PSEUDOCODE

Write the pseudocode using modules and show how your module will be called for the following example:

BMI is often used to determine whether a person is overweight or underweight based on height and weight. The calculation uses the following formula:

BMI = Weight x 703/Height2

Design a program that calculates and displays a person’s body mass index (BMI).

Your 3-4 page document must include:

  • Pseudo code for the entire program.
  • Internal documentation, using block and/or line comments.
  • You must declare all variables before using them in your pseudo code. Don’t forget that variables are just names. You need to assign values to variables. For example:
    Set price = 20
    Or
    Set dollars = 2.75
  • Your pseudo code must illustrate all calculations and modules called.

 

Create a flowchart showing how your module will be called for the BMI example from your Module 03 lab:

BMI is often used to determine whether a person is overweight or underweight based on height and weight. The calculation uses the following formula:

BMI = Weight x 703/Height2

Design a program that calculates and displays a person’s body mass index (BMI)

Your submission must include:

  • You may use Microsoft Visio or http://draw.io/ to create your flowchart and export the drawing as a JPG. Paste your image in your Word document with your pseudo code. Use File >> Export As >> Image.
  • Your flowchart must depict each step in the program, as well as the module.
  • Your flowchart must use 3 types of symbols: ovals (start and end terminal symbols), parallelograms (input and output symbols), and rectangles (processing symbols).
  • All symbols must be connected by arrows that represent the flow of the program. The flow must make logical sense.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Basic Optimization

ISYE 6740 Homework 3

Total 100 points.

1. Basic optimization. (30 points.)

Consider a simplied logistic regression problem. Given m training samples (xi; yi), i = 1; : : : ;m.

The data xi 2 R (note that we only have one feature for each sample), and yi 2 f0; 1g. To t a

logistic regression model for classication, we solve the following optimization problem, where 2 R

is a parameter we aim to nd:

max

`(); (1)

where the log-likelhood function

`() =

Xm

i=1

f???? log(1 + expf????xig) + (yi ???? 1)xig :

(a) (10 points) Show step-by-step mathematical derivation for the gradient of the cost function `()

in (1) and write a pseudo-code for performing gradient descent to nd the optimizer . This is

essentially what the training procedure does. (pseudo-code means you will write down the steps

of the algorithm, not necessarily any specic programming language.)

(b) (10 points) Present a stochastic gradient descent algorithm to solve the training of logistic

regression problem (1).

(c) (10 points) We will show that the training problem in basic logistic regression problem

is concave. Derive the Hessian matrix of `() and based on this, show the training problem (1)

is concave (note that in this case, since we only have one feature, the Hessian matrix is just a

scalar). Explain why the problem can be solved eciently and gradient descent will achieve a

unique global optimizer, as we discussed in class.

2. Comparing Bayes, logistic, and KNN classiers. (30 points)

In lectures we learn three dierent classiers. This question is to implement and compare them. We are

suggest use Scikit-learn, which is a commonly-used and powerful Python library with various machine

learning tools. But you can also use other similar library in other languages of your choice to perform

the tasks.

Part One (Divorce classication/prediction). (20 points)

This dataset is about participants who completed the personal information form and a divorce predic-

tors scale.

The data is a modied version of the publicly available at https://archive.ics.uci.edu/ml/datasets/

Divorce+Predictors+data+set (by injecting noise so you will not replicate the results on uci web-

site). There are 170 participants and 54 attributes (or predictor variables) that are all real-valued. The

dataset marriage.csv. The last column of the CSV le is label y (1 means \divorce”, 0 means \no

divorce”). Each column is for one feature (predictor variable), and each row is a sample (participant).

A detailed explanation for each feature (predictor variable) can be found at the website link above.

Our goal is to build a classier using training data, such that given a test sample, we can classify (or

essentially predict) whether its label is 0 (\no divorce”) or 1 (\divorce”).

1

Build three classiers using (Naive Bayes, Logistic Regression, KNN). Use the rst 80% data for

training and the remaining 20% for testing. If you use scikit-learn you can use train test split to split

the dataset.

Remark: Please note that, here, for Naive Bayes, this means that we have to estimate the variance for

each individual feature from training data. When estimating the variance, if the variance is zero to

close to zero (meaning that there is very little variability in the feature), you can set the variance to

be a small number, e.g., = 10????3. We do not want to have include zero or nearly variance in Naive

Bayes. This tip holds for both Part One and Part Two of this question.

(a) (10 points) Report testing accuracy for each of the three classiers. Comment on their perfor-

mance: which performs the best and make a guess why they perform the best in this setting.

(b) (10 points) Use the rst two features to train three new classiers. Plot the data points and

decision boundary of each classier. Comment on the dierence between the decision boundary

for the three classiers. Please clearly represent the data points with dierent labels using dierent

colors.

Part Two (Handwritten digits classication). (10 points) Repeat the above using the MNIST

Data in our Homework 2. Here, give \digit” 6 label y = 1, and give \digit” 2 label y = 0. All the

pixels in each image will be the feature (predictor variables) for that sample (i.e., image). Our goal

is to build classier to such that given a new test sample, we can tell is it a 2 or a 6. Using the rst

80% of the samples for training and remaining 20% for testing. Report the classication accuracy on

testing data, for each of the three classiers. Comment on their performance: which performs the best

and make a guess why they perform the best in this setting.

3. Naive Bayes for spam ltering. (40 points)

In this problem we will use the Naive Bayes algorithm to t a spam lter by hand. This will en-

hance your understanding to Bayes classier and build intuition. This question does not involve any

programming but only derivation and hand calculation.

Spam lters are used in all email services to classify received emails as \Spam” or \Not Spam”. A

simple approach involves maintaining a vocabulary of words that commonly occur in \Spam” emails

and classifying an email as \Spam” if the number of words from the dictionary that are present in the

email is over a certain threshold. We are given the vocabulary consists of 15 words

V = fsecret, oer, low, price, valued, customer, today, dollar, million, sports, is, for, play, healthy, pizzag:

We will use Vi to represent the ith word in V . As our training dataset, we are also given 3 example

spam messages,

• million dollar oer

• secret oer today

• secret is secret

and 4 example non-spam messages

• low price for valued customer

• play secret sports today

• sports is healthy

• low price pizza

2

Recall that the Naive Bayes classier assumes the probability of an input depends on its input feature.

The feature for each sample is dened as x(i) = [x(i)

1 ; x(i)

2 ; : : : ; x(i)

d ]T , i = 1; : : : ;m and the class of the

ith sample is y(i). In our case the length of the input vector is d = 15, which is equal to the number

of words in the vocabulary V . Each entry x(i)

j is equal to the number of times word Vj occurs in the

i-th message.

(a) (5 points) Calculate class prior P(y = 0) and P(y = 1) from the training data, where y = 0

corresponds to spam messages, and y = 1 corresponds to non-spam messages. Note that these

class prior essentially corresponds to the frequency of each class in the training sample.

(b) (10 points) Write down the feature vectors for each spam and non-spam messages.

(c) (15 points) In the Naive Bayes model, assuming the keywords are independent of each other (this

is a simplication), the likelihood of a sentence with its feature vector x given a class c is given

by

P(xjy = c) =

Yd

k=1

xk

c;k; c = f0; 1g

where 0 c;k 1 is the probability of word k appearing in class c, which satises

Xd

k=1

c;k = 1; 8c:

Given this, the complete log-likelihood function for our training data is given by

`(1;1; : : : ; 1;d; 2;1; : : : ; 2;d) =

Xm

i=1

Xd

k=1

x(i)

k log y(i);k

(In this example, m = 7.) Calculate the maximum likelihood estimates of 0;1, 0;7, 1;1, 1;15 by

maximizing the log-likelihood function above. (Hint: We are solving a constrained maximization

problem. To do this, remember, you need to introduce two Lagrangian multiplier because you

have two constraints.)

