report, say in PDF format, showing the top 50 customers from the prior year. Mary could print
that report or place it on a private section of her Web site so that she can download it from
wherever she happens to be.

You have decided to set up a web-based business. You have investigated the costs, chosen an
ISP, and are ready to get working on your site. You’ve heard that a quick way to get your site
up and running is to use a website template. Some examples are provided at
www.templatemonster.com or www.websitetemplates.com . a

A three table database design for the data in the spreadsheet in Figure 5-15 is as follows:
ChoirMember (LastName, FirstName, Email, Phone, Part) MusicalWork (NameOfWork,
Composer) CheckOut (LastName, FirstName, NameofWork, Part, CopyNumber, DateIn,
DateOut) a. Redraw the data in Figure 5-15 into this three-table fo

See Full Question And Answer at solutionrank.com

1. What problem does MyBus solve? 2. How important was access to the TransLink website and
the text messaging API? 3. Does this system cooperate or compete with Translink? 4. What
technological changes could affect John and Igor’s efforts to commercialize MyBus? 5. What
advice would you give John and Igor?

Explain how this team uses alerts. Summarize the advantages of using alerts.

1. What problem does active.com solve for event organizers? 2. Does active.com have any other
advantages other than economies of scale? 3. Are there are any network effects for active.com?
4. What kind of information would Active.com have about its members? How would this be
useful and to whom? What is the value of

Can in-class use of Twitter be used to integrate educational processes? These processes might
include student assessment, student collaboration, technology use, and class discussion.

Many small businesses operate with local servers running in broom closets or the like. Explain
what using a cloud vendor that is compliant with these standards and statements means to such
companies.

See Full Question And Answer at solutionrank.com

Visit Zillow at www.zillow.com. Enter the address of someone’s home (your parents’
perhaps) and obtain an appraisal of it. Check out the appraised values of the neighbors’
homes. Do you think this site violates anyone’s privacy? Why or why not? Find and describe
features that demonstrate that this is a social m

What are the objectives and measures of the class discussion process?

Describe the best possible application of market basket analysis at Carbon Creek. Can it be used
to solve the lost customer problem? Why or why not? What is the best way, if any, for Mary to
use market basket analysis at Carbon Creek? If none, explain why.

Fired Up, Inc., is a small business owned by Curt and Julie Robards. Based in Brisbane,
Australia, Fired Up manufacturers and sells Fired Now, a lightweight camping stove the. Recall
from Chapter 3 that Curt used his previous experience as an aerospace engineer to invent a
burning nozzle that enables the stove to stay

Summarize the advantages to this team of using Lync.

See Full Question And Answer at solutionrank.com

Become a prosumer. Find a cause or group on Facebook that you believe in and contribute in
ways that you do not typically contribute. Does the organization value your help in an
encouraging way? If you were in charge of the site, how would you reward prosumers?

Describe a potential human safeguard for each of the vulnerabilities you identified in your
answer to question 12-3. a. CBI b. Your university c. A neighborhood accounting firm

Which Informing process (Reporting or Data Mining) would have improved your answers?

Groupon’s Procurement process integrates with the spa’s Sales process. How is this
integration accomplished?

If you completed the case study/tutorial in Chapter 7, how is the Sales process in SAP similar to
the Procurement process in SAP? In what important ways are they different?

See Full Question And Answer at solutionrank.com

Using 32-bit Internet addresses was originally thought to provide ample room for expansion, but
that conjecture is not proving to be accurate. IPv6 uses 128-bit addressing. Will that prove to be
adequate? Justify your answer. (For example, you might compare the number of possible
addresses to the population of the worl

Many financial experts advice that property owners should insure their homes or buildings for at
least 80% of the amount it would cost to replace the structure. Create a VB application that lets
the user enter the replacement cost of a building and then displays the minimum amount of
insurance he or she should buy for

A software company sells three packages, Package A, Package B, and Package C, which retail
for $99, $199, and $299, respectively. Quantity discounts are given according to the following
table: Quantity Discount 10 through 19 .....................20% 20 through 49..................... 30% 50
through 99 ...........

Why did you set your boundaries where you did?

How complete a profile can Google assemble of a typical user?

See Full Question And Answer at solutionrank.com


Is unit testing possible or even desirable in all circumstances? Provide examples to justify your
answer.

What four main types of actions involve databases? Briefly discuss each.

Design a class named StopWatch. The class contains: â– The private data fields startTime and
endTime with get methods. â– A constructor that initializes startTime with the current time. â–
A method named start() that resets the startTime to the current time. â– A method named stop()
that sets the endTime to the

What is the focus when referring to a running application?

