Computer Science Textbook Solutions - 4
Computer Science Textbook Solutions - 4
Modify your states.html page so that it uses the nested array structure STATE_INFO to store the
names of the states and their capitals. Then, experiment with the new version to verify that the
page behaves as before?
What is the total number of gates required to build a 4-bit adder? Assuming two transistors per
NOT gate (as in Figure 16.8) and four transistors per AND and OR gate (as in Figures 16.9 and
16.10, respectively), what is the total number of transistors in the circuitry of the 4-bit adder?
Using your stats.html page, perform 100 dice rolls and report the results. Are your percentages
close to the expected ones listed in Figure 17.14? Should they be? Now, perform 1,000 dice rolls
using your page and report the results. Are the percentages from this experiment closer to the
expected percentages? Should th
What settings would cause the contents of memory address 4 to be copied into register R0?
Define a function named PigLatin that takes a string as input and returns the Pig Latin
translation. For example, the call PigLatin('oops') should return 'oopsway', whereas
PigLatin('foo') should return 'oofay'. Insert this function definition into your string.js library file.
Then, create a Web page named piglatin.htm
Modify your PigLatin function (Exercise 15.7) so that it can translate entire phrases of words
into Pig Latin. Similar to the Acronym function from Exercise 17.5, your function should break
the input string into words using the split method. It should then translate each word as before
and combine the translated words
Suppose that the assignment to random-Index in the Random-One-Of function (Figure 17.2)
were replaced by the following: randomIndex = RandomInt(0, list.length); Would this
modification cause the function to return an error? Would the function still behave appropriately
every time it is called? Explain.
Whenever you order a pizza, you are faced with the dilemma of which size to order. Is a large
pizza a good deal, or would you be better off ordering two mediums? Create a Web page named
pizza.html that determines the cost per square inch of any pizza. The page should contain text
boxes in which the user can enter the
It is possible to develop truth tables for logic circuits, just as we did for individual gates. For
example, the following logic circuit combines an AND gate and an OR gate. Complete the
corresponding truth table by calculating the output value for each set of inputs. [Figure out the
output of the AND gate in each case
What sequence of machine-language instructions would cause the contents of the four registers
to be copied into memory locations 7, 8, 9, and 10, respectively?
Design and create a Web page named roman.html containing a text box in which the user can
enter an ancient Roman numeral. When the user clicks a button, the number represented by that
Roman numeral should appear in the page. Once you have completed your page, use it to convert
the following Roman numerals to numeric v
Assume that the following statements have assigned arrays to variables: responses = ['yes', 'no',
'maybe']; nums = [1, 2, 3, 2+1, 7*7, 2*5-1]; misc = [1.234, 'foo', 7-5, true, 3, 'foo']; empty = [ ];
Predict the value that would be accessed by each of the following expressions:
How many cycles are required to add the contents of R0, R1, and R2 and then place the sum in
R3? Describe the settings for each cycle.
Enter the average.html text from Figure 17.12 into a new Web page, then load this page to verify
that it behaves as described. What happens if you click on the button without entering any
numbers in the text box? Calling the split method on an empty string produces an empty array,
i.e., an array with length 0. Thus, c
Re-implement your grades.html page from Chapter 7 (Exercise 7.4). Instead of requiring users to
provide pre-computed averages, your modified page should provide text boxes in which users
can enter a series of grades for each category (e.g., all homework grades obtained by the user
could be listed in a text box)?
Assuming that data can be copied to and from main memory in a single CPU cycle, how many
cycles are required to add the contents of memory addresses 5 and 6 and then store the result in
memory address 7? Describe the settings for each cycle.
Define a function named Minimum that is similar to the Average function from Figure 17.11, but
that takes an array of numbers as input and returns the smallest value from that array. For
example, the call Minimum ([33, 12, 5, 17, 8]) should return 5. After inserting this function into
your arrays.js page, modify your a
Within the control unit, what is the role of the program counter (PC)? That is, how is the PC used
in fetching and executing instructions?
Create a Web page named acronym.html that derives an acronym from a given phrase. The page
should load the arrays.js library file (accessible at balance3e.com/arrays.js) and contain a text
box in which the user can enter the phrase. When the user clicks the button in the page, the
Acronym function is called to construc
Utilize a search engine to research and answer the following questions. Identify the site at which
you obtained your answer, as well as the search parameters you used to locate the page. • Who
invented the programming language PHP? • In what year did the Battle of Hastings take
place? • Who won the Academy Awa
Design and create a Web page named stats.html that simulates a number of dice rolls and
displays statistics on those rolls. The user should be able to specify the number of dice rolls via a
text box and then click a button to view the resulting counts. Figure 17.17 portrays one possible
layout for the page?
Augment your stats.html page so that, in addition to displaying the counts for each dice total, the
page also represents the counts as percentages of the total number of rolls. To compute each
percentage, you must divide the count by the total number of rolls, then multiply by 100. For
example, if 162 out of 1,000 roll
Does it make any sense for both of a flip-flop's input wires to carry current at the same time?
What would happen within the circuit if this were to happen?
When a course has numerous assignments, a kindly instructor may drop a student's lowest grade
to allow for one bad day. Modify your grades.html page from Exercise 17.8 so that the lowest
lesson grade is ignored. [To compute the average of a collection of grades while dropping the
lowest grade, you can use the followin
The following logic circuit is similar to the one in Question 4, except that the AND and OR gates
are in reversed positions. Complete the corresponding truth table by calculating the output value
for each set of inputs?
For each of the following statements, draw the memory cell associated with the variable after the
assignment has been made:
In a stored-program computer, both instructions and data are stored in main memory. How does
the Control Unit know where the program instructions begin? How does it know where the
instructions end?
Describe the settings that would cause the value stored in R2 to be doubled?
Can Moore's Law continue to hold forever? That is, can technology continue to advance at its
current rate indefinitely, causing the number of transistors that fit on a microchip to double every
12 to 18 months? Explain.
Consider the following code segment, which removes all spaces and punctuation marks from a
given phrase. The first statement performs a search to determine whether the phrase contains a
space or punctuation mark. If such a character is found, then its index will be stored in the
variable index and the loop test will su
After experimenting with bin.html's binary search capabilities, answer the following questions:
• What is the minimum number of inspections required to find an item in an array using binary
search? Where must the desired item occur in the array in order for the page to perform this
minimum number of inspections? â€
Augment your cipher.html page so that it can both encode and decode messages. You will need
to define a new function named Decode, which decodes the message in the text area using the
entered cipher key. You should also add a second button labeled "Decode the message" that calls
this new function when it is clicked. O
Design and implement a Web page named pal.html that tests whether a word or phrase is a
palindrome. Your page should allow the user to enter a word or phrase and then display a string
indicating whether that word or phrase is a palindrome. The code that evaluates the user's input
should be case insensitive and should i
1. TRUE or FALSE? Computer technology has greatly impacted the banking industry, to the
extent that credit cards and debit cards have reduced consumers' reliance on cash. 2. TRUE or
FALSE? Embedded processors are computer chips that are built into appliances and machinery
to control their workings. 3. TRUE or FALSE?
