System Design Chapter 7 Answers

In: Computers and Technology

Submitted By sundevilgary
Words 1736
Pages 7
CHAPTER 7

3. Write the query that will generate a combined list of customers (from tables CUSTOMER and CUSTOMER_2) that do not include the duplicate customer records. (Note that only the customer named Juan Ortega shows up in both customer tables.)

SELECT CUST_LNAME, CUST_FNAME FROM CUSTOMER UNION SELECT CUST_LNAME, CUST_FNAME FROM CUSTOMER_2;

4. Write the query that will generate a combined list of customers to include the duplicate customer records.

SELECT CUST_LNAME, CUST_FNAME FROM CUSTOMER UNION ALL SELECT CUST_LNAME, CUST_FNAME FROM CUSTOMER_2;

5. Write the query that will show only the duplicate customer records.

We have shown both Oracle and MS Access query formats:

Oracle

SELECT CUST_LNAME, CUST_FNAME FROM CUSTOMER INTERSECT SELECT CUST_LNAME, CUST_FNAME FROM CUSTOMER_2;

MS Access

SELECT C.CUST_LNAME, C.CUST_FNAME FROM CUSTOMER AS C, CUSTOMER_2 AS C2 WHERE C.CUST_LNAME=C2.CUST_LNAME AND C.CUST_FNAME=C2.CUST_FNAME;

Because Access doesn’t support the INTERSECT SQL operator, you need to list only the rows in which all the attributes match.

6. Write the query that will generate only the records that are unique to the CUSTOMER_2 table.

We have shown both Oracle and MS Access query formats:

Oracle

SELECT CUST_LNAME, CUST_FNAME FROM CUSTOMER_2 MINUS SELECT CUST_LNAME, CUST_FNAME FROM CUSTOMER;

MS Access

SELECT C2.CUST_LNAME, C2.CUST_FNAME FROM CUSTOMER_2 AS C2 WHERE C2.CUST_LNAME + C2.CUST_FNAME NOT IN (SELECT C1.CUST_LNAME + C1.CUST_FNAME FROM CUSTOMER C1);

Because Access doesn’t support the MINUS SQL operator, you need to list only the rows that are in CUSTOMER_2 that do not have a matching row in CUSTOMER.

7. Write the query to show the invoice number, the customer number, the…...

Similar Documents

System Analysis and Design

...Exercises – Chapter 8 Please answer the questions below using complete sentences (unless the question specifically asks for a list) and your best grammar and spelling. Retain the question so that both question and answer are uploaded. Your uploaded file should be named: Ch8_Exercises_YourLastName and should be stored in the Chapter 8 dropbox. The completed assignment should be submitted by the due date shown on eLearn. NOTE: Although these questions come from page 374 in your textbook, I have not included all questions, which results in the re-numbering of some questions, and I have added to some of the questions Therefore, answer from this list of questions, rather than from the book. Review Questions Define detail reports, exception reports, and summary reports. Explain the concept of a control field and how it is used to produce a control-break report. - A detail report produces at least one line of output for every record processed. In an exception report, only those records that satisfy a specific condition are reported. - A summary report displays only subtotals and totals. - A control field is a field that controls the output by determining its sequence and defining a control break. - A control break occurs when the value of a control field changes. It uses one or more control fields and generates some type of special output, such as printed subtotals or totals, at control break points. Explain the concept of human-computer......

Words: 941 - Pages: 4

System and Design End of Chapter Answers

...Chapter One 1.1 With what other terminology is systems analysis and design synonymous? Systems analysis and design is also known as information systems engineering, software engineering, systems engineering, software development, and systems development. 1.2 What activities and deliverables are included in analysis? Activities: systems planning, feasibility study (optional), requirements determination, user acceptance,and prototyping (optional). Deliverables: Requirements specification and prototype (optional). 1.3 What activities and deliverables are included in design and implementation? Activities: Physical design, prototyping (optional), software construction/purchase, user documentation, testing, training, user acceptance, conversion, and implementing the system. Deliverable: Information system. 1.4 Describe a system and the components of a systems model. A generic systems model consists of six components- inputs, processes, outputs, controls, feedback, and boundary. Using predetermined controls, a system accepts inputs at its boundary, processes them into outputs, and provides a feedback mechanism for taking any necessary corrective action. 1.5 What two key components distinguish an information system from an automated information system? Software and hardware. 1.6 How are data incorporated into an automated information system and what role does it play? Data are either input, stored, or output. As part of the information system,...