(d) (10 points) Given a test message \today is secret”, using the Naive Bayes classier that you have

trained in Part (a)-(c), to calculate the posterior and decide whether it is spam or not spam.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Java Homework

(Note: I have attached the book below)

(pg number 971)

24.3:  (Implement a doubly linked list) The MyLinkedList class used in Listing 24.5 is

a one-way directional linked list that enables one-way traversal of the list. Modify

the Node class to add the new data field name previous to refer to the previous

node in the list, as follows:

public class Node<E> {

E element;

Node<E> next;

Node<E> previous;

public Node(E e) {

element = e;

}

}

Implement a new class named TwoWayLinkedList that uses a doubly linked list

to store elements. Define TwoWayLinkedList to implements MyList. You need

to implement all the methods defined in MyLinkedList as well as the methods

listIterator() and listIterator(int index). Both return an instance of

java.util.ListIterator<E> (see Figure 20.4). The former sets the cursor to

the head of the list and the latter to the element at the specified index.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

CO SCI Simnet Project Access Ch 4 Fix It 4.6

CustomerID FirstName LastName StreetAddress City ZipCode Phone Newsletter
AG01 Antonio Gonzalez 702 Columbia Road West Palm Beach 33403 5615559361 true
AW01 Anthony Willett 1274 Valley Street West Palm Beach 33412 5615557939 false
BG01 Bruce Garber 1107 Murry Street Ft. Lauderdale 33312 9545554473 true
CF01 Caroline Fredette 4123 Five Points West Palm Beach 33403 5615550634 false
CS01 Charlotte Sager 749 Petunia Way Miami 33156 3055552879 true
DB01 Dale Brown 4849 Sunrise Road West Palm Beach 33401 5615552312 false
DD01 David Duron 1317 Everette Lane West Palm Beach 33414 5615555510 false
DT01 Danny Tweed 711 Duke Lane Miami 33183 3055557623 false
EM01 Emily McNabb 3633 Armbrester Drive Miami 33134 3055557363 false
GE01 Genevieve Eades 1941 Collins Avenue West Palm Beach 33401 5615554819 false
GP01 Gerald Price 3735 Jadewood Drive Ft. Lauderdale 33312 9545556754 false
HH01 Heidi Hartzell 2204 Plainfield Avenue Ft. Lauderdale 33301 9545553859 true
JA01 Joe Alleyne 2086 Lewis Street Miami 33176 3055553748 true
JB01 Juan Bettencourt 4769 Pinewood Avenue West Palm Beach 33412 5615554509 true
JC01 John Castellano 56 Waldeck Street Miami 33176 3055557731 false
JD01 Jeff Defelice 2202 Boone Street Miami 33134 3055559012 true
JM01 Jason Mayer 2331 Upland Avenue Miami 33183 3055551956 false
JW01 Jeffery Weldon 3775 Willow Oaks Lane Ft. Lauderdale 33305 9545556243 true
MB01 Melinda Bocanegra 355 Garrett Street Miami 33156 3055555648 true
MN01 Marvin Numbers 4630 Meadowcrest Lane Ft. Lauderdale 33305 9545554366 true
MZ01 Min Zhou 3952 Hewes Avenue Ft. Lauderdale 33316 9545554386 false
NG01 Nora Gomez 3182 Roguski Road Ft. Lauderdale 33316 9545559177 true
NW01 Nathan Westmoreland 4066 Glen Street West Palm Beach 33414 5615550096 true
PE01 Philip Elson 2905 Washington Street Miami 33186 3055551028 false
RR01 Russell Rand 3320 Sharon Lane West Palm Beach 33417 5615552958 true
RR02 Ronald Rayner 3670 Beechwood Drive West Palm Beach 33417 5615551141 true
RS01 Roberta Storm 2191 Jarvis Street Miami 33186 3055550049 true
RW01 Ralph Whitacre 590 Grant View Drive Ft. Lauderdale 33304 9545554512 true
SD01 Steve Diggs 2860 Godfrey Road Ft. Lauderdale 33304 9545551017 false
TW01 Thomas Walk 2474 Croft Drive Ft. Lauderdale 33301 9545559960 false
PetID AnimalType Breed MainColor AgeInMonths AdoptionFee Field1
144601 Cat Bengal Brown 3 ¤ 50.00
147883 Dog Fox Terrier White 5 ¤ 95.00
208636 Dog Siberian Husky Gray 3 ¤ 180.00
217716 Cat American Shorthair White 2 ¤ 20.00
236936 Dog Bull Terrier White 3 ¤ 135.00
267349 Cat Siamese Beige 4 ¤ 35.00
308359 Dog Labrador Retriever Brown 4 ¤ 120.00
366426 Dog Pomeranian Beige 3 ¤ 145.00
382848 Dog American Eskimo Dog White 5 ¤ 220.00
412745 Dog Chihuahua Brown 4 ¤ 90.00
451472 Cat Turkish Angora White 3 ¤ 95.00
453557 Dog Boxer Beige 3 ¤ 210.00
458263 Dog Poodle White 4 ¤ 75.00
466448 Cat American Shorthair Calico 2 ¤ 20.00
481238 Dog Chihuahua White 4 ¤ 75.00
495646 Dog Dachshund Brown 3 ¤ 105.00
519192 Dog Labrador Retriever Brown 4 ¤ 165.00
520691 Cat American Bobtail Brown Tabby 4 ¤ 30.00
571764 Cat Himalayan White 5 ¤ 60.00
599703 Cat American Shorthair Black 4 ¤ 20.00
661399 Cat Savannah Beige Tabby 5 ¤ 105.00
665054 Dog Irish Setter Brown 5 ¤ 175.00
678221 Cat Persian White 4 ¤ 100.00
718056 Cat Scottish Fold Gray 4 ¤ 75.00
723951 Dog Golden Retriever Beige 5 ¤ 180.00
763290 Cat American Shorthair Orange Tabby 2 ¤ 20.00
796859 Cat Manx Gray Tabby 3 ¤ 50.00
797129 Cat American Shorthair Silver Tabby 3 ¤ 20.00
831176 Dog Old English Sheepdog White 4 ¤ 175.00
858070 Cat Maine Coon Gray Tabby 3 ¤ 75.00
883940 Dog Giant Schnauzer Black 4 ¤ 110.00
909445 Dog Labrador Retriever Chocolate 4 ¤ 150.00
910387 Dog Cocker Spaniel Beige 3 ¤ 145.00
SELECT Pets.PetID, Pets.AnimalType, Pets.Breed, Pets.MainColor, Pets.AgeInMonths FROM Pets WHERE (((Pets.AgeInMonths)=0));
SELECT Customers.CustomerID, Customers.FirstName, Customers.LastName, Customers.Phone, Customers.Newsletter FROM Customers;
SELECT Customers.FirstName, Customers.LastName, Customers.StreetAddress, Customers.City, Customers.ZipCode, Customers.Phone, Customers.Newsletter FROM Customers WHERE (((Customers.LastName)=”B”)) OR (((Customers.LastName)=”W”));
SELECT Pets.AnimalType, Pets.Breed, Pets.MainColor, Pets.AgeInMonths, Pets.AdoptionFee FROM Pets WHERE (((Pets.AnimalType)=”Dog”)) OR (((Pets.AgeInMonths)=4));
SELECT Pets.AnimalType, Pets.Breed, Pets.MainColor, Pets.AgeInMonths, Pets.AdoptionFee, 1.1 AS AdoptionFee FROM Pets;
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Homework Assignment: Module 2 – Process Analysis 10 Questions 1. Posh Nails Katie Posh Runs

