Calculate the estimated time for each activity using PERT techniques for the 3 estimates provided.  Include a sample calculation.

There are 2 parts to this assignment.  You can submit two files to the drop box.  MS Project (should you have your own license to the software) is not acceptable for completing any part of this assignment.

Part 1 Exercise Questions (40 points)

Complete exercise questions 1 (5 pts), 3 (5 pts), 5 (10 pts), 6 (5 pts) and 9 (15 pts) found at the end of Chapter 8.

Part 2 Scheduling Problem (50 points)

Complete the following:

Your child is a member of the school theater group and have been asked to prepare the schedule, etc. for a skit to be performed during the 4th of July celebration in the local village square.  As a volunteer, you offer to serve as the project controller because of your expertise in schedule management.

  1. Construct an AON diagram similar to the format used in the Youtube videos found in the commentary using an MS Excel spreadsheet.  Ensure that you include a Start activity and a Finish activity.  Include a legend (example is the one completed in Question 1, Part 1.
  2. Calculate the estimated time for each activity using PERT techniques for the 3 estimates provided.  Include a sample calculation.
  3. Prepare a table that identifies all paths and their lengths.  Which path is the critical path?
  4. During the execution phase of the skit project, one of the activities on the critical path is delayed by one day.  Is this serious?
  5. Using the activity estimates for optimistic, pessimistic and most likely time to complete activities on the critical path, qualitatively discuss the estimate uncertainty of the critical path.

You will be assessed on content and mechanics.

Content (90 points): Each element of this assignment has a correct answer.  Your content will be assessed on whether or not you produced a correct diagram, estimate, result, etc. or the degree to how you demonstrate knowledge of scheduling practices in case your diagram, estimate or result are incorrect.

Mechanics (10 points):  The results must include sample calculations (where applicable) and be presented in a professional manner. This is not an academic paper, therefore you do not need to follow APA guidelines.

Your Instructor will use Turn-it-in to ensure your paper is authentic work.  To avoid plagiarism, see the course home page for more information and use the Purdue Online Writing Lab to learn how to paraphrase, summarize and cite the references you use in all academic writing assignments.

How many distinct patterns can be stored with 3 bits?

a. Circle any of the following which offer persistent byte storage:

CPU, Flash Memory, Hard Drive, Random Access Memory (RAM), Ethernet

 

b. How many distinct patterns can be stored with 3 bits?

 

c. Note that Firefox is written in C++. What is the predominant type of instruction stored in the Firefox.exe file?

 

d. Alice has 1000 images, each 400 KB in size. About how much space do they take up overall?

 

e. Suppose we have a video camera that records at a rate of 2 GB per hour. Recording for 15 minutes creates about how much data, expressed in MB?

 

Short Answer 2 (15)

a. Suppose computers A, B, C, and D are connected to an ethernet cable, similar to the setup shown in lecture. Computer A begins transmitting a packet on the cable, but it collides with another transmission, so A stops transmitting. What does computer A do next?

 

b. Suppose we are using the following checksum scheme: add up all the bytes, and take just the last two digits of the sum. What is the checksum of the following bytes: 101, 202, 103, 100, 210, 120

 

c. What problem is addressed by checksums? (one sentence answer)

 

d. A computer connected to the internet is identified by what kind of address (the specific name, not just “internet address”):

 

e. Circle any of the addresses below which are not valid internet addresses:
1.2.3.4,   11.250.3.4,   45.67.212.100,   42.257.99.11,   171.64.64.171

 

f. True or false. Routing on the internet from Nick’s office to the east bay is about 15 hops, and to Poland is about 1000 hops.

 

g. The following is the output of a famous networking utility.

