Exam II Solution_2023
.pdf
keyboard_arrow_up
School
University of Illinois, Urbana Champaign *
*We aren’t endorsed by this school
Course
450
Subject
Computer Science
Date
Dec 6, 2023
Type
Pages
7
Uploaded by CoachBat2042
1
SE 450 –Decision Analysis I
Fall -202
3
Exam II
•
Duration: 120 minutes
•
Close book and notes
•
Calculator is allowed.
“I pledge on my honor that I have not given or received any unauthorized assistance on
this examination.”
Your Signature:
Name: _____________________________
Net ID: ___________________________
Prob.
1
2
3
4
5
TOTAL
Score
/15
/20
/20
/20
/25
(
Note: calculations must be accurate up to the second decimal point
)
2
Problem 1 (15’):
in the context of engineering decision-making, please judge true (
T
) or false (
F
) for the
following statements.
[
T
]
A decision tree shows all possible paths that the decision maker might follow, and branches from
each chance node form a set that is mutually exclusive and collectively exhaustive.
[
F
]
Influence diagram is a flowchart of the decision process that represents all possible future scenarios,
which usually display more details of a decision problem than a decision tree.
[
T
]
When constructing the decision tree, entropy is used to determine how informative a particular
input attribute is about the output attribute for a subset of the training data.
[
F
]
When we consider the value of information for a decision making problem by using multiple
experts, the more interrelated and consistent the information is that they provide, the more valuable
it is.
[
T
]
Decision makers can look to the tornado graphs to determine which variables impact the specific
alternative most. Then, turn to the sensitivity diagram to understand the exact nature of the variables
effect.
Problem 2 (20’):
A professional sports club is trying to use the ID3 algorithm to construct a decision tree
for determination of the length of their outdoor training session (none, half or full) in a day based upon the
weather conditions. The decision is made based on four different weather attributes, as shown in the table
below, together with 14 available instances. While constructing the tree, please divide the humidity into
three groups (below 0.7, 0.7 to 0.9, and above 0.9).
Please help the sports club to
identify the first weather attribute
to be considered while constructing the
decision tree for the decision making.
Samples
Weather Attributes
Decision
Outlook
Temperature
Humidity
Windy
1
Sunny
Hot
0.90
False
None
2
Sunny
Hot
0.87
True
Half
3
Overcast
Hot
0.93
True
Full
4
Rain
Mild
0.89
False
Half
5
Rain
Cool
0.80
False
Half
6
Rain
Cool
0.59
True
None
7
Overcast
Cool
0.77
True
Half
8
Sunny
Mild
0.91
False
None
9
Sunny
Cool
0.68
False
Full
10
Rain
Mild
0.84
False
Half
11
Sunny
Mild
0.72
True
Full
12
Overcast
Mild
0.49
True
Full
13
Overcast
Hot
0.74
False
Half
14
Rain
Mild
0.86
True
None
3
࠵?(࠵?) = −
4
14
log
!
,
4
14
- −
6
14
log
!
,
6
14
- −
4
14
log
!
,
4
14
- = 1.5567
࠵?(࠵?) =
5
14
3−
2
5
log
!
,
2
5
- −
1
5
log
!
,
1
5
- −
2
5
log
!
,
2
5
-5 +
4
14
3−
2
4
log
!
,
2
4
- −
2
4
log
!
,
2
4
-5 +
5
14
3−
3
5
log
!
,
3
5
- −
2
5
log
!
,
2
5
-5
= 1.1760
࠵?(࠵?) = 2 ∗
4
14
3−
1
4
log
!
,
1
4
- −
2
4
log
!
,
2
4
- −
1
4
log
!
,
1
4
-5 +
6
14
3−3 ∗
2
6
log
!
,
2
6
-5 = 1.5364
࠵?(࠵?) =
3
14
3−
2
3
log
!
,
2
3
- −
1
3
log
!
,
1
3
-5 +
9
14
3−
1
9
log
!
,
1
9
- −
6
9
log
!
,
6
9
- −
2
9
log
!
,
2
9
-5 +
2
14
3−2 ∗
1
2
log
!
,
1
2
-5 = 1.1267
࠵?(࠵?) =
7
14
3−
3
7
log
!
,
3
7
- −
2
7
log
!
,
2
7
- −
2
7
log
!
,
2
7
-5 +
7
14
3−
1
7
log
!
,
1
7
- −
4
7
log
!
,
4
7
- −
2
7
log
!
,
2
7
-5 = 1.4678
Thus,
Humidity
provides the largest entropy again.
Problem 3 (20’):
For the decision tree shown below,
(a)
Develop the risk profile for the decision strategies A, B, C, respectively. Will any one strategy
dominate the other?
