Homework assignment

  

Homework assignment

The following table records the results for would-be actors who are undergoing a preliminary screening audition for a particular role in a play. Any actor who is turned down for a role, in the preliminary screening, is not allowed to re-audition for that role again. (Everyone who passes will be re-auditioned later along with others who passed the preliminary screening, and that data will be put in a separate table.)

  

Actor 

Role 

AuditionDate

Result 

 

AaryanChaudary

Julius Caesar 

2018-09-13 

reject 

 

AaryanChaudary

Brutus 

2018-09-14 

pass 

 

Barry Evans 

Julius Caesar 

2018-09-13 

pass 

 

Isaac Biko 

Cassius 

2018-09-13 

pass 

 

Isaac Biko 

Julius Caesar 

2018-09-13 

pass 

The primary key of this table is Actor + Role.

Question 1

What bad consequences could follow if, in creating the table – before we added the data – we defined the primary key of the table as:

(a) Actor alone?

(b) Role alone?

(c) AuditionDate Alone?

(d) Actor + Role + AuditionDate?

(e) Actor + Role + AuditionDate + Result?

Question 2

Suppose it is decided to allow actors to re-audition for roles for which they were initially rejected, at a later date. Would we need to change the definition of the primary key? If we didn’t change it, what problem might arise? If we changed it, what would the new key be? Explain your answer.

********************************************************************************************************

Normalizing an Unnormalized Relation 

The following table holds information about the annually-recorded weight of particular prize sheep, and about the veterinarians (vets) who weigh them. Each sheep belongs to a particular owner. No sheep is owned by more than one owner. Each sheep’s birthdate and current owner is recorded. Every year, a veterinarian weighs each prize sheep and records its weight. The date of the weighing, and the ID number of the vet, plus the mobile phone number of the vet, is recorded. Vets have only one mobile phone number. The Primary Key of the table recording this information is SheepID+WeighingDate. The table has not been normalized beyond First Normal Form. That is, there are no ‘repeating groups’, but there may be Partial and Transitive Dependencies.

  

SheepID

Owner 

Birthdate   

WeighingDate

Vet 

Weight 

VetPhoneNum

 

K3922 

McNab013 

2013-05-12 

2013-08-14 

M330 

22 

7633088852 

 

K3922 

McNab013 

2013-05-12 

2014-06-02 

S929 

34 

7609865463 

 

K3922 

McNab013 

2013-05-12 

2015-08-02 

M330 

43 

7633088852 

 

K3922 

McNab013 

2013-05-12 

2016-07-30 

P301 

53 

7682907965 

 

K3922 

McNab013 

2013-05-12 

2017-08-12 

P301 

52 

7682907965 

 

K3922 

McNab013 

2013-05-12 

2018-07-22 

S929 

51 

7609865463 

 

T8832 

McNab013 

2012-03-26 

2012-08-14 

K339 

19 

7602907550 

 

T8832 

McNab013 

2012-03-26 

2013-09-01 

S929 

26 

7609865463 

 

T8832 

McNab013 

2012-03-26 

2014-08-15 

K339 

32 

7602907550 

 

T8832 

McNab013 

2012-03-26 

2015-07-28 

K339 

40 

7602907550 

 

T8832 

McNab013 

2012-03-26 

2016-08-11 

T975 

42 

7646746741 

 

P9742 

Smith002 

2014-05-10 

2014-09-11 

K339 

14 

7602907550 

 

P9742 

Smith002 

2014-05-10 

2015-08-10 

S300 

25 

7629920821 

 

P9742 

Smith002 

2014-05-10 

2016-08-29 

K339 

35 

7602907550 

 

P9742 

Smith002 

2014-05-10 

2017-09-01 

S929 

44 

7609865463 

 

P9742 

Smith002 

2014-05-10 

2018-08-22 

S929 

51 

7609865463 

 

M3110 

Smith002 

2015-05-12 

2015-09-12 

S300 

15 

7629920821 

 

M3110 

Smith002 

2015-05-12 

2016-09-10 

S300 

26 

7629920821 

 

M3110 

Smith002 

2015-05-12 

2017-08-17 

K339 

34 

760290755 

Question 3

Identify the Functional Dependencies in this table. Your answer should conform to the following format: If, taken together, attributes A and B determine C, show it this way:

A + B → C 

Question 4

The above table in question 3 is susceptible to update, deletion, and insertion anomalies. Examine the ten possible problems. (Some of these problems are examples of normalization anomalies, and some are not.) For each of the 10 problems (a to j) below state whether there are 

  

Update 

Anomaly 

Deletion 

Anomaly 

Insertion 

Anomaly 

None of these. 

