Pharmaceutical Industry. An equities analyst is studying the pharmaceutical in-dustr and would like your help in exploring and understanding the financial data collected by her fun. Iler main...
There is a database that contains a website's traffic data over a period of 30 days. The first table contains users' information including the user type (user, crawler, admin). The second table...
Assuming the data are normal, what is the probability the blade weights from this process will exceed 5.20? What is the probability that weights will be less than 4.80? What is the actual percent of...
Analytics mindset Final Project 4 Gamification Part 1: Background You are the chief technology officer (CTO) of an international bank. A key component of your job is to manage risk within the bank...
The customer billing and collection functions of the Misty Company, a small paint manufacturer, are attended to by a receptionist, an accounts receivable clerk, and a cashier who also serves as a...
It's mid-December and Marie is finalizing her divorce. Generally, she and her soon to be ex-spouse have been amicable, and Marie is looking forward to being single. The divorce attorneys will be...
Open the start file EX2019-ChallengeYourself-6-3 . The file will be renamed automatically to include your name. If the workbook opens in Protected View, click the Enable Editing button in the Message...
You are the IT director at Big Ten University. As part of a training program, you decide to draw a DM that includes some obvious mistakes to see whether your newly hired junior analysts can find...
For each of the following narratives, draw an ERD diagram which indicates the entities and their attributes (if noted). Identify and label significant relationships between pairs of entities. 1- A...
Create a payroll program named CalcPay that allows the user to enter two double value sand a string namely hours worked, hourly rate and name. After the user enters the rate, hours, and name the...
A travel and tour company has two tables relating to customers: Families and Countries. Each tour offers a discount if a minimum number of people book at the same time. Write a query (sql oracle)to...
Write a letter to the Smith's discussing the results of their tax return, remind them of any deduction substantiation rules they need to follow (receipts, mileage log, etc.), offer suggestions for...
Background: SO MUCH CANDY DATA, SERIOUSLYCandy hierarchy data for 2017 Boing Boing Halloween candy hierarchy. This is survey data over the span of 4-years. The data is split into 4 separate files....
How would the following ERD be changed to incorporate the design decision listed next? The analyst wants to keep track of the user ID of anyone who changes a grade for a course. A data store is...
Describe the matrices and formulae used to determine centralization or distribution of data. In the absence of subjective reasoning, would the matrices and formulae lead to a rational decision? Why...
After conducting preliminary security testing on the Alexander Rocco Corporation network, you have identified that the company has seven Web servers. One is a Windows 2003 Server system running IIS...
City Tours Ltd. needs to update the database on a regular basis. As a customer service manager for the company, you need to add new customers and confirmations, update basic costs, delete...
Suppose we have a stream of tuples with the schema Grades(university, courseID, studentID, grade) Assume universities are unique, but a courseID is unique only within a university (i.e., different...
Create an app called HotSpots! The MainActivity should allow the user to save the name and address of a bar or nightclub into a database table. Add a Rate button to the activity. The Rate button will...
Find the SQL code for the following business question.HR wants to send the completed budget reports to the various department managers. To do so, they need a current listing of the department...
Garden Glory Project Questions Assume that Garden Glory designs a database with the following tables: OWNER (OwnerID, OwnerName, OwnerEmail, OwnerType) OWNED_PROPERTY (PropertyID, PropertyName,...
1. List reseller name for resellers who have not sold any bikes. -- 114 Rows 2. List all male customers and any clothing they have purchased over the internet. List customer alternate key, customer...
The figure below depict a maze. STOP 0 1 2 north 3 4 5 12 west east south 6 7 B Write a description of the maze in FSP, which using deadlock analysis provided by LTSA, finds the shortest path out of...
Monterey Co. makes and sells a single product. The current selling price is $15 per unit. Variable expenses are $9 per unit, and fixed expenses total $27,000 per month. Required: (Unless otherwise...
1. The university rules allow an F grade to be overridden by any pass grade (A, B, C, D). Now, create a view that lists information about all fail grades that have not been overridden (the view...
Acquiring MVN design pattern, you need to build a data model for the application described in the Assignment Description section together with API Contracts. What would an Entity relationship model...