Software for System X has 24 individual functional requirements and 14 nonfunctional


requirements. What is the specificity of the requirements? The completeness?

See Full Question And Answer at solutionrank.com

Write an application that displays a box, an oval, an arrow and a diamond using asterisks (*), as
follows:

Is it possible to begin coding immediately after an analysis model has been created? Explain
your answer and then argue the counterpoint.

Is software engineering applicable when WebApps are built? If so, how might it be modified to
accommodate the unique characteristics of WebApps?

1. Which of the following identifies a specific element within an array? a. Element specifier b.
Determinator c. Locator d. Subscript 2. Which of the following is the lower subscript of an
array? a. 1 b. { } c. 0 d. -1 3. When does array bounds checking occur? a. Runtime b. Design
time c. Break time d. Al

Which components constitute the disk service time? Which component contributes the largest
percentage of the disk service time in a random I/O operation?

See Full Question And Answer at solutionrank.com

Consider the following MAILORDER relational schema describing the data for a mail order
company. PARTS(Pno, Pname, Qoh, Price, Olevel) CUSTOMERS(Cno, Cname, Street, Zip,
Phone) EMPLOYEES(Eno, Ename, Zip, Hdate) ZIP_CODES(Zip, City) ORDERS(Ono, Cno,
Eno, Received, Shipped) ODETAILS(Ono, Pno, Qty) Qoh stands for q

Research RAID 6 and its second parity computation.

Write a Java code segment that creates a blank image and converts its pixels to green. Your code
should use an enhanced for loop.
Answer each of the following in terms of an operating system that you use: a. How does the
operating system restrict access to only those who are approved users? b. How do you ask the
operating system to show you what processes are currently in the process table? c. How do you
tell the operating system that you do n

What are some variations of the two-phase locking protocol? Why is strict or rigorous two-phase
locking often preferred?

See Full Question And Answer at solutionrank.com

A database is stored on ten 9-GB RAID 1 LUNs. A cascade three-site remote replication solution
involving a synchronous and disk-buffered solution has been chosen for disaster recovery. All
the LUNs involved in the solution have RAID 1 protection. Calculate the total amount of raw
capacity required for this solution.

Consider the page table for a system with 12-bit virtual and physical addresses with 256-byte
pages. The list of free page frames is D, E, F (that is, D is at the head of the list E is second, and
F is last). Page Page Frame 0 ................................... - 1 ................................... 2 .....

A yield sign encloses the word YIELD within a triangle. Write a program that displays a yield
sign. (Use stars to represent the sides of the triangle.)

Consider the following GRADEBOOK relational schema describing the data for a grade book of
a particular instructor. CATALOG(Cno, Ctitle) STUDENTS(Sid, Fname, Lname, Minit)
COURSES(Term, Sec_no, Cno, A, B, C, D) ENROLLS(Sid, Term, Sec_no) Specify and execute
the following queries using the RA interpreter on the GR

You are designing a caching subsystem that temporarily stores data retrieved over the network
(e.g., web pages) into a faster access storage (e.g., the hard disk). Due to a change in
requirements, you define an additional service in your subsystem for configuring cache
parameters (e.g., the maximum amount of hard disk

See Full Question And Answer at solutionrank.com

A yield sign encloses the word YIELD within a triangle. Write a program that displays a yield
sign. (Use stars to represent the sides of the triangle.)

Design an algorithm that, given two strings of characters, tests whether the first string appears as
a substring somewhere in the second.

Define load balancing and scaling in the context of multiprocessor architectures.

Develop and test a Python program that determines how many images can be stored on a given
size USB (flash) drive. The size of the USB drive is to be entered by the user in gigabytes (GB).
The number of images that can be stored must be calculated for GIF, JPEG, PNG, and TIFF
image file formats. The program output shou

Create a subclass of BinaryTree whose nodes have fields for storing preorder, post-order, and in-
order numbers. Write recursive methods preOrderNumber(), inOrderNumber(), and
postOrderNumbers() that assign these numbers correctly. These methods should each run in O(n)
time.

See Full Question And Answer at solutionrank.com

1. What is an advantage of a linked list over an array? A. Linked lists take up less space per
element B. Linked lists can grow dynamically to hold individual new elements without copying
existing elements C. Linked lists are faster at finding a particular element than an array D.
Linked lists can hold structures a

Solve each of the following problems by translating the values into two's complement notation
(using patterns of 5 bits), converting any subtraction problem to an equivalent addition problem,
and performing that addition. Check your work by converting your answer to base ten notation.

