DB Systems Discussion

1. How can the key and foreign key constraints be enforced by the DBMS? Is the enforcement technique you suggest difficult to implement? Can the constraint checks be executed in an efficient manner when updates are applied to the database?

2. What is the FUNCTION operation? For what is it used? And Present a practical example/ scenario.

Write a C program that reads

  

Write a C program that reads a numbers from the keyboard and calculates its square if the number is *****: use an infinite loop for reading and calculating, break out of the loop if the number is *****

The company has asked you to build

  

The company has asked you to build a prototype of an n-tier system using the Northwind database as an example. The company wants to be able to add, edit, and delete records from the customers, orders, order details, products, categories, and supplier’s tables. Your instructor will provide you the online link to the SQL Server database files (MDF and LDF).
Assignment Guidelines
• Create the Data Access tier and Data tier projects:
1. Create a class library project for the Data tier.
2. Add a new class library project the project created in Step 1 for the data access tier.
3. Add a typed DataSet using a new data source that connects to the Northwind sample database.
4. Select the database objects (customers, orders, order details, products, categories, and suppliers) tables.
5. Make sure the TableAdapters are stored in the Data Access tier and the DataSet class is added to the Data tier.
• Make sure that separate tiers are created for each layer by verifying that separate class libraries were created and the necessary references to the project were added.
•Using the project, you started in Week 2 Individual Project, verify the business logic layer (middle tier) is working correctly and make the connection to the database, implementing the logic in the data layer provided to manipulate the data stored in the database portion of the n-tier system.
Assignment Guidelines
• Add the following to the Phase 2 individual project:
o Add a new Windows Communication Foundation (WCF) service library project to the Phase 2 individual project to communicate with the Data Access tier.
o Add the necessary queries and methods to the table adapters that will return, add, edit, and delete the data from the tables specified in Phase 2.
o Add references in the Data Service to the Data tier and Data Access tier projects.
o Add methods to the Data Service class created in Step 1 that will call into the Data Access tier.
• Make sure that separate tiers are created for each layer by verifying that separate class libraries were created and the necessary references to the project were added.

  

Assignment4_1.java as the file name and Assignment4_1 as the class name – Write a console program with a static method printHello() (in addition to main() method which is also static) that prints out “Hello World”. Call that method from main(). Assignment4_2.java as the file name and Assignment4_2 as the class name – Write a console program with static method inc() that takes value of type int and returns that value increased by one. In main() method do the following: Ask a user to enter an integer value Call method inc() and pass user input (integer value) into that method Print returned result Assignment4_3.java as the file name and Assignment4_3 as the class name – Write a console program with static method inc() that takes value of type int and returns that value increased by one. In main() – public static void localModification(int a) { a++; } Call that method from main() while passing some integer value stored in a variable, for instance: public static void main(String[] args) { int A = 5; localModification(A); System.out.println(A); } Make sure that value of A, printed in main(), is not affected by local modification made within the localModification() method, i.e. value 5 is printed. Try to understand why. Task: Change declaration and/or implementation and/or call of the localModification() method, such that print statement in main() method prints incremented value, i.e. 6.

Computer

 You can build and save a list of master sources you have used in research papers and reports and display them using Manage Sources. What are the advantages of storing sources over time? 

Project 3: Client Presentation

 

Your final project will be to design a training presentation to the client’s IT staff. 

If you haven’t already done it last week,:

The presentation must meet the following requirements:

  • 11 to 15 slides of writing-to-understand content (text and visuals). Remember, your audience is the IT team within an accounting firm.
  • voice annotation for every slide (excluding the reference slide)
  • at least two references

The presentation can incorporate screenshots from Project 2 along with additional screenshots as needed. Content should include work that needs to go into making the upgrade successful, how to improve security using two or three of the Windows 10 built-in features, and how-to backup and restore Windows 10 data using some of the tools available in Windows 10.

The presentation should address your recommendations for the following items:

  • Version Summary
    • Recommended version of Windows 10 (e.g., Windows 10 Pro, Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).
  • Installation Methods
    • Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.
  • Security Features
    • Windows Security, BitLocker, Defender, Local Security Policy
  • Backup and Recovery Overview
    • Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data that can backed up and restored. This should address:
      • the problems encountered when Tetra Shillings Accounting fell victim to a ransomware attack that resulted in the loss of critical data.
      • the concerns that Tetra Shillings Accounting has concerning recovering data that is lost due to deletion, corruption, or media failure.
      • the ability to restore system files and settings without affecting the user’s personal files and data.
      • the concerns that the client has about recovering systems that are negatively impacted by an operating system update.
  • Backup and Recovery Tools
    • You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool and how it can be used to address the company’s concerns. Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed.
  • Backup to Recover from Ransomware Attack
    • Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.
  • Backup and Recover a Restore Point
    • Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.

IG Wk7

2 pages

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.    

Find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other leaners for full points. 

Assin10

 

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriate for the use case?  Why or why not?

