ECET 450

  

ECET 450: Laboratory 2

Part A: 

Purpose:

This exercise involves normalizing a small part of a DB. The steps to complete this exercise include getting the data items into 1NF, 2NF, and 3NF. The final step is to generate the ERD for the table or tables that are in the dependency diagram in 3NF.

Discussion: 

Some small business wants to keep track of office furniture, computers, printers, etc. A sample of the ITEM records is shown below:

  

ATTRIBUTE NAME

SAMPLE VALUE

SAMPLE VALUE

SAMPLE VALUE

 

ITEM_ID

D1342245

D1453356

D1365779

 

ITEM_DESCRIPTION

IQ Deskjet 683P

IQ Toner

DT Photocopier

 

ROOM_NUMBER

227

227

342

 

BLDG_CODE

SC

SC

ET

 

BLDG_NAME

Science

Science

Electronics Technology

 

BLDG_MANAGER

A. B. Jones

A. B. Jones

R. S. Smith

1. Draw the dependency diagram using the data in the table. Make sure to label the transitive and partial dependencies.

2. Using the dependency diagram developed in step 1, create a set of dependency diagrams that meet 3rd Normal Form requirements. Rename attributes to meet the naming conventions. Create new entities and attributes as necessary.

3. Draw the crow’s foot ERD with the VISIO drawing tool using the results of step 2.

History Of java

 Research the history of Java and how it is different from procedural languages and its advantages.  Write 250 – 350 words summarizing your findings. Cite all of your sources using APA format.  

4-2 Final Project Milestone Two: Information Security Roles and Responsibilities

 

Instructions

You will submit your roles and responsibilities portion of the final project. Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization’s information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.

For additional details, please refer to the Final Project Document and the Milestone Two Guidelines and Rubric document.

Alternate Instruction for Microsoft 365 Apps icon

computer word

Insert a SmartArt graphic and add text.

  1. Place your insertion point in front of the second section heading (“Emergency Telephone Locations”).
  2. Insert the Vertical Chevron List SmartArt graphic from the List category (Figure 4-122).Type 1 in the graphic text box in the upper-left corner of the SmartArt graphic (first chevron shape).
    1. Type 2 in the second graphic text box in the first column of the graphic.
    2. Type 3 in the third graphic text box in the first column of the graphic.
    3. Type the following text in the bulleted text boxes in the second column. You do not need to add bullets because bullets are already included in the SmartArt.
    4. This table lists text to be typed in a SmartArt graphic
    • Press the “Help” button
    • Speak when the light comes on
    • Stay on the line
    • You will be connected with the college police
    • State clearly the nature of the emergency and your location
    1. Use Backspace to remove the extra bullet in the last graphic in the second column.
  3. Resize and format the SmartArt
    1. Select the frame of the graphic to select the entire graphic.
    2. Change the height to 2.5″ and the width to 4.2″.
    3. Change the text wrapping to Top and Bottom.
    4. Change Colors [SmartArt Design tab] of the entire SmartArt graphic to Dark 2 Fill (Figure 4-123).
      Alternate Instruction for Microsoft 365 Apps icon Change Colors [SmartArt Tools Design tab] of the entire SmartArt graphic to Dark 2 FillApply the Intense Effect SmartArt style.
  4. Convert text to a table.
    1. Select the tabbed text below the second section heading (“Emergency Telephone Locations”). Do not select the paragraph mark below the last row.
    2. Convert Text to Table and select AutoFit to contents.
  5. Sort the table text by Column 1 in Ascending order.
  6. Add a title row and insert text.
    1. Add a row above the first row.
    2. Merge the cells in this row.
    3. Type Blue Emergency Telephones in the merged first row.
  7. Format the table.
    1. Select Header Row, First Column, and Banded Rows in the Table Style Options group (if necessary). Deselect all other options.
    2. Apply the List Table 2 table style.
    3. Select the entire table and change the top and bottom cell margins to 0.04″ and the left and right cell margins to 0.1″.
    4. Vertically center all text in the table. (Hint: Use the Cell tab in the Table Properties dialog box.)
    5. Select the first row and horizontally center the text. This text should be centered vertically and horizontally.
  8. Insert, resize, and position the SPCCD logo.
    1. Place your insertion point at the beginning of the document and insert the SPCCDlogo-04 picture (downloaded from the Resources link). Use the Insert Picture dialog box.
    2. Change the width to 3″ and keep the size proportional.
    3. Change the text wrapping to Top and Bottom and drag the logo above the title (if necessary).
    4. Set the Horizontal Absolute position to 0.3″ to the right of Page.
    5. Set the Vertical Absolute position to 0.3″ below Page.
    6. Change the Color [Picture Format tab, Adjust group] to Saturation: 0%.
      Alternate Instruction for Microsoft 365 Apps icon Change the Color [Picture Tools Format tab, Adjust group] to Saturation: 0%.
  9. Insert, modify, and position an icon.
    1. Place your insertion point at the end of the title.
    2. Insert an icon and select the phone in the Communication section Change the width to 2″ and keep the size proportional.
    3. Change the text wrapping to Tight.
    4. Set the Horizontal Alignment to Right relative to Margin.
    5. Set the Vertical Absolute position to 1.1″ below Margin.
    6. Change the Graphics Fill color to Dark Blue, Text 2 (fourth color in the first row of Theme Colors).
  10. Modify the footer to include a symbol and the current date.
    1. Edit the footer and space once at the end of the text on the right side of the footer.
    2. Insert a solid circle symbol from the Symbol font set (Character code 183) and space once after it.
    3. Type Revised: and space once.
    4. Insert the current date in MM/DD/YY format, set it so that it does not update automatically, and close the footer.
  11. Edit the alt text of the graphic objects.
    1. Edit the alt text of the Sierra Pacific logo, type Sierra Pacific logo as the alt text.
    2. Select the entire SmartArt graphic, type Graphic of emergency telephone instructions as the alt text.
    3. Edit the alt text of the phone icon, type Icon of a blue phone as the alt text, and close the Alt Text pane.

Orthocenter Theorem

 Prove the Orthocenter Theorem by geometric arguments: Let T be the triangle on the image plane defined by the three vanishing points of three mutually orthogonal sets of parallel lines in space. Then the image center is the orthocenter of the triangle T (i.e., the common intersection of the three altitudes.  Note that you are asked to prove the Orthocenter Theorem rather than that the orthocenter itself as the common interaction of the three altitudes, which you can use as a fact.
(1)    Basic proof: use the result of Question 1, assuming the aspect ratio of the camera is 1. (20 points)
(2)    If you do not know the  focal length of the camera, can you still find the image center using the Orthocenter Theorem? Can you further estimate the focal length? For both questions, please show why (and then how) or why not.
(3)    If you do not know the aspect ratio of the camera, can you still find the image center using the Orthocenter Theorem? Show why or why not.  

Propose the necessary

Propose the necessary network interconnection materials ( material 1 material 2 and material 3) and briefly justify your choice.

Propose a possible IP addressing for the material 3. 

Consider this hypothetical situation 300 WORDS

Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim, since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Write your answer using a WORD document

Discuss the primary factors that motivate companies to expand internationally.

This posting should be at least 250 words. Respond to at least one other student’s initial posting. Your primary posting can end with a “tag-line” or a related question of your own. Your secondary postings can either answer another student’s question, or comment on their answering my question. Secondary responses should be substantial and well-meaning, between 100-125 words

Attached student’s question for a reply.