Homework Assignment: Module 2 – Process Analysis 10 questions 1. Posh Nails Katie Posh runs an upscale nail salon. The service process includes five activities that are conducted in the sequence described below. (The time required for each activity is shown in parentheses):Activity 1: Welcome a guest. (1 minute)Activity 2: Clip and file nails. (3 minutes)Activity 3: Paint. (5 minutes)Activity 4: Dry. (10 minutes)Activity 5: Check out the customer. (4 minutes)Three servers (S1, S2, and S3) offer the services in a worker-paced line. The assignment of tasks to servers is the following: S1 does Activity 1. S2 does Activities 2 and 3. S3 does Activities 4 and 5. The drying process does not require server 3’s constant attention; she/he needs to only escort the customer to the salon’s drying chair (equipped with fans for drying). The time to do this is negligible. There exists only one drying chair in the salon. Which resource is the bottleneck of the process? Dryer chair S3S2S12. Posh Nails Katie Posh runs an upscale nail salon. The service process includes five activities that are conducted in the sequence described below. (The time required for each activity is shown in parentheses): Activity 1: Welcome a guest. (1 minute)Activity 2: Clip and file nails. (3 minutes)Activity 3: Paint. (5 minutes)Activity 4: Dry. (10 minutes)Activity 5: Check out the customer. (4 minutes)Three servers (S1, S2, and S3) offer the services in a worker-paced line. The assignment of tasks to servers is the following: S1 does Activity 1. S2 does Activities 2 and 3. S3 does Activities 4 and 5. The drying process does not require server 3’s constant attention; she/he needs to only escort the customer to the salon’s drying chair (equipped with fans for drying). The time to do this is negligible. There exists only one drying chair in the salon. What is the utilization of server 2 (in decimal form)? Assume that there is unlimited demand and that the process only admits customers at the rate of the bottleneck. Enter answer here3. Posh Nails Katie Posh runs an upscale nail salon. The service process includes five activities that are conducted in the sequence described below. (The time required for each activity is shown in parentheses):Activity 1: Welcome a guest. (1 minute) Activity 2: Clip and file nails. (3 minutes)Activity 3: Paint. (5 minutes) Activity 4: Dry. (10 minutes) Activity 5: Check out the customer. (4 minutes)Three servers (S1, S2, and S3) offer the services in a worker-paced line. The assignment of tasks to servers is the following: S1 does Activity 1. S2 does Activities 2 and 3. S3 does Activities 4 and 5. The drying process does not require server 3’s constant attention; she/he needs to only escort the customer to the salon’s drying chair (equipped with fans for drying). The time to do this is negligible. There exists only one drying chair in the salon. What is the average labor utilization of the servers (in decimal form)? Assume that there is unlimited demand and that the process only admits customers at the rate of the bottleneck. Enter answer here4. Posh NailsKatie Posh runs an upscale nail salon. The service process includes five activities that are conducted in the sequence described below. (The time required for each activity is shown in parentheses):Activity 1: Welcome a guest. (1 minute) Activity 2: Clip and file nails. (3 minutes)Activity 3: Paint. (5 minutes)Activity 4: Dry. (10 minutes)Activity 5: Check out the customer. (4 minutes)Three servers (S1, S2, and S3) offer the services in a worker-paced line. The assignment of tasks to servers is the following: S1 does Activity 1. S2 does Activities 2 and 3. S3 does Activities 4 and 5. The drying process does not require server 3’s constant attention; she/he needs to only escort the customer to the salon’s drying chair (equipped with fans for drying). The time to do this is negligible. There exists only one drying chair in the salon. Assume a wage rate of $12 per hour. What are the direct labor costs for one customer (in dollars)? Enter answer here 5. BN1. Butternut is a ski resort in Massachusetts. One of their triple chair lifts unloads 1296 skiers per hour at the top of the slope. (A triple chair lift can carry three passengers per chair. Note that each lift contains multiple chairs.) The ride from the bottom to the top takes 5 minutes. On average, how many skiers are riding on the lift at any one time? Enter answer here 6. Tech Company is a medium-sized consumer electronics retailer. The company reported $155,000,000 in revenues for 2007 and $110,050,000 in Costs of Goods Sold (COGS). In the same year, Tech Co. held an average of $20,000,000 in inventory. How many times did Tech Co. turn its inventory in 2007? Enter answer here7. Tech Company is a medium-sized consumer electronics retailer. The company reported $155,000,000 in revenues for 2007 and $110,050,000 in Costs of Goods Sold (COGS). In the same year, Tech Co. held an average of $20,000,000 in inventory. Inventory cost at Tech Co. is 35 percent per year. What is the per unit inventory cost (in dollars) for an MP3 player sold at $50? Assume that the margin corresponds to the retailer’s average margin. Enter answer here8. The Gamer Company is a video game production company that specializes in educational video games for kids. The company’s R&D department is always looking for great ideas for new games. On average, the R&D department generates about 25 new ideas a week. To go from idea to approved product, the idea must pass through the following stages: paper screening (a 1-page document describing the idea and giving a rough sketch of the design), prototype development, testing, and a focus group. At the end of each stage, successful ideas enter the next stage. All other ideas are dropped. The following chart depicts this process, and the probability of succeeding at each stage. The paper screening for each idea takes 2 hours of a staff member’s time. After that, there is a stage of designing and producing a prototype. A designer spends 4 hours designing the game in a computer-aided-design (CAD) package. The actual creation of the mock-up is outsourced to one of many suppliers with essentially limitless capacity. It takes 4 days to get the prototype programmed, and multiple prototypes can be created simultaneously. A staff member of the testing team needs 2 days to test an idea. Running the focus group takes 2 hours of a staff member’s time per idea, and only one game is tested in each focus group. Finally, the management team meets for 3 hours per idea to decide if the game should go into production. Available working hours for each staff member are 8 hours per day, 5 days a week. The current staffing plan is as follows: A. Paper screening: 3 staff members. B. Design and Production: 4 staff members. C. Testing: 6 staff members. D. Focus Group: 1 staff member. E. Final Decision: 1 management team How many new ideas would Gamer Co. approve for production per week if it had unlimited capacity (staff) in its R&D process? Enter answer here 9. The Gamer Company is a video game production company that specializes in educational video games for kids. The company’s R&D department is always looking for great ideas for new games. On average, the R&D department generates about 25 new ideas a week. To go from idea to approved product, the idea must pass through the following stages: paper screening (a 1-page document describing the idea and giving a rough sketch of the design), prototype development, testing, and a focus group. At the end of each stage, successful ideas enter the next stage. All other ideas are dropped. The following chart depicts this process, and the probability of succeeding at each stage. The paper screening for each idea takes 2 hours of a staff member’s time. After that, there is a stage of designing and producing a prototype. A designer spends 4 hours designing the game in a computer-aided-design (CAD) package. The actual creation of the mock-up is outsourced to one of many suppliers with essentially limitless capacity. It takes 4 days to get the prototype programmed, and multiple prototypes can be created simultaneously. A staff member of the testing team needs 2 days to test an idea. Running the focus group takes 2 hours of a staff member’s time per idea, and only one game is tested in each focus group. Finally, the management team meets for 3 hours per idea to decide if the game should go into production. Available working hours for each staff member are 8 hours per day, 5 days a week. The current staffing plan is as follows: A. Paper screening: 3 staff members. B. Design and Production: 4 staff members. C. Testing: 6 staff members. D. Focus Group: 1 staff member. E. Final Decision: 1 management team Which stage is the bottleneck according to the current staffing plan? Testing Final decision Focus group Paper screening Design and production 10. The Gamer Company is a video game production company that specializes in educational video games for kids. The company’s R&D department is always looking for great ideas for new games. On average, the R&D department generates about 25 new ideas a week. To go from idea to approved product, the idea must pass through the following stages: paper screening (a 1-page document describing the idea and giving a rough sketch of the design), prototype development, testing, and a focus group. At the end of each stage, successful ideas enter the next stage. All other ideas are dropped. The following chart depicts this process, and the probability of succeeding at each stage. The paper screening for each idea takes 2 hours of a staff member’s time. After that, there is a stage of designing and producing a prototype. A designer spends 4 hours designing the game in a computer-aided-design (CAD) package. The actual creation of the mock-up is outsourced to one of many suppliers with essentially limitless capacity. It takes 4 days to get the prototype programmed, and multiple prototypes can be created simultaneously. A staff member of the testing team needs 2 days to test an idea. Running the focus group takes 2 hours of a staff member’s time per idea, and only one game is tested in each focus group. Finally, the management team meets for 3 hours per idea to decide if the game should go into production. Available working hours for each staff member are 8 hours per day, 5 days a week. The current staffing plan is as follows: A. Paper screening: 3 staff members. B. Design and Production: 4 staff members. C. Testing: 6 staff members. D. Focus Group: 1 staff member. E. Final Decision: 1 management team. With the current staffing plan, how many new ideas will be put into production per week?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Terminal And Bash