Add the above two assignment statements to your cipher.html page so that it properly encodes
messages containing both uppercase and lowercase letters. As before, any non-letters (including
spaces and punctuation marks) should be left unchanged by the encoding?
Machine languages are machine-specific, meaning that each type of computer has its own
machine language? Explain why this is the case.
Using the array of names from the previous examples (repeated below), perform the following
traces: name = ['Charlie','Dave','Jack','Jerald','Jerroll','Laura','Lois','Winnie'];
Enter the strdemo.html text from Figure 15.2 into a new Web page, then load this page to verify
that it behaves as described. After experimenting with strdemo.html, augment the page so that a
lowercase version of the string is also displayed in the page division?
Do the e-commerce success factors listed in figure guarantee success for an e-commerce
business venture? Give a few examples of what else could go wrong and how you would
confront such challenges. e-Commerce Success Factors • Selection and Value. Attractive
product selections, competitive prices, satisfaction guarant
Assume you will start an Internet-based business similar to one of those mentioned in this case or
another one of your choice. Would you be a first, second, or later mover in the market you
select? How would you differentiate yourself from other competitors or prospective new
entrants? Break into small groups to share
Are the form and use of information and decision support systems for managers and business
professionals changing and expanding? Why or why not?
Refer to the Real World Case on Valero Energy and others in the chapter. Information is one part
(albeit a very important one) of decision making, with managers being the other. What
experiences and qualifications are important in preparing managers for “fact-basedâ€
decision-making? How are those obtained?
Define a function named Reverse that takes a string as input and returns a copy of that string in
reverse order. For example, the function call Reverse('abcd') should return the string 'dcba'. Once
you have developed this function, insert its definition into your string.js library file. Then,
modify your strdemo.html p
Review the Google real-world example in the chapter. How might you change the user interface
of Google’s search pages and those of some of its other products on the Web? Defend your
proposals.
The IT function is notorious for being dynamic, and its leaders are no exception. Go online to
research recent trends affecting the traditional roles of senior IT executives and how those roles
are changing. Prepare a presentation to share your findings with the rest of the class.
Online trust providers such as e Trust (www.etrust.org) and others review privacy policies,
including information collection and use, sharing and disclosure, and security, and then certify
Web sites as meeting their standards. Companies that achieve this can then display a logo to that
effect. Search the Internet to di
1. How does the job of the CIO change with the assumption of customer responsibilities? Do you
agree with this new development? Why or why not? 2. Why would there be internal resistance to
CIOs becoming more externally customer-focused than they were before? Does this present a
threat to executives in other areas of a
1. Consider your own online shopping patterns. How much weight do you place on the presence
of a name or logo or other trademark (such as the Kitchen Aid silhouette) on a Web site when
purchasing goods or services? Do you ever stop to consider whether you may have been misled?
How could you tell the difference? 2. Bria
Has the growth of self-directed teams to manage work in organizations changed the need for
strategic, tactical, and operational decision making in business?
1. Why do you think the practices described in the case led to success for these companies? 2.
How do they change the structure of projects so that the likelihood of a positive outcome
increases? 3. In the case of Shaw Industries, how did Scrum help? 4. Provide three specific
examples from the case, and explain where a
How can a company use change management to minimize the resistance and maximize the
acceptance of changes in business and technology? Give several examples.
Review the real-world example about Walmart and Others in the chapter. How could these
companies prepare for the unexpected changes in demand that brought down their Web sites?
Explain your reasoning.
1. How can companies benefit from the “cultural assessments†regularly performed by
Mattel? How could the information obtained be used to create business value for those
organizations? Provide multiple examples. 2. The case notes that, in spite of disconfirming
evidence as to the effectiveness of targeting online o
Three Ethical Scenarios Whether you’re an employer or an employee, you should know what
your rights are when it comes to Internet use in the workplace. Mark Grossman, a Florida
attorney who specializes in computer and Internet law, gives answers to some basic questions. â€
¢ Scenario 1: Nobody told you that your Inter
1. How do the companies involved benefit from the innovations discussed in the case? Is it about
more transaction that is efficient processing, better reaching out to customers, or both? 2. Use
examples from the case to illustrate your answer. 3. “Shopping online can be social again, as
it was in person,†says Wade
1. Is the second-mover advantage always a good business strategy? Defend your answer with
examples of the companies in this case. 2. What can a front-runner business do to foil the
assaults of second movers? Defend your answer using the examples of the front-runner
companies in the case. 3. Do second movers always have
If virtualization technology were to eventually allow end users to run any environment of their
choice in the same device, does that mean the choice of computing platform (desktop, notebook,
smart phone; Windows, Linux, Mac OS) becomes irrelevant? Break into small groups to discuss
this issue.
What potential security problems do you see in the increasing use of intranets and extranets in
business? What might be done to solve such problems? Give several examples.
Many companies plan really well, yet few translate strategy into action. Do you think this
statement is true? Why or why not?
Refer to the Real World Case on IT/Business Alignment in the chapter. Companies where IT is
an important part of their product offerings presumably also have a sales force that is well versed
in technology. Why is it then necessary to take the CIO along on customer visits? Discuss.
Conversion Strategies the city of London has been well known for its many historic sites, live
theater, and heavy traffic. In spite of a sophisticated underground subway system known locally
as the “tube,†traffic delays, car exhaust, noise pollution, and vehicle-pedestrian accidents
have plagued Londoners for deca
Why are ERP upgrades so complex and expensive? What role does ERP customization, if any,
play in this process? Go online and research other examples discussing ERP upgrades. Can you
discern a pattern in what seems to be the major cost drivers of the upgrade process?
Refer to the Real World Case on social networks, mobile commerce, and online shopping in the
chapter. Do you think that mobile devices (not just phones anymore) are becoming the major
platform for shopping, communication, everything? What are the implications for companies?
If personalizing a customer’s Web site experience is a key success factor, then electronic
profiling processes to track visitor Web site behavior are necessary. Do you agree or disagree
with this statement? Explain your position.
