Database Marketing Strategy

1. Compare the use of simple selects versus regression analysis for choosing the customers on the house file most likely to respond in a certain way to an offer. 

2. What is the basic mathematical concept behind simple linear regression? 

3. What is extrapolation and why should it be used with caution? 

4. Give an example of a potential linear relationship that a direct marketer may examine and attempt to estimate. 

5. What is the coefficient of determination and how is it used in model building? 

6. Describe the scatter plots for a low R2 and a high R2 relationship 

 Please read chapter 9 and submit end of chapter 9 questions

Exp19_Access_Ch02_Capstone – International Foodies 1.0

 

Exp19_Access_Ch02_Capstone – International Foodies 1.0

 

Exp19_Access_Ch02_Capstone – International Foodies 1.0

nternational Foodies is an importer of exotic foods from all over the world. You landed a summer internship with the company and discovered that their product lists and the suppliers they buy from are stored in Excel workbooks. You offer to help by using your newly gained knowledge of Access to create a relational database for them. You will begin by importing the workbooks from Excel into a new Access database. Your manager mentions that she would also like a table that specifies food categories so that you can relate the products you sell to specific categories in the database. You will create a table from scratch to track categories, create relationships between the tables, and create some baseline queries.

1

Start   Access. Open the downloaded Access file named Exp19_Access_Ch2_Cap_Foodies. Grader has automatically added your   last name to the beginning of the filename. Save the file to the location   where you are storing your files.

2

You   will examine the data in the downloaded Excel worksheets to determine which   fields will become the primary keys in each table and which fields will   become the foreign keys so that you can join them in the database.
 

  Open the Suppliers.xlsx Excel   workbook, examine the data, and close the workbook. Open the Products.xlsx Excel workbook, examine   the data, and close the workbook.
 

  You will import two Excel workbooks that contain supplier and product   information into the database.
 

  Click the External Data tab, click   New Data Source, point to From File in the Import & Link   group, and then select Excel.   Navigate to and select the Suppliers.xlsx   workbook to be imported as a new table in the current database. Select First Row Contains Column Headings.   Set the SupplierID field Indexed option to Yes (No Duplicates). Select SupplierID   as the primary key when prompted and accept the table name Suppliers. Do not save the import   steps.

3

Import   the Products.xlsx workbook, set the   ProductID Indexed option to Yes (No   Duplicates), and select ProductID   as the primary key. Accept the table name Products.

4

Change   the Field Size of the QuantityPerUnit field to 25   in Design view of the Products table. Set the Field Size of ProductID and   CategoryID to Long Integer. Save   the changes and open the table in Datasheet view. Open the Suppliers table in   Datasheet view to examine the data. Close the tables.

5

You   will create a new table that will enable International Foodies to associate   each product with a food category in the database.
 

  Create a new table in Design view. Add the following fields in Design view   and set the properties as specified:
 

  Add the primary key field as CategoryID   with the Number Data Type and Number assigned to a new category.   (type the period) as the Description. Set the Caption property to Category ID.
 

  Save the table as Categories.

6

   Add CategoryName with the Short Text Data Type and Name of food   category.   (type the period) as the Description. Change the field size to 15. Set the Caption property to Category Name and the Required property to Yes.

7

Add   CategoryDescription with the Long Text Data Type. Set the Caption property to Category Description. Switch to Datasheet view and save the   table when prompted. You will enter Category data into the table in the next step.

8

   You will add 8 records to the Categories table so that you have some sample   data to test in the database.
 

  Add the following records to the Categories table:

Category   ID Category Name   Category Description 

1 BEVERAGES  SOFT DRINKS, COFFEES, TEAS 

2 CONDIMENTS  SAUCES, RELISHES, SEASONINGS

3 CONFECTIONS  DESSERTS,   CANDIES, SWEET BREADS

4 DAIRY   PRODUCTS  CHEESES

5 GRAINS/CEREALS  BREADS, PASTA, CEREAL

6  MEAT/POULTRY  PREPARED   MEATS

7 PRODUCE  DRIED FRUIT, BEAN CURD

8 SEAFOOD  SEAWEED AND FISH

  Close the table.

9

You will create   the relationships between the tables using the Relationships window.
 

  Add all three tables to the Relationships window. Identify the primary key   fields in the Categories table and the Suppliers table and join them with   their foreign key counterparts in the related Products table. Select the Enforce Referential Integrity and Cascade Update Related Fields check boxes.   Save and close the Relationships window.

10

You   will use the Simple Query Wizard to create a query of all products that you   import in the seafood category.
 

  Add the ProductName, SupplierID, and CategoryID fields from Products (in that order). Save the query   as Seafood Products.

11

Add   a criterion in Design view, to include only products with 8 as the CategoryID.

12

Sort   the query results in ascending order by ProductName. Run, save, and close the   query.

13

You   want to create a query that displays actual category names rather than the   CategoryIDs. You are interested to know which meat and poultry products are   imported. You will copy the Seafood Products query and modify it to delete a   field, then add an additional table and field.
 

  Copy the Seafood Products query   and paste it using Seafood Or Meat/Poultry   as the query name.