Consider a workflow system supporting software developers. The system enables managers to
model the process the developers should follow in terms of activities and work products. The
manager can assign specific processes to each developer and set deadlines for the delivery of
each work product. The system supports seve

Suggest a design pattern that you encounter in a category of everyday things (e.g., consumer
electronics, automobiles, appliances). Briefly describe the pattern.

Suppose you want to interchange the values stored in memory cells 2 and3. What is wrong with
the following sequence of steps: Step 1. Move the contents of cell number 2 to cell number 3.
Step 2. Move the contents of cell number 3 to cell number 2. Design a sequence of steps that
correctly interchanges the contents o

See Full Question And Answer at solutionrank.com

When is unified storage a suitable option for a data center? Justify your answer by comparing the
unified storage offering with traditional storage solutions.

The three bit patterns 10000010, 01101000, and 00000010 are representations of the same value
in two's complement, excess, and the 8-bit floating-point format presented in Figure 1.26, but not
necessarily in that order. What is the common value, and which pattern is in which notation?

Choose a database application with which you are familiar. Design a schemaand show a sample
database for that application, using the notation of Figures 1.2 and 2.1. What types of additional
information and constraints would you like to represent in the schema? Think of several users of
your database, and design a view
Compare the circular-wait scheme with the various deadlock-avoidance schemes (like the
banker's algorithm) with respect to the following issues: a. Runtime overheads b. System
throughput

What problems could arise during maintenance if a large software system were designed in such
a way that all of its data elements were global?

See Full Question And Answer at solutionrank.com

What is the stripe size of a five-disk RAID 5 set with a strip size of 32 KB? Compare it with the
stripe size of a five-disk RAID 0 array with the same strip size.

Give an example of a set of steps that conforms to the informal definition of an algorithm given
in the opening paragraph of Section 5.1 but does not conform to the formal definition given in
Figure 5.1

Draw an inheritance hierarchy for students at a university similar to the hierarchy shown in Fig.
9.2. Use Student as the superclass of the hierarchy, then extend Student with classes
Undergraduate Student and Graduate Student. Continue to extend the hierarchy as deep (i.e., as
many levels) as possible. For example, Fr

Encode the following sentences in ASCII using even parity by adding a parity bit at the high-
order end of each character code: a. Does 100/5 = 20? b. The total cost is $7.25.

Define two classes, Patient and Billing, whose objects are records for a Clinic. Derive Patient
from the class Person given in Listing 8.1. A Patient record has the patient's name (defined in the
class Person) and identification number (use the type String). A Billing object will contain a
Patient object and a Doctor o

See Full Question And Answer at solutionrank.com

Consider the CD cover in Figure 5-61. A. Specify identifiers and attributes for the entities CD,
ARTIST, ROLE, and SONG. B. Construct a crow's foot model showing relationships among
these four entities. Name each relationship and specify cardinalities. Indicate which cardinalities
you can justify on the basis of the

An application has 1,000 heavy users at a peak of 2 IOPS each and 2,000 typical users at a peak
of 1 IOPS each. It is estimated that the application also experiences an overhead of 20 percent for
other workloads. The read/write ratio for the application is 2:1. Calculate RAID corrected IOPS
for RAID 1/0, RAID 5, and RA

Consider an ONLINE_AUCTION database system in which members (buyers and sellers)


participate in the sale of items. The data requirements for this system are summarized as follows:
â– The online site has members, each of whom is identified by a unique member number and is
described by an e-mail address, name, password
Suppose a right triangle is placed in a plane as shown below. The right-angle point is at (0, 0),
and the other two points are at (200, 0), and (0, 100). Write a program that prompts the user to
enter a point with x- and y-coordinates and determines whether the point is inside the triangle.
Here are some sample runs:

A simplified view of thread states is Ready, Running, and Blocked, where a thread is either
ready and waiting to be scheduled, is running on the processor, or is blocked (i.e. is waiting for
I/O.) This is illustrated in Figure. Assuming a thread is in the Running state, answer the
following questions: (Be sure to expla

See Full Question And Answer at solutionrank.com

Newton's method for computing the square root of a number consists of approximating the actual
square root by means of a set of transformations. Each transformation starts with a guess at the
square root. A better approximation is then (guess + number / guess) / 2. This result becomes the
guess for the next approximati

Develop a complete use case for one of the following activities: a. Making a withdrawal at an
ATM b. Using your charge card for a meal at a restaurant c. Buying a stock using an on-line
brokerage account d. Searching for books (on a specific topic) using an on-line bookstore e. An
activity specified by your instru

What primary characteristics should an OID possess?