What are some of the limitations or dangers you see in the use of AI technologies such as expert
systems, virtual reality, and intelligent agents? What could be done to minimize such effects?
What can be done to improve the security of business uses of the Internet? Give several
examples of security measures and technologies you would use.
What is the difference between the parallel, direct, phased, and pilot forms of IS conversion?
Which conversion strategy is best? Explain why.
1. Consider the outcomes of the projects discussed in the case. In all of them, the payoffs are
both larger and achieved more rapidly than in more traditional system implementations. Why do
you think this is the case? How are these projects different from others you have come across in
the past? What are those differen
Refer to the Real World Case on Microsoft, SiCortex, and Others in the chapter. Does the ability
of virtualization technology to provide developers with multiple combinations of operating
systems and applications mean that companies should be required, or expected, to support all
possible ones? Discuss.
What are several e-business and e-commerce strategies and applications that should be
developed and implemented by many companies today? Explain your reasoning.
Choose two or three companies with global operations that interest you and visit their Web sites
for countries other than the United States. Even if you are not familiar with the language, do the
Web sites have the same look and feel of the U.S. site? In which ways are they similar, and in
which ways are they different
Project Planning Projects have many dependencies, any of which could become points of failure.
Without the cooperation or input from even one vital resource, a project may fail to meet its
objectives. Effective project planning helps project managers think through a project before it
starts and prepare communication st
Planning is a useless endeavor because developments in e-business and e-commerce and in the
political, economic, and societal environments are moving too quickly nowadays. Do you agree
or disagree with this statement? Why?
Enabling Technologies the Americans with Disabilities Act prohibits discrimination based on
disability about public accommodations and commercial facilities. This act has been interpreted
to include certain information systems as well. All information systems development projects
should consider ADA issues during devel
Why has prototyping become a popular way to develop business applications? What are proto
tapping’s advantages and disadvantages?
1. The case notes that a changing environment or business priorities can render an ongoing
project obsolete even before it has been completed. What alternatives do CIOs who find
themselves in this situation have with respect to dealing with the troubled project? Would you go
ahead and finish it, or scrap it altogether?
What are the three most important factors you would use in evaluating computer hardware?
Computer software? Explain why.
In what ways does using an electronic spreadsheet package provide you with the capabilities of a
decision support system?
Refer to the Real World Case on Kimberly-Clark and virtual reality in the chapter. Is the
company fixing something that was not broken? Explain.
1. How does virtualization work? In your own words, describe what you understand about the
virtualization process as depicted in the case. 2. In software development and testing, where does
virtualization help, and where does it not help? Why? 3. What are the business benefits of
implementing virtualization technologie
What would you suggest companies do to overcome those? Break into small groups with your
classmates to develop a few recommendations.
1. What are the business benefits of BI deployments such as those implemented by Avnet and
Quaker Chemical? What roles do data and business processes play in achieving those benefits?
2. What are the main challenges to the change of mindset required to extend BI tools beyond
mere reporting? What can companies do to ove
How do you think the possession or access to certain information shapes the political dynamics
of organizations? Do you believe companies should be open about widespread access to
information, or will they be better off by restricting it? Why? Break into small groups with your
classmates to discuss these issues, and ta
Are you interested in investing in, owning, managing, or working for a business that is primarily
engaged in e-commerce on the Internet? Explain your position.
1. What is the business benefits derived from the technology implementation described in the
case? Also, discuss benefits other than those explicitly mentioned in the case. 2. Are virtual
stores like this one just an incremental innovation on the way marketing tests new product
designs? Or do they have the potential to
Consider the examples discussed in the case. Go online and research what other companies or
industries are doing in terms of the use of social networking sites and mobile commerce. What
other examples can you find? Prepare a report that compares those in your research with the ones
described here, highlighting similari
Remote Point of Sales in Mexico Melissa and “Rook†Nelson, co-owners of Skydive
Chicago, shut down their northern operations in mid- December each year. With heavy cloud
cover and frigid temperatures, they just cannot find enough skydivers willing to jump over the
frozen Chicago landscape. Without customers, valued
One of the organizations featured in the case is New Mexico State University (NMSU). Think
about how IT can be of strategic importance to universities and educational institutions. Break
into small groups with your classmates to discuss some possibilities and how these apply to your
educational experience. What suggest
E-Commerce Web Site Reviews BizRate.com Biz Rate (www.bizrate.com) instantly provides
information about hundreds of online stores. Supported product lines include books, music,
electronics, clothes, hardware, gifts, and more. Customer reviews help shoppers select products
and retailers with confidence. Biz- Rate also f
1. In the case, both airlines upgraded to the same application but approached the upgrade process
differently. What were those differences, and how much impact did they have on the outcome of
the project? 2. What precautions did the organizations in the case take to prevent software
upgrade problems? To what extent do
Why do you think there have been so many business failures among dot-com companies that
were devoted only to retail e-commerce?
Reflect on your own purchasing behavior. How much do you rely on blogs, feedbacks, and
recommendations from past customers to make your own purchase decisions? Why do you (or
don’t you) rely on these sources of information? Do you believe they are largely unbiased?
Break into small groups to discuss these issues with
Which of the following strategies do you think IT executives should adopt to improve their
current situation: reject new projects, attempt to increase staff and funding, prioritize often, or all
of the above? Break into small groups with your classmates to discuss these and other strategies
you may have thought of; com
Refer to the real-world example about copying CDs and music downloading in the chapter. Is
copying music CDs an ethical practice? How about Internet music downloading? Explain.
1. Consider statements made in the case about business often not having an overarching business
strategy that can serve as guidance for the development of a strategy for IT. 2. Dave Aron of
Gartner notes that in some cases the lack of clear business strategy provides an opportunity for
IT leaders to step in and help ar
What are your major concerns about computer crime and privacy on the Internet? What can you
do about it? Explain.
The Spyware Problem Web surfers may feel anonymous as they use the Internet, but that feeling
isn’t always justified. IP addresses, cookies, site log-in procedures, and credit card purchases
all help track how often users visit a site and what pages they view. Some companies go further.
Some free screensaver software
Review the real-world example discussing the factors involved in project failure in the chapter. If
these are well-known, why would companies choose to ignore them over and over again? What
could be the reasons behind such behavior?
Choose one of the companies introduced in the case and search the Internet to update the status
of their project. Also, look at their competitors, and discover how they have responded to the
introduction of the developments mentioned in the case. Have they attempted to imitate them?