## Week 3 Homework: A High Stakes Investigation ### Scenario You have just been hired by Lucky Duck Casino as a security analyst. – Lucky Duck has lost a significant amount of money on the roulette tables over the last month. – The largest losses occurred on March 10, 12, and 15. – Your manager believes there is a player working with a Lucky Duck dealer to steal money at the roulette tables. – The casino has a large database with data on wins and losses, player analysis, and dealer schedules. – You are tasked with navigating, modifying, and analyzing these data files to gather evidence on the rogue player and dealer. – You will prepare several evidence files to assist the prosecution. – You must work quickly as Lucky Duck can’t afford any more losses. Lucky Duck Casino has provided you with the following files if required: – [Roulette Player Data: Week of March 10](Resources/Roulette_Player_WinLoss_0310.zip) – [Employee Dealer Schedule: Week of March 10](Resources/Dealer_Schedules_0310.zip) **Note**: The instructions ask you to set up the files using a `wget` command, but the files are also provided in compressed zip format if the command does not work. ### Lab Environment – You will use your local Vagrant virtual machine for today’s activities. Please note that instructors and students have different access credentials. – Username: `sysadmin` – Password: `cybersecurity` ### Instructions Use your command-line skills to uncover the identities of the rogue casino player and dealer colluding to scam Lucky Duck out of thousands of dollars. After your investigation, you will provide a summary of your findings to the casino. #### Step 1: Investigation Preparation Your first task is to set up directories to prepare for your investigation. 1. Begin by making a single directory titled `Lucky_Duck_Investigations`. 2. In this directory, create a directory for this specific investigation titled `Roulette_Loss_Investigation`. 3. In `Roulette_Loss_Investigation`, create the following directories: – `Player_Analysis` to investigate the casino player. – `Dealer_Analysis` to investigate the dealers. – `Player_Dealer_Correlation` to summarize your findings of the collusion. 4. Create empty files called `Notes_<Directory Name>` under each subdirectory to store investigation notes. – For example: `Notes_Player_Analysis` #### Step 2: Gathering Evidence Your next task is to move evidence from the specific days that Lucky Duck experienced heavy losses at the roulette tables. 1. Navigate to the directory where you created the `Lucky_Duck_Investigations` directory and run the following command to set up the evidence files: – `wget “https://tinyurl.com/3-HW-setup-evidence” && chmod +x ./3-HW-setup-evidence && ./3-HW-setup-evidence` After running this command your current directory should have the following subdirectories: – `Dealer_Schedules_0310`: Contains the dealer schedules. – `Lucky_Duck_Investigations`: Contains the investigation directories and notes files you created. – `Roulette_Player_WinLoss_0310`: Contains the data for player wins and losses. 2. The `Dealer_Schedules_0310` and `Roulette_Player_WinLoss_0310` directories contain the dealer schedules and win/loss player data from the roulette tables during the week of March 10. – Since the losses occurred on March 10, 12, and 15, move the schedules for those days into the directory `Dealer_Analysis`. – Move the files for those days into the directory `Player_Analysis`. #### Step 3: Correlating the Evidence Your next task is to correlate the large losses from the roulette tables with the dealer schedule. This will help you determine which dealer and player are colluding to steal money from Lucky Duck. **Note:** Winnings for Lucky Duck Casino are indicated with a positive number and losses are indicated with a negative number. Complete the player analysis. 1. Navigate to the `Player_Analysis` directory. 2. Use `grep` to isolate all of the losses that occurred on March 10, 12, and 15. 3. Place those results in a file called `Roulette_Losses`. 4. Preview the file `Roulette_Losses` and analyze the data. – Record in the `Notes_Player_Analysis` file: – The times the losses occurred on each day. – If there is a certain player that was playing during each of those times. – The total count of times this player was playing. – **Hint:** Use the `wc` command to find this value. Complete the dealer analysis. 1. Navigate to the `Dealer_Analysis` directory. 2. This file contains the dealer schedules for the various Lucky Duck casino games: Blackjack, Roulette, and Texas Hold ‘Em. – Preview the schedule to view the format and to understand how the data is separated. 3. Using your findings from the player analysis, create a separate script to look at each day and time that you determined losses occurred. Use `awk`, `pipes`, and `grep` to isolate out the following four fields: – Time – a.m./p.m. – First name of roulette dealer – Last name of roulette dealer For example, if a loss occurred on March 10 at 2 p.m., you would write one script to find the roulette dealer who was working at that specific day and time. – **Hint:** You will have many scripts, but only a small change is required for each script. 5. Run all of the scripts and append those results to a file called `Dealers_working_during_losses`. 6. Preview your file `Dealers_working_during_losses` and analyze the data. – Record in the `Notes_Dealer_Analysis` file: – The primary dealer working at the times where losses occurred. – How many times the dealer worked when major losses occurred. 3. Complete the player/employee correlation. – In the notes file of the `Player_Dealer_Correlation` directory, add a summary of your findings noting the player and dealer you believe are colluding to scam Lucky Duck. – Make sure to document your specific reasons for this finding. #### Step 4: Scripting Your Tasks You manager is impressed with the work you have done so far on the investigation. They tasked you with building a shell script that can easily analyze future employee schedules. They will use this to determine which employee was working at a specific time in the case of future losses. Complete the following tasks: 1. Remain in the `Dealer_Analysis` directory. Develop a shell script called `roulette_dealer_finder_by_time.sh` that can analyze the employee schedule to easily find the roulette dealer at a specific time. **Hint:** You will be using a script similar to the one you created for the dealer analysis step, but you will not output the results into a file. – Design the shell script to accept the following two arguments: – One for the date (four digits) – One for the time **Note:** The argument should be able to accept a.m. or p.m. 3. Test your script on the schedules to confirm it outputs the correct dealer at the time specified. #### Bonus – In case there is future fraud on the other Lucky Duck games, create a shell script called `roulette_dealer_finder_by_time_and_game.sh` that has the three following arguments: – Specific time – Specific date – Casino game being played **Hint:** The argument does not need to name the specific casino game. ### Submission Guidelines – Move the following to the `Player_Dealer_Correlation` directory: – All note files – Evidence files: – `Roulette_Losses` – `Dealers_working_during_losses` – Shell script(s) – Compress the `Player_Dealer_Correlation` folder to a zip file and submit it. — © 2020 Trilogy Education Services, a 2U, Inc. brand. All Rights Reserved.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Encryption And Decryption Using Vigenere With Cipher Block Chaining: Up To 50 Dollars Will Be Given