 1  yoza-vlan70 (171.64.70.2)  2.039 ms
 2  bbra-rtr-a (171.64.255.129)  0.932 ms
 3  boundarya-rtr (172.20.4.2)  3.174 ms
 4  dca-rtr (68.65.168.51)  27.085 ms
 5  dc-svl-agg1--stanford-10ge.cenic.net (137.164.50.157)  2.485 ms
 6  dc-oak-core1--svl-agg1-10ge.cenic.net (137.164.47.123)  3.262 ms
 7  dc-paix-px1--oak-core1-ge.cenic.net (137.164.47.174)  4.046 ms
 8  hurricane--paix-px1-ge.cenic.net (198.32.251.70)  14.252 ms
 9  10gigabitethernet1-2.core1.fmt1.he.net (184.105.213.65)  9.117 ms
10  linode-llc.10gigabitethernet2-3.core1.fmt1.he.net (64.62.250.6)  4.975 ms
11  li229-70.members.linode.com (173.255.219.70)  4.761 ms

What does this output show? (one sentence)

 

h. You open your laptop and type “http://www.blah.com/news/today.html” into your browser and hit return. Three questions, 1-3 word answers:

What computer does your laptop contact to request this web page?

 

What is the content of the request?

 

What is the content of the response?

 

Short Answer 3 (15)

a. What does the above sound like?

 

b. Why is a digital signal more resistant to noise?

 

c. Suppose we have these 6 samples: 1000, 1001, 1010, 1005, 1006, 1002. Consider the compression scheme from lecture, recording the first sample followed by the local delta for each sample. Write out the encoding of the 6 samples using this scheme:

 

d. Is the above compression scheme lossy or lossless?

 

e. Suppose we have two versions of the same image, differing only in their JPEG compression level. Image A is compressed at q1 and is 100 KB. Image B is compressed at q5 and is 400 KB. Which of these two images is more likely to exhibit JPEG compression artifacts?

 

f. Circle any of the following which are video encoding formats:
HTTP, PNG, H.264, JPEG, OGG VORBIS

 

g. “Network effect” means that users select among competing products based on what feature of each product?

 

h. Suppose Stanford is using the open source software YoYoMatic widely and is dependent on it. Describe an example scenario where Stanford would gain significant benefit from having access to the YoYoMatic source code.

 

i. Suppose there is a website foo.com and you have a password to log in to it. What are threedifferent, non-physical techniques a bad guy might use to obtain your password (non-physical meaning other than breaking in to your house and making you tell them):


j. Consider the brake pedal in a car — what is the abstraction the brake pedal presents to the driver?

 

Problem 4 (5)

Write code to print all the girl rows where the rank is greater than 900.

table = new SimpleTable("baby-2010.csv");


for (row: table) {













Problem 5 (5)

Write code to count the number of people who identified “purple” as their favorite color and print the result in the following format.

purple: 5

 

 

table = new SimpleTable("survey-2012.csv");


for (row: table) {








Problem 6 (5)

Here is some code that does something.

image = new SimpleImage("flowers.jpg");
for (pixel: image) {
  print("pixel");
}
print("image");

Suppose that flowers.jpg has 150,000 pixels. Describe the output of the above program:


Problem 7 (5)

This problem is similar to a bluescreen computation. As usual, we have two images — image and back, and the back image is at least as large as the main image. Write code that for each pixel in image, if the red, green, or blue value is less than 60, then copy just the blue value from back to image.

image = new SimpleImage("image.jpg");
back = new SimpleImage("back.jpg");

for (pixel: image) {




Problem 8 (10)

Write code to print the rows of all names beginning with J, except do not print John or Jess.

table = new SimpleTable("baby-2010.csv");


for (row: table) {













Problem 9 (10)

Consider the people who identified “coke” as their favorite soda. Write code to count and print how many of them identified “red” or “blue” as their favorite color with output in the following format.

red: 6
blue: 8

 

 

table = new SimpleTable("survey-2012.csv");
table.convertToLowerCase();


for (row: table) {








Problem 10 (8)

We’ll say that a pixel is intense if its red or green value is over 150. Write code below to count the number of intense pixels in flowers.jpg and print result in the following format.

intense: 12623

 

