Exp19_Excel_AppCapstone_Intro_Collection

 

Exp19_Excel_AppCapstone_Intro_Collection

Project Description:

You are the financial manager for Judi’s Art Gallery. One of your clients, Raymond Chancellor, has a large collection of limited edition signed art by James C. Christensen (1942-2017). Over the years, you have helped Raymond maintain a list of his collection, including the title of the art, medium, issue date, issue price, the price he paid, and current market values. Most of the art is sold out from the publisher, which increases the value of the art. Other art is still readily available or is available in limited quantities. You want to update the list so that he can properly insure his collection.

Steps to Perform:

 

Step

Instructions

Points Possible

 

1

Start Excel. Download and open the file named Exp19_Excel_AppCapstone_Intro_Collection.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

0

 

2

Select the range A1:A6 on the   Christensen worksheet, merge the cells, and apply Middle Align vertical   alignment.

2

 

3

Change the width of column K to 17.00, select the range   K1:K3, and apply Thick Outside Borders.

2

 

4

Click cell C9, and freeze panes so that rows 1 through   8 and columns A and B are frozen.

1

 

5

Select the range E9:E54 and apply the Mar-12 date format.

2

 

6

Find all occurrences of Retired and   replace them with Sold Out.

2

 

7

Click cell H9 on the Christensen worksheet, and insert a   formula that calculates the percentage Raymond paid of the issue price by   dividing the amount Paid by the Issue Price. Copy the formula from cell H9 to   the range H10:H54.

3

 

8

Click cell J9, and insert a   formula that calculates the percentage change in value by subtracting the   Issue Price from the Current Value and then dividing that result by the Issue   Price. Copy the formula from cell J9 to the range J10:J54.

3

 

9

Apply Percent Style with one decimal place to the ranges   H9:H54 and J9:J54.

2

 

10

Insert in the Current Values   section at the top of the worksheet summary functions that use the range   I9:I54. In cell I2, calculate the total of all the Current Values. In cell   I3, calculate the average current value. in cell I4, calculate the lowest   current value. In cell I5, calculate the highest current value.

12

 

11

Click cell C9 and insert a VLOOKUP function that looks up   the code in cell B9, compares it to the codes and types of art in the range   B2:C6, and returns the type of art. Copy the function in cell C9 to the range   C9:C54. Hide column B that contains the codes.

5

 

12

Click cell K9 and insert an IF   function that determines if the Issue Price is equal to the Current Value. If   the values are the same, display Same as Issue (using the cell reference K2);   otherwise, display Increased in Value (using the cell reference   K3). Copy the function from cell K9 to the range K10:K54.

4

 

13

Display the Purchase worksheet, insert a row above Monthly   Payment. Type Monthly   Payments in 1 Year in cell A5 and type 12 in cell B5.

2

 

14

In cell B6 in the Purchasing   sheet, insert the payment function to calculate the monthly payment using   cell references, not numbers, in the function, and make sure the function   displays a positive result. Apply Accounting Number Format and the Output   cell style to cell B6.

5

 

15

Display the Christensen worksheet, select the range C1:E6,   and create a clustered column chart.

4

 

16

Cut the chart and paste it in   cell A57, change the height to 4″, and change the width to 6.5″.   Add Alt Text The   column chart compares total issue prices to total current values by type of   art. (include the period).

4

 

17

Type Raymond’s Art Collection for the chart   title, apply bold, and Black, Text 1 font color. Place the legend at the top   of the chart. Add Primary Minor Horizontal gridlines.

4

 

18

Create a pie chart using the   ranges C2:C6 and E2:E6, and then move the chart to a new chart sheet named Current   Values. Move the Current Values sheet to the right of the Purchase   sheet.

5

 

19

Type Percentage of Total Current Value as the   chart title and change the font size to 18 pt. Choose Colorful Palette 3 for   the chart colors. Add this description for Alt Text: The pie chart shows each art type by   percentage of total current value. (include the period).

4

 

20

Hide the legend. Add data labels   for categories and percentages; remove value data labels. Change the font   size to 16 pt, bold, and Black, Text 1 font color for the data labels.

4

 

21

Explode the Masterwork Anniversary Edition slice by 15%   and change the fill color to Light Blue.

1

 

22

Display the Christensen   worksheet, click in any cell within the dataset, convert the data to a table,   assign a table name Collection, and apply Green, Table Style   Light 14.

4

 

23

Apply a conditional format to the range J9:J54 that   highlights cells where the value is greater than 200% with Green Fill with   Dark Green Text.

3

 

24

Sort the dataset by Type of Art   in alphabetical order and then within Type of Art, sort by Current Value from   largest to smallest.

