ER Diagram using 3NF

  

Let’s consider the following scenario:

Papa Georgeo (AKA PG) is opening a Pizzeria and he needs a database to capture and maintain the data for the entities Sales, Customers, Products, Purchase, Suppliers, and Employees. 

Business Needs:

PG would like to capture all the sales data with the details of every order. An order could be consisted of multiple items. For example, a customer could order 3 large pizza, 1 bread sticks, and 2 beverages in one order with one order ID. The Sales schema should capt
ure and maintain order date, customer ID, Order Time, Sub Total, Tax Amount, Total Due, Order Item, Qty, Price Charged for each item, Discount Amount for each item etc. PG is going to offer a club card (AKA PG Card) for his customers which they will hand it to the cashier to get points (those points are known as, you guessed it correctly, PG points! ???? ) every time they buy anything from the pizzeria. A customer can get a free pizza when he/she has accumulated enough points.  In addition, PG would like to track who is buying what so he can create different promotions for his customers with that information. The restaurant will accept cash, checks, and all major credit cards as payment method.

Note: Find the complete question in the attached document

2 Q

  

1. Suppose that a dynamic table was used to store a hash table. That way we can ensure that the hash table is never half full or more, and performance should be good. Does the amortized analysis guarantee that the average cost of a put operation on the hash table will be constant time? Does it guarantee that the expected average cost of a put operation will be constant time? Justify your answers.?

  

1. Suppose that we have a perfect hash function. Is using a dynamic table to store the hash table useful? Why or why not?

Activity to do

 

Learn About Learning Styles.

Barbara Soloman and Richard Felder at North Carolina State Universityhave researched different learning styles. They created an instrument to assess learning styles on these 4 dimensions:

1. Active/reflective

2. Sensing/intuitive

3. Visual/verbal

4. Sequential/global

Find out more about each of these learning styles at their website (www.engr.ncsu.edu/learningstyles/ilsweb.html (Links to an external site.)). Answer their Index of Learning Styles (ILS) questionnaire (there are no right or wrong answers) to learn more about your learning style. PrtScn/ snapshot your results( I attached two Screen Shots for me and my friend Martin). Compare your scores on the ILS questionnaire with the scores of 1 coworker(attached file Martin use it ). Write a summary paragraph (10 sentences) of the results you observed and what the results mean for you as a trainee.

In your summary, INCLUDE (in the 10 sentence paragraph) the answer this question: “Does any one of the training methods described in this chapter meet the needs of all the different learning styles that Felder and Soloman describe on their website?” Why or Why not (explain in 1 paragraph/5 sentences).

Discussion – Gaps

You should have gathered and read information from a number of sources related to your topic. State your topic and problem you are addressing in your dissertation. What trends are you seeing in the research related to your topic? What gap in evidence have you identified so far?  

 Topic :  The Smart Phone as a Dangerous Technology  

APA format with references needed. 

500 words

Security draft

Submit a second draft of your research proposal.  This will help you envision all the components before you begin drafting your IRB materials 

Use attached template.

CBSC 630 Case Study 2.1

 Conduct research on the use of network scanners and sniffers.  Use what you’ve learned in your research to write a report on the use of such equipment by hackers.  Some information that should be included in your paper is, the types of attacks using sniffers and scanners, why such attacks occurred, and why such attacks are conducted?    Be sure to cite your sources and follow APA formatting.  

HTML

In this assignment, you will create a table in the webpage you previously created. Create a table similar to the following attached screenshot with the three pictures on your webpage, include a paragraph of description for each picture, and another column showing the title of the picture.

In your HTML and CSS codes, you will need to use the following properties:

1. border-bottom
2. padding
3. min-width
4. width
5. box-shadow
6. font-family
7. font-weight
8. background-color
9. cellspacing

Final Project

 

Final Project

For the final project, write a paper exploring themes at the intersection of technology and policy. Select one of the following topics:

•  Methods for reducing the level of international cybercrime

•  Coping with the fragility of and lack of security on the Internet

•  Establishing norms of national behavior in cyberspace, in peace and conflict

•  Developing national legal support for norms

•  The role and importance of declaratory national policies for cyberspace

•  Creation of international risk mitigation frameworks

•  Development of strategies that encourage international agreements

•  Assess the risk of catastrophic attacks on national infrastructure.

•  Should cyberspace be treated as a potential battlefield?

•  Explore the impact of commercial cyber-espionage on advanced economies.

•  Contrast European and American approaches to privacy on the Internet.

•  Explore freedom of expression via the Internet within autocratic regimes.

•  Must freedom of speech and association in cyberspace be sacrificed for cybersecurity?

Prepare an 8 – 10 paged paper that fully discusses the policies, events and technology for your selected topic using the brainstorming and analysis methodology. You should use current events, laws/regulations, technology and methods to support your opinion in your paper. You must include at least 5 reference resources. You should include a title page, table of contents, and reference page. Format your paper consistent with APA guidelines.

ITP-4 – Project Execution, Tracking, and Changes

Full details, requirements and grading criteria are provided in the attached document below.

Most of the project work so far has dealt with project planning.  The purpose of this Individual project is to consider project execution, monitoring and control, and changes.  During project execution, things may change from what was planned, either intentionally (scope change) or unintentionally (risks and problems).  In this project, your team will field and deal with various project changes, and will monitor and track what happens to the project when things change.

OE

 

 

Midterm 

13. Define the IT organizational structure and how the IT organizational structure impacts culture and change management practices.  Additionally, how does the organizational structure impact competitive advantage?

14. How do you define operational excellence?  What factors are involved in achieving operational excellence?  Who (within an organization) is responsible for operational excellence and why is this important?

—————————————————————

1.  What is the productivity paradox?

2.  Summarize Carr’s argument in “Does IT Matter.”

3.  How is the 2008 study by Brynjolfsson and McAfee different from previous studies? How is it the same?

4.  What does it mean for a business to have a competitive advantage?

5.  What are the primary activities and support activities of the value chain?

6.  What has been the overall impact of the Internet on industry profitability? Who has been the true winner?

7.  How does EDI work?

8.  Give an example of a semi-structured decision and explain what inputs would be necessary to provide assistance in making the decision.

9.  What does a collaborative information system do?

10. How can IT play a role in competitive advantage, according to the 2008 article by Brynjolfsson and McAfee?

11. Do some independent research on Nicholas Carr (the author of “IT Doesn’t Matter”) and explain his current position on the ability of IT to provide competitive advantage.

1.  What does the term business process mean?

2.  What are three examples of business process from a job you have had or an organization you have observed?

3.  What is the value in documenting a business process?

4.  What is an ERP system? How does an ERP system enforce best practices for an organization?

5.  What is one of the criticisms of ERP systems?

6.  What is business process re-engineering? How is it different from incrementally improving a process?

7.  Why did BPR get a bad name?

8.  List the guidelines for redesigning a business process.

9.  What is business process management? What role does it play in allowing a company to differentiate itself?

10. What does ISO certification signify?

11. Review the return policies at your favorite retailer, then answer this question. What information systems do you think would need to be in place to support their return policy?

12. Review the section on knowledge creation, culture, and strategy.  Explain how balance scorecards impact knowledge creation, culture, and strategy.  Why are these important concepts to understand within an organization?

1 page

————————————————————————–