  

Problem 

 

a. Instead of   entering ‘2014-08-15’ for one of the weighing dates, ‘2104-08-15’ could be   entered instead. 

 

b. We cannot   insert information about a new vet (such as their mobile phone number) until   they have weighed a sheep. 

 

c. If we delete   all the tuples about a particular sheep, we lose all the information about   that sheep. 

 

d. If we delete   all the tuples for sheep K3922, we lose information about Vet M330’s mobile   phone number. 

 

e. We cannot   enter ownership and birthdate information about a sheep until it has been   weighed. 

 

f. A Vet could   record a sheep’s weight incorrectly. 

 

g. If a Vet   changes their mobile phone number, we could record the change in some of the   tuples with thier ID, and not in others. 

 

h. If a Vet   changes their mobile phone number, we could record the new number   incorrectly. 

 

i. If we delete   information about a Vet, we lose their mobile phone number. 

 

j. If sheep is   sold to a new owner, we could change some of its Owner values but not others.   

Question 5

Split the above  table from question 3 above into tables in BCNF, specifying the Primary Key of each table, and showing the first and last tuples for each table (following the order of tuples in the original table).

p1/150

Write a 6-8 page paper (APA)

  1. What types of security should be considered when dealing with information security as a whole?
  2. What are the pros and cons of each researched type?
  3. Which areas of security might be more critical more than others? Why?

150/p3

  • What are different types of inventory management software that could be used to track an organization’s assets?
  • What are the defining features of these software programs?

Work Computer Science WL -2

 

Remember to review the syllabus expectations for initial discussion posts and peer replies!

Discuss the following questions: 1. How can Blockchain increase human resource management efficiencies? 2. What are the stages of Blockchain maturity and explain which stages have the most potential for human resource management application? 3. How and why is Blockchain a disruptive technology in human resource management? You are required to cite this week’s assigned readings in your paper. You may also cite prior week’s reading assignments and external sources if you wish.

Use the following headings to organize your paper: Introduction, Question 1, Question 2, Question 3, Conclusion, References.

Submit your paper as a Word attachment in the discussion forum. I provide feedback within the paper and will not grade your post unless you submit it as an attachment. Your response to the discussion prompt should contain 2pages and it should be submitted no later than Wednesday before 11:59 pm EST.  Your response should be formatted in APA style and reference each of this week’s readings.

Textbooks for to use —-

 

Title: Blockchain for BusinessISBN: 0-13-558135-4Authors: Arun, J. S., Cuomo, J., & Gaur, N.Publisher: Pearson Addison-WesleyPublication Date: 2019Edition: 1st

Title: Harvard Course Pack BLCN 634 Summer 2021ISBN: https://hbsp.harvard.edu/import/822085Publisher: Harvard

According to the authors, privacy and security go hand in hand;

 

According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations.   

For this discussion, find an example of a security breach which compromised data records at a company in the same industry as you will be using in your final paper. Summarize the breach, discuss the data that was lost and identify security controls that you would recommend be in place (be certain to remember to cite sources) that could have prevented this breach from occurring. Remember to critical respond appropriately to two other leaners for full points.

Program

 Man Flowgorithm Program You must complete this assignment on your own. If you need help, please send me an email with your .py file attached and tell me where you are stuck. I will help you get unstuck, either via Zoom or via email. Create a flowgorith file named YourNameTaxMan.fprg•Part 1: Declaration of VariablesoPut a comment in your code that says Part 1oDeclare all the variables you will need for this programoDo not assign any values in Part 1•Part 2:User InputoPut a comment in your code that says Part 2oGather the following information from the user: first name, last name, gross income and number of children•Part 3: Calculations / FormattingoPut a comment in your code that says Part 3oCalculate the user’s dependency exemption, as follows: number of children times 2,000oCalculate the user’s taxable income, as follows: gross income minus dependency exemptionoCalculate the user’s tax due, as follows: taxable income times 15%oFormat the values that will be displayed, if needed•Part 4: OutputoPut a comment in your code that says Part 4oDisplay the information entered by the user, in the following format. It should be formatted exactly as pictured. Of course,the names and amounts will vary, depending upon what the user enters. •Part 5:Say byeoPut a comment in your code that says Part 5odisplay a message to which says: Goodbye from _____ (Fill in the blank with your full name. )•Submit the assignment as followsoSubmit the .fprgfile in CanvasoI do not give credit for code that does not run or that crashes while it runs. If you have problems running your code, sendme the .fprg file and in the body of the email tell me the error message you get when you try to run the code. Within 24 hours Iwill email you back and tell you how to fix it.