Using the information below develop a linear program to determine the best course of action for Draper Agricultural Enterprises. Using the results of the linear program prepare an Executive Summary...
List the lunch ID, lunch date, the count of menu items per purchased lunch, and the total price of a purchased lunch per lunch id. Only include lunch dates from the second half of May 2021 (May 16,...
New Endor Airlines Database New Endor Airlines (NEA) is the premier aviation service in the small island nation of New Endor, located in the southwestern Pacific Ocean. For the 40 years since its...
What type of web server is sending packet/frame 280 of the capture? 2. What type of HTTP Status Code is the web server in packet/frame 314 sending? Google the error and provide a quote summarizing...
1. A database normalization database textbooks and tutorials emphasize the need to ensure normalization of the database. while database designers and database administrators will generally ensure...
Why is the SUDO command important and who can use it? What is the name of the mechanism in Linux that can prohibit certain users from executing certain administrative commands?
Consider a CONFERENCE-REVIEW database in which researchers submit their research papers for consideration. Reviews by reviewers are recorded for use in the paper selection process. The database...
Create a decision table, flowchart, and algorithm for problem in Chapter. Problem Eureka Lumber Company gives a 2% discount if the remaining balance is paid within 10 days of purchase. Write a...
Assume the Item table has been created, but there are no integrity constraints. Create the necessary integrity constraint to ensure that the only allowable values for the Category field are PZL, GME,...
Youre doing systems administration work for Network Funtime Company. Evaluate their current IT infrastructure needs and limitations, then provide at least five process improvements and rationale...
This program should be written in Java Language Sales Analysis: The file SalesData.txt contains the dollar amount of sales that a retail store made each day for a number of weeks. Each line in the...
Based on your own personal experiences or those of someone you know (you may have to interview other students or a friend), write a paragraph regarding a computer attack that occurred. When did it...
Display the calculated field value (the donation total) in bold, red text when the value is greater than $500 and in regular, black text otherwise. (Hint: Use the FontBold property with the value...
The analysis of binary search in this chapter assumed that the size was always 2k 1 for some value of k. For this question, we will explore other possibilities for the size: a. What is the worst case...
A. ________ is a description of the database structure. Data independence makes each level immune to changes to lower levels. __________ refers to the Immunity of the external schemes to changes in...
Choose below scenarios and Create the physical level ERD. Scenario : This is a simple list table of a company trying to keep track of parts that they sell and orders that came in purchasing those...
Convert the E/R diagram of Fig. 4.33 to a relational database schema, using: a) The straight-E/R method. b) The object-oriented method. c) The nulls method. Figure 4.33: E/R diagram for Exercise...
An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight characters long and were taken from the character set consisting of...
A purchase request is initiated when an employee at the company fills in and signs a form on paper. The purchase request includes information about the good to be purchased, the quantity, the desired...
Suppose RSA-OEAP is used, where the hash function G has a bug and outputs the all zero string. Show how an attacker can (with probability at least 1/2) break the IND-CCA security of RSA in this case.
Create the database SBR and the following tables Sailors, Boats , and Reserves which are reproduced as follows: Sailors ( sid: VARCHAR (2) PK, sname: VARCHAR(7), rating: SMALLINT, age: DOUBLE Boats (...
1-In what circumstances the composite primary key is appropriate? 2-Design the EERD for a media store that have a PRODUCT supertype containing attributes, Prod_Title, Prod_ReleaseDate, Prod_Price,...
Fisch, White, and Pooch [319] define four levels of log sanitization. A. Simple sanitization, in which all information except the commands issued by anintruder are deleted B. Information-tracking...
1. Create an in-memory database for a bookstore inventory. The bookstore sells books. Each book has a name, price, unique id, and a quantity. The store uses sequential integers for unique ids. We...
Use the data in FERTIL2.RAW to answer this question. (i) Estimate the model and report the usual and heteroskedasticity-robust standard errors. Are the robust standard errors always bigger than the...