14

Open   the Seafood Or Meat/Poultry query   in Design view and delete the CategoryID   column.

15

Add   the Categories table to the top   pane of the query design window. Add the CategoryName   field to the last column of the design grid and set the criterion as “Seafood” Or “Meat/Poultry”.   Run, save, and close the query.

16

You   will create a query that identifies suppliers and their associated products.   Because there is a relationship between the two tables, you can now pull data   from each of them together as usable information.
 

  Create a query in Design view that includes the Suppliers and Products   tables. The query should list the company name, contact name, phone (in that   order), then the product name and the product cost (in that order).

17

Sort   the query by company name in ascending order, then by product cost in   descending order. Run, close, and save the query as Company by Product List.

18

You   determine that the data in the Company by Product List query could be   summarized with a Total row. You will group the records by company name, and   then count the number of products you buy from each of them.
 

  Copy the Company by Product List query   and paste it using Summary of Company by   Product   as the query name.

19

Open   the Summary of Company by Product   query in Design view and delete the ContactName, Phone, and ProductCost columns.

20

Click   Totals in the Show/Hide group on   the Query Tools Design tab. Click in the Total   row of the ProductName field, click the arrow, and then select Count.   The records will be grouped by the company’s name and the products for each   company will be summarized.

21

Modify   the field name of the ProductName column as Product Count:   ProductName to make the field name more   identifiable. Click Run in the   Results group (20 records display in the Datasheet). The results display the   product count for each company that supplies your organization. Save and   close the query.

22

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Presentation on responsibilities of cloud provider and consumer in security controls

 For this assignment’s scenario your management is considering deploying several VMs for the next project to the cloud in an IaaS service model to replace your current on-prem data center. They have asked you how hosting the workload in the cloud will change responsibility for security controls. Develop a PowerPoint presentation of no more than ten slides and provide guidance on who will be responsible (the cloud provider or your organization) for various security controls. Give specific examples using the VM you deployed in the previous module as a guide. Consider patching, intrusion response, software updates, network access, security monitoring, system redundancy, and physical security. 

Instructions:

 

  • This PowerPoint can include pictures, animation, whatever will professionally allow you to get your message across. 
  • Make sure to use your Speaker Notes (under the bottom of slides) to narrate your presentation materials, topics, images, etc. Remember that the slides are used to organize the topics you are presenting, while the speaker notes are used to narrate (explain, elaborate, etc.) your presentation. 
  • Review the directions carefully, consider all of your options, and provide details with explanations. Defend your work with examples and references.
  • All assignments are expected to adhere to APA formatting standards (references and citations), reflect a high level of scholarship, use correct grammar, and reflect critical thinking and problem-solving skills.

DQ

The purpose of this assignment is to examine the components of a research article and help you identify guidelines for conducting critical analyses of published works.  The knowledge gained should be applied when completing your weeks 3 and 5 research assignments.  As you complete assignments it is a good idea to proof read your work or use the University writing center to help with APA formatting.  Both are great avenues for assistance in minimizing grammatical errors and conducting research. 

Please use the attached “Guidelines for Evaluating a Research Article” to answer the below questions: 

  • What is an Information Technology Project?  
  • Identify & explain the major parts of a research paper.
  • Explain the difference(s) between qualitative vs quantitative research methods.
  • Why use Peer Reviewed journals?
  • Why are keywords used during the Literature Review process?
  • Why are project deliverables, limitations & deadlines an important aspect of project development?
  • Why use/apply APA Basic Citation Stiles in your writing assignments/research?
  • Why is Academic Integrity important (see syllabus)?
  • Explain the difference between plagiarism vs self-plagiarism?

Your assignment must follow these formatting requirements:

  • Use at least three – five (3 – 5) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.

Unit 6 DB: Planning Loyalty and a Mobile App

Your friends John and Pam discussed with you their need to implement a loyalty program and a mobile application for their restaurant.  As you were debating with them which initiative you would implement first, the customer loyalty system and the mobile app along with limited resources, they have asked you to explain the following:

  • The steps in IT planning and importance.
  • The advantages and disadvantages of different system conversion strategies.

In response to your peers, explain the challenges involved in systems development.

Risk Modeling

Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Below is the assignment/ instructions You can either write a paper or submit a powerpoint presentation

Locating a Missing Child: 

A 15-year-old girl left for school in the morning but never returned home. Her mother knows she never left home without her iPhone. She was also wearing her Apple Watch 6. Information we know:

  • The girl was present in school that day but did not return home at the usual time.
  • The young girl has a Facebook and an Instagram account and uses them to communicate with her friends daily. 
  • She posts photos and messages frequently in Facebook when she is able and the last photo she posted was two hours ago.
  • The family mobile account is with Verizon.
  • When her parents spoke with the girl’s friends, they were told she had recently ‘friended’ a new boy who had asked her to ‘meet up’.
  • There are video cameras in the school hallways and around the school grounds, and many of the local businesses also have digital cameras

Data and System Security

Read chapter 32 , 

Choose an organization describe your plan and proposal for a comprehensive Disaster Recovery and Business Continuity plan.

List all your references/resources.