What is the Basic SQL SELECT?
USE THE FOLLOWING FILE TO DO THIS HOMEWORK.
What is the Basic SQL SELECT?
USE THE FOLLOWING FILE TO DO THIS HOMEWORK.
need to write three section on a case study as follows ON APPLE INC:
1) Existing Information Systems (IS)/Information Technology (IT) Applications (those currently in place or already being provisioned in the near future)
2Required Information Systems (IS)/Information Technology (IT) Applications (those investments identified as essential to achieve the existing business objectives and create changes that can achieve required levels of performance or be shown to make a specific contribution to enabling or delivering the future business strategy, likely over a 3 to 12 month horizon),
3) Potential Information Systems (IS) and Information Technology (IT) Applications (those that might be valuable in the future, provided they prove feasible to deliver and can be shown to produce relevant benefits, either to the strategy directly by creating new strategic opportunities or via the valuable indirect effects of business changes the applications make possible, over probably the next 6 to 24 months).
Note: For the Required Information Systems (IS)/Information Technology (IT) Applications and the Potential Information Systems (IS) and Information Technology (IT) Applications, you must identify a minimum of three required and three potential IS/IT applications.
Please construct a Word document (times new roman 12-point font, double-spaced, 1-inch margins, APA 7th edition in-text citations and end references). Please add additional sources to your References page. When complete, upload your document (it must include all sections – so you will have a total of five for this submission) to Canvas using the appropriate link (you can upload it as many times as you want up to the deadline noting that the last submission will be graded. All uploads will be checked against SimCheck (a plagiarism tool).
The below SimCheck criteria will be used as one of the grading criteria for your waypoint.
Write a 3-page paper (1000 words): How does artificial intelligence impact games intelligence. Provide a game algorithm.
Provide examples and present your written findings. You must write a 3-page essay in APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject.
ER Model and Normalization
Q1: Garage Database [40 points]
We want to design a database for a local garage. For each customer, we want to record the (unique) name, the customer address, and the contact phone number. For each vehicle, we want to record the unique vehicle’s identification number (VIN), and the vehicle’s make, model and year. For each repair job we want to record the description of the job done (maximum 200 chars), the date, and the total dollar cost. A repair job may involve zero or more parts (like, e.g., “windshield wipers”, “battery”, etc.) For each part we want to record its (unique) part number, the part name and its cost. In addition, note that:
• Each vehicle may have 1 or more repair jobs.
• Each customer may be the primary owner of 1 or more vehicles.
• Every vehicle has only one primary owner (we ignore co-owners).
• No vehicle can have more than one repair job in any given day.
Please answer the following questions:
Q1.1. (10 points) Draw an ER diagram for this database. Make sure to indicate primary keys, cardinality constraints, weak entities (if any), and participation constraints. List any assumptions you make in the process.
Q1.2. (10 points) Translate the ER diagram in Q1.1 into relational database tables (i.e. give the SQL DDL statements). Make sure that the translation captures key constraints (primary keys and foreign keys if applicable) and participation constraints in the ER diagram. Identify constraints, if any, that you are not able to capture.
Q1.3. (20 points) Identify the functional dependencies that you expect should hold for the Garage Database domain. Use the dependencies to find keys and BCNF normal forms.
Q2: Restaurant Database [ 40 points]
The student administrator of the Mini University wants to design a database for profiling students’ preferences for the nearby restaurants and the dishes. For example, the student Jack Smith likes the “rib eye steak” at the “TGI Fridays”, not the “rib eye steak” at the “Olive Garden”, while the student Nancy Graham likes the Italian spaghetti at “Zeppoli’s”.
• Each student has his/her SSN, the name, and the department.
• Each restaurant has its name, and the mailing address.
• The name of a restaurant may not be unique, but the mailing address is unique.
• Each dish has the name and the price.
• The price of a dish might differ on different restaurants. For example, “rib eye steak” is $15 at “TGI Fridays”, but $20 at the “Olive Garden”.
• The name of a dish is unique within a restaurant. Two restaurants may have the same dish name.
• A dish is offered by at least one restaurant, and a restaurant offers at least a dish.
Please answer the following questions:
Q2.1. (10 points) Draw an ER diagram for this database. Make sure to indicate primary keys, cardinality constraints, weak entities (if any), and participation constraints. List any assumptions you make in the process.
Q2.2. (10 points) Translate the ER diagram in Q2.1 into relational database tables (i.e. give the SQL DDL statements). Make sure that the translation captures key constraints (primary keys and foreign keys if applicable) and participation constraints in the ER diagram. Identify constraints, if any, that you are not able to capture.
Q2.3. (20 points) Identify the functional dependencies that you expect should hold for the Restaurant Database domain. Use the dependencies to find keys and BCNF normal forms.
Q3: Reverse Engineering [20 points]
This question tests how well you understand the algorithm for converting E/R diagrams to relational schemas. An E/R diagram when converted to relations (using the mechanical construction that we know and love) gives rise to the following relations:
You may assume that the same symbols refer to the same attribute and different symbols refer to different attributes (e.g., the attributes a in the relations R, S and T are the same) i.e. it ultimately comes from a single entity set or relationship in the E/R diagram.
Your task is to reverse-engineer the E/R diagram from these relations; in other words, what E/R diagram could have produced these relations. For full credit, give two different E/R diagrams that could have produced these (and only these) relations (i.e. 10 points for each correct E/R diagram).
Submission Guidelines and Requirements
// Your Name
// Your UCM ID
//Certificate of Authenticity: “I certify that the assignment is entirely my own work.”
This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI). After reviewing the reading, please answer the following questions:
The paper should meet the following requirements:
This assignment covers the different mobile devices, sensors and features that exist on Android and iOS. You will find mobile applications that make effective and innovative use of those options.• Start by reviewing the features, device sensors and interfaces of iOS and Android from the resources provided in this unit.
• Choose 3 of the features, device sensors and interfaces that you find to be unique, effective and innovative.
o For each of those options, find 2 mobile applications that make good use of those options.
o Share screenshots to the mobile applications, the link to download them from their respective app store and an explanation of what makes the mobile app make effective use of those options.
opening sentence and your thesis statement!
powerpoint only 9 slides
1 objective summary
Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template.
complete literature review : It consists of Introduction, literature review and analysis
Windows Hardening Recommendations
Scenario
As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.
The following are issues to be addressed through hardening techniques:
Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.
Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.
Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.
To protect servers from attack, each server should authenticate connections based on the source computer and user.
Tasks
Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.
Required Resources
Internet access
Course textbook
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Times New Roman, size 12, double-space
Citation Style: APA
Length: 2 to 4 pages
Self-Assessment Checklist
I addressed all issues required for the summary report.
I created a well-developed and formatted report with proper grammar, spelling, and punctuation.
I followed the submission guidelines.
1. Identify the Inputs, Outputs, Tools, and Techniques of each of the Knowledge Areas and Process Groups.
2. Describe the relationship between Knowledge Areas and Process Groups.
3. Include detailed speaker’s notes for each slide.
Additional Requirements
· Written communication: Ensure written communication is free of errors that detract from the overall message.