Business Systems

Research a scholarly paper on “Business Systems” and reflect on only one of the following topics:

“Systems Perspective”: What is a System Perspective?

“System Types”: Describe a type of systems that exists in an Business.

“Enterprise System”: Identify a type of enterprise system.

“Data Driven System”: Describe a data-driven system

This paper must be at least one full page in length on what caught your eye and reflect on what you read. Do not add introduction or conclusion. You must provide at least one APA reference for  your resource and corresponding in-text citations. Do not use the Textbook as a referenced resource

Part 2: Vendor Database

  

Part 2: Vendor Database (MS Access)
 

As you recall, data is a collection of facts (numbers, text, even audio and video files) that is processed into usable information. Much like a spreadsheet, a database is a collection of such facts that you can then slice and dice in various ways to extract information or make decisions. However, the advantage and primary use of a database over a spreadsheet is its ability to handle a large volume of data and yet allow for quick access to the information that is desired.
 

Databases are everywhere now and impact our lives in a multitude of ways. It can accurately be said that “your life is in a database” or, more accurately, in multiple databases, and information about you (a retrieval of facts about you) is easily accessible. Your shopping history, credit history, medical history, even your driving history, is stored in one or more databases.
 

This exercise will introduce you to the basic building blocks of any database – fields, records, and files (also called tables). Although you will create a database with a single table containing a small amount of data about computer vendors, the more applicable use of databases involves the creation of many tables linked together with a common field or “key.” Regardless of the size of the database, the data is stored in the same way – in fields which are combined to create a record. And those records are stored in a file or table. The data is entered into the field via a data entry form, and the information is extracted (to answer a particular question or need) via reports and/or queries.
 

Create a vendor database and related reports and queries to capture contact information for potential PC vendors. This information will be used to populate an MS Access database.
 

This MS Access database assignment has the following parts:
 

1. a simple database table to hold vendor contact information;
2. a simple database form that can be used to enter data into the database table;
3. a simple database report that can used to present the data as information; and
4. a separate MS Word document answering questions about the database.
 

All aspects of the assignment will be evaluated according to the following criteria and overall professional, business-like appearance. This would include clear readability and formatting for both screen and print-based output.
Requirement
Points Allocated Comments
• Launch MS Access and open a Blank Access database.
• Save the new database with the following name:
“Student’s First Initial Last Name Vendor”
Example: JSmith Vendor 0.25
Create a table with all the following fields and settings:
A. Vendor ID (autonumber)
B. Company Name (text)
C. Contact’s First Name (text)
D. Contact’s Last Name (text)
E. Billing Address (text) (this is the street address)
F. City (text)
G. State (text—limited to 2 characters)
H. Zip Code (text—limited to 5 characters)
I. Phone number
J. YTD Orders (currency)
K. Preferred Vendor (Yes/No) 1.0 The Vendor ID field must be set as the primary key (*). If the Vendor ID is not the primary key, 0.5 points will be deducted. If you have properly set the Vendor ID field as the primary key, it will be numbered automatically (Auto Number).
• Name the table as follows:
Vendor Table 0.25
• Use the Form Wizard to create a form that uses all the fields from the Vendor table.
• Use a Columnar layout
• Select a theme 1.0 Let the Form Wizard guide you through the completion of the form.
• Name the form as follows:
Vendor Contact Entry Form 0.25 You should be finished with the form at this point. It is best if you allow the Form Wizard to open the form to view and enter information.
You can either use the form or enter data directly into the table.
• Enter all the appropriate data for five vendors (such as Best Buy, CDW, and CompUSA.)
• Mark at least one Vendor as a preferred Vendor.
It is important to complete all data entry prior to moving on to create the report. You should also use the table to manually review and audit all entries to ensure accuracy and consistency prior to report setup. If find any data entry errors or inconsistencies, simply go back the item in the form and make the appropriate corrections. Missing data or including data that should be ignored will result in a deduction. 1.5 When you are finished, the Vendor Table should contain all the contact information for five vendors. You may need to create fictitious information for contact names –other field information should be available from the company website.
The form will automatically populate the Vendor ID for you because this is your primary key. Vendor Names will be your five vendors.
Use the Report Wizard to create a report for the database that uses the following fields:
 

• Vendor Name
• Contact First and Last Name
• Complete Address (Street, City, State, Zip)
• Phone Number 1.0 Let the Report Wizard guide you through the completion of the report.
 