Phillip Morgan, the owner of Morgan Importing, makes periodic buying trips to various
countries. During the trips, he keeps notes about the items he purchases and basic data about
their shipments. He hired a college student as an intern, and she transformed his notes into the
spreadsheets in Figure 4-9. This is just sa

Using the class Pet from Listing 6.1, write a program to read data for five pets and display the
following data: name of smallest pet, name of largest pet, name of oldest pet, name of youngest
pet, average weight of the five pets, and average age of the five pets. public class Pet { private
String name; private in

See Full Question And Answer at solutionrank.com

Which type of application benefits the most by bypassing write cache? Justify your answer.

One of the bit patterns 01011 and 11011 represents a value stored in excess 16 notation and the
other represents the same value stored in two's complement notation. a. What can be determined
about this common value? b. What is the relationship between a pattern representing a value
stored in two's complement notation

When Christopher Alexander says "good design cannot be achieved simply by adding together
performing parts," what do you think he means?
Why does the lossy nature of standard Ethernet make it unsuitable for a layered FCoE
implementation? How does Converged Enhanced Ethernet (CEE) address this problem?

The table below represents a stack stored in a contiguous block of memory cells, as discussed in
the text. If the base of the stack is at address 10 and the stack pointer contains the value 12, what
value is retrieved by a pop instruction? What value is in the stack pointer after the pop operation?
Address

See Full Question And Answer at solutionrank.com

Write a Python function named zeroCheck that is given three integers, and returns true if any of
the integers is 0, otherwise it returns false.

Are a PSPEC and a use case the same thing? If not, explain the differences.

Encode the following values using the 8-bit floating-point format described in Figure
1.26.Indicate each case in which a truncation error occurs. a. - 7 ½ b. ½ c. - 3 ¾ d. 7⁄32
e. 31⁄32

Decode the following bit patterns using the floating-point format described in Figure 1.26: a.
01011001 b. 11001000 c. 10101100 d. 00111001

1.Which ADO.NET object is a forward only cursor and is connected to the database while the
cursor is open? a.DBDataReader b.DataSet c.DataTable d.DataAdapter 2.Which ADO.NET
Command object's property would you use when a query returns the SUM of a column in a
table? a.ExecuteNonQuery b.ExecuteDataReader

See Full Question And Answer at solutionrank.com

A storage array dials a support center automatically whenever an error is detected. The vendor's
representative at the support center can log on to the service processor of the storage array
through the Internet to perform diagnostics and repair. Discuss the security concerns in this
environment and provide security me

Hardware vendor XYZ Corp. claims that their latest computer will run 100 times faster than that
of their competitor, Prunes, Inc. If the Prunes, Inc. computer can execute a program on input of
size n in one hour, what size input can XYZ's computer execute in one hour for each algorithm
with the following growth rate eq

Assume the following declarations are made and indicate which items below are valid
subscripted variables. int a[] = new int[10]; char b[] = new char[6]; int x = 7, y = 2; double z =
0.0; a. a[0] b. b[0] c. c[1.0] d. b['a'] e. b[a] f. a[x + y] g. a[x % y] h. a[10] i. c[-1] j. a[a[4]]

Create an interface MessageEncoder that has a single abstract method encode(plainText), where
plainText is the message to be encoded. The method will return the encoded message. Create a
class SubstitutionCipher that implements the interface MessageEncoder, as described above. The
constructor should have one parameter

Encode each of the following bit patterns using dotted decimal notation. a.
000001010001001000100011 b. 1000000000100000 c. 0011000000011000

See Full Question And Answer at solutionrank.com

Consider the EER diagram in Figure for a car dealer Map the EER schema into a set of relations.
For the VEHICLE to CARITRUCK/SUV generalization consider the four options presented in
Section and show the relational schema design under each of those options. Option 8A: Multiple
relations-super-class and subclasses.

A network router has a failure rate of 0.02 percent per 1,000 hours. What is the MTBF of that
component?

Modify Listing 2.10, ComputeChange.java, to display the nonzero denominations only, using
singular words for single units such as 1 dollar and 1 penny, and plural words for more than one
unit such as 2 dollars and 3 pennies. (Use input 23.67 to test your program.)

Why were the tables populated in the order shown in Review Questions 7.14-7.17? In Review
Questions 7.14, write INSERT statements to add the data shown in Figure 1-30 to the
DEPARTMENT table. Run these statements to populate the DEPARTMENT table. In Review
Questions 7.17, write INSERT statements to add the data shown

Declare variables to represent a person's name, age, and hourly wage.