4

 

25

Set a filter to display art that equals Sold Out as the   status.

3

 

26

Add a total row to display the   sum of the Issue Price, Paid, and Current Values columns. Remove the total   for the Note column.

3

 

27

Select the Purchase sheet, set 2″ top margin, and   center horizontally on page.

2

 

28

Select the Christensen sheet,   select Landscape orientation, Legal paper size, set 0.2″ left and right   margins, 0.5″ top and bottom margins, and set row 8 to repeat at the top   of pages.

5

 

29

On the Christensen worksheet, change the width of column A   to 27,   the width of column D to 11, the width of column J to 12.   Wrap text in cell A1 and cell J8.

3

 

30

Create a footer with Exploring   Series on the left side, the sheet tab code in the center, and   file name code on the right side on the Christensen sheet.

2

 

31

Save and close Exp19_Excel_AppCapstone_Intro_Collection.xlsx.   Exit Excel. Submit the file as directed.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Excel_2F_Bonus

Excel_2F_Bonus

 

Excel_2F_Bonus

Project Description:

In the following project, you will edit a worksheet that summarizes the compensation for the commercial salespersons who qualified for bonuses in the Western and Eastern Canadian regions.

 

Open   the Excel file Student_Excel_2F_Bonus.xlsx downloaded with this   project.

 

Rename Sheet1 as Northern and rename Sheet2 as Southern.

 

Click the Northern sheet tab to   make it the active sheet, and then group the worksheets. In cell A1, type Rosedale   Landscape and Garden   and then Merge & Center the text across the range A1:F1. Apply the Title   cell style. Merge & Center the text in cell A2 across the range A2:F2,   and then apply the Heading 3 cell style.

 

The bonus rates for each salesperson are determined by sales amounts   using the following scale: Sales greater than $35,000 earn a bonus rate of   5%, sales greater than $25,000 earn a bonus rate of 4%. All other sales (any   amount greater than 0) earn a bonus rate of 2%. With the sheets still   grouped, in cell C5 use an IFS function to determine the commission rate for   the first salesperson whose sales are in cell B5. Fill the formula down   through cell C8.

 

In cell D5,   calculate Bonus for Reid by multiplying the Sales Eligible for Bonus times   the Bonus Rate. Copy the formula down through cell D8.

 

In cell F5, calculate Total   Compensation by summing the Bonus and Base Salary for Reid. Copy the formula   down through the cell F8.

 

In row 9, sum the columns for   Sales Eligible for Bonus, Bonus, Base Salary, and Total Compensation. Apply   the Accounting Number Format with two decimal places to the appropriate cells   in row 5 and row 9 (do not include the percentages).

 

Apply the Comma Style with two   decimal places to the appropriate cells in rows 6:8 (do not include the   percentages). Apply the Total cell style to B9 and D9:F9.

 

Ungroup the sheets, and then   insert a new worksheet. Change the sheet name to Summary. If any columns are too narrow to display   all the data, apply AutoFit to the column.

 

Move the Summary sheet so that   it is the first sheet in the workbook. In cell A1 of the Summary sheet, type Rosedale   Landscape and Garden   and then Merge & Center the title across the range A1:E1. Apply the Title   cell style. In cell A2, type June Commercial Salesperson Bonus Summary: California and then Merge & Center the   text across the range A2:E2. Apply the Heading 1 cell style.

 

In the range A5:A7, type the   following row titles and then apply the Heading 4 cell style:
Bonus
Base   Salary
Total   Compensation

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Describe The Technologies, Hardware, And Software Used Within The Information Technology Field Using Visio To Create A Diagram That Identifies The Networking Equipment Needed To Enable The Workflow Between These Employees.

Directions

The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.

The manager has provided the following employee descriptions:

  • Certified Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by the tax and data-entry specialist employees.
  • Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing taxes owed or maximizing tax refunds.
  • Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review.

For each employee, you must:

  • Describe all hardware components, including peripherals, needed to create the systems
  • Identify specific software programs (more than one) that would be beneficial to each identified employee. Programs could include:
    • Operating systems
    • Applications such as:
      • Office automation products
      • Security products
  • Describe security measures needed to support this system. Security measures could focus on:
    • Access
    • Administration and user passwords
    • Firewalls

Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components.

Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Tableau Assignment

In-Class Exercise: Calculated Fields

 

FILE to use: Telecommunications.twbx

Your task: recreate the dashboard depicted below exactly :

Important notes:

· “Dropped Call Percentage” is the percentage of “Attempted” calls that are “Dropped”

· In the bottom viz, there is only a label in cells that have a positive percentage of dropped calls

     
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Word Document Edit

  1. Open the ExpiredLetter-01.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  3. Apply the following formatting changes to the entire document:
    1. Select the entire document.
    2. Change the Before and After paragraph spacing to 0 pt.
    3. Change the line spacing to Single.
    4. Change the paragraph alignment to Left.
    5. Change the font and font size to Calibri and 11 pt.
  4. Turn on Show/Hide and press Enter at the end of each paragraph to add a blank line after each paragraph (including the last paragraph).
  5. Type and format the opening lines of the business letter.
    1. Press Ctrl+Home or move your insertion point to the top of the document.
    2. Type the current date (use January 1, 2020 format) and press Enter four times.
    3. Type the following inside address and press Enter two times after the last line:
      Mr. Rick Hermann
      9035 Masi Drive
      Fair Oaks, CA 95528
    4. Type Dear Mr. Hermann: as the salutation and press Enter two times after the salutation. One blank line displays between the salutation and the body of the letter.
    5. Add 72 pt. Before paragraph spacing to the date line.
  6. Type the closing lines of the business letter.
    1. Place your insertion point on the blank line below the last body paragraph and press Enter.
    2. Type Best regards, and press Enter four times.
    3. Type the following closing lines:
      Emma Cavalli
      Realtor Consultant
      Placer Hills Real Estate
    4. Press Enter two times after the company name and type your reference initials in lowercase letters.
  7. Move a paragraph and sentence.
    1. Move the third body paragraph so it appears before the second body paragraph. Confirm one blank line displays between each of the body paragraphs. If a blank space displays in front of the first word in the third paragraph, delete it.
    2. Move the last two sentences in the new second body paragraph (“A lot of detail . . .”) to the beginning of the paragraph. Verify proper spacing displays between sentences.
  8. Apply formatting to text in the business letter.
    1. Select “Placer Hills Real Estate” in the first body paragraph and apply Bold and Small caps formatting.
    2. Select the first sentence in the third paragraph including the period (“The service and experience . . .”) and apply Italic formatting.
    3. Select the writer’s name at the bottom and apply Small caps formatting.
    4. Select the writer’s title and apply Italic formatting.
    5. Select the company name below the writer’s title and apply Bold formatting.
  9. Use Smart Lookup to research selected words.
    1. Select “Fair Oaks” in the first body paragraph.
    2. Click the Smart Lookup button [References tab, Research group]. The Smart Lookup pane opens on the right.
    3. Review the research results in the Smart Lookup pane.
    4. Click the X in the upper-right corner of the Smart Lookup pane to close the pane.

      IMPORTANT: If this is the first time you have opened Smart Lookup, you will need Turn on intelligent services to let Office get web results for your highlighted text, and then continue to the next step. If you cannot turn on the services, skip the rest of this step and continue to step 10.

  10. Use the Read Aloud feature [Review tab, Speech group] to read the first two body paragraphs.
  11. Add the following document properties:
    1. TitleExpired Letter
    2. CompanyPlacer Hills Real Estate
    3. ManagerKelsey Kroll
    4. AuthorEmma Cavalli (right-click and choose Remove Person to remove existing author)
  12. Spell and grammar check the entire document, apply changes where necessary, and ignore proper nouns.
  13. Save and close the document (Figure 1-102).
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Battleship Java Program

Deliverables

To complete this assignment you must submit your compressed Netbeans project to Webcourses.  This requires you to submit a .zip, .rar, .tar, .tgz. etc… of the ENTIRE project.  Individual source code files will not be accepted.

 

Introduction

This assignment is to develop a User Interface using classes from the javax.swing package.

 

Tasks and Rubric

Activity
userInterface package  
BattleshipUI.java Add an import for

1.     core.BattleshipClient

2.     core.Ship

  Create an ActionListener for the Deploy Ships button that does the following:

1.     Disables the UI components on the JPanel with ship selection options

2.     Add a JPanel to the right of Player One’s button board with a JTextArea for displaying the game status to the user

3.     Add a JPanel to the right of the game status with Player Two’s button board

4.     Call the play() method in class BattleshipClient

  In the ActionListener for the Game Menu set the player mode based on what the user selected, the options are:

Player versus Player

Player versus Computer

Computer versus Computer

Example code:

if(e.getActionCommand().equals(“Player vs. Player”))

{                players[Constants.PLAYER_ONE].setPlayMode(Constants.HUMAN);                players[Constants.PLAYER_TWO].setPlayMode(Constants.HUMAN);