Suppose P, Q, and R, are network service providers, with respective CIDR address allocations C1.0.0.0/8, C2.0.0.0/8, and C3.0.0.0/8 (using hexadecimal dotted notation with mask). Each provider's...
Consider the following EER diagram that describes the computer systems at a company. Provide your own attributes and key for each entity type. Supply max cardinality constraints justifying your...
Consider the following relation with sample data. AIRPORT KLX TABLE Date AirlineID AirlineName TerminalID NumberOfGates Number OfDepartingFlights 11-Dec UA United A 20 34 11-Dec NW Northwest A 20 17...
(a) Carefully complete the energy diagram by drawing a curve that accurately shows the progress of the reaction, beginning at the reactants, moving through the transition state, and ending at the...
The close genetic relationship between humans, chimpanzees and bonobos provides us with a window into how early humans may have behaved Based on the videos and readings concerning chimpanzee and...
Exercise 8.8 A cache has the following parameters: b, block size given in numbers of words; S, number of sets; N, number of ways; and A, number of address bits. (a) In terms of the parameters...
(a) Based on the table given above provide the relevant relational algebra operations that is been described in the following statements: i. List all employees in the library whose salaries are...
The following exercises are based on the BITS database user views as designed in Your Turn 6-1 in this chapter. In each exercise, represent your answer in DBDL and with a diagram. You may use any of...
Consider the AIRLINE relational database schema shown below. Specify the following queries in relational algebra: a. For each flight, list the flight number, the departure airport for the first leg...
Calculate the Accounts Payable balance. (Enter the balance, along with a "Bal." reference on the correct side of the T-account.) Accounts Payable May 2 6,000 21,000 ay 1 May 22 11,500 500 ay 5 8,500...
1. Write an INSERT statement that adds this row to the Terms table: terms_id: 6 terms_description: Net due 120 days terms_due_days: 120 Use MySQL Workbench to review the column definitions for the...
Database Normalization A engineering consultancy firm supplies temporary specialized staff to bigger companies in the country to work on their project for certain amount of time. The table below...
Jack Wade owns an unincorporated business appropriately named Wade Enterprises. Mr. Wade has decided that he no longer needs to spend all of the business income he receives each year, and would like...
Question: List TOY category items and orders placed for them. Report: Item_Num, Description, Order_Num, and Order_Date REP ( REP_NUM , LAST_NAME, FIRST_NAME, STREET, CITY, STATE, POSTAL_CODE,...
In a sting operation, Police Forces found the message below. They have reasons to believe something serious is happening tonight. You are a steganography and code breaker expert working as a...
II- The owner of a sports memorabilia store wants to estimate the mean value of his baseball card inventory. A random sample of 100 cards indicates a mean value of $9 and a standard deviation of $2:...
Figure 4-35 includes an EER diagram describing a car racing league. Transform the diagram into a relational schema that shows referential integrity constraints (see Figure 4-5 for an example of such...
Serial Entrepreneur, author, and founder of the Entreprenaissance Movement, Creel Price, recounts a time when creativity was needed to fake it to make it. Within months of opening our marketing...
1. 2. Trace the depth-first search pseudocode below on the graph below and show only the sequence of vertices visited: dfs (adj, s) { } n = adj.last for (i = 1 to n) { } visit[i] = false dfs_recurs...
Based on the illustration of an iPhone shown below, draw a system model for an iPhone. iPhone Components Flash memory. CPU Main circuit boards Communications GSM cell, WiFi, EDGE Battery Display...
Assume that we have the following tables, with columns as indicated: Table Name: Rides Columns: ride_id, start_time, end_time, passenger_id, driver_id, ride_region, ride_completed (Y/N),...
Your task is to build a JEE web application that uses Enterprise JavaBeans (EJB) and Java Persistence API (JPA) to manage the persistence of Java objects to a relational database. The application...
This is a Collaborative Learning Community (CLC) assignment. For this assignment, you will use the "Analytics Problem Statement" template to organize your problem statement. This will help you...
1) Create a dimensional model containing an aggregated fact table, where a fact table shows a summary of daily revenue amount for each officer. Use ERDPlus to create your model. 2) Populate the...