Make sure that you do not select the Product ID field.

HomeWork

Discuss the best practices for implementing an access control system.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Please use the blank APA template to get started.

case 8

 

  1. submit your own original question and POST OF LESS THAN 300 WORDS. and cite
  2. submit a response to TWO other questions posed that week by your classmates and cite each one of them

 POSTS 

1. Are non-monetary performance indicators important, and if they are, what challenges exist in using them?

In section 4.9 of our book, the notion is presented that non-monetary performance indicators have become more and more prevalent, forcing Civil Engineers to engage with the public and private clients much more often, and much earlier in the process than ever before.

Considerations for:

  • Environmental issues
  • Disparate populations
  • Anti-Nuclear activists

All of these groups have armies of supporters they can use to put pressure on decision makers and designers, to produce more favorable outcomes for their causes and push companies to consider these causes as part of their ongoing measurement of success.

The Wharton School of Business at UPENN, talks about five of the challenges of using non-monetary measures:

  • The cost of considering a number of monetary and non- monetary measures is often greater than any benefits you might gain.
  • Unlike the more standard economic efficiency measures, non-financial data are measured in a lot of different ways, meaning there are no common denominators.
  • Difficulty linking non-monetary PI’s to financial PI’s to be able to justify the importance.
  • Because non-monetary measures are less objective, they become much harder to track and what you can track is less reliable than more traditional KPI’s
  • Some might say that the addition of non-monetary measures contributes to an overall dilution of the much more important financial measures.

 

2. How does monetary value affect index performance?

Monetary value is the amount of money a person, business, or market puts you into a product, product, or service. In fact, many of the goods and services in our modern economy have prices based on the value of money. Let’s look at some examples of resources, goods, and services that are priced:

  • Items such as metals, agricultural products, oil, gas and other natural resources
  • Visible material, which is the most personalized object, such as a computer, pencil and art
  • Intangible assets, such as patents, copyrights, and copyrights
  • The world
  • Certain intellectual property rights, such as gas, minerals, oil, timber and water rights
  • Jobs
  • Work, such as salary and salary
  • And businesses

In fact, almost everything related to our modern economy and market has value for money.

In the Person class implement

  

In the Person class implement a method that calculates an indicator m based on the following formula using recursion:
 

m(age) = 1 + 1/2 + 1/3 + 1/4 + 1/5 … + 1/age

(1200 Words) Provide >=3 examples of security exploits that have taken place in the last 3 years.

 Provide >=3 examples of security exploits that have taken place in the last 3 years.  In each example, provide the type of attack, technical detail on how the attack worked, what was known about the attacker, the impact of the attack (on both the victim/organization and on technology in general).
 

1200 Words – Exclude references!! 

***no Plagiarism, APA format***

!!!! No money Negotiations after accepting the Bid !!!!!!!

Copy 9

 This should be 3 pages

  1. How does white-collar crime fit within strain theory? 
  2. What are five techniques of neutralization? Provide an example of each.  
  3. List and describe the assumptions of deterrence theory. 
  4. Explain how cyber stalking and harassment could be the result of strains.
  5. Describe how hackers have formed their own subculture. 

Database Sql

Do the sql tables based on the report file uploaded 

Create tables using sql based on the requirements below:

 1. SQL to create all tables 

 2. SQL insert multi-table queries 

 3. SQL update multi-table queries 

4. SQL delete multi-table queries 

 5. SQL views that use: 

             i. Aggregation function

             ii. Sorting

             iii. Grouping

             iv. Subqueries 

Find the file ArrayBoundedStack.java which

1. Find the file ArrayBoundedStack.java which is in package ch02.stacks. Add

comments to the file so that it conforms to our specification requirements:

◦ Add @author and @version tags to the file headers

◦ Add method comments and @param tags as needed to each constructor

◦ Move each method comment in front of the method it describes and switch

comment symbols to Javadoc style

◦ Add @param, @precondition, and @postcondition tags to each method comment

2. Now you can generate documentation using our javadoc257 command. Generate the

docs to the file ~/html/CS257/ArrayBoundedStack so I can find it online.

You only need e-mail me when the docs are online so I can go look at them.

3. (EXTRA) Add these methods to your Quadratic class from Homework 3; note that

these override the versions inherited from the Object class. Don’t forget to comment the

specification for each.

equals – returns true if two quadratic equations have the exact same coefficients, false

otherwise

clone – returns an exact copy of the quadratic equation