}

Player.java Add a class member to store the player’s mode, human or computer; create getter/setter for the class member
  Create a method that will automatically layout the ships for when the player mode is set to computer using the Random class to randomly select the direction and location for the startRowClick and startColumnClick; make sure the auto layout uses null for the color
PlayerOptionDialog.java Update the UI so that it reflects the saved data for each Player
core package  
BattleshipClient.java This class controls the game being played
  Create a custom constructor that takes two parameters, an Array of class Player and class BattleshipUI
  Create a method play() to manage the play between Player One and Player Two; for this iteration only Human versus Computer has to function
  When a JButton has been selected/clicked:

1.     if it is a hit

a.      change the background color to something other than the default gray(i.e. null) and the ship color (e.g.Color.BLACK)

b.     update the object instance so that the number of hits is increased or the hits left is decreased

2.     if it is a miss

a.      change the background color to something other than the default gray (i.e. null), the ship color, or the color used for a hit

  When a ship has 0 (zero) hits left or has taken the max number of hits update the ship so that isSunk = true; notify the user when each of their ships has been sunk
  Whichever player sinks all five opponent’s ships first wins the game!
functionality  
Compiles Source compiles with no errors
Runs Source runs with no errors
Comments Source includes comments
Total  

 

 

Figures

 

 

Figure 1 Initial display

 

 

Figure 2 Deployed Ships

 

 

Figure 3 Display Game Status and Player Two Panels

 

 

Figure 4 Play Between Human and Computer

 

 

 

Figure 5 End of Game

 

Figure 6 Player Options Dialog Before Player Selection

 

 

 

Figure 7 Player Options Dialog After Player Selection

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Wk 2 Discussion 3 [Due Tomorrow. Provide At Least On Answer And Respond To Each Peer]

Review this week’s course materials and learning activities, and reflect on your learning so far this week.

Respond to one or more of the following prompts in one to two paragraphs:

  1. Choose a topic from this week’s course materials, and summarize what you learned about the topic. Provide citation and reference to the material(s) you discuss. Describe what you found interesting regarding this topic, and why.
  2. Discuss a key knowledge, skill, or ability you gained from your learning this week. Describe how you will apply that learning in your daily life, including your work life.
  3. Describe 2 to 3 ideas, topics, or concepts from this week’s course materials for which you would like to learn more, and why. Describe what may be unclear to you, and what you would like to learn.

Students need to contribute two substantive posts in this discussion by the due date indicated. The substantive posts can be any combination of responses and replies.

Aligned with discussion (3)

  • 2.12.1 Summarize when a business should use metrics to measure strategic initiatives to achieve success.Goal Set & CategoryCMGT_556Course Objective

2.22.2 Plan an IT metrics effectiveness and efficiency strategy for an organization.

Goal Set & CategoryCMGT_556Course Objective

2.32.3 Discuss the impact the evolution of data, information, business intelligence, and knowledge has on organizations.

Goal Set & CategoryCMGT_556Course Objective

PEER 1 

Business process is a set of activities and or tasks when completed will be in a position to realize the goals of the organization. For business process to remain valid there is the need for involvement of the multiple defined input but a single output. The three most important types of business processes include management processes, operational processes and at the same time, supporting operations. All the operations are capitalized mutually to realize the goals of the organization. In its definition, it begins with mission objectives and is concluded with the achievement of the specific objectives. Therefore, in simpler words, the business process is the set of activities needed to accomplish a common goal in an organization.

PEER 2

“Metrics are measurements that evaluate results to determine whether a project is meeting its goals. Two core metrics are critical success factors and key performance indicators. Critical success factors (CSFs) are the crucial steps companies perform to achieve their goals and objectives and implement their strategies (see Figure 4.2). Key performance indicators (KPIs) are the quantifiable metrics a company uses to evaluate progress toward critical success factors. KPIs are far more specific than CSFs.” (Baltzan, 2018, ).

Before reading these chapter, I didn’t realize all the ways we have at our disposal to evaluate different operating procedures. Some of these methods are pretty simply practices to improve effectiveness. Being able to go through a simple method of running through each step and seeing if you need it or can improve it, helps to shave down a ton of unneeded or ineffective actions.

Reference:

´Baltzan, P. (2018). Business Driven Technology (7th ed.). Retrieved from The University of Phoenix eBook Collection database.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

CSIS 325 Final Exam (2019)

IMPORTANT: AFTER PURCHASE, LOG IN TO YOUR ACCOUNT AND SCROLL DOWN BELOW THIS PAGE TO DOWNLOAD FILES WITH ANSWERS.