Go online and search the Internet to discover how typical the experiences reported in the case are
for other companies in different industries. How are the ones you discover addressing these
issues? How similar or different are those strategies with the ones discussed in the case? Prepare
a report to summarize your fin
Are enterprise information portals making executive information systems unnecessary? Explain
your reasoning.
Refer to the Real World Case on LinkedIn, Umbria, Mattel and Others in the chapter. What is
your take on the debate as to whether these “influential†individuals do really have an
effect on others, or they are representative of an underlying cultural trend? How would a
company react based on their position on the i
If you had to apply the ideas discussed in the case to your academic career, what would your
dashboard and/ or scorecard look like? What would be the sources of information? How you
would measure whether you are making progress toward attaining your goals? Break into small
groups to discuss these issues.
Use the Internet to research the current business status of all of the many companies in this case.
Are the second movers still successfully using their strategies, or have the first movers foiled
their attempts? Have new strong players entered the markets of the first and second movers, or
have business, economic, or
1. One of the challenges that PayPal faces now that it has managed to overcome the polylingual
obstacle is finding the best way to put this functionality in the hands of the business, so that they
do not have to go through IT each time. How do you balance this need for responsiveness and
flexibility versus its need to
A number of technological and cultural developments in recent years have resulted in the
emergence of extensive social networks and a large number of avidly followed blogs. Go online
to research how companies are tapping into these trends and what new marketing practices have
arisen as a result. Prepare a report to sum
Authentication Network and application managers need to know who is accessing their systems
to determine appropriate access levels. Typically, they require that users create secret passwords.
A secret password, known only to the user, allows an administrator to feel confident that a user is
who the user says he or she
Search the Internet for other examples of both “mere reporting†and transformational
implementations of business intelligence tools. In which ways are these similar to the ones
discussed in the case? In which ways are these different? What seems to be the main distinction
between reporting and process-transformatio
Which applications of AI have the potential value for use in the operations and management of a
business? Defend your choices.
What planning methods would you use to develop business/ IT strategies and applications for
your own business? Explain your choices.
With technologies like these, will consumers entirely do away with retailers sometime in the
future, shopping only through virtual representations of a retail store? Will consumers even want
it to look like a retail store? Break into small groups to propose arguments for and against these
questions.
Can computers think? Will they ever be able to? Explain why or why not.
Go online and research other users of virtualization technology (backup and disaster recovery
being one of those). How do those differ from the ones described in the case? How are they
similar? Prepare a report to summarize your findings.
As these technologies go beyond the capacity and abilities of human beings, what is the role of
people in the processes they affect? Do you think these technologies empower us by allowing us
to overcome our limitations and expand our range of possibilities? Instead, do they relegate
people to the role of uncritically a
1. Although a very detailed change proposal may prevent people from making their own
connections, as discussed in the case, it may lead others to consider the proposal vague and
unfinished. How do you balance these two concerns? What guidelines would you use to ensure
that you are not veering too far off in either dire
“In the future, the prevalence of IT in product offerings will blur the distinction between IT
and other areas of the company, to the extent that the IT function will cease to exist as a separate
entity.†Do you agree with this statement? Why? Break into small groups with your
classmates to see if you can reach a c
Refer to the Real World Case on WestJet, JetBlue, and Others in the chapter. In general, is it a
good idea for companies to make major software upgrades public beforehand? What are the
advantages and disadvantages of doing so? Do they have an ethical responsibility to tell their
customers? Discuss.
Although PayPal opted for a centralized approach to keep consistency across Web site
appearance and content, other companies let both of these vary for each of the countries in which
they operate. When would you use one or the other approach? Would it depend on the company,
products offered, markets, countries, or on a
Refer to the Real World Case on IT and ethics in the chapter. Most or all companies have an
ethics and compliance program of some sort, but not all of them “live†by it. What does it
take for a company to take this next step? What is the role of IT in that scenario?
Is there an ethical crisis in business today? What role does information technology play in
unethical business practices?
See Full Question And Answer at solutionrank.com
Assume that in your first week on a new job you are asked to use a type of business software that
you have never used before. What kind of user training should your company provide to you
before you start?
How often, if ever, do you shop with your mobile phone? What do you think are some of the
roadblocks that prevent the widespread adoption of mobile shopping?
Place yourself in the position of a WestJet or JetBlue customer while the upgrading was being
implemented. What, if anything, would you have done differently had the companies told you
that a major software upgrade would be happening soon? Should they have told you? Break into
small groups with your classmates and disc
Review the real-world examples on user resistance and involvement in the chapter. What else
would you recommend to encourage user acceptance in both cases? Explain your
recommendations.
Go online and follow up on some of the organizations featured in the case (note that Extant
Financial Services has recently merged with OptumHealth). How have these organizations been
doing lately? Research what the news media and their own financial reports say, if anything,
about the role of their IT investments and
The strategic opportunities matrix described in this chapter provides a simple analysis tool for
strategic planning groups. It places all plans in direct competition with each other and so
participants can quickly identify the most promising plans to evaluate in detail. Use the Internet
and your own experience to evalu
What major business changes beyond e-business and e-commerce do you think most companies
should be planning for in the next 10 years? Explain your choices.
Planning and budgeting processes are notorious for their rigidity and irrelevance to management
action. How can planning be made relevant to the challenges facing a business?
The wireless LANs that we studied used protocols such as MACA instead of using CSMA/CD.
Under what conditions, if any, would it be possible to use CSMA/CD instead?
From Fig. 4-35, we see that a Bluetooth device can be in two Pico nets at the same time. Is there
any reason why one device cannot be the master in both of them at the same time?
Ethernet frames must be at least 64 bytes long to ensure that the transmitter is still going in the
event of a collision at the far end of the cable. Fast Ethernet has the same 64-byte minimum
frame size but can get the bits out ten times faster. How is it possible to maintain the same
minimum frame size?
Would the issues discussed in the case be solved by making a business executive the head of any
projects involving IT? Why or why not? Break into small groups with your classmates and
develop a justification for both alternatives.
In the simplest version of the Chord algorithm for peer-to-peer lookup, searches do not use the
finger table. Instead, they are linear around the circle, in either direction. Can a node accurately
predict which direction it should search? Discuss your answer.
In an infinite-population slotted ALOHA system, the mean number of slots a station waits
between a collision and its retransmission is 4. Plot the delay versus throughput curve for this
system.
A 3000-km-long T1 trunk is used to transmit 64-byte frames using protocol 5. If the propagation
speed is 6 µsec/km, how many bits should the sequence numbers be?
Give an argument why the leaky bucket algorithm should allow just one packet per tick,
independent of how large the packet is.
