Posts

Computer Science homework help

Computer Science homework help

Question 1
1. Main memory is called ____.

read only memory

random access memory

read and write memory

random read only memory

3 points
Question 2
1. The ____ is the brain of the computer and the single most expensive piece of hardware in your personal computer.

MM

ROM

RAM

CPU

3 points
Question 3
1. The ____ carries out all arithmetic and logical operations.

IR

ALU

CU

PC

3 points
Question 4
1. The ____ holds the instruction currently being executed.

CU

IR

PC

ALU

3 points
Question 5
1. When the power is switched off, everything in ____ is lost.

main memory

secondary storage

hard disks

floppy disks

3 points
Question 6
1. ____ programs perform a specific task.

Application

System

Operating

Service

3 points
Question 7
1. The ____ monitors the overall activity of the computer and provides services.

Central Processing Unit

operating system

arithmetic logic unit

control unit

3 points
Question 8
1. Which of the following is NOT an output device?

monitor

printer

CPU

secondary storage

3 points
Question 9
1. ____ represent information with a sequence of 0s and 1s.

Analog signals

Application programs

Digital signals

System programs

3 points
Question 10
1. A sequence of eight bits is called a ____.

binary digit

byte

character

double

3 points
Question 11
1. The digit 0 or 1 is called a binary digit, or ____.

bit

bytecode

Unicode

hexcode

3 points
Question 12
1. The term GB refers to ____.

giant byte

gigabyte

group byte

great byte

3 points
Question 13
1. ____ consists of 65,536 characters.

ASCII-8

ASCII

Unicode

EBCDIC

3 points
Question 14
1. A program called a(n) ____ translates instructions written in high-level languages into machine code.

assembler

decoder

compiler

linker

3 points
Question 15
1. A program called a(n) ____ combines the object program with the programs from libraries.

assembler

decoder

linker

compiler

3 points
Question 16
1. Consider the following C++ program.

#include <iostream>
using namespace std;

int main()
{
cout << “Hello World ”
return 0;
}

In the cout statement, the missing semicolon in the code above will be caught by the ____.

compiler

editor

assembler

control unit

3 points
Question 17
1. A program that loads an executable program into main memory is called a(n) ____.

compiler

loader

linker

assembler

3 points
Question 18
1. A step-by-step problem-solving process in which a solution is arrived at in a finite amount of time is called a(n) ____.

algorithm

linker

analysis

design

3 points
Question 19
1. To develop a program to solve a problem, you start by ____.

analyzing the problem

implementing the solution in C++

designing the algorithm

entering the solution into a computer system

3 points
Question 20
1. In C++, the mechanism that allows you to combine data and operations on the data into a single unit is called a(n) ____.

object

class

function

algorithm

3 points
Question 21
1. Which of the following is a legal identifier?

program!

program_1

1program

program 1

3 points
Question 22
1. All of the following are examples of integral data types EXCEPT ____.

int

char

double

short

3 points
Question 23
1. Which of the following is a valid char value?

-129

-128

128

129

3 points
Question 24
1. The value of the expression 17 % 7 is ____.

1

2

3

4

3 points
Question 25
1. The expression static_cast<int>(9.9) evaluates to ____.

9

10

9.9

9.0

3 points
Question 26
1. The length of the string “computer science” is ____.

14

15

16

18

3 points
Question 27
1. Suppose that count is an int variable and count = 1. After the statement count++; executes, the value of count is ____.

1

2

3

4

3 points
Question 28
1. Suppose that alpha and beta are int variables. The statement alpha = –beta; is equivalent to the statement(s) ____.

alpha = 1 – beta;

alpha = beta – 1;

beta = beta – 1;
alpha = beta;

alpha = beta;
beta = beta – 1;

3 points
Question 29
1. Suppose that alpha and beta are int variables. The statement alpha = beta++; is equivalent to the statement(s) ____.

alpha = 1 + beta;

alpha = alpha + beta;

alpha = beta;
beta = beta + 1;

beta = beta + 1;
alpha = beta;

3 points
Question 30
1. Suppose that alpha and beta are int variables. The statement alpha = ++beta; is equivalent to the statement(s) ____.

beta = beta + 1;
alpha = beta;

alpha = beta;
beta = beta + 1;

alpha = alpha + beta;

alpha = beta + 1;

3 points
Question 31
1. Choose the output of the following C++ statement:
cout << “Sunny ” << ‘\n’ << “Day ” << endl;

Sunny \nDay

Sunny \nDay endl

Sunny
Day

Sunny \n
Day

3 points
Question 32
1. Which of the following is the new line character?

\r

\n

\l

\b

3 points
Question 33
1. Consider the following code.

// Insertion Point 1

using namespace std;
const float PI = 3.14;

int main()
{
//Insertion Point 2

float r = 2.0;
float area;
area = PI * r * r;

cout << “Area = ” << area <<endl;
return 0;
}
// Insertion Point 3

In this code, where does the include statement belong?

Insertion Point 1

Insertion Point 2

Insertion Point 3

Anywhere in the program

3 points
Question 34
1. ____ are executable statements that inform the user what to do.

Variables

Prompt lines

Named constants

Expressions

3 points
Question 35
1. The declaration int a, b, c; is equivalent to which of the following?

inta , b, c;

int a,b,c;

int abc;

int a b c;

3 points
Question 36
1. Suppose that sum and num are int variables and sum = 5 and num = 10. After the statement sum += num executes, ____.

sum = 0

sum = 5

sum = 10

sum = 15

3 points
Question 37
1. Suppose that alpha is an int variable and ch is a char variable and the input is:

17 A

What are the values after the following statements execute?

cin >> alpha;
cin >> ch;

alpha = 17, ch = ‘ ‘

alpha = 1, ch = 7

alpha = 17, ch = ‘A’

alpha = 17, ch = ‘a’

3 points
Question 38
1. Suppose that x is an int variable, y is a double variable, z is an int variable, and the input is:

15 76.3 14

Choose the values after the following statement executes:

cin >> x >> y >> z;

x = 15, y = 76, z = 14

x = 15, y = 76, z = 0

x = 15, y = 76.3, z = 14

x = 15.0, y = 76.3, z = 14.0

3 points
Question 39
1. Suppose that x and y are int variables, ch is a char variable, and the input is:

4 2 A 12

Choose the values of x, y, and ch after the following statement executes:

cin >> x >> ch >> y;

x = 4, ch = 2, y = 12

x = 4, ch = A, y = 12

x = 4, ch = ‘ ‘, y = 2

This statement results in input failure

3 points
Question 40
1. Suppose that ch1, ch2, and ch3 are variables of the type char and the input is:

A B
C

Choose the value of ch3 after the following statement executes:

cin >> ch1 >> ch2 >> ch3;

‘A’

‘B’

‘C’

‘\n’

3 points
Question 41
1. Suppose that ch1 and ch2 are char variables, alpha is an int variable, and the input is:

A 18

What are the values after the following statement executes?

cin.get(ch1);
cin.get(ch2);
cin >> alpha;

ch1 = ‘A’, ch2 = ‘ ‘, alpha = 18

ch1 = ‘A’, ch2 = ‘1’, alpha = 8

ch1 = ‘A’, ch2 = ‘ ‘, alpha = 1

ch1 = ‘A’, ch2 = ‘\n’, alpha = 1

3 points
Question 42
1. Suppose that ch1, ch2, and ch3 are variables of the type char and the input is:

A B
C

What is the value of ch3 after the following statements execute?

cin.get(ch1);
cin.get(ch2);
cin.get(ch3);

‘A’

‘B’

‘C’

‘\n’

3 points
Question 43
1. When you want to process only partial data, you can use the stream function ____ to discard a portion of the input.

clear

skip

delete

ignore

3 points
Question 44
1. Suppose that alpha, beta, and gamma are int variables and the input is:

100 110 120
200 210 220
300 310 320

What is the value of gamma after the following statements execute?

cin >> alpha;
cin.ignore(100, ‘\n’);
cin >> beta;
cin.ignore(100,’\n’);
cin >> gamma;

100

200

300

320

3 points
Question 45
1. Suppose that ch1 and ch2 are char variables and the input is:

WXYZ

What is the value of ch2 after the following statements execute?

cin.get(ch1);
cin.putback(ch1);
cin >> ch2;

W

X

Y

Z

3 points
Question 46
1. Suppose that ch1 and ch2 are char variables and the input is:

WXYZ

What is the value of ch2 after the following statements execute?

cin >> ch1;
ch2 = cin.peek();
cin >> ch2;

W

X

Y

Z

3 points
Question 47
1. In C++, the dot is an operator called the ____ operator.

dot access

member access

data access

member

3 points
Question 48
1. Suppose that x = 25.67, y = 356.876, and z = 7623.9674. What is the output of the following statements?

cout << fixed << showpoint;
cout << setprecision(2);
cout << x << ‘ ‘ << y << ‘ ‘ << z << endl;

25.67 356.87 7623.96

25.67 356.87 7623.97

25.67 356.88 7623.97

25.67 356.876 7623.967

3 points
Question 49
1. Suppose that x = 1565.683, y = 85.78, and z = 123.982. What is the output of the following statements?
cout << fixed << showpoint;
cout << setprecision(3) << x << ‘ ‘;
cout << setprecision(4) << y << ‘ ‘ << setprecision(2) << z << endl;

1565.683 85.8000 123.98

1565.680 85.8000 123.98

1565.683 85.7800 123.98

1565.683 85.780 123.980

3 points
Question 50
1. What is the output of the following statements?
cout << setfill(‘*’);
cout << “12345678901234567890” << endl
cout << setw(5) << “18” << setw(7) << “Happy”
<< setw(8) << “Sleepy” << endl;

12345678901234567890
***18  Happy  Sleepy

12345678901234567890
***18**Happy**Sleepy

12345678901234567890
***18**Happy  Sleepy

12345678901234567890
***18**Happy  Sleepy**

3 points
Question 51
1. What is the output of the above statements?
cout << “123456789012345678901234567890” << endl
cout << setfill(‘#’) << setw(10) << “Mickey”
<< setfill(‘ ‘) << setw(10) << “Donald”
<< setfill(‘*’) << setw(10) << “Goofy” << endl;

123456789012345678901234567890
####Mickey    Donald*****Goofy

123456789012345678901234567890
####Mickey####Donald*****Goofy

123456789012345678901234567890
####Mickey####Donald#####Goofy

23456789012345678901234567890
****Mickey####Donald#####Goofy

3 points
Question 52
1. Consider the following program segment.
ifstream inFile;        //Line 1
int x, y;              //Line 2

…                    //Line 3
inFile >> x >> y;        //Line 4

Which of the following statements at Line 3 can be used to open the file progdata.dat and input data from this file into x and y at Line 4?

inFile.open(“progdata.dat”);

inFile(open,”progdata.dat”);

open.inFile(“progdata.dat”);

open(inFile,”progdata.dat”);

3 points
Question 53
1. In a ____ control structure, the computer executes particular statements depending on some condition(s).

looping

repetition

selection

sequence

3 points
Question 54
1. What does <= mean?

less than

greater than

less than or equal to

greater than or equal to

3 points
Question 55
1. Which of the following is a relational operator?

=

==

!

&&

3 points
Question 56
1. Which of the following is the “not equal to” relational operator?