Question 1   Use the following tables to answer the question below

Given the following Access SQL   SELECT statement:

SELECT eventplan.eventno,   eventrequest.datereq, dateauth, planno,workdate, empname

FROM (EventRequest INNER JOIN   EventPlan

ON EventRequest.eventno =   EventPlan.eventno)

LEFT JOIN employee ON   EventPlan.empno = employee.empno

WHERE eventrequest.datereq   BETWEEN #7/1/2007# AND #7/31/2007#

AND dateauth BETWEEN #7/1/2007#   AND #7/31/2007# AND status = “Approved”;

The   meaning of the SELECT statement is

Question 2 The following table represents what type of operation that has been performed   on STUDENT_1 and STUDENT_2 tables?

Question 3 A table that satisfies 2NF:

Question 4 Use the following table definitions to answer the question   below.

customer(custno, name, address, city, state, zip, phone, income)

asset(assetno, assetdesc, assettype)

service(servno, servdesc, servrate)

employee(empno, empname, emptitle)

pricehistory(assetnodate, price)

FOREIGN KEY assetno REFERENCES   asset

charge(chargenocustnoservno, starttime, endtime, empno, billed, amtpaid)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY servno REFERENCES   service

FOREIGN KEY empno REFERENCES   employee

holding(custnoassetno, qty)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY assetno REFERENCES   asset

trade(tradenocustnoassetno, qty, price, date, type, status)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY assetno REFERENCES   asset

What table contains a combined   primary key that represents a M-N relationship?

Question 5 Use the following tables to answer the question below

Given   the following Access SQL SELECT statement:

SELECT eventrequest.eventno,   custname, contact, dateauth

FROM eventrequest, customer

WHERE eventrequest.custno =   customer.custno AND status = “Approved”

AND eventno NOT IN

( SELECT eventno FROM eventplan

WHERE workdate BETWEEN   #10/1/2007# AND #10/31/2007#)

The SELECT statement

 

Question 6 Use the following tables to answer the question below

To load   the tables from text files, which load order will NOT cause a violation of   referential integrity

 

Question 7 Use the following tables to answer the question below

Given the following Access SQL   SELECT statement:

SELECT eventplan.eventno,   eventrequest.datereq, dateauth, planno, workdate, empname

FROM (EventRequest INNER JOIN   EventPlan

ON EventRequest.eventno =   EventPlan.eventno)

LEFT JOIN employee ON   EventPlan.empno = employee.empno

WHERE eventrequest.datereq   BETWEEN #7/1/2007# AND #7/31/2007#

AND dateauth BETWEEN #7/1/2007#   AND #7/31/2007# AND status = “Approved”;

The   FROM clause of the SELECT statement

Question 8 Which table below is union compatible with the Student_1 and Student_2 tables?

Question 9

CUSTOMER (primary key = CID)

RENTALS (primary key = RTN)

In the table RENTALS, RTN   provides the rental number (it is the primary key), CID refers to the CID in   CUSTOMER, PICKUP is the city where the car was (or will be) picked up and   Return is the city where the car was (or will be) returned, VIN is a foreign   key that references the table CAR. The rental company has two branches, one   in San Diego (SD) and one in Los Angeles (LA). Cars are picked up and   returned by the customers at these two locations.

RENTCOST

In RENTCOST, COST shows the   base cost of renting a given MAKE for one day.

CAR

The table CAR (primary key =   VIN) provides information about each car, in particular if it is currently   rented, and where its usual storage location is (attribute AT).

CREATE VIEW CUST_SD AS

SELECT * FROM CUSTOMER

WHERE Cregion = ‘SD’

CREATE VIEW CUST_40D AS

SELECT CNAME, RENTALS.MAKE,   RENTCOST.COST

FROM CUSTOMER, RENTALS,   RENTCOST

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.MAKE =   RENTCOST.MAKE

AND RENTCOST < 40

CREATE VIEW Make_View (Make,   NumRentals, Cregion, Storageat) AS

SELECT RENTALS.MAKE, Count   (RTN), Cregion, AT

FROM CUSTOMER, RENTALS, CAR

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.VIN = CAR.VIN

GROUP BY RENTALS.MAKE, Cregion,   At

The maximum value in the column   Storageat of the view Make_View is:

 

Question 10 The following SQL query is an   example of a _____________________ join.

SELECT   FacNo, FacFirstName, FacLastName, FacSalary, StdNo

FROM Faculty RIGHT JOIN Student

ON Student.StdNo =   Faculty.FacNo

Question 11 The following SQL query is an   example of a _____________________ join.

SELECT FacNo, FacFirstName,   FacLastName, FacSalary, StdNo

FROM Faculty LEFT JOIN Student

ON Student.StdNo = Faculty.FacNo

 

Question 12 A table that satisfies BCNF:

 

Question 13 Use the following tables to answer the question below

List   the event number, customer name, plan number, employee name, facility name,   work date, and activity for event plans.  The result should show only   event plans with a work date in October 2007.
How   many tables appear in the FROM clause assuming that no nested queries are   used?