Consider the subnet of Fig. 5-13(a). Distance vector routing is used, and the following vectors
have just come in to router C: from B: (5, 0, 8, 12, 6, 2); from D: (16, 12, 6, 0, 9, 10); and from
E: (7, 6, 3, 9, 0, 4), the measured delays to B, D, and E, are 6, 3, and 5, respectively. What is C's
new routing table? Giv
In protocol 6 the code for frame arrival has a section used for NAKs. This section is invoked if
the incoming frame is a NAK and another condition is met. Give a scenario where the presence
of this other condition is essential.
An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is
not in use, is padding needed in the Ethernet frame, and if so, how many bytes?
A computer on a 6-Mbps network is regulated by a token bucket. The token bucket is filled at a
rate of 1 Mbps. It is initially filled to capacity with 8 megabits. How long can the computer
transmit at the full 6 Mbps?
One way of detecting errors is to transmit data as a block of n rows of k bits per row and adding
parity bits to each row and each column. The lower-right corner is a parity bit that checks its row
and its column. Will this scheme detect all single errors? Double errors? Triple errors?
Give two reasons why networks might use an error-correcting code instead of error detection and
retransmission.
Consider the network of Fig. 5-16(a). Imagine that one new line is added, between F and G, but
the sink tree of Fig. 5-16(b) remains unchanged. What changes occur to Fig. 5-16(c)?
Give three examples of protocol parameters that might be negotiated when a connection is set up.
Measurements of a slotted ALOHA channel with an infinite number of users show that 10
percent of the slots are idle. (a) What is the channel load, G? (b) What is the throughput? (c) Is
the channel under loaded or overloaded?
Consider building a CSMA/CD network running at 1 Gbps over a 1-km cable with no repeaters.
The signal speed in the cable is 200,000 km/sec. What is the minimum frame size?
Figure 4-25 shows several physical layer protocols. Which of these is closest to the Bluetooth
physical layer protocol? What is the biggest difference between the two?
Compute a multicast spanning tree for router C in the following subnet for a group with members
at routers A, B, C, D, E, F, I, and K.
Suppose that the three-statement while loop near the end of protocol 6 were removed from the
code. Would this affect the correctness of the protocol or just the performance? Explain your
answer.
Ten thousand airline reservation stations are competing for the use of a single slotted ALOHA
channel. The average station makes 18 requests/hour. A slot is 125 µsec. What is the
approximate total channel load?
Data link protocols almost always put the CRC in a trailer rather than in a header. Why?
See Full Question And Answer at solutionrank.com
Consider the network of Fig. 4-49(a). If machine J were to suddenly become white, would any
changes be needed to the labeling? If so what?
Consider the network of Fig. 5-7, but ignore the weights on the lines. Suppose that it uses
flooding as the routing algorithm. If a packet sent by A to D has a maximum hop count of 3, list
all the routes it will take. Also tell how many hops worth of bandwidth it consumes.
To make VLANs work, configuration tables are needed in the switches and bridges. What if the
VLANs of Fig. 4-49(a) use hubs rather than multi drop cables? Do the hubs need configuration
tables, too? Why or why not?
A group of N stations share a 56-kbps pure ALOHA channels. Each station outputs a 1000-bit
frame on an average of once every 100 sec, even if the previous one has not yet been sent (e.g.,
the stations can buffer outgoing frames). What is the maximum value of N?
What is the minimum overhead to send an IP packet using PPP? Count only the overhead
introduced by PPP itself, not the IP header overhead.
Consider the interconnected LANs shown in Fig. 4-44. Assume that hosts a and b are on LAN 1,
c is on LAN 2, and d is on LAN 8. Initially, hash tables in all bridges are empty and the spanning
tree shown in Fig 4-44(b) is used. Show how the hash tables of different bridges change after
each of the following events happe
How many frames per second can gigabit Ethernet handle? Think carefully and take into account
all the relevant cases. Hint: the fact that it is gigabit Ethernet matters.
Given the transition rules AC → B, B → AC, CD → E, and E→CD, draw the Petri net
described. From the Petri net, draw the finite state graph reachable from the initial state ACD.
What well-known concept do these transition rules model?
In protocol 3, is it possible that the sender starts the timer when it is already running? If so, how
might this occur? If not, why is it impossible?
Name two networks that allow frames to be packed back-to-back. Why is this feature worth
having?
IEEE 802.16 supports four service classes. Which service class is the best choice for sending
uncompressed video?
Suppose that node B in Fig. 5-20 has just rebooted and has no routing information in its tables. It
suddenly needs a route to H. It sends out broadcasts with TTL set to 1, 2, 3, and so on. How
many rounds does it take to find a route?
Looking at the subnet of Fig. 5-6, how many packets are generated by a broadcast from B, using
(a) Reverse path forwarding? (b) The sink tree?
The 1000Base-SX specification states that the clock shall run at 1250 MHz, even though gigabit
Ethernet is only supposed to deliver 1 Gbps. Is this higher speed to provide for an extra margin
of safety? If not, what is going on here?
In the text it was stated that when a mobile host is not at home, packets sent to its home LAN are
intercepted by its home agent on that LAN. For an IP network on an 802.3 LAN, how does the
home agent accomplish this interception?
If the procedure between in protocol 5 checked for the condition a < b < c instead of the
condition a < b < c, would that have any effect on the protocol's correctness or efficiency?
Explain your answer.
In Fig. 5-14 the Boolean OR of the two sets of ACF bits are 111 in every row. Is this just an
accident here, or does it holds for all subnets under all circumstances?
Imagine a flow specification that has a maximum packet size of 1000 bytes, a token bucket rate
of 10 million bytes/sec, a token bucket size of 1 million bytes, and a maximum transmission rate
of 50 million bytes/sec. How long can a burst at maximum speed last?
Consider the operation of protocol 6 over a 1-Mbps error-free line. The maximum frame size is
1000 bits. New packets are generated 1 second apart. The timeout interval is 10 msec. If the
special acknowledgement timer were eliminated, unnecessary timeouts would occur. How many
times would the average message be transmit
A 100-km-long cable runs at the T1 data rate. The propagation speed in the cable is 2/3 the speed
of light in vacuum. How many bits fit in the cable?
For hierarchical routing with 4800 routers, what region and cluster sizes should be chosen to
minimize the size of the routing table for a three-layer hierarchy? A good starting place is the
hypothesis that a solution with k clusters of k regions of k routers is close to optimal, which
means that k is about the cube ro
Assuming that all routers and hosts are working properly and that all software in both is free of
all errors, is there any chance, however small, that a packet will be delivered to the wrong
destination?