 

image = new SimpleImage("flowers.jpg");


for (pixel: image) {










Problem 11 (12)

We’ll say that “A” names start with “A” and end with any letter other than “a”. Likewise “B” names start with “B” and end with any letter other than “b”. Count both types of name and print the result in the following format:

A: 123
B: 61

 

 

table = new SimpleTable("baby-2010.csv");


for (row: table) {

Display the second worksheet named Warehouse Payment Table. In cell B8, enter a PMT function using cell B4 divided by 12 as the rate, cell B3 as the number of payment periods, and cell B2 as the present value of the loan. Display the result as a positive number.

1.Start Excel. Download and open the workbook named go16_xl_ch04_grader_4g_hw.xlsx, and then save it in your Excel Chapter 4 folder as Lastname_Firstname_4G_Loan_Staff_Form.

2.Display the second worksheet named Warehouse Payment Table. In cell B8, enter a PMT function using cell B4 divided by 12 as the rate, cell B3 as the number of payment periods, and cell B2 as the present value of the loan. Display the result as a positive number.

3.Create a two-variable data table in the range B8:H16. Set cell B3 as the row input cell, and cell B4 as the column input cell. From the Cell Styles gallery, apply the Currency cell style to the range C9:H16. Select the payment option closest to but less than $10,000 per month for a 120-month loan—cell D16—and format the option with the Note cell style. Save your workbook.

4.Display the fourth worksheet named Job Information, select the range A4:C11, and then sort the range by Job Code in ascending order. Create a range named Job_Code using the data in cells A5:A11.

5.Display the Staffing Plan worksheet, and then select the range A9:A18. Display the Data Validation dialog box, and validate from a List using the Source =Job_Code.

6.Click cell A9, click the list arrow, and then click M-MG. Click cell B9 to make it the active cell, and then insert a VLOOKUP function that will look up the Description of the Job Code in cell A9 using the information in the Job Information worksheet as the table array. After selecting the table array, be sure to press F4 to make it an absolute cell reference. The Description to be looked up is in column 2 of the table array.

7.With cell B9 as the active cell, copy the VLOOKUP formula down through cell B18. In cell C9, type 1 as the # of Positions and in cell D9, type Management as the Type.

8.In cell E9, insert the VLOOKUP function to look up the Salary of the Job Code in cell A9 by using the information in the Job Information sheet as the table array; the Salary is in column 3 of the table array. Copy the VLOOKUP formula in cell E9 down through cell E18.

9.Beginning in cell A10, add these staff positions:

Item   # of Positions   Type
C-CASH            3        Cashier
C-CSA              1        Customer Service
M-AMG            3        Management

10.Delete any unused rows between the last item and the Total row. Sum the Budget Amount column and apply the Total cell style. Save your workbook.

11.Display the Bracelet Revenue worksheet. Click cell I5, and then on the Formulas tab, click Trace Precedents. On the ribbon, in the Formula Auditing group, click Error Checking, and then click Edit in Formula Bar. Edit the formula so that the formula is using the Growth Assumption for Beaded Bracelets, not for Crystal Bracelets.

12.In the Error Checking dialog box, click Resume. In cell M6, notice the formula is trying to divide by cell L10, which is empty. Click Edit in Formula Bar, change 10 to 9 Ensure that the reference to L9 is an absolute reference, and then in the Error Checking dialog box, click Resume.

13.In cell F7, examine the error information, and then click Copy Formula from Above. Examine the error in cell J8, and then click Copy Formula from Left. Click OK. Use Format Painter to copy the format in cell M5 to cell M6. Save your workbook.

14.In the sheet tab row, right-click any sheet tab, and then click Select All Sheets. Display the Page Setup dialog box, click the Margins tab, and then under Center on page, click Horizontally. Click the Header/Footer tab, click Custom Footer, and then in the Left section, insert the File Name. Click OK two times. Ungroup the sheets, and then for these three worksheets—Warehouse Payment Table, Staffing Plan, and Bracelet Revenue—set the Orientation to Landscape. Select the Bracelet Revenue sheet, and on the Page Layout tab, set the Scale to 90%. Add the tag New York revenue to the properties.