Words: 9128 - Pages: 37

System Design and Analysis Chapter One

...main components of an information system hardware, software, data, processes and people. People are the stakeholders, which is who have an interest in the information system and sometimes are called the end user. 4. Explain the difference between vertical and horizontal systems packages. A horizontal system is a basic software package system that can be adapted to common business processes like inventory and payroll. A vertical system is customized to meet the unique needs of a particular business, industry, or organization. 5. How do companies use EDI? What are some advantages of using xml? EDI is the exchange of information in a standard format between computers without any human intermediary. XML is cheap to implement and cheaper to deploy via the Internet, while being intuitive, easy to read. 6. Describe five types of information systems, and give an example of each. Enterprise computing systems support company-wide data management. Airline reservations systems Transaction processing systems process data generated by day-to-day business operations. Customer billing systems Business support systems provide job-related information support to users at all levels of a company. Inventory reordering systems Knowledge management systems simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied. Technical support knowledge base User productivity systems provide employees at all......

Words: 833 - Pages: 4

Essentials of Systems Analysis and Design

... This page intentionally left blank Download at www.Pin5i.Com Essentials of Systems Analysis and Design Download at www.Pin5i.Com Editorial Director: Sally Yagan Editor in Chief: Eric Svendsen Executive Editor: Bob Horan Editorial Assistant: Ashlee Bradbury Director of Marketing: Patrice Lumumba Jones Executive Marketing Manager: Anne Fahlgren Senior Managing Editor: Judy Leale Production Project Manager: Kelly Warsak Senior Operations Supervisor: Arnold Vila Operations Specialist: Cathleen Petersen Creative Director: Blair Brown Senior Art Director/Design Supervisor: Janet Slowik Text Designer: Michael Fruhbeis Creative Director/Cover: Jayne Conte Cover Designer: Suzanne Duda Cover Art: Fotolia/3d mosaic/©Redshinestudio Manager, Rights and Permissions: Hessa Albader Media Project Manager: Lisa Rinaldi Media Editor: Denise Vaughn Full-Service Project Management: Tiffany Timmerman/S4Carlisle Publishing Services Composition: S4Carlisle Publishing Services Printer/Binder: Courier/Kendallville Cover Printer: Lehigh-Phoenix Color/Hagerstown Text Font: ITCCentury Book Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Microsoft® and Windows® are registered trademarks of the Microsoft Corporation in the U.S.A. and other countries. Screen shots and icons reprinted with permission from the Microsoft Corporation. This book is not sponsored or endorsed by or affiliated with the......

Words: 179288 - Pages: 718

Systems Analysis and Design 9th Chapter 9

...------------------------------------------------- 1. Explain the main difference between a file-oriented system and a database system. A file-oriented system utilizes data in a regular OS file based format where a database system uses a database engine that organizes data in a database in a table format utilizing rows for each record. 2. What is a DBMS? Briefly describe the components of a DBMS. DBMS stands for Database Management System. A DBMS is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the contents of a database. A DBMS is made up of a DML (data manipulation language), Schema and subschemas, Physical data repository, and an Interface to allow access to the database from DBA’s, Users, and Related Information Systems. 3. Describe a primary key, candidate key, secondary key, foreign key, and common field. Primary Key – a field or combination of fields that uniquely and minimally identifies an entity. Candidate Key – Any field or combination of fields that can act as the primary key but are not. Secondary Key – Any field of combination of fields that can be use to identify a entity. Foreign Key – A field that exists in an entity that is the PK of another entity. Common Field – An attribute (field) that appears in more than one entity (record). 4. What are entity-relationship diagrams and how are they used? What symbol is used to represent and entity in an ERD? What......