!

|

!=

&

3 points
Question 57
1. Suppose x is 5 and y is 7. Choose the value of the following expression:

(x != 7) && (x <= y)

false

true

0

null

3 points
Question 58
1. The expression in an if statement is sometimes called a(n) ____.

selection statement

action statement

decision maker

action maker

3 points
Question 59
1. What is the output of the following C++ code?
int x = 35;
int y = 45;
int z;

if (x > y)
z = x + y;
else
z = y – x;

cout << x << ” ” << y << ” ” << z << endl;

35 45 80

35 45 10

35 45 –10

35 45 0

3 points
Question 60
1. When one control statement is located within another, it is said to be ____.

blocked

compound

nested

closed

3 points
Question 61
1. What is the output of the following code?

if (6 > 8)
{
cout << ” ** ” << endl ;
cout << “****” << endl;
}
else if (9 == 4)
cout << “***” << endl;
else
cout << “*” << endl;

*

**

***

****

3 points
Question 62
1. The conditional operator ?: takes ____ arguments.

two

three

four

five

3 points
Question 63
1. What is the value of x after the following statements execute?

int x;
x = (5 <= 3 && ‘A’ < ‘F’) ? 3 : 4

2

3

4

5

3 points
Question 64
1. Assume you have three int variables: x = 2, y = 6, and z. Choose the value of z in the following expression: z = (y / x > 0) ? x : y;.

2

3

4

6

3 points
Question 65
1. What is the output of the following code?

char lastInitial = ‘S’;

switch (lastInitial)
{
case ‘A’:
cout << “section 1” <<endl;
break;
case ‘B’:
cout << “section 2” <<endl;
break;
case ‘C’:
cout << “section 3” <<endl;
break;
case ‘D’:
cout << “section 4” <<endl;
break;
default:
cout << “section 5” <<endl;
}

section 2

section 3

section 4

section 5

3 points
Question 66
1. What is the output of the following code?

char lastInitial = ‘A’;

switch (lastInitial)
{
case ‘A’:
cout << “section 1” <<endl;
break;
case ‘B’:
cout << “section 2” <<endl;
break;
case ‘C’:
cout << “section 3” <<endl;
break;
case ‘D’:
cout << “section 4” <<endl;
break;
default:
cout << “section 5” <<endl;
}

section 1

section 2

section 3

section 5

3 points
Question 67
1. What is the output of the following code fragment if the input value is 4?
int num;
int alpha = 10;
cin >> num;
switch (num)
{
case 3:
alpha++;
break;
case 4:
case 6:
alpha = alpha + 3;
case 8:
alpha = alpha + 4;
break;
default:
alpha = alpha + 5;
}
cout << alpha << endl;

13

14

17

22

3 points
Question 68
1. What is the output of the following C++ code?
int x = 55;
int y = 5;

switch (x % 7)
{
case 0:
case 1:
y++;
case 2:
case 3:
y = y + 2;
case 4:
break;
case 5:
case 6:
y = y – 3;
}
cout << y << endl;

2

5

8

10

3 points
Question 69
1. A(n) ____-controlled while loop uses a bool variable to control the loop.

counter

sentinel

flag

EOF

3 points
Question 70
1. Consider the following code. (Assume that all variables are properly declared.)

cin >> ch;

while (cin)
{
cout << ch;
cin >> ch;
}

This code is an example of a(n) ____ loop.

sentinel-controlled

flag-controlled

EOF-controlled

counter-controlled

3 points
Question 71
1. What is the next Fibonacci number in the following sequence?

1, 1, 2, 3, 5, 8, 13, 21, …

34

43

56

273

3 points
Question 72
1. Which of the following is the initial statement in the following for loop? (Assume that all variables are properly declared.)

int i;
for (i = 1; i < 20; i++)
cout << “Hello World”;
cout << “!” << endl;

i = 1;

i < 20;

i++;

cout << “Hello World”;

3 points
Question 73
1. What is the output of the following C++ code?
int j;
for (j = 10; j <= 10; j++)
cout << j << ” “;
cout << j << endl;

10

10 10

10 11

11 11

3 points
Question 74
1. Suppose sum, num, and j are int variables, and the input is 4 7 12 9 -1. What is the output of the following code?

cin >> sum;
cin >> num;
for (j = 1; j <= 3; j++)
{
cin >> num;
sum = sum + num;
}
cout << sum << endl;

24

25

41

42

3 points
Question 75
1. Suppose j, sum, and num are int variables, and the input is 26 34 61 4 -1. What is the output of the code?

sum = 0;
cin >> num;
for (int j = 1; j <= 4; j++)
{
sum = sum + num;
cin >> num;
}
cout << sum << endl;

124

125

126

127

3 points
Question 76
1. Which executes first in a do…while loop?

statement

loop condition

initial statement

update statement

3 points
Question 77
1. What is the value of x after the following statements execute?

int x = 5;
int y = 30;

do
x = x * 2;
while (x < y);

5

10

20

40

3 points
Question 78
1. What is the output of the following loop?

count = 5;
cout << ‘St’;
do
{
cout << ‘o’;
count–;
}
while (count <= 5);

St

Sto

Stop

This is an infinite loop.

3 points
Question 79
1. Which of the following loops does not have an entry condition?

EOF-controlled while loop

sentinel-controlled while loop

do…while loop

for loop

3 points
Question 80
1. Which of the following is a repetition structure in C++?

if

switch

while…do

do…while

3 points
Question 81
1. Which of the following is true about a do…while loop?

The body of the loop is executed at least once.

The logical expression controlling the loop is evaluated before the loop is entered.

The body of the loop may not execute at all.

It cannot contain a break statement.

3 points
Question 82
1. Which of the following is not a function of the break statement?

To exit early from a loop

To skip the remainder of a switch structure

To eliminate the use of certain bool variables in a loop

To ignore certain values for variables and continue with the next iteration of a loop

3 points
Question 83
1. Which executes immediately after a continue statement in a while and do-while loop?

loop-continue test

update statement

loop condition

the body of the loop

3 points
Question 84
1. When a continue statement is executed in a ____, the update statement always executes.

while loop

for loop

switch structure

do…while loop

3 points
Question 85
1. The heading of the function is also called the ____.

title

function signature

function head

function header

3 points
Question 86
1. Given the following function prototype: int test(float, char); which of the following statements is valid?

cout << test(12, &);

cout << test(“12.0”, ‘&’);

int u = test(5.0, ‘*’);

cout << test(’12’, ‘&’);

3 points
Question 87
1. A variable or expression listed in a call to a function is called the ____.

formal parameter

actual parameter

data type

type of the function

3 points
Question 88
1. A variable listed in a function call is known as a(n) ____ parameter.  A variable list in a header is known as a(n) ____ parameter.

actual; actual

formal; formal

actual; formal

formal; actual

3 points
Question 89
1. What value is returned by the following return statement?
int x = 5;

return x + 1;

0

5

6

7

3 points
Question 90
1. Given the following function
int strange(int x, int y)
{
if (x > y)
return x + y;
else
return x – y;
}

what is the output of the following statement:?

cout << strange(4, 5) << endl;

-1

1

9

20

3 points
Question 91
1. Given the following function

int next(int x)
{
return (x + 1);
}

what is the output of the following statement?

cout << next(next(5)) << endl;

5

6

7

8

3 points
Question 92
1. Given the function prototype:

float test(int, int, int);

which of the following statements is legal?

cout << test(7, test(14, 23));

cout << test(test(7, 14), 23);

cout << test(14, 23);

cout << test(7, 14, 23);

3 points
Question 93
1. Given the following function prototype: double tryMe(double, double);, which of the following statements is valid? Assume that all variables are properly declared.

cin >> tryMe(x);

cout << tryMe(2.0, 3.0);

cout << tryMe(tryMe(double, double), double);

cout << tryMe(tryMe(float, float), float);

3 points
Question 94
1. Given the function prototype: double testAlpha(int u, char v, double t); which of the following statements is legal?

cout << testAlpha(5, ‘A’, 2);

cout << testAlpha( int 5, char ‘A’, int 2);

cout << testAlpha(‘5.0’, ‘A’, ‘2.0’);

cout << testAlpha(5.0, “65”, 2.0);

3 points
Question 95
1. Which of the following function prototypes is valid?

int funcTest(int x, int y, float z){}

funcTest(int x, int y, float){};

int funcTest(int, int y, float z)

int funcTest(int, int, float);

3 points
Question 96
1. Which of the following function prototypes is valid?

int funcExp(int x, float v);

funcExp(int x, float v){};

funcExp(void);

int funcExp(x);

3 points
Question 97
1. Given the following function prototype: int myFunc(int, int); which of the following statements is valid? Assume that all variables are properly declared.

cin >> myFunc(y);

cout << myFunc(myFunc(7, 8), 15);

cin >> myFunc(‘2’, ‘3’);

cout << myFunc(myFunc(7), 15);

3 points
Question 98
1. The statement: return 8, 10; returns the value ____.

8

10

18

80

3 points
Question 99
1. The statement: return 37, y, 2 * 3; returns the value ____.

2

3

y

6

3 points
Question 100
1. The statement: return 2 * 3 + 1, 1 + 5; returns the value ____.

2

3

6

7

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

2

 

The Tip Left column in the Friday worksheet contains a fill color and number formatting. You want to fill these formats to the other daily worksheets.

Group the Friday through Monday worksheets, staring with the Friday worksheet. Fill the format only for the range E5:E24.

 

8

 

3

 

Now you want to insert column totals for the five worksheets simultaneously.

With the worksheets still grouped, insert SUM functions in the range B25:E25 and apply the Totals cell style. Ungroup the worksheets.

 

5

 

4

 

The Week worksheet is designed to be a summary sheet. You want to insert a hyperlink to the Total heading in the Monday worksheet.

On the Week worksheet, in cell A5, insert a hyperlink to cell A25 in the Monday worksheet with the ScreenTip text Monday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

5

 

In cell A6 on the Week worksheet, insert a hyperlink to cell A25 in the Tuesday worksheet with the ScreenTip text Tuesday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

6

 

In cell A7, insert a hyperlink to cell A25 in the Wednesday worksheet with the ScreenTip text Wednesday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

7

 

In cell A8, insert a hyperlink to cell A25 in the Thursday worksheet with the ScreenTip text Thursday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

8

 

In cell A9, insert a hyperlink to cell A25 in the Friday worksheet with the ScreenTip text Friday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

9

 

Now, you are ready to insert references to cells in the individual worksheets. First, you will insert a reference to Monday’s Food Total.

In cell B5 on the Week worksheet, insert a formula with a 3-D reference to cell B25 in the Monday worksheet. Copy the formula to the range C5:E5.

 

2

 

10

 

The next formula will display the totals for Tuesday.

In cell B6, insert a formula with a 3-D reference to cell B25 in the Tuesday worksheet. Copy the formula to the range C6:E6.

 

2

 

11

 

In cell B7, insert a formula with a 3-D reference to cell B25 in the Wednesday worksheet. Copy the formula to the range C7:E7.

 

2

 

12

 

In cell B8, insert a formula with a 3-D reference to cell B25 in the Thursday worksheet. Copy the formula to the range C8:E8.

 

2

 

13

 

In cell B9, insert a formula with a 3-D reference to cell B25 in the Friday worksheet. Copy the formula to the range C9:E9.

 

2

 

14

 

Now you want to use a function with a 3-D reference to calculate the totals.

In cell B10 on the Week worksheet, insert the SUM function with a 3-D reference to calculate the total Food purchases (cell B25) for the five days. Copy the function to the range C10:E10.

 

5

 

15

 

The servers are required to share a portion of their tips with the Beverage Worker and Assistants. The rates are stored in another file.

Open the Exp_Excel_Ch09_Cap_Assessment_Rates.xlsx workbook. Go back to the Exp_Excel_Ch09_Cap_Assessment_Tips.xlsx workbook. In cell F5 of the Week worksheet, insert a link to the Beverage Worker Tip Rate (cell C4 in the Rates workbook) and multiply the rate by the Monday Drinks (cell C5). Copy the formula to the range F6:F9.

 

5

 

16

 

Next, you will calculate the tips for the assistant.

In cell G5 in the Tips workbook, insert a link to the Assistant Tip Rate (cell C5 in the Rates workbook) and multiply the rate by the Monday Subtotal (cell D5). Copy the formula to the range G6:G9. Close the Rates workbook.

Note: The tip is a monetary value in the Week worksheet. It should be formatted for Accounting Number Format.

