Datebase HW Week 6

 3.44 What is a referential integrity constraint? Define the term, and give an example of its use. Are null values allowed in foreign key columns with a referential integrity constraint? How does the referential integrity constraint contribute to database integrity? 

3.45 Explain the role of referential integrity constraints in normalization. 

3.46 Do relations StudID_SocialSecurityNumber and SocialSecurityNumber_StudName contain a transitive dependency? 

3.47 In normalization example 3, why is the EXTENDED_PRICE relation “silly”? 

3.48 In normalization example 4, under what conditions is the functional dependency (StudentID, Activity) S ActivityFee more accurate than Activity S ActivityFee 

3.49 If a determinant is part of a candidate key, is that good enough for BCNF? 

 3.50 In normalization example 5, why are the following two tables not correct? DEPARTMENT (Department, DeptBudgetCode, Buyer) SKU_DATA_4 (SKU, SKU_Description, Department) 

3.51 How does a multivalued dependency differ from a functional dependency? 

3.52 Consider the relation: PERSON (Name, Sibling, ShoeSize) Assume that the following functional dependencies exist: Name S S Sibling Name S ShoeSize Describe deletion, modification, and insertion anomalies for this relation. 

3.53 Why is BCNF referred to as the best of the forms? 

3.54 Consider the relation: PERSON_2 (Name, Sibling, ShoeSize, Hobby) Assume that the following functional dependencies exist: Name S S Sibling Name S ShoeSize Name S S Hobby Describe deletion, modification, and insertion anomalies for this relation. 

3.55 What must we know in order to find functional dependencies in a table? 

3.56 What is a multivalued dependency? 

3.57 How do the conditions for DK/NF correspond to the conditions for BCNF 

Need 750+ Words With No Plagiarism And 2+ Scholarly References In APA Format

In chapter seven (7), we have learned from “The Path to Information Value” that 70% (seventy percent) of managers and executives say data are “extremely important” for creating competitive advantage.

In addition, it is implied by the authors that, “The key, of course, is knowing which data matter, who within a company needs them, and finding ways to get that data into users’ hands.”

Based on the company you have identified for your Final Paper, discuss 1) the data that matters to the executives in that industry, 2) who, within that industry, needs that data, and 3) some methods for ensuring that the critical data gets into the users’ hands.  Remember to respond to two other learners’ post, letting them know if they missed any data or details in their industry.

A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide outside schoarly sources (for example, an article from the UC Library https://www.ucumberlands.edu/library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

Chapter: 4-5 Assignment

  

Chapter: 4-5 Assignment: Create a web page that follows the text, formatting, and graphics of the attached graphic. use the attached sample photo. Create a folder called “Images” for your graphics. Pay particular attention to the clues on how/where to apply CSS. Note: Different browsers may render slightly different than the attached example, and that’s OK

Note: You may need to use a graphic editing software package

Purpose: To demonstrate your understanding of background colors, resizing graphics, transparency, and image hyperlinks

Requirements: A fully compliant and accessible web page

Expectations: A single zip file that contains the contents of web site

Instructions: Submit your file using the naming convention in the syllabus, for example: “CIS3315 Assignment3 Doe.John.zip” 

Reflection (R4)

 

Submit a 2 page marketing plan that uses Blockchain to prevent “over-serving” and allows for greater automation of the global commerce function.

Reflection Four (R4) is an essay assignment. 

Module 2: Creating a Research Paper.

 

Module 2: Creating a Research Paper.

Exercise 1

  • Open your textbook on pages WD 2-1 and follow the step-by-step (red balls) from pages WD 2-1 to WD 2-63.
  • After you completed all steps, your document should look similar to the following pictures.
  • Use your Name, your Instructor name, and the class CGS1030
  • Submit your work.

Textbook : Technology for success Microsoft office 365 & office 2019

IT470 week 6

Week 6 discussion topic

Discuss the following…

A) What current dedicated networks are there? Does anyone know how much it cost?

B) Can someone search when to use ring, mesh, star (pick one)? when to use what?

Feel free to show diagrams or videos or animation to help others understand.