Words: 1096 - Pages: 5

System Design

...System Design - ISM4113 Question 1 2 out of 2 points A template that the analyst may use when beginning to model or talk about the system from an O-O perspective is called a: Answer Correct Answer: CRC card. Question 2 2 out of 2 points Which leaves a stub behind as a record when separated? Answer Correct Answer: perforated form Question 3 2 out of 2 points Which of the following is true when implementing a one-to-many relationship? Answer Correct Answer: The file on the many end has a foreign key consisting of the primary key on the one end. Question 4 2 out of 2 points Which of the following is not a form of electronic output? Answer Correct Answer: Report Question 5 2 out of 2 points Which type of class acts as a coordinator when implementing classes? Answer Correct Answer: Control Question 6 2 out of 2 points Which of the following is not one of the main components of UML? Answer Correct Answer: Entities Question 7 2 out of 2 points Which is not one of the seven main sections of a strong form? Answer Correct Answer: footnote Question 8 2 out of 2 points What is an important operation because it can take two relations and combine them to make a larger relation Answer Correct Answer: join Question 9 2 out of 2 points Which type of......

Words: 1389 - Pages: 6

Chapter 7 Assessment Answers

...Chapter 7 Assessment Answers 1.) B.) is the following firewall rule that prevents internal users from accessing public FTP sites. 2.) A.) is a Default-Deny rule. 3.) The Default-Deny rule appears last in the rule set. 4.) C.) is the Mechanism that allows a firewall to hand off authentication to a dedicated service host on a different system. 5.) E.) All events should be included in the file log. 6.) Stopping intrusions is not an activity used in firewall logging. 7.) An internal user accessing a public web site is not in a firewall log warrant investigation by an administrator. 8.) Centralized logging is a highly recommended method or technique for keeping firewall logs secure and uncorrupted. 9.) Packets from an unassigned internal address is an event found in a firewall log file that is a symptom of a rogue host operating within the private network. 10.) False negatives is the biggest issue or problem with an IDS. 11.) Using first match apply rule systems is not a limitation of a firewall. 12.) Wirespeed is when a firewall is able to process packets, filter malicious code, transit authorized communications onward to their destination without introducing latency or lag. 13.) Native antivirus scanning is not related to improving or maintaining the performance of a firewall. 14.) Transport mode is a form of encryption allows a firewall to filter based on the original source and destination address. 15.) The Web can be...

Words: 364 - Pages: 2

Systems Analysis and Design Chapter 2

...Update or Create Database. (20 – 15) | Read and write to a database. (14-10) | Read to a Database. (10-5) | No link to a Database. (5-0) | Correct Output20 pts Available | Program displays more than expected (20-15) | Output has minor errors (14-10) | Output has multiple errors (10-5) | Output is incorrect (5-0) | | | | | | Design of Output 10 pts Available | Program displays more than expected(10-7) | Program displays minimally expected output. (6-4) | Program does not display the required output.(3-2) | Output is poorly designed. (1-0) | Design of logic10 pts Available | Program is logically well designed (10-7) | Program has slight logic errors that do no significantly affect the results (6-4) | Program has significant logic errors (3-2) | Program is incorrect (1-0) | Standards10 pts Available | Program is stylistically well designed (10-7) | Few inappropriate design choices (i.e. poor variable names, improper indentation) (6-4) | Several inappropriate design choices (i.e. poor variable names, improper indentation) (3-2) | Program is poorly written (1-0) | Documentation10 pts Available | Program is well documented (10-7) | Missing one required comment (6-4) | Missing two or more required comments (3-2) | Most or all documentation missing (1-0) |...

Words: 254 - Pages: 2

Systems and Design

...business operations? Why is it important for systems analysts to understand a company's strategic plan? Answer: A strategic plan looks beyond day-to-day activities and focuses on a horizon that is three, five, ten, or more years in the future. Because the firm's IT group will be expected to deliver IT resources, IT managers must understand and participate in strategic planning. Strategic planning starts with a mission statement that reflects the firm's vision, purpose, and values. Mission statements usually focus on longterm challenges and goals, the importance of the firm's stakeholders, and a commitment to the firm's role as a corporate citizen. 2. What is a SWOT analysis? Prepare a SWOT analysis of your school or your employer. Answer: The letters SWOT stand for strengths, weaknesses, opportunities, and threats. A SWOT analysis can focus on a specific product or project, an operating division, the entire company, or the mission statement itself. Strengths – Affordable, comprehensiveness, quality, and growth of online education Weaknesses - lack of financial support for faculty Scholarship Opportunities - international and off-campus study and exchange programs Threats - risk of losing prominent faculty and staff for genuinely better opportunities at other schools. 3. What is an effective way to assess user requests for additional features and functions? Answer: As users rely more heavily on information systems to perform their jobs, they are likely to......