 

5

 

17

 

You noticed a circular error when you first opened the Tips workbook. Now you will find and correct it.

On the Week worksheet, check for errors and correct the formula with the circular reference.

 

5

 

18

 

You want to create a validation rule to prevent the user from accidentally entering a negative value. For now, you will create a validation in the Friday worksheet.

Select the range E5:E24 in the Friday worksheet, create a validation rule to allow a decimal value greater than or equal to zero. Enter the input message title Tip and the input message Enter the amount of tip. (including the period). Use the Stop alert with the error alert title Invalid Number and the error alert message The tip must be zero or more. (including the period). Test the data validation by attempting to enter -20 in cell E5 and then cancel the change.

 

10

 

19

 

Now you will copy the validation settings to the other daily worksheets.

Copy the range E5:E24 in the Friday worksheet. Group the Monday through Thursday worksheets, select the range E5:E24, and use Paste Special Validation to copy the validation settings.

 

10

 

20

 

You want to unlock data-entry cells so that the user can change the tips in the daily worksheets.

Group the Monday through Friday worksheets. Select the ranges E5:E24 and unlock these cells.

 

10

 

21

 

Create footer with your name on the left side, the sheet name code in the center, and the file name code on the right side of all worksheets.

 

5

 

22

 

Now that you unlocked data-entry cells, you are ready to protect the worksheets to prevent users from changing data in other cells. Individually, protect each sheet using the default allowances without a password.

 

12

 

23

 

Mark the workbook as final.

Note: Mark as Final is not available in Excel for Mac. Instead, use Always Open Read-Only on the Review tab.

 

0

 

24

 

Save and close Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx. Exit Excel. Submit the file as directed.

 

0

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

  1. sDownload the attached template called “INFO620-Assignment1_LastNameFirst.doc”.
  2. Change the file name applying your Last Name and First Name in place of the LastNameFirst.
  3. Then open the newly saved file and enter your name and the date due on the top of the document.
  4. Then enter each problem’s solution within this same file in their proper locations WITHOUT changing or erasing the questions.
  5. Support your responses and answers by references from the text.
  6. Review and complete all questions.
  7. Then upload to Assignment #1 area of the Assignments.
  8. Your grade may be reduced if these instructions are NOT followed closely.

Week 1 Assignment Grading Rubric: 

#1.9 0.2 points #3.13 0.3 points #4.12a 0.2 points
#1.10 0.2 points #3.16 0.3 points #4.12b 0.2 points
#1.12 0.2 points #3.19a 0.2 points #4.12c 0.2 points
#1.13 0.2 points #3.19b 0.2 points #4.12d 0.2 points
#1.14a 0.2 points #3.19c 0.2 points #4.12e 0.2 points
#1.14b 0.2 points #3.19d 0.2 points #4.12f 0.2 points
#2.14 0.3 points #3.20 0.3 points #4.15a 0.2 points
#2.15 0.3 points     #4.14b 0.1 points

Here are the contents of Assignment #1 (however – please use the template attached  – don’t copy and paste from here):

CH1: DATABASES AND DATABASE USERS
#1.9 – What is the difference between controlled and uncontrolled redundancy?
#1.10 – Specify all the relationships among the records of the database shown in Figure 1.2.
#1.12 – Cite some examples of integrity constraints that you think can apply to the database shown in Figure 1.2.
#1.13 – Give examples of systems in which it may make sense to use traditional file processing instead of a database approach.
#1.14 – Consider Figure 1.2.
a.        If the name of the ‘CS’ (Computer Science) Department changes to ‘CSSE’ (Computer Science and Software Engineering) Department and the corresponding prefix for the course number also changes, identify the columns in the database that would need to be updated.
b.       Can you restructure the columns in COURSE, SECTION, and PREREQUISITE tables so that only one column will need to be updated?
CH 2: DATABASE SYSTEM CONCEPTS AND ARCHITECTURE
#2.14 – if you were designing a Web-based system to make airline reservations and to sell airline tickets, which DBMS Architecture would you choose from Section 2.5? Why? Why would the other architectures not be a good choice?
#2.15 – Consider Figure 2.1. In addition to constraints relating the values of columns in one table to columns in another table, there are also constraints that impose restrictions on values in a column or a combination of columns within a table. One such constraint forces that a column or a group of columns must be unique across all rows in the table. For example, in the STUDENT table, the StudentNumber column must be unique (to prevent two different students from having the same StudentNumber). Identify the column or the group of columns in the other tables that must be unique across all rows in the table?
CH 3: THE RELATIONAL DATA MODEL AND RELATIONAL DATABASE CONSTRAINTS
#3.13 – Consider the relation CLASS(Course#, Univ_Section#, InstructorName, Semester, BuildingCode, Room#, TimePeriod, Weekdays, CreditHours). This represents classes taught in a university with unique Univ_Section#. Give what you think should be various candidate keys and
#3.16 – Consider the following relations for a database that keeps track of student enrollment in courses and the books adopted for each course:
STUDENT (SSN, Name, Major, Bdate)
COURSE (Course#, Quarter, Grade)
ENROLL (SSN, Course#, Quarter, Grade)
BOOK_ADOPTION (Course#, Quarter, Book_ISBN)
TEXT (Book_ISBN, Book_Title, Publisher, Author)
Specify the foreign keys for this schema, stating any assumptions you make.
#3.19 – Consider a STUDENT relation in a UNIVERSITY database with the following attributes (Name, SSN, Local_phone, Address, Cell_phone, Age, GPA). Note that the cell phone may be from a different city and state (or province) from the local phone. A possible tuple of the relation is shown below:
Name
SSN
LocalPhone
Address
CellPhone
Age
GPA
George Shaw William Edwards
123-45-6789
555-1234
123 Main St., Anytown, CA 94539
555-4321
19
3.75
a.        Identify the critical missing information from the LocalPhone and CellPhone attributes as shown in the example above. (Hint: How do call someone who lives in a different state or province?)
b.       Would you store this additional information in the LocalPhone and CellPhone attributes or add new attributes to the schema for STUDENT?
c.        Consider the Name attribute. What are the advantages and disadvantages of splitting this field from one attribute into three attributes (first name, middle name, and last name)?
d.       What general guideline would you recommend for deciding when to store information in a single attribute and when to split the information.
#3.20 – Recent changes in privacy laws have disallowed organizations from using SSN to identify individuals unless certain restrictions are satisfied. As a result, most US universities cannot use SSNs as primary keys (except for financial data). In practice, StudentID, a unique ID, a unique identifier, assigned to every student, is likely to be used as the primary key rather than SSN since StudentID is usable across all aspects of the system. Reference the entire problem in the text
CH 4: Basic SQL
#4.12 – Specify the following queries in SQL on the database schema of Figure 1.2.
a)       Retrieve the names of all senior students majoring in ‘COSC’ (computer science).
b)       Retrieve the names of all courses taught by professor King in 85 and 86.
c)       For each section taught by professor King, retrieve the course number, semester, year, and number of students who took the section.
d)       Retrieve the name and transcript of each senior student (Class=5) majoring in COSC. Transcript includes course name, course number, credit hours, semester, year, and grade for each course completed by the student.
e)       Retrieve the names and major departments of all straight A students (students who have a grade of A in all their courses).
f)        Retrieve the names and major departments of all students who do not have any grade of A in any of their courses.
#4.15 – Consider the EMPLOYEE table’s constraint EMPSUPERFK as specified in Figure 4.2 is changed to read as follows:
CONSTRAINT EMPSUPERFK
 FOREIGN KEY (SUPERSSN) REFERNCES EMPLOYEE(SSN)
        ON DELETE CASCADE ON UPDATE CASCADE,
Answer the following questions:
a.        What happens when the following command is run on the database state shown in Figure 5.6?
                DELETE EMPLOYEE WHERE LNAME = ‘Borg’
b.       Is it better to CASCADE or SET NULL in case of EMPSUPERFK constraint ON DELETE?
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Exp19_Excel_Ch10_ML1_Dow_Jones_Instructions.docx

Grader – Instructions Excel 2019 Project

Exp19_Excel_Ch10_ML1_Dow_Jones

 

Project Description:

You are an intern for Hicks Financial, a small trading company located in Toledo, Ohio. Your intern supervisor wants you to create a report that details all trades made in February using current pricing information from the Dow Jones Index. To complete the task, you will import and shape data using Power Query. Then you will create data connections and visualizations of the data.

 

Steps to Perform:

Step Instructions Points Possible
1 Start Excel. Download and open the file named Exp19_Excel_Ch10_GRADER_ML1_Dow.xlsx. Grader has automatically added your last name to the beginning of the filename. 0
2 Use Get & Transform Data tools (Power Query) to import the Dow Index information located in Table 2 from the URL https://finance.yahoo.com/quote/%5EDJI/components?p=%5EDJI. Before loading the data, use the Power Query Editor to remove the Change, % Change, and Volume columns. Format the Last Price column as Currency, name the query Dow and load the data into the existing worksheet. 15
3 Name the worksheet Current_Price. 5
4 Use Power Query to import trade data located in the workbook Exp19_Excel_Ch10_GRADER_ML1-TradeInfo.csv. Before loading the data, if necessary use the Power Query Editor to remove the NULL value columns and use the First Row As Headers. Split the company column using the left most space as the delimiter and rename the respective columns Symbol and Company Name. 15
5 Rename the worksheet Trades. 5
6 Add the Dow table and the Exp19_Excel_Ch10_GRADER_ML1-TradeInfo table to the Data Model. 0
7 Use Power Pivot to create the following relationship: Table Exp19_Excel_Ch10_GRADER_ML1-TradeInfo Field Symbol Table Dow Field Symbol 15
8 Use Power Pivot to create a PivotTable with the EXP19_Excel_Ch110_GRADER_ML1_TradeInfo Date field as a Filter, Last Price as a value, and the Dow table Company Name as Rows. 20
9 Create a Clustered Column PivotChart based on the PivotTable that compares the trading price of Apple and Coca-Cola stocks. 15
10 Add the chart title Trading Comparison, apply Accounting Number Format to cells C4:C5, and name the worksheet Price_Comparison. 5
11 Delete Sheet 1, if necessary. 5
12 Edit the connection properties to Refresh data when opening the file. 0
13 Save and close Exp19_Excel_Ch10_GRADER_ML1_Dow.xlsx and Exp19_Excel_Ch10_GRADER_ML1-TradeInfo.csv. Exit Excel. Submit the file as directed. 0
Total Points 100

 

Created On: 10/05/2020 1 Exp19_Excel_Ch10_ML1 – Dow Jones 1.3

Amy_Exp19_Excel_Ch10_GRADER_ML1-Dow.xlsx

Sheet1

1

2

3

4

5

6

7

8

9

A

B

C

D

E

Exp19_Excel_CH10_GRADER_ML1_Dow Jones_Final.jpg

Exp19_Excel_Ch10_GRADER_ML1-TradeInfo.csv

Date,Trade_#,Company,,,,, 2/27/2021,8280,CAT Caterpillar,,,,, 2/25/2021,3564,CVX Chevron,,,,, 2/25/2021,7709,BA Boeing,,,,, 2/11/2021,5494,BA Boeing,,,,, 2/7/2021,6555,HD Home Depot,,,,, 2/13/2021,8821,CSCO Cisco,,,,, 2/14/2021,4771,DIS Disney,,,,, 2/17/2021,9021,HD Home Depot,,,,, 2/28/2021,1342,BA Boeing,,,,, 2/6/2021,5092,AAPL Apple,,,,, 2/20/2021,9602,AAPL Apple,,,,, 2/16/2021,3952,GS Goldman Sachs,,,,, 2/20/2021,3432,MMM 3M,,,,, 2/10/2021,2953,KO Coca-Cola,,,,, 2/27/2021,9270,AXP American Express,,,,,

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Warming Hut Management

This week it seems like everyone needs an answer to a question. The Accounting Manager for Operations has asked you to update some analysis prepared earlier in the year. In an attempt to predict year-end changes in net income, you have been asked to prepare some reports on changes in condominium rental fees, ski lift tickets, and X Game tickets and pricing.