Modular Arithmetic Dr. Y. Chu CIS3360: Security in Computing 0R02 Spring 2018

1

Information

Reading: Appendix B.2 in textbook (will be posted in Webcourses)

Reference: online tutorials

2

Modulo Operation

Given any positive integer n and any integer a, when a is divided by n, we get an integer quotient, q, and integer remainder, b, that obey the following relationship:

a = q · n + b, where 0 <= b <= n-1

Then we define b= a modulo n or b= a mod n.

Note: b (modular value) is always non-negative

Examples:

5 mod 11 = 5, 5=0x11+5, so q=0 and b=5

17 mod 11 = 6, 17=1×11+6, so q=1 and b=6

-11 mod 7 = 3. (-11)=(-2)x7+3, so q=-2 and b=3

3

b is always non-negative

Congruent Modulo

Two integers, a and b, are congruent modulo n if and only if a mod n = b mod n

When a and b are divided by n, they have the same remainder

a ≡ b (mod n) ⇔ a mod n = b mod n

Example:

100 mod 11 = 1; 34 mod 11 = 1

So 100 ≡ 34 (mod 11)

In arithmetic modulo n, a and b are equivalent if their difference, (a – b), is a multiple of n

n | (a – b)

Example:

10 ≡ 2 (mod 4) because 4 | (10 − 2)

4

Modular Arithmetic

Modular arithmetic is ‘clock arithmetic’

For clock, time goes from 1 to 12, and back to 1 again

For modulo arithmetic, we start with 0, go up to n-1, and then go back to 0

Modular arithmetic uses a finite number of values, and loops back from either end

When we do modular arithmetic, we can first perform the operation and then modulo reduce the answer

Examples:

( 12 + 8 ) mod 5 = 20 mod 5 = 0

( 12 x 8 ) mod 5 = 96 mod 5 = 1

5

Modulo Reduction

The results of modular computations must remain within Zn = {0, 1, 2, … n-1}

For large values, modulo reduction is used to simplify modular computations.

Modulo properties:

Reducing each intermediate result modulo n yields the same result as doing the entire calculation, and then reducing the result to modulo n

For integers a, b, and c, and for positive n, we have:

( a + b ) mod n = ( ( a mod n ) + ( b mod n ) ) mod n

( a – b ) mod n = ( ( a mod n ) – ( b mod n ) ) mod n

( a · b ) mod n = ( ( a mod n ) · ( b mod n ) ) mod n

a (b+c) mod n = ( ( a b mod n ) · ( a c mod n ) ) mod n

Examples

( 12 + 8 ) mod 5 = ( ( 12 mod 5 ) + ( 8 mod 5 ) ) mod 5 = ( 2 + 3 ) mod 5 = 5 mod 5 = 0

(12 – 8) mod 5 = ( (12 mod 5 ) – ( 8 mod 5) ) mod 5 = ( 2 – 3 ) mod 5 = -1 mod 5 = 4

( 12 · 8 ) mod 5 = ( ( 12 mod 5 ) · ( 8 mod 5 ) ) mod 5 = ( 2 · 3 ) mod 5 = 6 mod 5 = 1

26 mod 5 = ( ( 22 mod 5 ) · ( 24 mod 5 ) ) mod 5 = (( 4 mod 5 ) · ( 16 mod 5 ) ) mod 5= (4*1) mod 5 = 4

Other properties:

Transitive law: a ≡ b ≡ c, then a ≡ c

Commutative: a + b = b + a

Associative: (a + b) + c = a + (b + c)

Distributive: a(b + c) = ab + ac

6

Modular Inverse

Given two positive integers x and y, both less than some other positive integer n, we say that y is the modular inverse of x, modulo n, and x is the modular inverse of y, modulo n,

if and only if (x · y) mod n = 1, for 0 < x < n and 0 < y < n

x-1 = y (mod n)

Example:

Prove 7 and 3 are inverses modulo 10

Steps:

Compute the multiplication

Compute the modulo value of the result

If the modulo value is 1, the numbers are inverses

7 · 3 = 21

21 mod 10 = 1

Since the modulo value is 1, 7 and 3 are inverses modulo 10

7

Properties of Modular Inverse

The number 1 is always the modular inverse of 1 for any modulus.

Not all values less than a particular modulus have inverses

Inverse of 2, mod 14 does not exist

Look at the row of 2

This row does not have 1

For the number a and modulo n, the inverse can be found if a and n are relatively prime

Relatively prime: two numbers a, n are relatively prime if gcd(a,n) = 1, where gcd is greatest common divisor

In the table, we can see 1, 3, 5, 9, 11 and 13 are relatively prime to 14.

So those rows contains 1, indicating modular inverses

8

Mod 14 multiplication table

Summary

What is Modulo Operation

Concept of Congruent Modulo

Modular Arithmetic

Modulo Reduction

Modular Inverse

Properties of Modular Inverse

9

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

#6925 Computer Science Database

Adventure Works Cycles Company Story

Business

Adventure Works Cycles, the fictitious company on which the AdventureWorks sample databases are based, is a large, multinational manufacturing company. The company manufactures and sells metal and composite bicycles to North American, European, and Asian commercial markets. While its base operation is located in Bothell, Washington, with 290 employees, several regional sales teams are located throughout its market base.

In 2000, Adventure Works Cycles bought a small manufacturing plant, Importadores Neptuno, located in Mexico. Importadores Neptuno manufactures several critical subcomponents for the Adventure Works Cycles product line. These subcomponents are shipped to the Bothell location for final product assembly. In 2001, Importadores Neptuno, became the sole manufacturer and distributor of the touring bicycle product group.

Coming off a successful fiscal year, Adventure Works Cycles is looking to broaden its market share by targeting its sales to its best customers, extending its product availability through an external website, and reducing cost of sales through lower production costs.

Product Overview

As a bicycle manufacturing company, Adventure Works Cycles has four product lines:

· Bicycles that are manufactured at the Adventure Works Cycles company.

· Bicycle components that are replacement parts, such as wheels, pedals, or brake assemblies.

· Bicycle apparel that is purchased from vendors for resale to Adventure Works Cycles customers.

· Bicycle accessories that are purchased from vendors for resale to Adventure Works Cycles customers.

Manufacturing Overview

· Bill of materials: List of the products used or contained in another product.

· Work orders: Manufacturing orders by work center.

· Locations: Major manufacturing and inventory areas, such as frame forming, paint, subassembly, and so on.

· Manufacturing and product assembly instructions by work center.