Fred Campbell asked for a transfer from the Shipping department to the MKT department. His request was approved. Update the database to reflect this change.In the answers document, the whole...
The data for the number employed at several famous IT companies is maintained in the COMPANY table. Write a query to print the /Ds of the companies that have more than 10000 employees, in ascending...
Perform normalization by writing UNF, 1NF, 2NF and 3NF for the following user views. Please provide the answer in both table and schema form for each (UNF, 1NF, 2NF and 3NF) StorelD S101 S101 S101...
Pivot Tables allow you to create reports on a new spreadsheet from data stored on a separate, often large spreadsheet. Employers tell us that knowing how to create and manipulate Pivot Tables is an...
The CIS Department at Tiny College maintains the Free Access to Current Technology (FACT) library of e-books. FACT is a collection of current technology e-books for use by faculty and students....
Case Study Questions: 1. Based only on the information provided in the case study, use Michael Porters competitive forces model ( see figure 3.8 in Page 6 ) to analyze Bed Bath & Beyonds (BB&Bs)...
2 nd note: Since tax planning requires a wide range of knowledge in tax, you would need to review material from multiple prior lectures in this course to complete this homework. Question 1 Addison, a...
Consider the following tables and give answers to the queries in Relational Algebra syntax. Queries are given at the end of the tables. Note: Just write the queries on the paper and submit them. No...
A small publisher wants to keep data about its books and authors. What are possible business rules (must come from the real world)? Draw a conceptual ERD for the publisher.
3. Spy vs. Spy. We have captured 5 spies. Their names are A, B, C, D, and E. Here is a summary of what we know: Spy A says he knows 4 others, B 3, C 3, D 2, and E 1. If a spy is lying, he knows more...
You will write a class called Grid, and test it with a couple of programs. A Grid object will be made up of a grid of positions, numbered with rows and columns. Row and column numbering start at 0,...
Part 2 : Write a series of attacks against our insecure reference monitors. . Requirement 1 : You will need to write one or more attack files which successfully circumvent each of the reference...
Can someone fix and check if my ".c" file and "Makefile" are correct? Need 2 things: ".c" file with the name "LastNameLKM.c" Makefile you use to build it My screenshots: Instructions: There is also a...
.def .def .def A 12 .def Br3 .def zero r4 .def oloop r17 .def iloop r18 .org $0000 [25 pts] 4- Consider the AVR assembly code in Problem # 3 with its equivalent (partially completed) address and...
I Raven Lawrence CSC 537 4.12. Figure 4.32 shows another VIOLIN adaptation scenario for change in virtual environments. There are four VIOLIN applications running in two cluster domains. Trace the...
3. Create an ER model for each of the following descriptions: (a) A large organization has several parking lots, which are used by staff. (b) Each parking lot has a unique name, location, capacity,...
A concentration control loop in an industrial chemical process can be represented by a second-order dynamics with a long transmission delay. The two-time constants of the second-order dynamics are T...
Three ropes pull on a knot shown in (Figure 1) . The knot is not accelerating. A partially completed force diagram for the knot is shown in the figure (Figure 2) . Use Newton's second law to...
Cisco Systems is a U.S.-based multinational corporation that designs, manufactures, and sells networking equipment. Founded in 1984, Cisco became a giant in the telecom industry, due in large part to...
a. Write the proper sequence of activities in the design of a video rental database. The initial ERD is shown in above (or refer to textbook figure 9.9). The design must support all rental...
1. Construct the complement FA of the following FA
Problem: In this lab, you will be using Visual Studio to create an application where you will calculate a person's lean body weight, fat mass, percent body fat, and ideal weight. This lab uses radio...
Personal Trainer, Inc., owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new supercenter...
CengageNOW | Online teaching and learning resource from Cengage Learning Assignment: Chapter 0 3 Use It Assignment Score: 5 0 . 0 0 % Keyboard Navigation Help Questions Previous Question 2 of 2 co 5...
(10pt) Suppose that you know a MAC value X and the key K that was used to compute the MAC, but you do not know the original message. (a) (8pt) Show that you can construct a message M that also has...