 

Question 14

CUSTOMER (primary key = CID)

RENTALS   (primary key = RTN)

In the table RENTALS, RTN   provides the rental number (it is the primary key), CID refers to the CID in   CUSTOMER, PICKUP is the city where the car was (or will be) picked up and   Return is the city where the car was (or will be) returned, VIN is a foreign   key that references the table CAR. The rental company has two branches, one   in San Diego (SD) and one in Los Angeles (LA). Cars are picked up and   returned by the customers at these two locations.

RENTCOST

In RENTCOST, COST shows the   base cost of renting a given MAKE for one day.

CAR

The table CAR (primary key =   VIN) provides information about each car, in particular if it is currently   rented, and where its usual storage location is (attribute AT).
CREATE   VIEW CUST_SD AS

SELECT * FROM CUSTOMER

WHERE Cregion = ‘SD’

CREATE VIEW CUST_40D AS

SELECT CNAME, RENTALS.MAKE,   RENTCOST.COST

FROM CUSTOMER, RENTALS,   RENTCOST

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.MAKE =   RENTCOST.MAKE

AND RENTCOST < 40

CREATE VIEW Make_View (Make,   NumRentals, Cregion, Storageat) AS

SELECT RENTALS.MAKE, Count   (RTN), Cregion, AT

FROM CUSTOMER, RENTALS, CAR

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.VIN = CAR.VIN

GROUP BY RENTALS.MAKE, Cregion,   At

There   is a request to execute the two following SQL commands in the order shown:

CREATE VIEW CUST1 AS

SELECT CNAME, AGE FROM CUSTOMER

UPDATE CUST_SD

SET AGE = AGE +1

Select   the most appropriate statement:

 

Question 15 After execution of this SQL   query

SELECT CID, CName

FROM  Customer

WHERE  (SELECT COUNT(*)   FROM Rentals WHERE Customer.CID = Rentals.CID) = 0

The   execution of this query produces the following number of rows:

Question 16 The entity integrity rule

Question 17 The following SQL query is an   example of a _____________________ join.

SELECT   FacNo, FacFirstName, FacLastName, FacSalary, StdNo

FROM Faculty, Student

WHERE Student.StdNo =   Faculty.FacNo

Question 18 A table in 1NF in which the unique   candidate key consists of two of its three attributes:

Question 19 Use the following tables to answer the question below

Null   values in the column EventRequest.DateAuth represent

 

Question 20 Use the following tables to answer the question below The   combination of columns, EventPlan.PlanNo and EventPlan.EventNo, is a

Question 21 Given the following query:

SELECT CID FROM Customer

WHERE CID IN(SELECT DISTINCT   CID FROM Rentals WHERE Make = ‘FORD’)

The meaning of this query is   the following:

 

Question 22 Use the following tables to answer the question below

Using the tables listed above,   a natural join of the EventPlanLine and Location tables contains how many   rows?

 

Question 23 What query produces the same   results as the one below?

SELECT Student.StdNo,   Student.StdFirstName, Student.StdLastName, Student.StdMajor

FROM Student

WHERE EXISTS (SELECT * FROM   Enrollment

WHERE Enrollment.StdNo =    Student.StdNo )

 

Question 24 What field is redundant in the   Rentals table?

Question 25 For a violation of 2NF to occur in   a table in 1NF, the following condition(s) must exist:

CUSTOMER (primary key = CID)

RENTALS (primary key = RTN)

In the table RENTALS, RTN   provides the rental number (it is the primary key), CID refers to the CID in   CUSTOMER, PICKUP is the city where the car was (or will be) picked up and   Return is the city where the car was (or will be) returned, VIN is a foreign   key that references the table CAR. The rental company has two branches, one   in San Diego (SD) and one in Los Angeles (LA). Cars are picked up and   returned by the customers at these two locations.

RENTCOST

In RENTCOST, COST shows the   base cost of renting a given MAKE for one day.

CAR

The   table CAR (primary key = VIN) provides information about each car, in   particular if it is currently rented, and where its usual storage location is   (attribute AT).