See Full Question And Answer at solutionrank.com

Assuming there are no accidents or delays, the distance that a car travels down the interstate can
be calculated with the following formula: Distance = Speed × Time Create a VB application
that allows the user to enter a car's speed in miles-per-hour. If the user fails to enter numeric
values, display an appropriat

Write a Java program that simulates car racing, as shown in Figure 16.22(a). The car moves from
left to right. When it hits the right end, it restarts from the left and continues the same process.
You can use a timer to control animation. Redraw the car with a new base coordinates (x, y), as
shown in Figure 16.22(b).

Read [Nog00] and write a two- or three-page paper that discusses the impact of "chaos" on
software engineering.

Develop a complete test strategy for the SafeHome system discussed earlier in this book.
Document it in a Test Specification.
If each sector on a magnetic disk contains 1024 bytes, how many sectors are required to store a
single page of text (perhaps 50 lines of 100 characters) if each character is represented in
Unicode?

See Full Question And Answer at solutionrank.com

Write a multithreaded program that implements the banker's algorithm discussed in Section
7.5.3. Create n threads that request and release resources from the bank. The banker will grant
the request only if it leaves the system in a safe state. You may write this program using either
Pthreads or Win32 threads. It is imp

Write a class named Octagon that extends GeometricObject and implements the Comparable and
Cloneable interfaces. Assume that all eight sides of the octagon are of equal size. The area can be
computed using the following formula: area = (2 + 4/√2)*side*side Draw the UML diagram
that involves Octagon, GeometricObject

Consider schedules S3, S4, and S5 below. Determine whether each schedule is strict,
cascadeless, recoverable, or nonrecoverable. (Determine the strictest recoverability condition that
each schedule satisfies.) S3:
r1(X);r2(Z);r1(Z);r3(X);r3(Y);w1(X);c1;w3(Y);c3;r2(Y);w2(Z);w2(Y);c2;
S4:r1(X);r2(Z);r1(Z);r3(X);r3(Y);w

How are the concepts of coupling and software portability related? Provide examples to support
your discussion.

Write an instruction sequence to copy 4 bytes starting from $1000 to $1100, $1103.

See Full Question And Answer at solutionrank.com

Some CPUs provide for more than two modes of operation. What are two possible uses of these
multiple modes?

Consider the following relation: a. Given the previous extension (state), which of the following
dependencies may hold in the above relation? If the dependency cannot hold, explain why by
specifying the tuples that cause the violation. i. A→B, ii. B→C, iii. C→B, iv. B→A, v. C→A
b. Does the above relati

Identify a situation in a multiprogramming system in which a process does not consume the
entire time slice allocated to it.

Explain what the following terms mean in object-oriented database terminology: method,
signature, message, collection, extent.
Identify the syntactically incorrect statements in the following: 1. Loop intX = intX + 1 Do
While intX < 100 2. Do lstOutput.Items.Add("Hello") intX = intX + 1 While intCount < 10 3.
Loop Until intX = 99 intX = intX + 1 Do 4. For intX = 1 lstOutput.Items.Add(intX) Next

See Full Question And Answer at solutionrank.com

Write an application that displays a box, an oval, an arrow and a diamond using asterisks (*), as
follows:

If the message xxy yyx xxy xxyy were compressed using LZW with a starting dictionary whose
first, second, and third entries were x, y, and space, respectively, what would be the entries in the
final dictionary?

Describe how the insert, delete, and update commands should be implemented on a bitemporal
relation.

Create a base class called Vehicle that has the manufacturer's name (type String), number of
cylinders in the engine (type int), and owner (type Person given in Listing 8.1Truck that is
derived from Vehicle and has additional properties: the load capacity in tons (type double, since
it may contain a fractional part) an

Select a subject with which you are familiar and design a pseudocode for giving directions in that
subject. In particular, describe the primitives you would use and the syntax you would use to
represent them. (If you are having trouble thinking of a subject, try sports, arts, or crafts.)

See Full Question And Answer at solutionrank.com

Elementary physics states that when an object is subjected to a constant acceleration a, the
relationship between distance d and time t is given by d = (1/2)*a*t^2. Suppose that, during a
seek, the disk in Exercise 12.8 accelerates the disk arm at a constant rate for the first half of the
sleek, then decelerates the di

You are designing the access control policies for a Web-based retail store. Customers access the
store via the Web, browse product information, input their address and payment information, and
purchase products. Suppliers can add new products, update product information, and receive
orders. The store owner sets the ret

What is the value of the program counter in the machine described in Appendix C immediately
after executing the instruction B0CD?

A retail store has a preferred customer plan where customers may earn discounts on all their
purchases. The amount of a customer's discount is determined by the amount of the customer's
cumulative purchases in the store. • When a preferred customer spends $500, he or she gets a
5% discount on all future purchases.

Das könnte Ihnen auch gefallen