15.Ensure that the worksheets are correctly named and placed in the following order in the workbook:  Warehouse Purchase, Warehouse Payment Table, Staffing Plan, Job Information, Revenue. Save the workbook. Close the workbook and then exit Excel. Submit the workbook as directed.

Discuss the following detailed design decisions:

  1. Download the attached template called “INFO620-Assignment3_LastNameFirst.doc”.
  2. Change the file name applying your Last Name and First Name in place of the LastNameFirst.
  3. Then open the newly saved file and enter your name and the date due on the top of the document.
  4. Then enter each problem’s solution within this same file in their proper locations WITHOUT changing or erasing the questions.
  5. Support your responses and answers by references from the text.
  6. Review and complete all questions.
  7. Then upload to Assignment #3 area of the Assignments.
  8. Your grade may be reduced if these instructions are NOT followed closely.

 

Week 3 Assignment Grading Rubric: 

#8.17 0.6 points #10.23a 0.2 points
#8.26 0.6 points #10.23b 0.3 points
#9.3 0.6 points #10.23c 0.3 points
#9.4 0.6 points #10.23d 0.3 points
#10.22 0.6 points #10.23e 0.3 points
#10.24 0.6 points    

 

Here are the contents of Assignment #3 (however – please use the template attached  – don’t copy and paste from here):

CH 8: THE ENHANCED ENTITY-RELATIONSHIP (EER) MODEL

#8.17 – Consider the BANK ER schema of Figure 7.21, and suppose that it is necessary to keep track of different types of ACCOUNTS (SAVINGS_ACCTS, CHECKING_ACCTS, …) and LOANS (CAR_LOANS, HOME_LOANS, …). Suppose that it is also desirable to keep track of each account’s TRANSACTIONs (deposits, withdrawals, checks, …) and each loan’s PAYMENTs; both of these include the amount, date, time, …  Modify the BANK schema, using ER and EER concepts of specialization and generalization. State any assumptions you make about the additional requirements. (You may use Visio)

#8.26 – Which of the following EER diagram(s) is/are incorrect and why? State clearly any assumptions you make. (refer to the diagrams in your text – they are not too clear here).

CH 9: RELATIONAL DATABASE DESIGN BY ER- AND EER-TO-RELATIONAL MAPPING

#9.3 – Try to map the relational schema of Figure 6.14 into an ER schema. This is part of a process known as reverse engineering, where a conceptual schema is created for an existing implemented database. State any assumptions you make.

#9.4 – Figure 9.8 shows an ER schema for a database that may be used to keep track of transport ships and their locations for maritime authorities. Map this schema into a relational schema, and specify all primary keys and foreign keys.

CH 10: PRACTICAL DATABASE DESIGN METHODOLOGY AND USE OF UML DIAGRAMS

#10.22 – What are the current relational DBMSs that dominate the market? Pick one that you are familiar with and show how it measures up based on the criteria laid out in Section 10.2.3?

#10.23 – A possible DDL corresponding to Figure 3.1 is shown below:

CREATE TABLE STUDENT (

NAME                             VARCHAR(30)       NOT NULL,

SSN                                 CHAR(9)                 PRIMARY KEY,

HOMEPHONE                VARCHAR(14),

ADDRESS                        VARCHAR(40),

OFFICEPHONE               VARCHAR(14),

AGE                                 INT,

GPA                                 DECIMAL(4,3)

);

 

Discuss the following detailed design decisions:

a.     The choice of requiring NAME to be NON NULL.

b.     Selection of SSN as the PRIMARY KEY.

c.     Choice of field sizes and precision.

d.     Any modification of the fields defined in this database.

e.     Any constraints on individual fields.

#10.24 – What naming conventions can you develop to help identify foreign keys more efficiently?