Words: 2037 - Pages: 9

System Design

...Requirements Analysis Chapter 3 3-1 PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 4th Edition Copyright 2009 © John Wiley & Sons, Inc. All rights reserved. Key Definitions The As-Is system is the current system and may or may not be computerized The To-Be system is the new system that is based on updated requirements The System Proposal is the key deliverable from the Analysis Phase 3-2 PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 4th Edition Copyright 2009 © John Wiley & Sons, Inc. All rights reserved. . Key Ideas The goal of the analysis phase is to truly understand the requirements of the new system and develop a system proposal. . 3-3 PowerPoint Presentation for Dennis, Wixom, & Roth Systems Analysis and Design, 4th Edition Copyright 2009 © John Wiley & Sons, Inc. All rights reserved. . Systems and the Real World A system that helps to understand the real-world situation Makes comparisons Thinks about A real-world situation or problem 4  System Analysis ****** Analysis Means breaking problem down into subproblems part. Analysis an organization means to: 1) scan and investigate the organization. 2) to ask what current system do. 3) what is requirement they need from the new system. 5 Analysis: Process of understanding the organization, investigating and understandng its requirements as well as understanding the......

Words: 1303 - Pages: 6

Chapter 7

...from derived demand. Explanation: The answer can be found in Section 7.1. * d. Business buyers are more influenced by impersonal environmental factors. 2. Which step in the purchase decision is represented by the following statement? Based on how their expectations have been met, a consumer might make positive or negative comments in social media. * a. Information search * b. Alternative evaluation * c. Post-purchase behavior Explanation: The answer can be found in Section 7.1. * d. Needs recognition Review this content to learn more. 3. Which of the following BEST describes the process known as "data cleansing"? * a. Augmenting a data set with demographic and other information to enhance direct marketing. * b. Removal of records from a data set because they are too long. * c. Reviewing individual records to detect and correct or delete inaccurate records to ensure a set of data is accurate and useful. Explanation: The answer can be found in Section 7.4. * d. Basic analytics performed on a data set to split addresses containing many consumers into separate records. Review this content to learn more. 4. Fulfillment of what type of need is more likely to have a positive influence on brand loyalty? * a. Hedonic Explanation: The answer can be found in Section 7.2. * b. Cognitive * c. Physiological * d. Utilitarian Review this content to learn more. 5. Which answer BEST describes the foundational......

Words: 3141 - Pages: 13

Chapter 7 Answer Key

...Exercise 7-1 (15 minutes) Case 1 Case 2 Item Relevant Not Relevant Relevant Not Relevant a. Sales revenue X X b. Direct materials X X c. Direct labor X X d. Variable manufacturing overhead X X e. Book value—Model A3000 machine X X f. Disposal value—Model A3000 machine X X g. Depreciation—Model A3000 machine X X h. Market value—Model B3800 machine (cost) X X i. Fixed manufacturing overhead X X j. Variable selling expense X X k. Fixed selling expense X X l. General administrative overhead X X Exercise 7-2 (30 minutes) 1. No, the housekeeping program should not be discontinued. It is actually generating a positive program segment margin and is, of course, providing a valuable service to seniors. Computations to support this conclusion follow: Contribution margin lost if the housekeeping program is dropped $(80,000) Fixed costs that can be avoided: Liability insurance $15,000 Program administrator’s salary 37,000 52,000 Decrease in net operating income for the organization as a whole $(28,000) Depreciation on the van is a sunk cost and the van has no salvage value since it would be donated to another organization. The general administrative overhead is allocated and none of it would be avoided if the program were dropped; thus it is not relevant to the decision. The same result can be obtained with the alternative analysis below: Current Total Total If......