If delays are recorded as 8-bit numbers in a 50-router network, and delay vectors are exchanged
twice a second, how much bandwidth per (full-duplex) line is chewed up by the distributed
routing algorithm? Assume that each router has three lines to other routers.
A block of bits with n rows and k columns uses horizontal and vertical parity bits for error
detection. Suppose that exactly 4 bits are inverted due to transmission errors. Derive an
expression for the probability that the error will be undetected.
How long does a station, s, have to wait in the worst case before it can start transmitting its frame
over a LAN that uses (a) The basic bit-map protocol? (b) Mok and Ward's protocol with
permuting virtual station numbers?
Consider the Chord circle of Fig. 5-24. Suppose that node 10 suddenly goes on line. Does this
affect node 1's finger table, and if so, how?
One consequence of using a spanning tree to forward frames in an extended LAN is that some
bridges may not participate at all in forwarding frames. Identify three such bridges in Fig. 4-44.
Is there any reason for keeping these bridges, even though they are not used for forwarding?
Consider an error-free 64-kbps satellite channel used to send 512-byte data frames in one
direction with very short acknowledgements coming back the other way. What is the maximum
throughput for window sizes of 1, 7, 15, and 127? The earth-satellite propagation time is 270
msec.
An 802.16 network has a channel width of 20 MHz. How many bits/sec can be sent to a
subscriber station?
Beacon frames in the frequency hopping spread spectrum variant of 802.11 contain the dwell
time. Do you think the analogous beacon frames in Bluetooth also contain the dwell time?
Discuss your answer.
In protocol 6, MAX_SEQ = 2n - 1. While this condition is obviously desirable to make efficient
use of header bits, we have not demonstrated that it is essential. Does the protocol work correctly
for MAX_SEQ = 4, for example?
Suppose that an 11-Mbps 802.11b LAN is transmitting 64-byte frames back-to-back over a radio
channel with a bit error rate of 10-7. How many frames per second will be damaged on average?
In Fig. 4-50 the switch in the legacy end domain on the right is a VLAN-aware switch. Would it
be possible to use a legacy switch there? If so, how would that work? If not, why not?
Sketch the differential Manchester encoding for the bit stream of the previous problem. Assume
the line is initially in the low state.
A datagram subnet allows routers to drop packets whenever they need to. The probability of a
router discarding a packet is p. Consider the case of a source host connected to the source router,
which is connected to the destination router, and then to the destination host. If either of the
routers discards a packet, the
A bit stream 10011101 is transmitted using the standard CRC method described in the text. The
generator polynomial is x3 + 1. Show the actual bit string transmitted. Suppose the third bit from
the left is inverted during transmission. Show that this error is detected at the receiver's end.
A 1-km-long, 10-Mbps CSMA/CD LAN (not 802.3) has a propagation speed of 200 m/µsec.
Repeaters are not allowed in this system. Data frames are 256 bits long, including 32 bits of
header, checksum, and other overhead. The first bit slot after a successful transmission is
reserved for the receiver to capture the channel
Give three examples of protocol parameters that might be negotiated when a connection is set up.
A 12-bit Hamming code whose hexadecimal value is 0xE4F arrives at a receiver. What was the
original value in hexadecimal? Assume that not more than 1 bit is in error.
The byte-counting variant of the leaky bucket algorithm is used in a particular system. The rule
is that one 1024-byte packet, or two 512-byte packets, etc., may be sent on each tick. Give a
serious restriction of this system that was not mentioned in the text.
A seven-story office building has 15 adjacent offices per floor. Each office contains a wall socket
for a terminal in the front wall, so the sockets form a rectangular grid in the vertical plane, with a
separation of 4 m between sockets, both horizontally and vertically. Assuming that it is feasible
to run a straight c
Datagram subnets route each packet as a separate unit, independent of all others. Virtual-circuit
subnets do not have to do this, since each data packet follows a predetermined route. Does this
observation mean that virtual-circuit subnets do not need the capability to route isolated packets
from an arbitrary source to
Compute the fraction of the bandwidth that is wasted on overhead (headers and retransmissions)
for protocol 6 on a heavily-loaded 50-kbps satellite channel with data frames consisting of 40
header and 3960 data bits. Assume that the signal propagation time from the earth to the satellite
is 270 msec. ACK frames never o
As a possible congestion control mechanism in a subnet using virtual circuits internally, a router
could refrain from acknowledging a received packet until (1) it knows its last transmission along
the virtual circuit was received successfully and (2) it has a free buffer. For simplicity, assume
that the routers use a s
What properties do the WDMA and GSM channel access protocols have in common? See Chap.
2 for GSM.
A LAN uses Mok and Ward's version of binary countdown. At a certain instant, the ten stations
have the virtual station numbers 8, 2, 4, 5, 1, 7, 3, 6, 9, and 0. The next three stations to send are
4, 3, and 9, in that order. What are the new virtual station numbers after all three have finished
their transmissions?
Frames of 1000 bits are sent over a 1-Mbps channel using a geostationary satellite whose
propagation time from the earth is 270 msec. Acknowledgements are always piggybacked onto
data frames. The headers are very short. Three-bit sequence numbers are used. What is the
maximum achievable channel utilization for? (a) S
For this problem, use a formula from this chapter, but first state the formula. Frames arrive
randomly at a 100-Mbps channel for transmission. If the channel is busy when a frame arrives, it
waits its turn in a queue. Frame length is exponentially distributed with a mean of 10,000
bits/frame. For each of the following
Suppose that the case for checksum errors were removed from the switch statement of protocol
6. How would this change affect the operation of the protocol?
In protocol 6, when a data frame arrives, a check is made to see if the sequence number differs
from the one expected and nonak is true. If both conditions hold, a NAK is sent. Otherwise, the
auxiliary timer is started. Suppose that the else clause were omitted. Would this change affect the
protocol's correctness?
Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using
the adaptive tree walk protocol. If all the stations whose addresses are prime numbers suddenly
become ready at once, how many bit slots are needed to resolve the contention?
Suppose that we model protocol 4 using the finite state machine model. How many states exist
for each machine? How many states exist for the communication channel? How many states
exist for the complete system (two machines and the channel)? Ignore the checksum errors.
Give two example computer applications for which connection-oriented service is appropriate.
Now give two examples for which connectionless service is best.