The Sales Department for Luxury Condominiums wants to know how increasing their rental pricing by varying percentages will affect the existing pricing. The manager would like to know how that will increase the Summit Ridge Mountain Resort’s total revenue. A one-variable data table might be good to create these results.

The supervisor in charge of setting prices for lift tickets also needs some help. She wants to price the lift tickets so that they are affordable but yet offer the resort a chance to improve its net income at the end of the season. A one-variable data table might be able to answer this question.

Resort Management has a target income for the X Games. They need help determining the best combination of pricing and quantity of tickets to sell for the X Games to be a success. A two-variable data table might be best to display these results.

And there are more puzzling questions. Resort Management has reviewed variables such as lift ticket prices, restaurant revenues, retail revenues, maintenance costs, and payroll. They would like you to create a Scenario Summary to determine optimistic, mid-range, and pessimistic scenarios for the resort. The Operations Manager would like to know how these changes might affect revenue, expenses, and net income. A Scenario Summary would be a good choice for this analysis.

Last, all of the Warming Hut Management need a little help with some investigation on their data. They have quite a bit of data collected but need some assistance making sense of it. It may be time to polish your skills with Pivot Tables, because the management has many questions and concerns. Your boss is confident about your ability to be creative and customize some Pivot Tables that are unique to each Hut.

What-If questions need solid answers. It is time to provide a professional response.

Deliverables

After completing the steps below, turn in one Excel 2016 workbook. Rename the workbook with your lastname_first initial_Week6_Lab. xlsx. Example: If your name were Jane Doe, your workbook would be Doe_J_Week6_Lab.xlsx.

LAB 6 – What-If-Analysis
Step Task Points Possible Points Received Comments
1 Complete Income Statement
1a – g Complete formulas & formatting 4
2 Build One-Variable Data Tables
2a One-Variable Data Table for condo rentals 3
2b One-Variable Data Table for ski lift tickets 3
2c Apply conditional formatting 2
2d Answer question in G17 5
3 Build Two-Variable Data Table
3a Enter Net Income and format 3
3b Apply conditional formatting 3
3c-d Answer question in G17 5
4 Scenarios and Summary
4a Name Cells for Scenario 2
4b Create three scenarios 4
4c Create Scenario Summary 2
4d Move sheet & apply formatting 2
5 Create Pivot Tables
5a, b Build Pivot Table 1 3
5c Build Pivot Table 2 3
5d Build Pivot Table 2 3
5e Create a chart for one pivot table 2
5f Apply professional formatting 2
6 Create Documentation Sheet
6a Create Documentation Sheet 2
6b Organize worksheet contents 1
6c, d Format Documentation Sheet 1
Comment: What you learned from completing this Lab 5
TOTAL POINTS 60 0

Week 6 Grading Rubric

Lab Resources

Microsoft Office: Excel 2016

Options for Accessing Microsoft Excel 2016

  1. Use a personal copy on your PC. You can request a copy of Microsoft Office 2016 via the Student Software Store icon on the Course Resources Page.
  2. If you are a MAC user, click to read the MAC User Information.
  3. If you do not have Excel 2016 installed locally, then access the software by going to the Course Resources page, Lab Resources section, and click the Virtual Lab Citrix icon.

Lab Steps

Preparation

You will be using Microsoft Excel 2016 for this lab.

Be sure you have read the required chapter materials and reviewed the hands-on exercise videos located on the Lesson page before you begin the lab.

Please do not rely solely on the hands-on exercise videos to complete this week’s lab. The videos provide detailed examples walking you through the hands-on exercises. Applying the hands-on exercise examples will provide both practice and instruction of what to complete.

Begin: Open and Save

Download the spreadsheet Week 6 Lab – Summit Ridge Mountain Resort Student.xslx. (Links to an external site.)Links to an external site. You will be prompted to save the file. Click yes.

Open the saved file from your Download folder on your computer.

Note: If you are using the Remote Lab environment, you will need to follow the instructions for uploading the file. These instructions can be found on the Lab page when you click on the Lab icon on Course Resources.

To save the spreadsheet with a new file name,

  • open the workbook in Excel 2016; and
  • in Excel, click File and then Save As and rename it as lastname_first initial_Week6_Lab.xlsx (Jane Doe would save the file as Doe_J_Week6_Lab.xlsx).

Step 1: Complete Income Statement

It is time to build the formulas needed to complete the income statement. Begin working on the Income Statement worksheet and complete formulas for all of the cells marked in gray.

  1. Enter the formula to calculate the Condo Rentals Revenue in C13 Multiple the Quantity of Condo Rental Days * the Price for Condo Rental.
  2. Enter the formula to calculate the Ski Lift Revenue in C14 Multiple the Quantity of Ski Lift Tickets * the Price for Ski Lift Tickets.
  3. Enter the formula to calculate the Winter X Games Revenue in C17 Multiple the Quantity of X Games Tickets * the Price for X Games Tickets.
  4. Enter the formula to calculate the Total Revenues in C20 and Total Expenses in C34.
  5. Make sure the cell references for Total Revenues and Total Expenses are placed in cells C37 and C38 respectively.
  6. Enter the formula to calculate the Net Income in cell C39.
  7. Apply professional formatting to all of this data using the image below as a guide.

Income Statement

Step 2: Build the One-Variable Data Tables

Now that the Income Statement is complete, begin to address the questions about the condo rentals and ski lift tickets.

  1. Build a one-variable data table based on condo rental days. The initial values for Revenue and Net Income for cells I6 and I7 should be cell references from the income statement.
  2. Build a one-variable data table based on the quantity of ski lift tickets. The initial values for Revenue and Net Income for cells I14 and I15 should be cell references from the income statement.
  3. Apply conditional formatting to highlight Net Income of at least $250,000 for each of the one-variable data tables.
  4. In cell G17, a question exists. “If management has a target net income of at least $250,000, which of the above SPECIFIC scenarios in the condo rentals or ski tickets one-variable data table would you recommend using? Explain your reasoning.” Make sure you place your answer in the text box beginning in cell G20.
  5. Apply professional formatting to all of this data using the image below as a guide.

One-Variable Data Tables 

Step 3: Build the Two-Variable Data Table

Once the one-variable data tables are complete, begin to address the questions about the X Games tickets sold.

  1. Build a two-variable data table based on the quantity and price of the X Games tickets sold.  Enter a reference to Net Income in cell I27 from the income statement.
  2. Apply conditional formatting to highlight Net Income of at least $250,000 for each of the two-variable data table.
  3. In cell G37, a question exists. “If management has a target net income of at least $250,000. Which of the above SPECIFIC combinations of price and quantity of X Games Tickets in the two-variable data table would you recommend using? Explain your reasoning.”
  4. Make sure you place your answer in the text box beginning in cell G40.
  5. Apply professional formatting to all of this data using the image below as a guide.
    Two-Variable Data Table

Step 4: Create the Scenario Summary

You addressed quite a few questions. Now it is time to create a Scenario Summary.

  1. Assign names to all of the income statement cell values in column C in the assumptions, revenues, expenses, and summary sections using the labels in column B. For example, select cells B5:C10, and then on the Formula tab in the Defined Names Group, select “Create from Selection” and use the left column as the name (repeat on lower sections).
  2. Build three scenarios by changing cells C8, C15, C16, C29, and C30 using the following data: Optimistic, Mid-range, and Pessimistic.
    Scenario Details
  3. Generate the Scenario Summary using C37:C39 as the result cells.
  4. Move the Scenario Summary sheet after the Income Statement and apply professional formatting to all of this data using the image below as a guide.

Completed Scenarios

Step 5: Create Pivot Tables From Warming Hut Data

Select the Warming Hut Sales Worksheet. You notice the data are not formatted or organized well.

  1. Use the Warming Hut Sales data to build Pivot Tables.
  2. Build the first Pivot Table to summarize total sales by category and by location. Name this sheet Pivot Table 1.
  3. Build the second Pivot Table to summarize total sales by category and by season for only the Summit View location. Name this sheet Pivot Table 2.
  4. Build the third Pivot Table to summarize total sales by month and by product for only the Mogul Hill location. Name this sheet Pivot Table 3.
  5. Choose one of the created Pivot Tables and add a professional chart to the same worksheet.
  6. Apply professional formatting to all of this data using the image below as a guide.
    Click Image to Expand

Step 6: Create a Documentation Sheet

Clean up the formatting of your Excel workbook, taking into account professional appearance.

 

The Minimum Requirement (per the Grading Rubric)

 

  1. Insert a new spreadsheet into the workbook. The documentation sheet should be the first sheet in the workbook.
  2. Make certain all contents of the workbook are properly noted on the documentation sheet.
  3. Make certain each tab has a descriptive name for each tab (sheet) in the workbook.
  4. Create the professional documentation worksheet. Be sure to include a description of each worksheet. An image is provided below.
    Click Image to Expand

     

 

 

Finish and Submit

Save your Excel file. Make sure you are aware as to where your files are physically saved. Saving your file often is good practice (Ctrl + s).

Your Excel file should contain seven worksheets.

  • Documentation Page
  • Income Statement
  • Scenario Summary
  • WarmingHutSales
  • Pivot Table 1
  • Pivot Table 2
  • Pivot Table 3

Submit one workbook. When submitting the workbook, provide a comment in the comments area explaining what you learned from completing this lab activity. File naming convention: If your name is Jane Doe, then your file should be named very similar to Doe_J_Week6_Lab.xlsx.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

8.  A script to create a small table with 3 rows for recovery testing.

CREATE TABLE LOG (

Id int primary key not null,

UserID int,

TimeStamp DateTime

)

Insert into LOG (1,1,2019-07-13 10:00:01)

Insert into LOG (2,4,2019-07-13 09:20:01)

Insert into LOG (3,5,2019-07-13 08:50:01)

9.  Backup and recovery commands for Recovery testing using export/import and RMAN utilities.

rman

RMAN> OnlineShopping

RMAN> register database

RMAN> RESYNC OnlineShopping;

10.  Design and backup/recovery commands for your test.

RMAN> backup database;

 

Starting backup at 12-JUL-19

using target database control file instead of recovery catalog

allocated channel: ORA_DISK_1

 

channel ORA_DISK_1: SID=198 device type=DISK

channel ORA_DISK_1: starting full datafile backup set

channel ORA_DISK_1: specifying datafile(s) in backup set

 

input datafile file number=00001 name=D:\APP1\SUNTYADA\ORADATA\ORCL\SYSTEM01.DBF

input datafile file number=00002 name=D:\APP1\SUNTYADA\ORADATA\ORCL\SYSAUX01.DBF

input datafile file number=00005 name=D:\APP1\SUNTYADA\ORADATA\ORCL\EXAMPLE01.DBF

input datafile file number=00003 name=D:\APP1\SUNTYADA\ORADATA\ORCL\UNDOTBS01.DBF

input datafile file number=00004 name=D:\APP1\SUNTYADA\ORADATA\ORCL\USERS01.DBF

 

channel ORA_DISK_1: starting piece 1 at 12-JUL-19

channel ORA_DISK_1: finished piece 1 at 12-JUL-19

 

piece handle=D:\APP1\SUNTYADA\FLASH_RECOVERY_AREA\ORCL\BACKUPSET\2014_10_05\O1_MF_NNNDF_TAG20191005T162412_B328TXQG_.BKP tag=TAG20141005T162412 comment=NONE

 

channel ORA_DISK_1: backup set complete, elapsed time: 00:04:27

channel ORA_DISK_1: starting full datafile backup set

channel ORA_DISK_1: specifying datafile(s) in backup set

 

including current control file in backup set

including current SPFILE in backup set

 

channel ORA_DISK_1: starting piece 1 at 12-JUL-19

channel ORA_DISK_1: finished piece 1 at 12-JUL-19

 

piece handle=D:\APP1\SUNTYADA\FLASH_RECOVERY_AREA\ORCL\BACKUPSET\2019_07_12\O1_MF_NCSNF_TAG20191005T162412_B3293806_.BKP tag=TAG20191005T162412 comment=NONE

channel ORA_DISK_1: backup set complete, elapsed time: 00:00:04

 

Finished backup at 12-JUL-19

Restore:

Starting restore at 12-JUL-19

using channel ORA_DISK_1

 

List of Backup Sets

===================

BS Key Type LV Size       Device Type Elapsed Time Completion Time

——- —- — ———- ———– ———— —————

4       Full   1.39G     DISK       00:04:23     12-JUL-19

BP Key: 4   Status: AVAILABLE Compressed: NO Tag: TAG20191005T162412

Piece Name: D:\APP1\SUNTYADA\FLASH_RECOVERY_AREA\ORCL\BACKUPSET\2019_07_12\O1_MF_NNNDF_TAG20191005T162412_B328TXQG_.BKP

List of Datafiles in backup set 4

File LV Type Ckp SCN   Ckp Time Name

—- — —- ———- ——— —-

1       Full 9684060   12-JUL-19 D:\APP1\SUNTYADA\ORADATA\ORCL\SYSTEM01.DBF

2       Full 9684060   12-JUL-19 D:\APP1\SUNTYADA\ORADATA\ORCL\SYSAUX01.DBF

3       Full 9684060   12-JUL-19 D:\APP1\SUNTYADA\ORADATA\ORCL\UNDOTBS01.DBF

4       Full 9684060   12-JUL-19 D:\APP1\SUNTYADA\ORADATA\ORCL\USERS01.DBF

5       Full 9684060   12-JUL-19 D:\APP1\SUNTYADA\ORADATA\ORCL\EXAMPLE01.DBF

 

List of Archived Log Copies for database with db_unique_name ORCL

=====================================================================

Key     Thrd Seq     S Low Time

——- —- ——- – ———

367     1   366     A 02-OCT-14

Name: D:\APP1\SUNTYADA\FLASH_RECOVERY_AREA\ORCL\ARCHIVELOG\2019_07_12\O1_MF_1_366_B32925TJ_.ARC

Media recovery start SCN is 9684060

Recovery must be done beyond SCN 9704654 to clear datafile fuzziness

 

Finished restore at 12-JUL-19

 

11.  Include explanations for what happened during the recovery when import vs. RMAN was used.

RMAN and export both used to backup tables, both commands supports the flashback database but some difference is

· Data Pump Export (expdp) – The export utility is a “logical” backup, usually done by specifying table names which need to be backed up.

· Recovery manager (rman) – RMAN is designed for backup and recovery, it takes the backup of full database.

Rman is more preferable in my opinion for the database.

12.  Flashback recovery commands.

· sqlplus ‘/ as sysdba’

· SQL> alter system set db_recovery_file_dest=’+<FRA Diskgroup>’ SCOPE=spfile;

· SQL> alter system set db_recovery_file_dest_size=100G SCOPE=spfile;

· sqlplus ‘/ as sysdba’

· SQL> shutdown immediate;

· SQL> startup mount;

· If flashback to any previous point in time is required, then turn flashback on using the following command

· SQL> alter database flashback on;

· SQL> alter database open;

· SQL> alter system set db_flashback_retention_target=2880;

· sqlplus ‘/ as sysdba’

· SQL> select name, time,guarantee_flashback_databse from v$restore_point;

· SQL> quit

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

FUNDAMENTALS OF

Database Systems SIXTH EDITION

 

 

This page intentionally left blank

 

 

FUNDAMENTALS OF

Database Systems SIXTH EDITION

Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington

Shamkant B. Navathe College of Computing Georgia Institute of Technology

Addison-Wesley Boston Columbus Indianapolis New York San Francisco Upper Saddle River

Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico City Sao Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

 

 

Editor in Chief: Michael Hirsch Acquisitions Editor: Matt Goldstein Editorial Assistant: Chelsea Bell

Managing Editor: Jeffrey Holcomb Senior Production Project Manager: Marilyn Lloyd

Media Producer: Katelyn Boller Director of Marketing: Margaret Waples

Marketing Coordinator: Kathryn Ferranti Senior Manufacturing Buyer: Alan Fischer

Senior Media Buyer: Ginny Michaud Text Designer: Sandra Rigney and Gillian Hall

Cover Designer: Elena Sidorova Cover Image: Lou Gibbs/Getty Images

Full Service Vendor: Gillian Hall, The Aardvark Group Copyeditor: Rebecca Greenberg

Proofreader: Holly McLean-Aldis Indexer: Jack Lewis

Printer/Binder: Courier, Westford Cover Printer: Lehigh-Phoenix Color/Hagerstown

Credits and acknowledgments borrowed from other sources and reproduced with permis- sion in this textbook appear on appropriate page within text.

The interior of this book was set in Minion and Akzidenz Grotesk.

Copyright © 2011, 2007, 2004, 2000, 1994, and 1989 Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. To obtain permission(s) to use material from this work, please submit a written request to Pear- son Education, Inc., Permissions Department, 501 Boylston Street, Suite 900, Boston, Massa- chusetts 02116.

Many of the designations by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps.

Library of Congress Cataloging-in-Publication Data

Elmasri, Ramez. Fundamentals of database systems / Ramez Elmasri, Shamkant B. Navathe.—6th ed.

p. cm. Includes bibliographical references and index. ISBN-13: 978-0-136-08620-8

1. Database management. I. Navathe, Sham. II. Title.

QA76.9.D3E57 2010 005.74—dc22Addison-Wesley

is an imprint of

10 9 8 7 6 5 4 3 2 1—CW—14 13 12 11 10 ISBN 10: 0-136-08620-9 ISBN 13: 978-0-136-08620-8

 

 

To Katrina, Thomas, and Dora (and also to Ficky)

R. E.

To my wife Aruna, mother Vijaya, and to my entire family

for their love and support

S.B.N.

 

 

This page intentionally left blank

 

 

vii

This book introduces the fundamental concepts nec-essary for designing, using, and implementing database systems and database applications. Our presentation stresses the funda- mentals of database modeling and design, the languages and models provided by the database management systems, and database system implementation tech- niques. The book is meant to be used as a textbook for a one- or two-semester course in database systems at the junior, senior, or graduate level, and as a reference book. Our goal is to provide an in-depth and up-to-date presentation of the most important aspects of database systems and applications, and related technologies. We assume that readers are familiar with elementary programming and data- structuring concepts and that they have had some exposure to the basics of com- puter organization.

New to This Edition The following key features have been added in the sixth edition:

■ A reorganization of the chapter ordering to allow instructors to start with projects and laboratory exercises very early in the course

■ The material on SQL, the relational database standard, has been moved early in the book to Chapters 4 and 5 to allow instructors to focus on this impor- tant topic at the beginning of a course

■ The material on object-relational and object-oriented databases has been updated to conform to the latest SQL and ODMG standards, and consoli- dated into a single chapter (Chapter 11)

■ The presentation of XML has been expanded and updated, and moved ear- lier in the book to Chapter 12

■ The chapters on normalization theory have been reorganized so that the first chapter (Chapter 15) focuses on intuitive normalization concepts, while the second chapter (Chapter 16) focuses on the formal theories and normaliza- tion algorithms

■ The presentation of database security threats has been updated with a dis- cussion on SQL injection attacks and prevention techniques in Chapter 24, and an overview of label-based security with examples

Preface

 

 

■ Our presentation on spatial databases and multimedia databases has been expanded and updated in Chapter 26

■ A new Chapter 27 on information retrieval techniques has been added, which discusses models and techniques for retrieval, querying, browsing, and indexing of information from Web documents; we present the typical processing steps in an information retrieval system, the evaluation metrics, and how information retrieval techniques are related to databases and to Web search

The following are key features of the book:

■ A self-contained, flexible organization that can be tailored to individual needs

■ A Companion Website (http://www.aw.com/elmasri) includes data to be loaded into various types of relational databases for more realistic student laboratory exercises

■ A simple relational algebra and calculus interpreter

■ A collection of supplements, including a robust set of materials for instruc- tors and students, such as PowerPoint slides, figures from the text, and an instructor’s guide with solutions

Organization of the Sixth Edition There are significant organizational changes in the sixth edition, as well as improve- ment to the individual chapters. The book is now divided into eleven parts as follows:

■ Part 1 (Chapters 1 and 2) includes the introductory chapters

■ The presentation on relational databases and SQL has been moved to Part 2 (Chapters 3 through 6) of the book; Chapter 3 presents the formal relational model and relational database constraints; the material on SQL (Chapters 4 and 5) is now presented before our presentation on relational algebra and cal- culus in Chapter 6 to allow instructors to start SQL projects early in a course if they wish (this reordering is also based on a study that suggests students master SQL better when it is taught before the formal relational languages)

■ The presentation on entity-relationship modeling and database design is now in Part 3 (Chapters 7 through 10), but it can still be covered before Part 2 if the focus of a course is on database design

■ Part 4 covers the updated material on object-relational and object-oriented databases (Chapter 11) and XML (Chapter 12)

■ Part 5 includes the chapters on database programming techniques (Chapter 13) and Web database programming using PHP (Chapter 14, which was moved earlier in the book)

■ Part 6 (Chapters 15 and 16) are the normalization and design theory chapters (we moved all the formal aspects of normalization algorithms to Chapter 16)

viii Preface

 

 

Preface ix

■ Part 7 (Chapters 17 and 18) contains the chapters on file organizations, indexing, and hashing

■ Part 8 includes the chapters on query processing and optimization tech- niques (Chapter 19) and database tuning (Chapter 20)

■ Part 9 includes Chapter 21 on transaction processing concepts; Chapter 22 on concurrency control; and Chapter 23 on database recovery from failures

■ Part 10 on additional database topics includes Chapter 24 on database secu- rity and Chapter 25 on distributed databases

■ Part 11 on advanced database models and applications includes Chapter 26 on advanced data models (active, temporal, spatial, multimedia, and deduc- tive databases); the new Chapter 27 on information retrieval and Web search; and the chapters on data mining (Chapter 28) and data warehousing (Chapter 29)

Contents of the Sixth Edition Part 1 describes the basic introductory concepts necessary for a good understanding of database models, systems, and languages. Chapters 1 and 2 introduce databases, typical users, and DBMS concepts, terminology, and architecture.

Part 2 describes the relational data model, the SQL standard, and the formal rela- tional languages. Chapter 3 describes the basic relational model, its integrity con- straints, and update operations. Chapter 4 describes some of the basic parts of the SQL standard for relational databases, including data definition, data modification operations, and simple SQL queries. Chapter 5 presents more complex SQL queries, as well as the SQL concepts of triggers, assertions, views, and schema modification. Chapter 6 describes the operations of the relational algebra and introduces the rela- tional calculus.

Part 3 covers several topics related to conceptual database modeling and database design. In Chapter 7, the concepts of the Entity-Relationship (ER) model and ER diagrams are presented and used to illustrate conceptual database design. Chapter 8 focuses on data abstraction and semantic data modeling concepts and shows how the ER model can be extended to incorporate these ideas, leading to the enhanced- ER (EER) data model and EER diagrams. The concepts presented in Chapter 8 include subclasses, specialization, generalization, and union types (categories). The notation for the class diagrams of UML is also introduced in Chapters 7 and 8. Chapter 9 discusses relational database design using ER- and EER-to-relational mapping. We end Part 3 with Chapter 10, which presents an overview of the differ- ent phases of the database design process in enterprises for medium-sized and large database applications.

Part 4 covers the object-oriented, object-relational, and XML data models, and their affiliated languages and standards. Chapter 11 first introduces the concepts for object databases, and then shows how they have been incorporated into the SQL standard in order to add object capabilities to relational database systems. It then

 

 

x Preface

covers the ODMG object model standard, and its object definition and query lan- guages. Chapter 12 covers the XML (eXtensible Markup Language) model and lan- guages, and discusses how XML is related to database systems. It presents XML concepts and languages, and compares the XML model to traditional database models. We also show how data can be converted between the XML and relational representations.

Part 5 is on database programming techniques. Chapter 13 covers SQL program- ming topics, such as embedded SQL, dynamic SQL, ODBC, SQLJ, JDBC, and SQL/CLI. Chapter 14 introduces Web database programming, using the PHP script- ing language in our examples.

Part 6 covers normalization theory. Chapters 15 and 16 cover the formalisms, theo- ries, and algorithms developed for relational database design by normalization. This material includes functional and other types of dependencies and normal forms of relations. Step-by-step intuitive normalization is presented in Chapter 15, which also defines multivalued and join dependencies. Relational design algorithms based on normalization, along with the theoretical materials that the algorithms are based on, are presented in Chapter 16.

Part 7 describes the physical file structures and access methods used in database sys- tems. Chapter 17 describes primary methods of organizing files of records on disk, including static and dynamic hashing. Chapter 18 describes indexing techniques for files, including B-tree and B+-tree data structures and grid files.

Part 8 focuses on query processing and database performance tuning. Chapter 19 introduces the basics of query processing and optimization, and Chapter 20 dis- cusses physical database design and tuning.

Part 9 discusses transaction processing, concurrency control, and recovery tech- niques, including discussions of how these concepts are realized in SQL. Chapter 21 introduces the techniques needed for transaction processing systems, and defines the concepts of recoverability and serializability of schedules. Chapter 22 gives an overview of the various types of concurrency control protocols, with a focus on two-phase locking. We also discuss timestamp ordering and optimistic concurrency control techniques, as well as multiple-granularity locking. Finally, Chapter 23 focuses on database recovery protocols, and gives an overview of the concepts and techniques that are used in recovery.

Parts 10 and 11 cover a number of advanced topics. Chapter 24 gives an overview of database security including the discretionary access control model with SQL com- mands to GRANT and REVOKE privileges, the mandatory access control model with user categories and polyinstantiation, a discussion of data privacy and its rela- tionship to security, and an overview of SQL injection attacks. Chapter 25 gives an introduction to distributed databases and discusses the three-tier client/server architecture. Chapter 26 introduces several enhanced database models for advanced applications. These include active databases and triggers, as well as temporal, spa- tial, multimedia, and deductive databases. Chapter 27 is a new chapter on informa- tion retrieval techniques, and how they are related to database systems and to Web

 

 

search methods. Chapter 28 on data mining gives an overview of the process of data mining and knowledge discovery, discusses algorithms for association rule mining, classification, and clustering, and briefly covers other approaches and commercial tools. Chapter 29 introduces data warehousing and OLAP concepts.

Appendix A gives a number of alternative diagrammatic notations for displaying a conceptual ER or EER schema. These may be substituted for the notation we use, if the instructor prefers. Appendix B gives some important physical parameters of disks. Appendix C gives an overview of the QBE graphical query language. Appen- dixes D and E (available on the book’s Companion Website located at http://www.aw.com/elmasri) cover legacy database systems, based on the hierar- chical and network database models. They have been used for more than thirty years as a basis for many commercial database applications and transaction- processing systems. We consider it important to expose database management stu- dents to these legacy approaches so they can gain a better insight of how database technology has progressed.

Guidelines for Using This Book There are many different ways to teach a database course. The chapters in Parts 1 through 7 can be used in an introductory course on database systems in the order that they are given or in the preferred order of individual instructors. Selected chap- ters and sections may be left out, and the instructor can add other chapters from the rest of the book, depending on the emphasis of the course. At the end of the open- ing section of many of the book’s chapters, we list sections that are candidates for being left out whenever a less-detailed discussion of the topic is desired. We suggest covering up to Chapter 15 in an introductory database course and including selected parts of other chapters, depending on the background of the students and the desired coverage. For an emphasis on system implementation techniques, chap- ters from Parts 7, 8, and 9 should replace some of the earlier chapters.

Chapters 7 and 8, which cover conceptual modeling using the ER and EER models, are important for a good conceptual understanding of databases. However, they may be partially covered, covered later in a course, or even left out if the emphasis is on DBMS implementation. Chapters 17 and 18 on file organizations and indexing may also be covered early, later, or even left out if the emphasis is on database mod- els and languages. For students who have completed a course on file organization, parts of these chapters can be assigned as reading material or some exercises can be assigned as a review for these concepts.

If the emphasis of a course is on database design, then the instructor should cover Chapters 7 and 8 early on, followed by the presentation of relational databases. A total life-cycle database design and implementation project would cover conceptual design (Chapters 7 and 8), relational databases (Chapters 3, 4, and 5), data model mapping (Chapter 9), normalization (Chapter 15), and application programs implementation with SQL (Chapter 13). Chapter 14 also should be covered if the emphasis is on Web database programming and applications. Additional documen- tation on the specific programming languages and RDBMS used would be required.

Preface xi

 

 

The book is written so that it is possible to cover topics in various sequences. The chapter dependency chart below shows the major dependencies among chapters. As the diagram illustrates, it is possible to start with several different topics following the first two introductory chapters. Although the chart may seem complex, it is important to note that if the chapters are covered in order, the dependencies are not lost. The chart can be consulted by instructors wishing to use an alternative order of presentation.

For a one-semester course based on this book, selected chapters can be assigned as reading material. The book also can be used for a two-semester course sequence. The first course, Introduction to Database Design and Database Systems, at the soph- omore, junior, or senior level, can cover most of Chapters 1 through 15. The second course, Database Models and Implementation Techniques, at the senior or first-year graduate level, can cover most of Chapters 16 through 29. The two-semester sequence can also been designed in various other ways, depending on the prefer- ences of the instructors.

xii Preface

1, 2 Introductory

7, 8 ER, EER Models

3 Relational

Model

6 Relational Algebra 13, 14

DB, Web Programming

9 ER–, EER-to-

Relational

17, 18 File Organization,

Indexing

28, 29 Data Mining, Warehousing

24, 25 Security,

DDB

10 DB Design,

UML

21, 22, 23 Transactions, CC, Recovery

11, 12 ODB, ORDB,

XML

4, 5 SQL

26, 27 Advanced Models,

IR

15, 16 FD, MVD,

Normalization

19, 20 Query Processing,

Optimization, DB Tuning

 

 

Supplemental Materials Support material is available to all users of this book and additional material is available to qualified instructors.

■ PowerPoint lecture notes and figures are available at the Computer Science support Website at http://www.aw.com/cssupport.

■ A lab manual for the sixth edition is available through the Companion Web- site (http://www.aw.com/elmasri). The lab manual contains coverage of popular data modeling tools, a relational algebra and calculus interpreter, and examples from the book implemented using two widely available data- base management systems. Select end-of-chapter laboratory problems in the book are correlated to the lab manual.

■ A solutions manual is available to qualified instructors. Visit Addison- Wesley’s instructor resource center (http://www.aw.com/irc), contact your local Addison-Wesley sales representative, or e-mail computing@aw.com for information about how to access the solutions.

Additional Support Material Gradiance, an online homework and tutorial system that provides additional prac- tice and tests comprehension of important concepts, is available to U.S. adopters of this book. For more information, please e-mail computing@aw.com or contact your local Pearson representative.

Acknowledgments It is a great pleasure to acknowledge the assistance and contributions of many indi- viduals to this effort. First, we would like to thank our editor, Matt Goldstein, for his guidance, encouragement, and support. We would like to acknowledge the excellent work of Gillian Hall for production management and Rebecca Greenberg for a thorough copy editing of the book. We thank the following persons from Pearson who have contributed to the sixth edition: Jeff Holcomb, Marilyn Lloyd, Margaret Waples, and Chelsea Bell.

Sham Navathe would like to acknowledge the significant contribution of Saurav Sahay to Chapter 27. Several current and former students also contributed to vari- ous chapters in this edition: Rafi Ahmed, Liora Sahar, Fariborz Farahmand, Nalini Polavarapu, and Wanxia Xie (former students); and Bharath Rengarajan, Narsi Srinivasan, Parimala R. Pranesh, Neha Deodhar, Balaji Palanisamy and Hariprasad Kumar (current students). Discussions with his colleagues Ed Omiecinski and Leo Mark at Georgia Tech and Venu Dasigi at SPSU, Atlanta have also contributed to the revision of the material.

We would like to repeat our thanks to those who have reviewed and contributed to previous editions of Fundamentals of Database Systems.

■ First edition. Alan Apt (editor), Don Batory, Scott Downing, Dennis Heimbinger, Julia Hodges, Yannis Ioannidis, Jim Larson, Per-Ake Larson,

Preface xiii

 

 

Dennis McLeod, Rahul Patel, Nicholas Roussopoulos, David Stemple, Michael Stonebraker, Frank Tompa, and Kyu-Young Whang.

■ Second edition. Dan Joraanstad (editor), Rafi Ahmed, Antonio Albano, David Beech, Jose Blakeley, Panos Chrysanthis, Suzanne Dietrich, Vic Ghor- padey, Goetz Graefe, Eric Hanson, Junguk L. Kim, Roger King, Vram Kouramajian, Vijay Kumar, John Lowther, Sanjay Manchanda, Toshimi Minoura, Inderpal Mumick, Ed Omiecinski, Girish Pathak, Raghu Ramakr- ishnan, Ed Robertson, Eugene Sheng, David Stotts, Marianne Winslett, and Stan Zdonick.

■ Third edition. Maite Suarez-Rivas and Katherine Harutunian (editors); Suzanne Dietrich, Ed Omiecinski, Rafi Ahmed, Francois Bancilhon, Jose Blakeley, Rick Cattell, Ann Chervenak, David W. Embley, Henry A. Etlinger, Leonidas Fegaras, Dan Forsyth, Farshad Fotouhi, Michael Franklin, Sreejith Gopinath, Goetz Craefe, Richard Hull, Sushil Jajodia, Ramesh K. Karne, Harish Kotbagi, Vijay Kumar, Tarcisio Lima, Ramon A. Mata-Toledo, Jack McCaw, Dennis McLeod, Rokia Missaoui, Magdi Morsi, M. Narayanaswamy, Carlos Ordonez, Joan Peckham, Betty Salzberg, Ming-Chien Shan, Junping Sun, Rajshekhar Sunderraman, Aravindan Veerasamy, and Emilia E. Villareal.

■ Fourth edition. Maite Suarez-Rivas, Katherine Harutunian, Daniel Rausch, and Juliet Silveri (editors); Phil Bernhard, Zhengxin Chen, Jan Chomicki, Hakan Ferhatosmanoglu, Len Fisk, William Hankley, Ali R. Hurson, Vijay Kumar, Peretz Shoval, Jason T. L. Wang (reviewers); Ed Omiecinski (who contributed to Chapter 27). Contributors from the University of Texas at Arlington are Jack Fu, Hyoil Han, Babak Hojabri, Charley Li, Ande Swathi, and Steven Wu; Contributors from Georgia Tech are Weimin Feng, Dan Forsythe, Angshuman Guin, Abrar Ul-Haque, Bin Liu, Ying Liu, Wanxia Xie, and Waigen Yee.

■ Fifth edition. Matt Goldstein and Katherine Harutunian (editors); Michelle Brown, Gillian Hall, Patty Mahtani, Maite Suarez-Rivas, Bethany Tidd, and Joyce Cosentino Wells (from Addison-Wesley); Hani Abu-Salem, Jamal R. Alsabbagh, Ramzi Bualuan, Soon Chung, Sumali Conlon, Hasan Davulcu, James Geller, Le Gruenwald, Latifur Khan, Herman Lam, Byung S. Lee, Donald Sanderson, Jamil Saquer, Costas Tsatsoulis, and Jack C. Wileden (reviewers); Raj Sunderraman (who contributed the laboratory projects); Salman Azar (who contributed some new exercises); Gaurav Bhatia, Fariborz Farahmand, Ying Liu, Ed Omiecinski, Nalini Polavarapu, Liora Sahar, Saurav Sahay, and Wanxia Xie (from Georgia Tech).

Last, but not least, we gratefully acknowledge the support, encouragement, and patience of our families.

R. E.

S.B.N.

xiv Preface

 

 

Contents

■ part 1 Introduction to Databases ■

chapter 1 Databases and Database Users 3 1.1 Introduction 4 1.2 An Example 6 1.3 Characteristics of the Database Approach 9 1.4 Actors on the Scene 14 1.5 Workers behind the Scene 16 1.6 Advantages of Using the DBMS Approach 17 1.7 A Brief History of Database Applications 23 1.8 When Not to Use a DBMS 26 1.9 Summary 27 Review Questions 27 Exercises 28 Selected Bibliography 28

chapter 2 Database System Concepts and Architecture 29

2.1 Data Models, Schemas, and Instances 30 2.2 Three-Schema Architecture and Data Independence 33 2.3 Database Languages and Interfaces 36 2.4 The Database System Environment 40 2.5 Centralized and Client/Server Architectures for DBMSs 44 2.6 Classification of Database Management Systems 49 2.7 Summary 52 Review Questions 53 Exercises 54 Selected Bibliography 55

xv

 

 

xvi Contents

■ part 2 The Relational Data Model and SQL ■

chapter 3 The Relational Data Model and Relational Database Constraints 59

3.1 Relational Model Concepts 60 3.2 Relational Model Constraints and Relational Database Schemas 67 3.3 Update Operations, Transactions, and Dealing

with Constraint Violations 75 3.4 Summary 79 Review Questions 80 Exercises 80 Selected Bibliography 85

chapter 4 Basic SQL 87 4.1 SQL Data Definition and Data Types 89 4.2 Specifying Constraints in SQL 94 4.3 Basic Retrieval Queries in SQL 97 4.4 INSERT, DELETE, and UPDATE Statements in SQL 107 4.5 Additional Features of SQL 110 4.6 Summary 111 Review Questions 112 Exercises 112 Selected Bibliography 114

chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification 115

5.1 More Complex SQL Retrieval Queries 115 5.2 Specifying Constraints as Assertions and Actions as Triggers 131 5.3 Views (Virtual Tables) in SQL 133 5.4 Schema Change Statements in SQL 137 5.5 Summary 139 Review Questions 141 Exercises 141 Selected Bibliography 143

 

 

chapter 6 The Relational Algebra and Relational Calculus 145

6.1 Unary Relational Operations: SELECT and PROJECT 147 6.2 Relational Algebra Operations from Set Theory 152 6.3 Binary Relational Operations: JOIN and DIVISION 157 6.4 Additional Relational Operations 165 6.5 Examples of Queries in Relational Algebra 171 6.6 The Tuple Relational Calculus 174 6.7 The Domain Relational Calculus 183 6.8 Summary 185 Review Questions 186 Exercises 187 Laboratory Exercises 192 Selected Bibliography 194

■ part 3 Conceptual Modeling and Database Design ■

chapter 7 Data Modeling Using the Entity-Relationship (ER) Model 199

7.1 Using High-Level Conceptual Data Models for Database Design 200 7.2 A Sample Database Application 202 7.3 Entity Types, Entity Sets, Attributes, and Keys 203 7.4 Relationship Types, Relationship Sets, Roles,

and Structural Constraints 212 7.5 Weak Entity Types 219 7.6 Refining the ER Design for the COMPANY Database 220 7.7 ER Diagrams, Naming Conventions, and Design Issues 221 7.8 Example of Other Notation: UML Class Diagrams 226 7.9 Relationship Types of Degree Higher than Two 228 7.10 Summary 232 Review Questions 234 Exercises 234 Laboratory Exercises 241 Selected Bibliography 243

Contents xvii

 

 

xviii Contents

chapter 8 The Enhanced Entity-Relationship (EER) Model 245

8.1 Subclasses, Superclasses, and Inheritance 246 8.2 Specialization and Generalization 248 8.3 Constraints and Characteristics of Specialization

and Generalization Hierarchies 251 8.4 Modeling of UNION Types Using Categories 258 8.5 A Sample UNIVERSITY EER Schema, Design Choices,

and Formal Definitions 260 8.6 Example of Other Notation: Representing Specialization

and Generalization in UML Class Diagrams 265 8.7 Data Abstraction, Knowledge Representation,

and Ontology Concepts 267 8.8 Summary 273 Review Questions 273 Exercises 274 Laboratory Exercises 281 Selected Bibliography 284

chapter 9 Relational Database Design by ER- and EER-to-Relational Mapping 285

9.1 Relational Database Design Using ER-to-Relational Mapping 286 9.2 Mapping EER Model Constructs to Relations 294 9.3 Summary 299 Review Questions 299 Exercises 299 Laboratory Exercises 301 Selected Bibliography 302

chapter 10 Practical Database Design Methodology and Use of UML Diagrams 303

10.1 The Role of Information Systems in Organizations 304 10.2 The Database Design and Implementation Process 309 10.3 Use of UML Diagrams as an Aid to Database

Design Specification 328 10.4 Rational Rose: A UML-Based Design Tool 337 10.5 Automated Database Design Tools 342

 

 

Contents xix

10.6 Summary 345 Review Questions 347 Selected Bibliography 348

■ part 4 Object, Object-Relational, and XML: Concepts, Models, Languages, and Standards ■

chapter 11 Object and Object-Relational Databases 353 11.1 Overview of Object Database Concepts 355 11.2 Object-Relational Features: Object Database Extensions

to SQL 369 11.3 The ODMG Object Model and the Object Definition

Language ODL 376 11.4 Object Database Conceptual Design 395 11.5 The Object Query Language OQL 398 11.6 Overview of the C++ Language Binding in the ODMG Standard 407 11.7 Summary 408 Review Questions 409 Exercises 411 Selected Bibliography 412

chapter 12 XML: Extensible Markup Language 415 12.1 Structured, Semistructured, and Unstructured Data 416 12.2 XML Hierarchical (Tree) Data Model 420 12.3 XML Documents, DTD, and XML Schema 423 12.4 Storing and Extracting XML Documents from Databases 431 12.5 XML Languages 432 12.6 Extracting XML Documents from Relational Databases 436 12.7 Summary 442 Review Questions 442 Exercises 443 Selected Bibliography 443

 

 

■ part 5 Database Programming Techniques ■

chapter 13 Introduction to SQL Programming Techniques 447

13.1 Database Programming: Techniques and Issues 448 13.2 Embedded SQL, Dynamic SQL, and SQLJ 451 13.3 Database Programming with Function Calls: SQL/CLI and JDBC

464 13.4 Database Stored Procedures and SQL/PSM 473 13.5 Comparing the Three Approaches 476 13.6 Summary 477 Review Questions 478 Exercises 478 Selected Bibliography 479

chapter 14 Web Database Programming Using PHP 481 14.1 A Simple PHP Example 482 14.2 Overview of Basic Features of PHP 484 14.3 Overview of PHP Database Programming 491 14.4 Summary 496 Review Questions 496 Exercises 497 Selected Bibliography 497

■ part 6 Database Design Theory and Normalization ■

chapter 15 Basics of Functional Dependencies and Normalization for Relational Databases 501

15.1 Informal Design Guidelines for Relation Schemas 503 15.2 Functional Dependencies 513 15.3 Normal Forms Based on Primary Keys 516 15.4 General Definitions of Second and Third Normal Forms 525 15.5 Boyce-Codd Normal Form 529

xx Contents

 

 

15.6 Multivalued Dependency and Fourth Normal Form 531 15.7 Join Dependencies and Fifth Normal Form 534 15.8 Summary 535 Review Questions 536 Exercises 537 Laboratory Exercises 542 Selected Bibliography 542

chapter 16 Relational Database Design Algorithms and Further Dependencies 543

16.1 Further Topics in Functional Dependencies: Inference Rules, Equivalence, and Minimal Cover 545

16.2 Properties of Relational Decompositions 551 16.3 Algorithms for Relational Database Schema Design 557 16.4 About Nulls, Dangling Tuples, and Alternative Relational

Designs 563 16.5 Further Discussion of Multivalued Dependencies and 4NF 567 16.6 Other Dependencies and Normal Forms 571 16.7 Summary 575 Review Questions 576 Exercises 576 Laboratory Exercises 578 Selected Bibliography 579

■ part 7 File Structures, Indexing, and Hashing ■

chapter 17 Disk Storage, Basic File Structures, and Hashing 583

17.1 Introduction 584 17.2 Secondary Storage Devices 587 17.3 Buffering of Blocks 593 17.4 Placing File Records on Disk 594 17.5 Operations on Files 599 17.6 Files of Unordered Records (Heap Files) 601 17.7 Files of Ordered Records (Sorted Files) 603 17.8 Hashing Techniques 606

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

You will write a flowchart, and C code for a program that does the following:

1. Uses a “for” loop.

2. Asks the user for their age.

3. Prints “Happy Birthday” for every year of the user’s age, along with the year.

Here is what the output of the program looks like.

File Submission

Upload your Flowgorithm file, your .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

10

 

WEEK 5 Assignments

 

Part I – p 48 Introduction

 

Personal

1. Shopping for Software. You are shopping for software that will assist you with your home’s interior design. The package for the program you would like to purchase states that it was designed for the most recent version of Windows, but an older version is installed on your computer. How can you determine whether the program will run on your computer?

Well, to make that program run, it sounds like all you need to do is uninstall the older version that is on your computer already and then install the newer version. As for how to determine which programs will run on your computer, you just need to see what operating system it was designed for and how much RAM it needs to run (and check to make sure your system has that much or more)

 

 

 

2. Bad Directions. You are driving to your friend’s house and are using your smartphone for directions. While approaching your destination, you realize that your smartphone app instructed you to turn the wrong way on your friend’s street. How could this have happened?

How could this happened?

– internet

(routing the wrong way on the

highway or down a closed road).

 

– wrong applications

Solutions?

Why smartphone app instructed me to turn the wrong way?

– because we as a user we need to efficently choose the right application for the right directions.

bad directions??

– we need a basic understanding

how GPS works

– before we install the apps

we should to see the rating or

feedback

 

3. Bank Account Postings. While reviewing your checking account balance online, you notice that debit card purchases have not posted to your account for the past several days. Because you use online banking to balance your account, you become concerned about your unknown account balance. What steps will you take to correct this situation?

You would finally create a check register. Contact online service to check a misuse of my account and update the docs

4. Trial Expired. You have been using an app on your mobile device for a30-day trial period. Now that the 30 days have expired, the app is requesting that you to pay to continue accessing your data. What are your next steps? What steps could you have taken to preserve your data before the trial period expired?

 

 

5. Problematic Camera. After charging your digital camera battery overnight, you insert the battery and turn on the camera only to find that it is reporting a low battery. Seconds later, the camera shuts off automatically. What might be wrong?

 

Professional

6. Discarding Old Computer Equipment. Your company has given you a new laptop to replace your current, outdated desktop. Because of the negative environmental impact of discarding the old computer in the trash, your supervisor asked you to suggest options for its disposal. How will you respond?

 

 

7. Dead Battery. While traveling for business, you realize that you forgot to bring the battery charger for your laptop. Knowing that you need to use the laptop to give a presentation tomorrow, what steps will you take tonight to make sure you have enough battery power?

 

8. Cannot Share Photos. You are attempting to send photos of a house for sale in an email message to your real estate partner. Each time you attempt to send the email message, you receive an automatic response stating that the files are too large. What are your next steps?

 

 

9. Incorrect Sign-In Credentials. Upon returning to the office from a well-deserved two-week vacation, you turn on your computer. When you enter your user name and password, an error message appears stating that your password is incorrect. What are your next steps?

 

10. Synchronization Error. You added appointments to the calendar on your computer, but these appointments are not synchronizing with your smartphone. Your calendar has synchronized with your smartphone in the past, but it has stopped working without explanation. What are your next steps?

 

 

 

Part II – p 100 Connection and Communication Online

 

Personal

1. Cyberbullying. Message While reviewing the email messages in your email account, you notice one that you interpret as cyberbullying. You do not recognize the sender of the email message, but still take it seriously. What are your next steps?

 

2. Unsolicited Friend Requests. You recently signed up for an account on the Facebook online social network. When you log in periodically, you find that people you do not know are requesting to be your friend. How should you respond?

 

 

3. Unexpected Search Engine. A class project requires that you conduct research on the web. After typing the web address for Google’s home page and pressing the enter key, your browser redirects you to a different search engine. What could be wrong?

 

4. Images Do Not Appear. When you navigate to a webpage, you notice that no images are appearing. You successfully have viewed webpages with images in the past and are not sure why images suddenly are not appearing. What steps will you take to show the images?

 

 

5. Social Media Password. Your social media password has been saved on your computer for quite some time and the browser has been signing you in automatically. After deleting your browsing history and saved information from your browser, the online social network began prompting you again for your password, which you have forgotten. What are your next steps?

 

Professional

6. Suspicious Website Visits. The director of your company’s information technology department sent you an email message stating that you have been spending an excessive amount of time viewing websites not related to your job. You periodically visit websites not related to work, but only on breaks, which the company allows. How does he know your web browsing habits? How will you respond to this claim?

 

 

7. Automatic Response. When you return from vacation, a colleague informs you that when she sent email messages to your email address, she would not always receive your automatic response stating that you were out of the office. Why might your email program not respond automatically to every email message received?

 

8. Email Message Formatting. A friend sent an email message containing a photo to your email account at work. Upon receiving the email message, the photo does not appear. You also notice that email messages never show any formatting, such as different fonts, font sizes, and font colors. What might be causing this?

 

 

9. Mobile Hot Spot Not Found. Your supervisor gave you a mobile hot spot to use while you are traveling to a conference in another state. When you attempt to connect to the hot spot with your computer, tablet, and phone, none of the devices is able to find any wireless networks. What might be the problem, and what are your next steps?

 

10. Sporadic Email Message Delivery. The email program on your computer has been displaying new messages only every hour, on the hour. Historically, new email messages would arrive and be displayed immediately upon being sent by the sender. Furthermore, your coworkers claim that they sometimes do not receive your email messages until hours after you send them. What might be the problem?

 

 

 

 

Part III – p 150 Computer and Mobile Devices

 

Personal

1. Slow Computer Performance. Your computer is running exceptionally slow. Not only does it take the operating system a long time to start, but programs also are not performing as well as they used to perform. How might you resolve this?

 

2. Faulty ATM. When using an ATM to deposit a check, the ATM misreads the amount of the check and credits your account the incorrect amount. What can you do to resolve this?

 

3. Wearable Device Not Synchronizing. Your wearable device synchronized with your smartphone this morning when you turned it on, but the two devices no longer are synchronized. What might be wrong, and what are your next steps?

 

4. Battery Draining Quickly. Although the battery on your smartphone is fully charged, it drains quickly. In some instances when the phone shows that the battery has 30 remaining, it shuts down immediately. What might be wrong?

 

5. Potential Virus Infection. While using your laptop, a message is displayed stating that your computer is infected with a virus and you should tap or click a link to download a program designed to remove the virus. How will you respond?

 

Professional

6. Excessive Phone Heat. While using your smartphone, you notice that throughout the day it gets extremely hot, making it difficult to hold up to your ear. What steps can you take to correct this problem?

 

7. Server Not Connecting. While traveling on a business trip, your phone suddenly stops synchronizing your email messages, calendar information, and contacts. Upon further investigation, you notice an error message stating that your phone is unable to connect to the server. What are your next steps?

 

8. Mobile Device Synchronization. When you plug your smartphone into your computer to synchronize the data, the computer does not recognize that the smartphone is connected. What might be the problem?

 

9. Cloud Service Provider. Your company uses a cloud service provider to back up the data on each employee’s computer. Your computer recently crashed, and you need to obtain the backup data to restore to your computer; however, you are unable to connect to the cloud service provider’s website. What are your next steps?

 

10. Connecting to a Projector. Your boss asked you to give a presentation to your company’s board of directors. When you enter the boardroom and attempt to connect your laptop to the projector, you realize that the cable to connect your laptop to the projector does not fit in any of the ports on your laptop. What are your next steps?

 

 

Part IV – p 204 Programs and Apps

 

Personal

1. Antivirus Program Not Updating. You are attempting to update your antivirus program with the latest virus definitions, but you receive an error message. What steps will you take to resolve this issue?

 

2. Operating System Does Not. Load Each time you turn on your computer, the operating system attempts to load for approximately 30 seconds and then the computer restarts. You have tried multiple times to turn your computer off and on, but it keeps restarting when the operating system is trying to load. What are your next steps?

 

3. Unwanted Programs. When you displayed a list of programs installed on your computer so that you could uninstall one, you noticed several installed programs that you do not remember installing. Why might these programs be on your computer?

 

4. News Not Updating. Each morning, you run an app on your smartphone to view the news for the current day. For the past week, however, you notice that the news displayed in the app is out of date. In fact, the app now is displaying news that is nearly one week old. Why might the app not be updating? What are your next steps?

 

5. Incompatible App. You are using your Android tablet to browse for apps in the Google Play store. You found an app you want to download, but you are unable to download it because a message states it is incompatible with your device. Why might the app be incompatible with your device?

 

Professional

6. Videoconference Freezes. While conducting a videoconference with colleagues around the country, the audio sporadically cuts out and the video freezes. You have attempted several times to terminate and then reestablish the connection, but the same problem continues to occur. What might be the problem?

 

7. License Agreement. You are planning to work from home for several days, but you are unsure of whether you are allowed to install a program you use at work on your home computer. What steps will you take to determine whether you are allowed to install the software on your home computer?

 

8. Low on Space. The computer in your office is running low on free space. You have attempted to remove as many files as possible, but the remaining programs and files are necessary to perform your daily job functions. What steps might you take to free enough space on the computer?

 

9. Unacceptable File Size. Your boss has asked you to design a new company logo using a graphics application installed on your computer. When you save the logo and send it to your boss, she responds that the file size is too large and tells you to find a way to decrease the file size. What might you do to make the image file size smaller?

 

10. Disc Burning Not Working. While attempting to back up some files on your computer on an optical disc, the disc burning software on your computer reports a problem and ejects the disc. When you check the contents of the disc, the files you are trying to back up are not there. What might be wrong?

 

 

Part V – p 254 Digital Security, Ethics and Privacy

 

1. Define the terms, digital security risk, computer crime, cybercrime, and crime ware.

2. Differentiate among hackers, crackers, script kiddies, cyber extortionists, and cyberterrorists. Identify issues with punishing cybercriminals.

 

3. List common types of malware. A(n) ___ is the destructive event or prank malware delivers.

 

4. Identify risks and safety measures when gaming.

 

5. Define these terms: botnet, zombie, and bot.

 

6. Describe the damages caused by and possible motivations behind DoS and DDoS attacks.

 

7. A(n) ___ allows users to bypass security controls when accessing a program, computer, or network.

 

8. Define the term, spoofing. How can you tell if an email is spoofed?

 

9. List ways to protect against Internet and network attacks.

 

10. Describe the purpose of an online security service.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

New Perspectives Word 2016 | Module 2: SAM Project 1a

 

C:\Users\akellerbee\Documents\SAM Development\Design\Pictures\g11731.pngNew Perspectives Word 2016 | Module 2: SAM Project 1a

Transportation Technology Report

preparing a research paper

GETTING STARTED

Open the file NP_WD16_2a_FirstLastName_1.docx, available for download from the SAM website.

Save the file as NP_WD16_2a_FirstLastName_2.docx by changing the “1” to a “2”.

0. If you do not see the .docx file extension in the Save As dialog box, do not type it. The program will add the file extension for you automatically.

With the file NP_WD16_2a_FirstLastName_2.docx still open, ensure that your first and last name is displayed in the footer.

· If the footer does not display your name, delete the file and download a new copy from the SAM website.

 

PROJECT STEPS

For your Emerging Technology class, you are part of a group writing a research paper on new transportation technologies. Your paper is about self-driving cars and must follow the MLA format. Change the Citation & Bibliography Style of the document to MLA.

Apply the Capitalize Each Word case to the title paragraph “Future transportation technology: self-driving cars”.

Insert a header to meet MLA standards as follows:

a. From the Top of Page page number gallery, insert a Plain Number 3 page number to the header of all pages in the document.

b. Without moving your insertion point, type Cooper and then press the Spacebar.

c. Close the Header & Footer Tools.

Find the word “machine” and replace all instances with the word computer. (Hint: Do not include the period. You should find and replace four instances.)

Create a First Line Indent of 0.5″ to indent the first lines of all the body paragraphs beginning “In California and Nevada…” and ending “…vehicle owners enjoy the benefits.”

Move the second body paragraph beginning “A self-driving car…” so that it becomes the new first body paragraph.

Find the paragraph beginning “Three technologies are required….” Move the insertion point before the colon and insert a citation from a new source using the information shown in Table 1 on the next page.

Table 1: Periodical Source

 

 

Type of Source Article in a Periodical
Author Pullen, John Patrick
Title Driverless Cars
Periodical Title Time Magazine
Year 2015
Month February
Day 24
Pages 35-39
Medium Print

 

 

Edit the new Pullen citation to add 37 as the page number.

Create a numbered list from the paragraphs beginning with “Global positioning system (GPS) – A high-definition GPS…” and ending with “…from the other two systems.”

In the paragraph beginning “The third major advantage…”, read the comment from Abby Markham and then reply to it with the text:

Thanks, this looks great.

In the same paragraph, move the insertion point before the period in the sentence “The idea behind platooning…according to an article in Science News.” Insert a citation that creates a new source with the information shown in Table 2 below.

 

Table 2: Journal Source

 

 

Type of Source Journal Article
Author Wu, Karen
Title Look Ma, No Hands!
Journal Name Science News
Year 1997
Pages 162-175
Medium Print

 

 

 

In the paragraph beginning “The substantial benefits…”, respond to the comment as follows:

d. Read the comment and then delete it.

e. Change the text “$50,000” to $100,000 in the middle of the paragraph.

Move the insertion point before the period in the sentence you modified in the previous step (“The cost of the new technology…for most car owners.”), and then insert a citation to the existing Fagnant, Daniel and Kockelman, Kara source.

Edit the new Fagnant citation to add 9 as the page number.

Move the insertion point to the end of the document, and then insert a bibliography as follows:

f. Insert a page break.

g. Insert a Works Cited from the Bibliography gallery.

You notice an error in the Fagnant source. Edit the Fagnant source so that the Name of Web Page reads “Preparing for a Nation of Autonomous Vehicles”.

Update the Works Cited list to reflect the edit you made to the source.

Format the “Works Cited” heading as follows:

h. Apply the Normal style to the heading.

i. Center the heading.

Select the entire document and format it as follows:

j. Change the font size to 12 pt.

k. Change the line spacing to double.

Move the insertion point to the beginning of the document, and then insert a comment with the following text:

Please review the format of the document.

Check the Spelling & Grammar in the document to identify and correct any spelling errors. (Hint: Ignore proper names. You should find and correct at least one spelling error.)

Your document should look like the Final Figure on the following pages. Save your changes, close the document, and then exit Word. Follow the directions on the SAM website to submit your completed project.

Final Figure

  

2
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!