· Product inventory: The physical location of a product in the warehouse or manufacturing area, and the quantity available in that area.

· Engineering documentation: Technical specifications and maintenance documentation for bicycles or bicycle components.

Assignment 1

The purpose of this assignment is to practice navigating and identifying database tables and related fields.

For this assignment, assume you have just been hired by Adventure Works Cycles company. As part of the orientation process, you have been asked to learn a little about the company by reading the “Adventure Works Cycles Company Story.”

Your supervisor also wants you to gain an understanding of the content included in the company database. To do this, you must utilize SELECT and FROM statements like the example provided below.

EXAMPLE: SELECT * FROM [Database].[Schema_Name].[Table_Name]

Access the “AdventureWorks 2016 and Scripts for SQL Server 2016 CTP3” database and use SELECT and FROM statements to find the answer to each of the questions below. Create a Word document that includes the SQL queries used to explore the database tables and answer the following questions using the queries completed in steps 1-5.

Please note that when SQL queries are run, results are generated in the form of data. This data should be exported and saved to an Excel file for a visual check of accuracy.

1. Locate the “Person” table and run a basic SELECT query as listed in the example. List all the available fields and how many records exist in that table.

2. On what table and schema would you locate an applicant’s resume data?

3. When is the CEO’s Birthday?

4. What is the list “ListPrice” of the product “HL Touring Seat Assembly?”

5. Is “Holiday Skate & Cycle” a preferred vendor?

Compile the Excel data file and Word document containing the SQL queries and answers to the questions into a .zip file and submit to your instructor.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

For part 2 of assignment 1

Proposal for Process Improvement

Requestor:

Business Problem:

Proposed Solution:

Required Resources:

1.

1.

Implementation Steps:

1.

1.

Benefits:

1.

1.

Potential Obstacles:

1.

1.

1. The purpose of this assignment is to practice making proposals to communicate database needs to relevant stakeholders.

1. For this assignment, assume you work at Adventure Works Cycles. Your manager recently informed you that by law, all employees must have an emergency phone number on file. This information is not currently included in the company database, so you must submit a proposal to the IT Department detailing your request to have it added.

1. Using the “Proposal for Process Improvement” template, construct a Word document that outlines the requester, business problem, proposed solution, resources, implementation steps, benefits, and potential obstacles of the request.

1. APA style is not required, but solid academic writing is expected.

1. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

1. You are not required to submit this assignment to Turnitin.

Assignment 2

The purpose of this assignment is to analyze the structure of a relational database and demonstrate the ability to correctly document and explain additions to the structure of a relational database.

Part 1:

For this part of the assignment, you will use the “AdventureWorks 2014 OLTP Schema.” Open the schema and follow the tree/chain to answer the questions below in a Word document.

1. How does the Sales.SalesTerritory table relate to the Person.StateProvince table? Which table holds the Primary and the Foreign Key? On what field do they join together?

2. If you wanted to know the Planned Cost of a Product, what route would you take to the data? Identify the tables and fields used to join on each.

3. Imagine a bonus was paid to an employee using a different currency. Identify the fields you would need so you could access the information. List all the tables involved and the fields used to join.

Part 2:

For this part of the assignment, you will continue to assume you work at Adventure Works Cycles company. In the Topic 1 assignment, you made a request to add a field to the company database. That request has been approved, and now the database diagram needs to be accurately updated.

Create a simple OpenOffice Draw document demonstrating how your new table will connect to the Human Resources.Person table on the diagram. Since this is a new table, add new fields to create the proper relationships as you see fit.

In a one or two paragraph Word document, explain how these fields relate to the rest of the database content.

Compile the OpenOffice Draw file and Word document into a .zip file and submit to your instructor.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

Assignment 3

The purpose of this assignment is to identify business problems that can be addressed through analyzing database content.

For this assignment, assume the role of a data analyst at Adventure Works Cycles company. Your manager recently approached you with a problem. The company is losing money on its popular model “LL Road Frame-Black 60” but cannot determine why sales are down. You have been tasked to research potential reasons why this product, which your manager believes is solid, is not selling.

In order to address this business problem, you must deconstruct it. Study the entity relationship diagram (ERD) titled “AdventureWorks 2014 OLTP Schema,” and use it determine the specific questions that must be asked and answered to address the problem.

In a 250-word document, address the following. Include basic information related to the problem along with specific information about the tables that should be researched.

1. Explain what methods will be used to set the parameters for the query.

2. Define the specific questions that need to be asked and answered in order to address the specified business problem.

3. Explain how the entity relationship diagram (ERD) was used in addressing questions 1-2 above.

4. Describe ethical dilemmas that could be encountered as a result of the research being done to address the business problem.

5. Explain what resources you will use to assist with addressing ethical dilemmas.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

Assignment 4

The purpose of this assignment is to design and implement queries that will assist in developing answers to business problems.

For this assignment, continue to operate in the role of a data analyst at Adventure Works Cycles company. Based upon “LL Road Frame-Black 60” scenario and questions formulated for the Topic 3 assignment, write queries for the “AdventureWorks 2016” database using SQL Server 2016 Developer Edition.

Please note that when SQL queries are run, results are generated in the form of data. This data should be exported and saved to Excel for a visual check of accuracy.

Create a Word document that includes the SQL queries used to explore the database tables, and answer the following questions.

1. Find the product ID for the LL Road Frame – Black 60.

2. Find the listing price of the LL Road Frame – Black 60.

3. How would you rewrite the query used in question 2 to exclude NULL values?

4. How many orders have been placed for LL Road Frame – Black 60?

5. Rename the OrderQty to Quantity in your results.

Compile the Excel data file and Word document containing the SQL queries and answers to the questions into a .zip file and submit to your instructor.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

Assignment 5

The purpose of this assignment is to design and implement queries that will assist in developing answers to business problems.

For this assignment, continue to operate in the role of a data analyst at Adventure Works Cycles company. Based upon “LL Road Frame-Black 60” scenario and questions formulated for the Topic 3 assignment, write queries for the “AdventureWorks 2016” database using SQL Server 2016 Developer Edition.

Please note that when SQL queries are run, results are generated in the form of data. This data should be exported and saved to Excel for a visual check of accuracy.

Create a Word document that includes the SQL queries used to explore the database tables, and answer the following questions.

1. Find the product ID for the LL Road Frame – Black 60.

2. Find the listing price of the LL Road Frame – Black 60.

3. How would you rewrite the query used in question 2 to exclude NULL values?

4. How many orders have been placed for LL Road Frame – Black 60?

5. Rename the OrderQty to Quantity in your results.

Compile the Excel data file and Word document containing the SQL queries and answers to the questions into a .zip file and submit to your instructor.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

Part 2

The purpose of this assignment is to create temporary tables and document them using an entity relationship diagram (ERD).

For this assignment, continue to play the role of the data analyst for Adventure Works Cycling Company.

Please note that when SQL queries are run, results are generated in the form of data. This data should be exported and saved to Excel for a visual check of accuracy.

Create a Word document that includes the SQL query code for the temporary table that includes the dates of each sales order.

1. Create a temporary table for each of the Topic 4 assignment data components.

2. Use the skills you have learned and practiced to write a query to determine the dates of each sales orders from a table you have not looked at yet. Create a temporary table for this information.

3. Use OpenOffice Draw to create a new entity relationship diagram (ERD) to document the addition of the temporary tables and the work stream. Show the relationship between the tables.

Compile the OpenOffice Draw, Excel data file, and Word document containing the SQL queries and answers to the questions into a .zip file and submit to your instructor.