CREATE VIEW CUST_SD AS

SELECT * FROM CUSTOMER

WHERE Cregion = ‘SD’
CREATE VIEW   CUST_40D AS

SELECT CNAME, RENTALS.MAKE,   RENTCOST.COST

FROM CUSTOMER, RENTALS,   RENTCOST

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.MAKE =   RENTCOST.MAKE

AND RENTCOST < 40

CREATE   VIEW Make_View (Make, NumRentals, Cregion, Storageat) AS

SELECT RENTALS.MAKE, Count   (RTN), Cregion, AT

FROM CUSTOMER, RENTALS, CAR

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.VIN = CAR.VIN

GROUP BY RENTALS.MAKE, Cregion,   At

SELECT * FROM CUST_SD

WHERE AGE < 25

The   number of rows displayed by this SELECT statement is:

Question 27 Under the MapReduce model,   the data processing primitives are called

Question 28

Use the following table definitions to answer the question   below.

customer(custno, name, address, city, state, zip, phone, income)

asset(assetno, assetdesc, assettype)

service(servno, servdesc, servrate)

employee(empno, empname, emptitle)

pricehistory(assetnodate, price)

FOREIGN KEY assetno REFERENCES   asset

charge(chargenocustnoservno, starttime, endtime, empno, billed, amtpaid)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY servno REFERENCES   service

FOREIGN KEY empno REFERENCES   employee
holding(custnoassetno, qty)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY assetno REFERENCES   asset

trade(tradenocustnoassetno, qty, price, date, type, status)

FOREIGN KEY custno REFERENCES   customer

FOREIGN KEY assetno REFERENCES   asset

Null values in the column   Charge.EmpNo represent

Question 29

After execution of this SQL   query

SELECT Customer.CName, SUM(Cost   * Days) AS TotalCost

FROM Customer, Rentals,   Rentcost

WHERE Customer.CID =   Rentals.CID

AND Rentals.Make =   RentCost.Make

AND Rentals.Make = ‘FORD’

GROUP BY CNAME

The   execution of this query lists the following TotalCost:

Question 30

CUSTOMER (primary key = CID)

RENTALS (primary key = RTN)

In the table RENTALS, RTN   provides the rental number (it is the primary key), CID refers to the CID in   CUSTOMER, PICKUP is the city where the car was (or will be) picked up and   Return is the city where the car was (or will be) returned, VIN is a foreign   key that references the table CAR. The rental company has two branches, one   in San Diego (SD) and one in Los Angeles (LA). Cars are picked up and   returned by the customers at these two locations.

RENTCOST

In RENTCOST, COST shows the   base cost of renting a given MAKE for one day.

CAR

The table CAR (primary key =   VIN) provides information about each car, in particular if it is currently   rented, and where its usual storage location is (attribute AT).

CREATE VIEW CUST_SD AS

SELECT * FROM CUSTOMER

WHERE Cregion = ‘SD’

CREATE   VIEW CUST_40D AS

SELECT CNAME, RENTALS.MAKE,   RENTCOST.COST

FROM CUSTOMER, RENTALS,   RENTCOST

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.MAKE =   RENTCOST.MAKE

AND RENTCOST < 40

CREATE VIEW Make_View (Make,   NumRentals, Cregion, Storageat) AS

SELECT RENTALS.MAKE, Count   (RTN), Cregion, AT

FROM CUSTOMER, RENTALS, CAR

WHERE CUSTOMER.CID =   RENTALS.CID

AND RENTALS.VIN = CAR.VIN

GROUP BY RENTALS.MAKE, Cregion,   At

The   view Make-View provides the following information:

Question 31 Which of the following will   usually not result in a faster execution of an SQL query?

Question 32 Since the objective of   physical database design is to minimize the combined demand of all   applications using the database, it is usually necessary to balance the   sometimes conflicting needs of both retrieval and update applications.

Question 33 Which of the following is not   a good candidate for a clustering index?

Question 34 The storage level is close   to:

Question 35 When a logical record   requested by an application is already in memory, which of the following is   not true?

Question 36 After the crash of a disk   containing the database, which of the following tools will need to be used   for recovery?

Question 37 An operating system failure   affects all active transactions, while a device failure affects all active   transactions plus all committed transactions that have been recorded on the   disk that failed.

Question 38 It is possible to detect   deadlocks in a database system by doing the following:

Question 39 Which one of the following   isolation levels does not prevent the uncommitted dependency problem?

Question 40 The redo operation:

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

9-1 Final Project Submission: Security Awareness Program Proposal

PROJECT PROPOSAL 1

PROJECT PROPOSAL 3

Security Awareness Program Proposal

Chaston Carter

Human Factors in Security

02/25/17

Security Awareness Program Proposal

In light of my recent move to an organization without a security awareness program, as a chief information security information officer. I have been tasked with drawing a proposal for this organization. The need for this proposal is to implement organizational threats, and a protection awareness program with the potential to help this organization with the appropriate network and IT-enabled devices and security practices. As well, as the need for this proposal is for the identification of likely vulnerabilities of the organization’s system. The overall purpose of this proposal is to address the company’s CEO’s concerns about risks that may be brought about by a breach of the company’s system security.