(b)
Perform one-way sensitivity analysis and construct the tornado diagram for the decision
parameters as shown below.
Parameters
Ranges
P1
[0.01, 0.50]
F1
[20, 80]
F2
[120, 280]
F3
[50, 150]
(c)
Perform two-way sensitivity analysis for P2 and F4 considering the following parameter ranges:
P2 ~ (0, 1) and F4 ~ (10, 75), and identify the parameter space leading to the following decision
inequalities:
EMV (C) > EMV (B) > EMV (A)
A
C
$0
$180
$100
(P3=0.3)
(P4 = 0.5)
(1
-
P3
-
P4)
$36
(P2 = 0.3)
(1
-
P2)
$0
$200
$55
B
(F1)
(F2)
$80
(F3)
(F4)
C-1
C-2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
The report from the hospital said a study following a group of 250 girls found those ____
Were fatter at 3 age 3 and ____ gained welght dung the next three years reached puberty by age 9
a) © who / which
b) © which / whose
c) © thark whom
d) who / that
e) which / who
arrow_forward
All data readily available to a computer user is knownas ___________data.
arrow_forward
Java Programming Language
DSA
Don't use built in libraries.
We want to build an address book that is capable of storing name, address & phone number ofa person. Address book provides functionality in the form of a menu. The feature list includes:• Add – to add a new person record• Delete – to delete an existing person record by name• Search – to search a person record by name· Exit – to exit from application
arrow_forward
Need help
arrow_forward
Need help
arrow_forward
Information of a computer system is protected from unauthorized access by a module known to be______
arrow_forward
a)Createa flow chartdiagram tomodel the online course registration described inthe case study belowCASE STUDYONLINE COURSE REGISTRATION SYSTEMThe User enters the surname and password and chooses if the user is a student or administrator. If entered details are valid, the user accounts become avaiable. f it is invaid an appropriate message is displayed to him/her. A student can search al the courses available to him and he chooses the best course he wants. The student can view course duration, facuty and department the course he may choose. When a student has successfully chosen a course, he can register to that course. Upon registration student details are stored in database.After registration to any course, the student may see the details of current course. He may wish to know details about fees and other information. The administrator also has the privilege to display details of the students and the corresponding course for which they have registered. The administrator has to perform…
arrow_forward
q5: project management
A company supplies a Tax Returns Automation process to its clients, visiting their sites andinspecting their revenues for a given year, giving advice and completing the necessaryforms for Tax Returns purposes. Once the forms have been completed, they are saved aspaper copies; one is kept by the client, the other is filed locally within the company’s
paper-based archives. The corresponding electronic copies are also saved in a word-processor format and saved on a local computer.The company is seeking to develop a more fully automated process: the tax consultantvisiting the client's premises periodically would log-in to an on-line application (withinthe company website) and input the data to an on-line form. The data collected wouldbe used to keep the clients informed of the results of the consultant’s visits and the dateof the next visit.Considering the above scenario:
a) List and describe at least THREE possible risks that the company will be likely to…
arrow_forward
______________ software capable of accepting requests
arrow_forward
Individuals with schizophrenia often experience ________, which involve hearing, seeing, feeling, smelling, or tasting things that are not there.
arrow_forward
Does the internet provide benefits to individuals with physical or mental disabilities? What novel technological advancements do you anticipate will be developed to provide assistance to individuals with disabilities? • Is it deemed suitable for assistive technology to be made available as open-source software?
arrow_forward
Mac OS X is an embedded operating system
arrow_forward
**** Computer operating systems ****
A research report of no less than 500 words in which you answer the following question:
What is the advantage of the Linux operating system, and what is the difference between it and the Windows 10 operating system
& **** The reference is mentioned ****
arrow_forward
The computer’s ____________permits the user to manage files and applications.
arrow_forward
UNIX Systems Programming
List 3 UNIX commands to use for Disk Space Usage
Answer1: __________________________________________
Answer2: __________________________________________
Answer3: __________________________________________
What does this command do? find . –name‘*.doc’
Answer: __________________________________________
arrow_forward
Task manager Allows use to identify running application and processes and the amount of Ram and CPU they are utilizing:
A: true
B: False
arrow_forward
Solve part 10 within 30 mins. with detailed explanation.
arrow_forward
User Requirements DocumentSection 1 Introduction A Programming Competition System is hosting a programming competitions and allows participants() to log onto the system and perform different tasks. Programming competitions are a fun way for scholars, university students as well as school students, to engage with each other and get exposure to the feel of what programming is about instead of the generic hacker mentality every individual has. The aim is to create a system that allows hosts to carry out programming competitions and provides the participants with all the rules and requirements and other necessary details on the upcoming programming competitions as well as part-take in these competitions. This process is usually done manually so the system is going to simplify the process and make everything digitally available. This makes it easier for the hosts to keep track of every candidate and check for qualified participants.