APA format is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

Assignment 6

The purpose of this assignment is to complete two complex queries, join them, and validate the expected results of the join.

For this assignment, continue to assume the role of a data analyst at Adventure Works Cycling Company. As you work to address the business problem surrounding sales of the “LL Road Frame-Black 60,” you must continue to refine the data by condensing them into two tables. This requires you to join the table data sets together. While this is an important process, you must be aware of the data integrity issues that can occur as a result of completing joins.

Please note that when SQL queries are run, results are generated in the form of data. This data should be exported and saved to Excel for a visual check of accuracy.

Create a Word document that includes the SQL query code used to explore the database tables and answer the following questions.

Complete the steps below to practice joins.

1. Combine MyProduct and MyPriceHistory displaying the fields into a new temporary table called MyProductPriceHistory. Display ProductID, Name, EndDate, and List Price.

2. Combine MyProduct and MySalesOrderDetail displaying the fields into a new temporary table called MySalesOrderDetailbyName. Display ProductID, Name, SalesOrderID, and Quantity.

3. Combine MySalesOrderDetailbyName and ALLSalesOrderDates displaying the fields into a new temporary table called MySalesHistory. Display ProductID, Name, OrderDate, and SumOfQuantity. This will require you using the SUM and GROUP BY statements.

Create a Word document that includes the SQL query code used for each of the joins listed. Additionally, identify and analyze the data integrity issues you encountered in SQL.

1. Discuss bad queries and bad table data in your analysis.

2. Explain the impact of the data integrity issues.

3. Indicate what needs to be revised in the code.

4. Discuss specifically what needs to be done to fix the data integrity issues created by the join. Please note that as part of your final project for the course you will be adding these new tables to the ERD you created in Topic 5.

Compile the Excel data file and Word document containing the SQL queries and answers to the questions into a .zip file and submit to your instructor.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

Assignment 7

he purpose of this assignment is to update a previous query and present it in an easily readable format.

For this assignment, continue to assume the role of a data analyst at Adventure Works Cycles company.

Please note that when SQL queries are run, results are generated in the form of data. This data should be exported and saved to Excel for a visual check of accuracy.

Create a Word document that includes the SQL query code used to explore the database tables and answer the following questions.

Part 1:

1. Using what you have learned, replicate the data found in #MySalesOrderDetailbyDate and #MyProductPriceHistory using a single line of SQL code. Refer back to the Topic 5 assignment for this information.

2. Modify the query completed in the Topic 6 assignment, and present it in an easy-to-read format. To do this, write the query in two single statements without temporary tables, using abbreviations and line spacing.

Part 2:

Karen Berge, a document control assistant at the company, comes to you with a request. Karen wants the titles and file names of all of the documents she has produced and has asked you to generate this information for her. Using what you have learned, produce a query in one statement to give her the information she needs. Note that constructing the query will require some thinking outside the box since the relationships are not well documented.

Please note that when SQL queries are run, results are generated in the form of data. This data should be exported and saved to Excel for a visual check of accuracy. This Excel file should include the names of all documents Karen has produced.

Add to the Word document you created in Part 1 and include the SQL query code associated with the query you wrote to locate Karen’s documents.

Compile the Excel data file and Word document containing the SQL queries and answers to the questions into a .zip file and submit to your instructor.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

Assignment 8

The purpose of this assignment is to analyze data and use it to provide stakeholders with potential answers to a previously identified business problem.

For this assignment, continue to assume the role of a data analyst at Adventure Works Cycling Company. Evaluate the data associated with the drop in sales for the popular model “LL Road Frame-Black 60.” Provide a hypothesis on what could be contributing to the falling sales identified in the initial business problem presented by your manager.

In 250-500 words, share these recommendations in a Word document that addresses the following.

1. Summary of the business problem including the requestor who initially brought the problem to you.

2. Summary of the data that were requested and how they was obtained.

3. Discussion of the limitations of the available data and ethical concerns related to those limitations.

4. Hypothesis of why sales of the popular model have dropped based upon data analysis. Reference the Excel file that summarizes the data findings that resulted from your queries.

5. Recommendations for addressing the business problem.

6. In addition to the report, the manager has requested that you submit the Excel files summarizing the data findings that resulted from your queries.

7. The manager has also requested that you update the ERD you created in the Topic 5 assignment to include the tables generated as a result of the joins completed in the Topic 6 assignment. The ERD should clearly document the work stream and relationships.

Compile the updated ERD, Excel data file, and Word document containing the SQL queries and answers to the questions into a .zip file and submit to your instructor.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

Part 2

The purpose of this assignment is to build a stored procedure that allows for the compression of data and the ability to run a process repeatedly over time.

For this assignment, continue to assume the role of a data analyst at Adventure Works Cycling Company. Your manager is waiting for you to deliver your analysis of why the company is losing money on its popular model “LL Road Frame-Black 60.” As you are preparing your final report, your manager asks you to save your final queries from Topic 6 (the two nontemporary queries) as a stored procedure so you can periodically check on them from time to time. To do this, you will need to complete the steps below.

Please note that when SQL queries are run, results are generated in the form of data. This data should be exported and saved to Excel for a visual check of accuracy.

Create a Word document that includes the SQL query code used to explore the database tables.

1. Drop all ORDER_BY statements from the query.

2. Label one as PriceHistory723.

3. Label the other as SalesOrderDetailbyDate723.

Compile the Excel data file and Word document containing the SQL queries into a .zip file and submit to your instructor.

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to Turnitin.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

A+ Answers

Question 1 You have purchased an Apple desktop computer and want to set it up so that you can access your computer desktop when you are on the road. How might you do this? A. Install Remote Desktop for Apple on your desktop. B. Install Apple+ VPN on your desktop. C. Configure your desktop for Platform as a Service. D. Install the GoToMyPC client on your desktop.

 

Question 2 What is a chief concern of cloud computing? A. Cost B. Security C. Redundancy D. Speed

 

Question 3 You have a Bluetooth headset that integrates with your computer so that you can talk to partners through Microsoft Lync. This is an example of what type of wireless networking? A. WLAN B. WPAN C. WMAN D. WWIRE

 

Question 4 Your boss calls you from his home to use the VPN connection you configured for him on his laptop. He has traditionally depended on Remote Desktop to access the server. Your boss tells you that the VPN connection shows that it is connected but the server’s desktop is not appearing on his screen. What do you tell him? A. The firewall on his home router must be blocking the remote connection. B. His ISP must not allow encrypted connections through their network. C. He must be running Windows 8 which doesn’t support VPN. D. VPN doesn’t bring up a remote desktop on the local computer.

 

Question 5 Your company is trying to get out of the responsibility of purchasing and hosting its own hardware so it won’t have to finance or manage a datacenter anymore. Your boss has told you that you need to install an operating system on all of the cloud-based servers. This is an example of what type of cloud computing? A. Infrastructure as a Service B. Network as a Service C. Platform as a Service D. Software as a Service

 

Question 6 You are configuring a wireless connection on your home router. Because you live in an apartment complex, the security level of the connection is paramount. Which wireless option below is the most secure? A. SSID B. WEP C. WPA D. WPA2 Question 7 In order for your laptop to make a wireless connection, it must first find an available __________ to connect to. A. SSID B. VPN C. RSAT D. WEP

 

Question 8 Your boss wants to utilize some sort of cloud storage for his files so that all of his computing devices can replicate these files. He installs the client on all of his devices. He asks you where the cloud folder is located within Windows Explorer. What do you tell him? A. It is located in his local profile. B. It is located in Program Files. C. It is located in Program Files. (86) D. It is located in the Windows System folder.

 

Question 9 Your boss wants you to devise a way for remote contractors to be able to access the server desktop. There is one stipulation, however, in that your boss wants to ensure that the local user can see everything that the remote contractor is doing in real time. What do you suggest? A. Install TeamViewer on the server. B. Configure a VPN connection on the server. C. Install GoToMyPC on the server. D. Configure RDP within the server’s web browser.

 

Question 10 You have a number of digital pictures you recently took on your smartphone. You would like to share these pictures with all of your friends and family. What is a “Cloud”-like example of sharing these pictures with them? A. Upload them to www.flickr.com and share a link with them. B. Email them to everyone by way of email attachments. C. Save them to your My Pictures folder on your Windows 8 tablet. D. Save them to a fractional website that offers file transfer capabilities.

 

Question 11 Your boss is very skeptical about the idea of storing his files up in the cloud rather than on a local storage drive. He asks you to give him the various advantages of cloud storage. Which of the selections below would not be a reason you give him? A. He won’t have to worry about backing up his files anymore. B. Cloud storage provides unlimited storage for free. C. He can keep all of his files replicated and uniform on all of his devices. D. He can access his files from anywhere he has an Internet connection.

 

Question 12 When you connect to a remote VPN server with your laptop running Windows 8, what key item is your computer allocated? A. The desktop of the VPN server B. The desktop of the logon server C. An IP address from the remote network D. A web browser with an SSL connection

 

Question 13 How does fractional employment differ from the traditional full-time job model of today? A. Fractional employment demands complete mathematical skills. B. A work unit in fractional employment is a project or task, not a job. C. Fractional employment only employs people from outside the United States. D. Fractional employment is exclusively for IT workers.

 

Question 14 Your CEO is concerned that too much productivity is lost by having employees call each other, only to be directed to voice mail. He asks you if something can be done to counter this. What do you suggest? A. Integrate Dropbox into the company network. B. Integrate RDP into the company network. C. Integrate Microsoft Lync into the company network. D. Integrate TeamViewer into the company network.

 

Question 15 Which of the following is a proper use of the application, NetStumbler? A. Finding rogue access points within your network B. Managing multiple access points within a large network C. Disguising designated broadcast SSIDs on your network D. Creating open-ended wireless connections for easy access

 

Question 16 Making a phone call through Lync from your laptop using only your headset is an example of: A. a PBX phone connection. B. an encrypted phone conversation. C. a legacy phone conversation. D. a peer-to-peer phone conversation.

 

Question 17 Your mom wants to start using some type of cloud storage so that she can access some of her important business files from anywhere without having to remote into another machine. What do you suggest? A. TeamViewer B. GoToMyPC C. Dropbox D. Microsoft RT

 

Question 18 Your sister is considering purchasing a tablet computer that utilizes RT as the operating system. She asks you if RT is any different from her Windows 8 desktop she has at home. What do you tell her? A. Unlike her Windows 8 PC, RT does not have a tile-based interface. B. RT is an Android-based operating system so it is completely different. C. RT isn’t touch-enabled so it is a poor choice for a tablet. D. She won’t be able to install regular Windows application on RT.

 

Question 19 You have set up Remote Desktop for the company server running Server 2008 so that your users can RDP in from their XP workstations. Users are calling you saying that they are being denied the ability to remote in. What is the most likely reason? A. XP does not support Remote Desktop by default. B. Network Level Authentication is being enforced on the RDP connection. C. Server 2008 does not support Remote Desktop by default. D. Remote Desktop only works through a web browser over the Internet.

 

Question 20 Which of these devices is usually the default gateway for most home networks? A. A workstation B. A server C. A smartphone D. A wireless router

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

LINEAR PROGRAMMING / PROJECT MANAGEMENT – USE POM SOFTWARE

POM-QM for Windows software LINK(http://wps.prenhall.com/bp_heizer_opsmgmt_10/147/37741/9661929.cw/index.html )

For this part of this project, you will need to use the POM software:

1. Read Appendix IV of the Operations Management (Heizer and Render, 2014) textbook.

2. Review the linear programming section from the POM manual:  Weiss, H.J. (2013) POM-QM for Windows manual. Upper Saddle River, NJ: Prentice Hall. Available from the ‘Help’ menu in the POM-QM Windows software. (Accessed: 30 December 2014). You may also wish to research and review online tutorials regarding the linear programming module and/or view the following resource.

Valverde, R. (2014) QM for Windows linear programming [Online] YouTube. Available from:  https://www.youtube.com/watch?v=uHsQSG75sPk  (Accessed 23 April 2015).

3. Install and launch the POM-QM for Windows software. From the main menu, select Module and then Linear Programming.

4. Program the linear programming formulation for the problem below and solve it with the use of POM. Refer to Appendix IV from the Heizer and Render (2014) textbook.

Note: Do not program the non-negativity constraint, as this is already assumed by the software.

For additional support, please reference the POM-QM for Windows manual available from the ‘Help’ menu in the POM-QM Windows software.

Individual Project, part 1

A firm uses three machines in the manufacturing of three products:

· Each unit of product 1 requires three hours on machine 1, two hours on machine 2 and one hour on machine 3.

· Each unit of product 2 requires four hours on machine 1, one hour on machine 2 and three hours on machine 3.

· Each unit of product 3 requires two hours on machine 1, two hours on machine 2 and two hours on machine 3.

The contribution margin of the three products is £30, £40 and £35 per unit, respectively.

The following are available for scheduling:

· 90 hours of machine 1 time

· 54 hours of machine 2 time

· 93 hours of machine 3 time

The linear programming formulation of this problem is as follows:

Maximise Z = 30X1 + 40X2 + 35X3

3X1 + 4X2 + 2X3 <= 90

2X1 + 1X2 + 2X3 <=54

X1 + 3X2 + 2X3 <=93

With X1, X2, X3 >= 0

To answer this question:

Answer each question and explain your reasoning or show your calculations.

1. What is the optimal production schedule for this firm? What is the profit contribution of each of these products?

2. What is the marginal value of an additional hour of time on machine 1? Over what range of time is this marginal value valid?

3. What is the opportunity cost associated with product 1? What interpretation should be given to this opportunity cost?

4. How many hours are used for machine 3 with the optimal solution?

5. How much can the contribution margin for product 2 change before the current optimal solution is no longer optimal?

Individual Project, part 2

For this part of this project, you will need to use the POM software:

1. Review the linear programming section from the POM manual:  Weiss, H.J. (2013) POM-QM for Windows manual. Upper Saddle River, NJ: Prentice Hall. Available from the ‘Help’ menu in the POM-QM Windows software. You may also wish to research and review online tutorials regarding the linear programming module.

2. Program the project management problem below and solve it with the use of POM. Select Project Management(PERT/CPM) module, and then select the option File->New->Mean, Std dev given items.

Activity Mean duration Std. dev. (days)
A 11 0.9
B 13 1.1
C

7 0.2
D 9 0.8
E 6 1
F 7 1.2
G 10 0.7
H 9 0.6
I 8 0.8

Table 1: Activity, duration and standard deviation

To answer this question:

Answer each question and explain your reasoning or show your calculations.

1. Calculate the project completion time.

2. Indicate the critical path activities.

3. What is the probability of completing this project between 38 and 40 days?

4. What are the slack values for activities C and F? Interpret the meaning of their slack values.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!