Imagine that you are writing the data link layer software for a line used to send data to you but
not from you. The other end uses HDLC, with a 3-bit sequence number and a window size of
seven frames. You would like to buffer as many out-of-sequence frames as possible to enhance
efficiency, but you are not allowed to m
Are there any circumstances when connection-oriented service will (or at least should) deliver
packets out of order? Explain.
PPP is based closely on HDLC, which uses bit stuffing to prevent accidental flag bytes within
the payload from causing confusion. Give at least one reason why PPP uses byte stuffing instead.
Six stations, A through F, communicate using the MACA protocol. Is it possible that two
transmissions take place simultaneously? Explain your answer.
In Fig. 4-27, four stations, A, B, C, and D, are shown. Which of the last two stations do you think
is closest to A and why?
Two CSMA/CD stations are each trying to transmit long (multi frame) files. After each frame is
sent, they contend for the channel, using the binary exponential back off algorithm. What is the
probability that the contention ends on round k, and what is the mean number of rounds per
contention period?
Describe two major differences between the warning bit method and the RED method.
Give a simple heuristic for finding two paths through a network from a given source to a given
destination that can survive the loss of any communication line (assuming two such paths exist).
The routers are considered reliable enough, so it is not necessary to worry about the possibility of
router crashes.
Imagine that a switch has line cards for four input lines. It frequently happens that a frame
arriving on one of the lines has to exit on another line on the same card. What choices is the
switch designer faced with as a result of this situation?
A collection of 2n stations uses the adaptive tree walk protocol to arbitrate access to a shared
cable. At a certain instant, two of them become ready. What are the minimum, maximum, and
mean number of slots to walk the tree if 2n >> 1?
A switch designed for use with fast Ethernet has a backplane that can move 10 Gbps. How many
frames/sec can it handle in the worst case?
Consider the delay of pure ALOHA versus slotted ALOHA at low load. Which one is less?
Explain your answer.
Some books quote the maximum size of an Ethernet frame as 1518 bytes instead of 1500 bytes.
Are they wrong? Explain your answer.
Imagine a sliding window protocol using so many bits for sequence numbers that wraparound
never occurs. What relations must hold among the four window edges and the window size,
which is constant and the same for both the sender and the receiver.
A channel has a bit rate of 4 kbps and a propagation delay of 20 msec. For what range of frame
sizes does stop-and-wait give an efficiency of at least 50 percent?
So far, we haven’t considered the impact of this process on the salesperson.What information
do salespeople need to maintain good relationships with their customers?
Suppose you decide to start a business that recruits students for summer jobs. You will match
available students with available jobs. You need to learn what positions are available and what
students are available for filling those positions. In starting your business, you know you will be
competing with local newspaper
Do you agree that this course is the most important course in the business school? Isn’t
accounting more important? No business can exist without accounting. Or isn’t management
more important? After all, if you can manage people, why do you need to know how to innovate
with technology? You can hire others to think
Give the firing sequence for the Petri net of Fig. 3-23 corresponding to the state sequence (000),
(01A), (01—), (010), (01A) in Fig. 3-21. Explain in words what the sequence represents.
1. Several comments in the case note that chief information officers are in a unique position for
companywide leadership, extending beyond their primary technological concerns. Why do you
think this is the case? How are CIOs different in this regard from other chief officers, for
example, in finance, HR, or marketing?
Suppose that the company in your answer to step 5 has requested your team implement your idea
on reducing the impact of lying. Explain how having strong personal skills for each of
Reich’s four abilities (abstract thinking, systems thinking, experimentation, and
collaboration) would enable each of you to be better co
Samantha Green owns and operates Twigs Tree Trimming Service. Samantha graduated from the
forestry program of a nearby university and worked for a large landscape design firm,
performing tree trimming and removal. After several years of experience, she bought her own
truck, stump grinder, and other equipment and opened
1. In what ways does Amazon, as a company, evidence the willingness and ability to collaborate?
2. In what ways does Amazon, as a company, evidence the willingness and ability to
experiment? Use Amazon coins as an example
(https://developer.amazon.com/post/Tx2EZGRG23VNQ0K/Introducing-Amazon-Coins-A-New-
Virtual-Curren
Suppose you manage the buyers at AllRoad and you have been asked to help determine the
requirements for a new vendor selection information system. As you think about those
requirements, you wonder how much autonomy you want your employees to have in selecting
the vendors and products to sell. You can develop a system t
As a customer of many of the companies noted in the case, or others in the same industries, what
is your expectation about the measures and safeguards that these organizations have
implemented to protect inappropriate leaking of your personal information? After reading the
case, has your expectation changed? Break into
Describe three to five personal goals for this class. None of these goals should include anything
about your GPA. Be as specific as possible, and make the goals personal to your major, interests,
and career aspirations. Assume that you are going to evaluate yourself on these goals at the end
of the quarter or semester.
The case features many examples of what is arguably unethical behavior, including child
pornography, accessing adult content on company-owned equipment, installing unlicensed
software, and so on. Are some of these practices “more wrong†than others? Is there any
one that you would not consider problematic? Break in
Business travelers who need to remain connected face special challenges outside their home
country, especially those who work out of their hotel rooms. Electricity varies by voltage, cycles,
and electric-plug shape. Likewise, telephone jacks may vary from country to country and, for the
most part, American cell phones
Data loss prevention (DLP) was a technology mentioned in the case, and one that is garnering
more and more attention from corporate security departments. Go online and research what DLP
involves, and look for examples of its application to actual problems, and their outcomes.
Prepare a report to summarize your work.
Do you think some form of international experience is key to your long-term career success?
Have you ever considered taking a position abroad? Why or why not? Break into small groups
with your classmates to discuss the advantages and disadvantages of moving abroad to gain these
experiences.
Refer to the Real World Case on the globalization challenges faced by CIOs in the chapter. All
those mentioned are CIOs from headquarters who went abroad, but there is no mention of CIOs
from emerging countries taking over the global helm. Why do you think this is the case?
Refer to the Real World Case on endpoint security in the chapter. How do companies strike a
balance between providing users with access to the information they need in the form that is
most useful to them, while at the same time enforcing adequate security? What issues should
organizations consider when making this dec
Consider the four definitions of information presented in this chapter. The problem with the first
definition, “knowledge derived from data,†is that it merely substitutes one word we
don’t know the meaning of (information) for a second word we don’t know the meaning
of (knowledge). The problem with the second
Update the table with the latest announcements and data. Go to finance.yahoo.com and update
the financial data. Add new devices as appropriate. Search the Internet, using terms such as
iPhonevs. Android market share to update the market share data.