Based on the above introductory statements, this proposal seeks to highlight on security postures to be addressed by the security awareness program proposal. Likewise, the paper will assess human factors contribution and associated factors within an organization that contributes to the status of security posture. To begin with, security posture refers to an overall plan for system security of an organizational. This is usually from the planning to the implementation stages which comprise of non-technical and technical controls, policies and procedures. Usually, security postures are meant to address policies, communication, user awareness, training, risk assessment, and controls within management practices in an organization’s system security.

With this in mind, the proposal seeks to ratify a security model that conforms to next generation technology. This is a view of addressing threats that may come by in the future at elevated levels. Additionally, based on security posture the proposal seeks to align initiatives towards security on the requirements of the organization. Likewise, the need to develop a culture of security accountability and inclusion will be drafted. Moreover, this model will include other factors that are often overlooked such as time, resources and the human element. Nevertheless, the major concentration will be on the human element.

The human element is a phenomenal threat to an organization’s system security. This may be through mistakes or lack of an understanding by the employees of their role in supporting security procedures and processes. In this light, this proposal seeks to recommend a model for analyzing the role of human factors in an organization’s security. This is for the use of the goal-driven risk management and force field analysis methods of human factor analysis. Likewise, the proposal will offer more insight on how changing behaviors, attitudes, and beliefs of employees may improve the security posture of an organization’s information system. As well, the proposal will highlight the importance of information sharing and effective training programs whose aim is in reducing the risk of lack of understanding and human error in an organization’s information security.

However, despite looking at the human factor, this proposal seeks to reflect at other aspects within the organization that has a contribution to security posture. This is beyond the scope of social and human elements. These factors are organizational policies, organizational culture, and management philosophy which expediently play a huge role in shaping the security posture of an organization’s security posture.

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

C10; Introduction To Computers Assignment 8; Business Consulting

C10; Introduction to Computers Assignment 8; Business Consulting

C10; Introduction to Computers
Assignment 8; Business Consulting
Remember Bill? He was the gentleman that you helped to start up his business in week 4. Well his business is doing well, but he has come to you with some questions and concerns. You discuss each of these with Bill and promise to send him a written report with your suggestions and recommendations. Submit your written response to Bill’s questions and concerns below.
1. Bill has set up a spreadsheet in Excel that will help him keep track of expenses. So far, he has this:

Tell Bill how to do the following tasks:
• What formula or function does he put in Column F that will show the total expenses for each day?
• What formula or function does he put in columns B through F in Row 13 that will give him the total expenses for the week in each category?
• Bill wants the entry in Column G to remind him of expenses that require receipts for the accountant. Tell Bill what to put in Column G to do this:
a. Print the word “Yes” in any row where the total daily expenses are greater than or equal to $100.00.
b. If the daily expenses total is less than $100.00, leave the Column G entry for that row blank.
2. Bill’s business is already expanding. He thinks that in a few weeks, he will need to hire one or two employees to help him. He knows that each new employee will need their own computer. He is also making the necessary changes so that the new employees will be working in a spare room in Bill’s house. Explain to Bill what networking options he has. Go through each type or configuration of network possible for him, making sure that you explain the pros and cons of each configuration. Finish with your suggestion for the network that he should set up and explain what new hardware will be required to do this.
3. With the possibility of three business computers in his home, and all of his business records possibly vulnerable, this would be a good time to advise Bill on how to set up a routine plan to protect and defend his new network. Provide a list of the five most important concerns for safety and security of the network and the computers in the network. For each concern, specify the action to be taken, and if applicable, what software you recommend be added to the system. Justify each of your recommendations.

Your proposal will be evaluated using the rubric below. Make sure you read the rubric and have a clear idea of what is expected. If there are any additional questions that you would have asked Bill be sure to note them as you explain to Bill what networking options he has so that you can explain what additional information could change your suggestion if any.
?
Rubric

Print this page

Format Requirements
Use the following format requirements on all submissions.
Writing Style APA (American Psychological Association)

Note: To find detailed information on APA manuscript style guidelines on the Internet, go to www.apastyle.org.

Margins 1” all sides

Paragraphs Single-space
Double-space between paragraphs
Indent first line of each paragraph

Headings Bold

Type Style and Size Times New Roman, 12 point

Software MS Word
Student/Assignment Information
The following information should be on the first page on the top left side of the page in the format provided below. Do not provide a cover sheet (unless the assignment requires one).
Student Name

Student Identification Number

Course Number and Title

Assignment Number and Title

Date of Submission

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!