Question 1
Draw an ER Diagram
arrow_forward
Please write them in Clarity and Concision way.
Computer technology and its associated software applications in conjunction with the widespread usage of the World Wide Web have had the most profound and visible effects of any invention in modern history.
Technologies have dramatically impacted and modified our complex communication systems, exchanges of information, and commercial endeavors.
As technology permeates nearly every facet of business entities, the question is whether today’s college students receive adequate information and assistance as they prepare for the high-tech world of business.
A multitude of employers is now testing prospective employees prior to employment to determine if their information technology knowledge and skill levels will meet or exceed their technology expectations in terms of meeting their workplace needs.
arrow_forward
One of the many achievements of President George H. W. Bush was signing the Americans with Disabilities Act into law. According to the ADA National Network (Links to an external site.), the "purpose of the law is to make sure that people with disabilities have the same rights and opportunities as everyone else." Because of the law, websites and software must meet specific guidelines to make them accessible to everyone. Microsoft Office has a number of accessibility features.
This week you should explore the accessibility features available in Windows and MS Office.
Questions
Write a description of at least two accessibility features available in Microsoft applications
Discuss how the accessibility feature improves productivity and creates a more inclusive work environment
Accessibility might be a topic that you may never have thought about. Here are some links to get you started:
Office 365 - Microsoft Accessibility (Links to an external site.)
Stories - Microsoft Accessibility…
arrow_forward
Discuss the Software Ownership Rights
Commercial software
Shareware
Freeware
Public domain software
Open-source software
Based on the provided software ownership right above, which is the best among Software Ownership? Explain your answer.
Provide a comparative analysis of the following terms:
Patent
Trademark
Copyright
arrow_forward
Is engaging in computer gaming beneficial or detrimental to individuals in the long term? What is the foundation upon which your belief is predicated?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- The report from the hospital said a study following a group of 250 girls found those ____ Were fatter at 3 age 3 and ____ gained welght dung the next three years reached puberty by age 9 a) © who / which b) © which / whose c) © thark whom d) who / that e) which / whoarrow_forwardAll data readily available to a computer user is knownas ___________data.arrow_forwardJava Programming Language DSA Don't use built in libraries. We want to build an address book that is capable of storing name, address & phone number ofa person. Address book provides functionality in the form of a menu. The feature list includes:• Add – to add a new person record• Delete – to delete an existing person record by name• Search – to search a person record by name· Exit – to exit from applicationarrow_forward
- a)Createa flow chartdiagram tomodel the online course registration described inthe case study belowCASE STUDYONLINE COURSE REGISTRATION SYSTEMThe User enters the surname and password and chooses if the user is a student or administrator. If entered details are valid, the user accounts become avaiable. f it is invaid an appropriate message is displayed to him/her. A student can search al the courses available to him and he chooses the best course he wants. The student can view course duration, facuty and department the course he may choose. When a student has successfully chosen a course, he can register to that course. Upon registration student details are stored in database.After registration to any course, the student may see the details of current course. He may wish to know details about fees and other information. The administrator also has the privilege to display details of the students and the corresponding course for which they have registered. The administrator has to perform…arrow_forwardq5: project management A company supplies a Tax Returns Automation process to its clients, visiting their sites andinspecting their revenues for a given year, giving advice and completing the necessaryforms for Tax Returns purposes. Once the forms have been completed, they are saved aspaper copies; one is kept by the client, the other is filed locally within the company’s paper-based archives. The corresponding electronic copies are also saved in a word-processor format and saved on a local computer.The company is seeking to develop a more fully automated process: the tax consultantvisiting the client's premises periodically would log-in to an on-line application (withinthe company website) and input the data to an on-line form. The data collected wouldbe used to keep the clients informed of the results of the consultant’s visits and the dateof the next visit.Considering the above scenario: a) List and describe at least THREE possible risks that the company will be likely to…arrow_forward______________ software capable of accepting requestsarrow_forward
- Individuals with schizophrenia often experience ________, which involve hearing, seeing, feeling, smelling, or tasting things that are not there.arrow_forwardDoes the internet provide benefits to individuals with physical or mental disabilities? What novel technological advancements do you anticipate will be developed to provide assistance to individuals with disabilities? • Is it deemed suitable for assistive technology to be made available as open-source software?arrow_forwardMac OS X is an embedded operating systemarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning