discussion

 

Discuss the role played by a scheduler in ensuring the serializability of transactions.

Discussion Guidelines
You must provide an original response of 300+ words of your own 

 Printed Textbook: Database Systems: Design, Implementation, and Management, 13th
edition, Coronel and Morris.  

Draw data flow diagrams,Determine the system requirements

Read the following Personal Trainer, Inc. case carefully, before answering any of the below questions

CASE: PERSONAL TRAINER, INC.

Personal Trainer, Inc., owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new “supercenter” in the Toronto area. Personal Trainer’s president, Cassia Umi, hired an IT consultant, Susan Park, to help develop an information system for the new facility. During the project, Susan will work closely with Gray Lewis, who will manage the new operation.

Background

During requirements modeling for the new system, Susan Park met with fitness center managers at several Personal Trainer locations. She conducted a series of interviews, reviewed company records, observed business operations, analyzed the BumbleBee accounting software, and studied a sample of sales and billing transactions. Susan’s objective was to develop a list of system requirements for the proposed system.

Fact-Finding Summary

§  A typical center has 300-500 members, with two membership levels: full and limited. Full members have access to all activities. Limited members are restricted to activities they have selected, but they can participate in other activities by paying a usage fee. All members have charge privileges. Charges for merchandise and services are recorded on a charge slip, which is signed by the member. At the end of each day, cash sales and charges are entered into the BumbleBee accounting software, which runs on a computer workstation at each location. Daily cash receipts are deposited in a local bank and credited to the corporate Personal Trainer account. The BumbleBee program produces a daily activity report with a listing of all sales transactions. At the end of the month, the local manager uses BumbleBee to transmit an accounts receivable summary to the Personal Trainer headquarters in Chicago, where member statements are prepared and mailed. Members mail their payments to the Personal Trainer headquarters, where the payment is applied to the member account.

§  The BumbleBee program stores basic member information, but does not include information about member preferences, activities, and history.

§  Currently, the BumbleBee program produces one local report (the daily activity report) and three reports that are prepared at the headquarters location: a monthly member sales report, an exception report for inactive members and late payers, and a quarterly profit-and-loss report that shows a breakdown of revenue and costs for each separate activity.

During the interviews, Susan received a number of “wish list” comments from local managers and staff members. For example, many managers wanted more analytical features so they could spot trends and experiment with what-if scenarios for special promotions and discounts. The most frequent complaint was that managers wanted more frequent information about the profitability of the business activities at their centers.

To enhance their business, managers wanted to offer a computerized activity and wellness log, a personal coach service, and e-mail communication with members. Managers also wanted better ways to manage information about part-time instructors and staff. Several staff members suggested a redesign for the charge slips or scannable ID cards.

Based on the Personal Trainer, Inc. case, please answer the following questions

 1.  Explain the reasons why the company wants to develop a new information System? (15 points)

 2.  Identify the fact-finding techniques used by Susan. (15 points)

 3.  Determine the system requirements, providing examples for each category and type. Review the information that Susan gathered, and as a system analyst, assume that you will add your own ideas to achieve more effective inputs, processes, outputs, performance, security, and controls. (30 points)

 4.  Draw data flow diagrams (i.e., context diagram and Level-0 diagram) that represent the main process, input and output requirements described in the fact statement or recommended by you, in question number 3, whenever applicable. (40 points)

article of history

You are doing a deep dive into the article.go beyond summerizing the paper to analyze the author’s argument. what sort of sources does she use to back her argument? how does she use those sources? where do you think she is effective and hwere do you think she fails? 900 words paper.

Technical Report on Cyber theft of trade secrets

 

Required major headings in the paper include the following:

(do not number major headings and do not use Roman Numerals; headings cannot be larger than a pitch of 14.  Twelve pitch is preferred and they must be in bold type.)  Do not indent the first line of any paragraph. If you indent a sub paragraph the indent for the text cannot be more than 5 spaces and if numbered, the number must be at the left margin.

Do not use left and right justification in the text of the paper and references.

Abstract – bold font

Keywords– bold font

Introduction– bold font

Other major headings as needed– bold font

Subheadings as needed– use bold font

Conclusions or summary– bold font

References– bold font

Other requirements

Use acronyms when needed.  For the first use of an acronym, type the complete phrase followed by the acronym in parentheses.  For example, Bring Your Own Pencil (BYOP).  After the first use, you can just use the acronym.

Minimum of 10 pages single-spaced – not including tables, figures and references

Times New Roman 12 point

Standard margins – 1in top, bottom, left and right, do not justify the paper; no headers or footers

Do not use two columns as in the example article

In text” citations and the reference list at the end of the paper must be in APA format. 

Tables must be identified as a Table with a number and title after the table

Figures must be identified as a Figure with a number and title after the figure

If you did not create the table or figure, you must include an ‘in text’ citation so the reader can identify the source of the figure or table.

References at end must be in alphabetic order – see article from Week 1 for indentation format for the complete reference.  For each reference in the list, you must have an ‘in text’ citation in APA format.  If you do not cite a paper then do not include it in the reference list.  This will be checked.  In the reference list, the first line of the reference will be at the left margin and all remaining lines for each reference will be indented a few spaces just like this requirement has been done.  All references must have a URL which is a hyperlink.  I cannot verify the reference without the URL.

Virtual Machine

 Your PowerPoint should contain 10-15 slides. You can use Microsoft Teams to record the audio narration of your PowerPoint presentation (preferred). Please cover the following topics in this presentation:

  • The CTF category
  • Problem solved
  • Steps used to solve
  • The solution
  • Strategies, pitfalls, lessons learned
  • Workplace relevance

Discussion 300 words

 

Use the Web to search for methods to prevent XSS attacks.

Write a brief description of more than one method.

Use your own words and supply references.

INT 1010 Cyberbullying

 This assignment is about Cyberbullying.  Please share the following:

  1. Define Cyberbullying.  (10 points)
  2. Share 2 strategies to prevent cyberullying. (5 points)
  3. Please include 3 references.  (5 points)
  4. Comment on at least one of your classmate’s post. (10 points)

This assignment requires you to research the topic.   

unix programming getusage()

Create the program ‘rusage’ that will run a program provided on the command

line and then print out the resources used by the process using the system call

getrusage(). 

The timeval structure (documented in the timeradd man page):

  struct timeval {

    time_t      tv_sec;     /* seconds */

    suseconds_t tv_usec;    /* microseconds */

  };