Words: 4777 - Pages: 20

Systems Design, Implementation and Operatio

...CHAPTER 20 SYSTEMS DESIGN, IMPLEMENTATION AND OPERATION In chapter 18 we focused on the first phase of the Systems Development Life Cycle – Systems Analysis. Chapter 20 deals with the remaining four phases: - conceptual systems design - physical systems design - systems implementation and conversion - operation and maintenance CONCEPTUAL SYSTEMS DESIGN In the conceptual systems design phase, the developer creates a general framework for implementing user requirements and solving problems identified in the analysis phase. As shown in Figure 20-1 on page 747 HC (page 637 SC), there are three main steps in conceptual design: 1. evaluating design alternatives, 2. preparing design specifications, and 3. preparing the conceptual systems design report. [pic] Evaluate Design Alternatives There are many ways to design an AIS, so accountants and others involved in systems design must continually make design decisions. [pic] The design team should identify a variety of design alternatives and evaluate each with respect to the following standards: 1) how well it meets organizational and system objectives, 2) how well it meets user needs, 3) whether it is economically feasible, and 4) what its advantages and disadvantages are. The steering committee evaluates the alternatives. Table 20-1 on page 748 HC (page 638 SC) presents examples of conceptual and physical design considerations and their corresponding...

Words: 3220 - Pages: 13

Chapter 7

...Performance and System Wiring…………………………………………………………….(6) VI. System Installation……………………………………………………………….……………………….(8) VII. Programming Options and Operation Instructions……………………………………………….(10) VIII. Usage and Operation Steps…………………………………………………….……………………(30) IX. Trouble Shooting……………………………………………………………………………………..….(35) |Accessories | | | |1. SK-968C Instruction Manual 1 6. Power cable 1 | |2. Warranty Card 1 7. Steel nails 2 | |3. Rubber-coated antenna 1 8. Screws (4×22) 2 | |4. Remote controls 2 9. Screws (2.5×6) 2 | |5. Telephone line with two RJ11 connectors 1 10. Fuse 1 | I. Overview SHIKE’s SK-968C burglar alarm is an intelligent device capable of transmitting alarm messages via the telephone communications network. This alarm system consists......

Words: 11487 - Pages: 46

Systems Analysis and Design

... SYSTEMS ANALYSIS and DESIGN This page intentionally left blank SYSTEMS ANALYSIS and DESIGN EIGHTH EDITION KENNETH E. KENDALL Rutgers University School of Business–Camden Camden, New Jersey JULIE E. KENDALL Rutgers University School of Business–Camden Camden, New Jersey Prentice Hall Boston Milan Sao Paulo Columbus Paris Indianapolis Montreal New York Dubai Delhi Toronto San Francisco London Taipei Madrid Tokyo Mexico City Upper Saddle River Munich Sydney Amsterdam Hong Kong Cape Town Seoul Singapore To the memory of Julia A. Kendall and the memory of Edward J. Kendall, whose lifelong example of working together will inspire us forever. Editorial Director: Sally Yagan Editor in Chief: Eric Svendsen Executive Editor: Bob Horan Editorial Project Manager: Kelly Loftus Editorial Assistant: Jason Calcano Director of Marketing: Patrice Lumumba Jones Senior Marketing Manager: Anne Fahlgren Senior Managing Editor: Judy Leale Associate Production Project Manager: Ana Jankowski Senior Operations Supervisor: Arnold Vila Senior Art Director: Steve Frim Text and Cover Designer: Jill Lehan Cover Art: Richard Kalina, “Carthage” collage, acrylic, flashe on linen: © 2006 Media Project Manager: Lisa Rinaldi Media Editor: Denise Vaughn Full-Service Project Management/Composition: S4Carlisle Publishing Services, Inc. Printer/Binder: Courier/Kendallville Cover Printer: Lehigh-Phoenix Color/Hagerstown Text Font: 10/12 Times “Carthage” © 2006 Richard......

Words: 317454 - Pages: 1270

The Lost Soldier Streaming HD The Lost Soldier Streaming Full-HD The Lost Soldier Streaming HD [1080p] gratuit en illimite - En 1942, en riposte à l’attaque japonaise sur Pearl Harbor, l’US Air Force décide de bombarder Tokyo. Mais sur le chemin du retour, l’avion du jeune pilote Jack Turner, à court de carburant, s’écrase dans la jungle de la province de Zhejiang en Chine. Les aviateurs ... | Channel 5 | saison 5, épisode 4 - Sauvons le soldat Brian