Systems thinking a. Define systems thinking, and explain why it is an important skill for
business professionals. b. Explain how you would use systems thinking to define why
Moore’s Law caused a farmer to dig up a field of pulp wood trees. Name each of the
elements in the system and explain their relationships to e
Technologies such as VoIP used by Skype and similar products make it more difficult to monitor
outgoing information. Search the Internet to help you understand these technologies and why
these problems arise. Other than banning them, what alternatives would you suggest to
companies facing this problem? Prepare a presen
State the criteria that you used for making your selections in questions 5 and 6.
Many small business owners have found it financially advantageous to purchase their own
building. As one owner remarked upon his retirement, “We did well with the business, but we
made our real money by buying the building.â€Explain why this might be so.
What would be examples of one positive and one negative effect of the use of information
technologies in each of the ethical and societal dimensions illustrated in Figure. Explain several
of yourchoices.
Your father asks you to help him purchase a new computer. He wants to use his computer for
email, Internet access, downloading pictures from his digital camera, uploading those pictures to
a shared photo service, and writing documents to members of his antique auto club. a. What
CPU, memory, and disk specification do
Using Figure 2-8, explain why credit must be allocated to customers. What is the business
consequence if these allocations are not adjusted when special terms are not approved?
Consider the alternative of increasing the value delivered by existing rental personnel. The text
suggests possibly renting more kinds of equipment or selling items of use to guests who are
renting bicycles, but consider other options as well. a. Describe five ways that you think the
existing personnel could increase
a. Define experimentation, and explain why it is an important skill for business professionals. b.
Explain several creative ways you could use experimentation to answer this question. c. How
does the fear of failure influence your willingness to engage in any of the ideas you identified in
part ‘b’. d. Explain h
Change the process in Figure 2-8 so that allocated inventory is returned when credit or special
terms are not approved. Indicate which role makes the adjustment and how they obtainthe data
for doing so?
The text states that information should be worth the cost required to produce it. Both cost and
value can be broken into tangible and intangible factors. Tangible factors can be measured
directly; intangible ones arise indirectly and are difficult to measure. For example, a tangible cost
is the cost of a computer monit
List and describe five factors that you think could be keeping a university that is on a quarter
system from converting to a semester system.
How might the Internet, intranets, and extranets affect the business drivers or requirements
responsible for a company’s use of global IT, as shown in Figure? Give several examples to
illustrate youranswer.
Should the IS function in a business be centralized or decentralized? Use the Internet to find
recent developments to support your answer.
Using general terms, describe the need these sites have for: a. Hardware b. Software c. Data d.
Procedures e. People
Optional extension.Download the Visio diagram version of Figure 2-8 from this book’s Web
site, www.pearsonhighered.com/kroenke. Modify the diagram to illustrate the sequence of tasks
you chose as best in your answer to question 6.
As a result of the location independence of knowledge work, many organizations seek to lower
their labor costs by moving their digital operations overseas. When managers evaluate such
opportunities, they must consider the following regional attributes: • Political and regulatory
environment • Infrastructure (electr
The passage of the Sarbanes-Oxley Act in the United States has greatly increased the compliance
obligations of publicly traded companies. Go online to research how this landmark legislation
affected the obligations of IT departments, and the way in which they develop and implement
new technologies. Prepare a presentati
Go online to follow up on John Mackey’s story and search for other instances of debatable
behavior where IT has been an important factor. Are the ones featured in the case exceptions, or
are these occurrences becoming more and more common? How do organizations seem to be
coping with these issues? What type of respons
1. What are the challenges faced by the CIOs mentioned in the case? Group them into categories
and use examples from the case to define each. 2. The case mentions that the traditional approach
toward emerging countries had been to develop technology in the corporate offices and then
hand them down to satellite operatio
Check out CEO Express (www.ceoexpress.com), a to prated Web portal for busy executives. See
Figure. The site provides links to top U.S. and international newspapers, business and technology
magazines, and news services. Hundreds of links to business and technology research sources
and references are provided, as well a
Microsoft makes and sells the Xbox with motion-sensing Kinect. Can you envision a way for
Microsoft to use either of those to help increase market share of its Surface/phone devices? If so,
what?
There are six different sequences for the three approval tasks in Figure 2-8.Name each and select
what your team considers to be the most promising three.
What are several business decisions that you will have to make as a manager that have both
ethical and IT dimensions? Give examples to illustrate your answer.
Suppose management has left you out of the requirements definition process for the development
of the system in question 2-2. Explain how you could use the knowledge you developed in
answering this question to justify your need to be involved in the requirements definition.
Recommend a process for adjusting credit for orders for which credit or special terms are not
approved. Indicate which role makes the adjustment and how they receivethe data for doing so?
Consider the alternative of replacing the rental personnel from the business process in Figure 3-
13. a. Describe the changes that will need to be made to the process documented in Figure 3-
13.You can download a copy of this Visio diagram from this text’s Website at
www.pearsonhighered.com/kroenke. b. Would eliminat
1. What are the two meanings of ‘corporate ethics’ in organizations today? What does each
definition imply for IT practices? How does the economic environment affect this? 2. How does
IT provide more opportunities for difficult ethics issues to arise? How does IT help address
those? 3. Use examples from the case to
Considering just the College of Business at your university, estimate each of the costs for
processes. Make and justify assumptions about labor rates and other factors.
Suppose you are told that the business process in Figure 3-13 has a negative margin. Explain
what that means. Suppose the margin of some business process is a negative $1 million. If costs
are reduced by $1.2 million, will the margin necessarily be positive? Explain why or why not.
1. Companies are developing ethical policies and guidelines for legal reasons, but also to clarify
what is acceptable and what is not. Do you think any of the issues raised in the case required
clarification? Would you take exception to any of them being classified as inappropriate
behavior? Why do you think these thin
The U.S. Department of Labor publishes descriptions of jobs, educational requirements, and the
outlook for many jobs and professions. Go to its site at www.bls.gov and answer the following
questions: a. Search for the job title systems analyst. Describe what such people do. Is this a job
that interests you? Why or why
1. Barring illegal activities, why do you think that employees in the organizations featured in the
case do not realize themselves the dangers of loosely managing proprietary and sensitive
information? Would you have thought of these issues? 2. How should organizations strike the
right balance between monitoring and in
Use your answers in question 2 to explain the following statement: “The structure of an
organization’s information system (here a Web storefront) is determined by its competitive
strategy.†Write your answer so that you could use it for a job interview to demonstrate your
overall knowledge of business planning.
Select two pairs from the above list. For each pair of companies, answer the following questions:
a. How do the companies’ market segments differ? b. How do their competitive pressures