Description: Unit 9 – Java Arrays and Data Files

 

Description: Unit 9 – Java Arrays and Data Files

This unit is really about three different topics that are related to one another – arrays in Java, simple text files in Java, and modular programing in java (Java methods).

The unit has a programming project spread over three related programming assignments, each worth 10 points.  

In the first assignment, you will create a Java program that works with a small array of data containing five test scores.   It will get data from user input do some calculations, and then print the results. 

In the second assignment, you will modify a copy of the first assignment to load the data from a data file into an array, and then output the results to a data file.  

In the third assignment, you will decompose a copy of the second assignment into separate methods in Java.

Our goal is to have a good modular program that loads stored data from a fie into an array, works with the data, then sends results to another data file.  Doing this in three parts will allow you to focus on one aspect of the problem at a time. 

There are reading assignments in Zybooks, but the two chapters from the Java Learning Kit – Chapter 5 – and Chapter 6 are your best source for learning this material.  They cover the things you need to learn to complete this project and have good sample programs.

Your tasks are to:

  1. Read Zybooks Assginment 11 – Arrays in Java.
  2. Read the material in JLK Chapter 6 about arrays in Java.
  3. Complete the Java Arrays Programming assignment.
  4. Read the material in Chapter 6 about text files in Java.
    There is no corresponding Zybooks assignment.
  5. Complete the Java Text Files Programming assignment.
  6. Read the Zybooks Assignment 12 – Methods in Java
  7. Read the material in JLK Chapter 5 about methods in Java.
  8. Complete the Java Methods programming assignment.

It may seem like their is a lot to do here but the assignments are each simple and build on one another.

assignments:

 #1

You should complete Zybooks Assignment 11 – Arrays in Java and read lessons 6.1, 6.2, and 6.3 in JLK Chapter 6 about arrays in Java before starting this assignment.

Your task is to create a Java I-P-O program that works with a small array of data containing five test scores.

Your program should:

  1. contain a for loop to read five test score into an array from the user. The array should be a floating point array with five elements.
  2. Using second for loop, calculate the average score, highest score, and lowest score in the array. JLK lesson 6.3 is a good guide for doing this.
  3. print the results.

You should submit a zipped copy of your IntelliJ project folder.

#2

You should read lesson 6.5  Text File Input and Output in Java before starting this assignment. Reading Lab 6.6 will also be helpful. There is no corresponding Zybooks assignment.

Your task is to modify the program from the Java Arrays programming assignment  to use text files for input and output. I suggest you save acopy of the original before modifying the software.

Your modified program should:

  1. contain a for loop to read the five test score into the array from a text data file. 

    You will need to create and save a data file for the program to use. It should have one test score on each line of the file.  You can type and save the text file with any text editor, such as Notepad or Notepad++.  NotePad++ is a good program to have on your computer, It can be downloaded freely from: https://notepad-plus-plus.org  (Links to an external site.)
    It should be saved or copied to the same folder as your Java source code file within you Intellij project.

  2. Contain a second for loop, calculate the average score, highest score, and lowest score in the array. This part  of your program does not need to change from the previous assignment.
  3. output the results to a new text file. You can decide the name of the file. You should only use a local file name and the file will then be created in your IntelliJ project folder.

You should submit a zipped copy of your IntelliJ project folder, which should contain the two data files within the project..

PreviousNext
 

#3

You should complete Zybooks Assignment 12 – Methods in Java and read lessons JLK Chapter 5 – Methods and Modularity in Java before starting this assignment.

Your task is to modify the program from the Java Text files programming assignment  to contain several methods for different parts of the program.I suggest you save a copy of the original before modifying the software.

Your modified program should have the following six methods:

  • a method with a for loop to read the five test score into the array from a text data file.  The array should be declared in the main method and passed as a parameter to this method.
  • three separate methods to each calculate and return one of the following: the average score, highest score, and lowest score . Each method should contain a for loop to calculate and return one of the values to the main method. You can copy and edit he existing loop form the previous program for each of these methods.
  • a method to output the results to a new text file, as the main method did in the previous program. You basically need to move the code to do this into a new method.
  • the main method, which has the necessary variables and which calls the other methods as needed, passing values to those methods and receiving returned value from the methods as needed. 

Unlike Python functions, methods do not need to appear before they are called in a program file. In fact, it is common practice in Java to put the main() method as the first method in Java program, similar to what is done in the payMethods sample program in the chapter.

You should submit a zipped copy of your IntelliJ project folder, which should contain will contain the two data files within the project..

You should submit a zipped copy of your IntelliJ project folder.

PreviousNext

CMST PART 2 PRO 2

 

PROJECT 2: PRESENTATION

OBJECTIVE
The purpose of this project is to demonstrate your understanding of the following course concepts:

1. How companies or organizations use digital or social media to effectively communicate ideas, information, arguments, and messages to achieve a specific goal.
2. How digital or social media has transformed the communication of idea, information, and arguments in society.