Programming with C++

 

1-   Silvia’s Pizzeria sells four different sizes of pizzas: small, medium, large, and family. The manager of the pizzeria wants a program that displays the total number of pizzas sold, as well as the percentage of the total number contributed by each different size.

 a.  Using the chart shown earlier in Figure 4-12 as a guide, enter the input, processing, and output items, as well as the algorithm, in the first column. 

b.  Desk-check the algorithm twice. For the first desk-check, use 25, 50, 50, and 75 as the numbers of small, medium, large, and family pizzas. For the second desk-check, use 30, 25, 85, and 73. Record the percentages with one decimal place. 

c.  Enter the C++ instructions in the second column of the chart, and then desk-check the program using the same data used to desk-check the algorithm. 

d.  If necessary, create a new project named Intermediate14 Project, and save it in the Cpp8Chap04 folder. Enter your C++ instructions into a source file named Intermediate14.cpp. Also enter appropriate comments and any additional instructions required by the compiler. Test the program using the same data used to desk-check the program. 

 Save your document with the name pizza followed by your initials(fdl). Example pizzal-fdl.cpp 

SEE FIGURE 4-12 ATTACHED 

kywk13its531as.

1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.

2. Discuss the financial benefits of chatbots. 

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

4. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

 5.Research the role of chatbots in helping patients with dementia.

6. Microsoft partners with the government of Singapore to develop chatbots for e-services. Find out how this is done.

YO19_Excel_Capstone_Intro_Smart_Rental

  

#YO19_Excel_Capstone_Intro_Smart_Rental

  

#YO19 Excel Capstone Intro Smart Rental

  

Project Description:

Virginia Garrero owns a small business in which she rents high end handbags, accessories, dresses and evening gowns. Virginia has created a workbook to keep track of weekly rentals. She uses this workbook to keep track of rentals and also to identify trends in length of rental, and payment method. Virginia wants to use this information when forecasting which new products to purchase for her rental business. To purchase new products, she will need to take out a loan. Therefore, she also wants to know what her monthly payment would be if new products were purchased. You have been asked to help finish the workbook so that Virginia can use it on a weekly basis.

     

Start Excel. Download and open the file named   Excel_Capstone_Intro_SmartRental.xlsx. Grader has automatically added your last name to   the beginning of the file name. Save the file to a location where you are   storing your files.

 

To improve the   appearance of the RentalData worksheet, wrap the text of cell range A5:I5.

 

Merge and Center cell   range K1:P1.
  Copy the format of cell K5 and paste the format to cell range N5:P5.

 

Delete Sheet4 and   Sheet5 from the workbook.

 

On the RentalData   worksheet, in cell E6, enter a DATEDIF (or DAYS) formula to determine the   length of rental in days based on the date rented and the date returned. Copy   this formula through cell range E7:E31.

 

On the RentalData   worksheet, assign a named range Rates to cell range A34:B37.

 

In cell G6, use an   appropriate VLOOKUP function to retrieve the daily rate from the named range   Rates for the product in column A. The function should look for an exact   match.
  Copy the formula through cell G31.
  Format cell range G6:G31 with the Accounting Number Format.

 

Rewards customers are   allowed a discount on their rentals. In cell H6, enter a formula to determine   if a discount should be applied. If the payment method in column F was Rewards, the customer should   receive the discount shown in cell B39. Otherwise the formula should return a   zero. Use absolute referencing where appropriate and then copy the formula   through cell range H7:H31.
  Apply the Percent style with zero decimal places to cell range H6:H31.

 

Virginia considers   customers who spend over $200 a week to be valued customers and wants to draw   attention to their sales totals.
  Apply a Conditional Format to cell range I6:I31 that will highlight the   values greater than 200 with Green Fill and Dark Green   Text. 

 

In cell I32, use a   function to add the Total Sales column.
  If necessary, in cell I32, remove the Conditional formatting.
  In cell I32, apply the Total cell style, bold formatting and change the font   to size 16.

 

Adjust the width of   columns O and P to 13
  Hide rows 33:39.

 

Virginia is   considering offering specials to clients based on their payment method.   Therefore, she wants you to help her analyze the week’s payment information   so she can determine her clients’ preferred method of payment.
 

  In cell L6, using a Statistical function, count the number of times the   criteria in cell K6 is used. Use absolute referencing where necessary and   then copy the formula through cell L9.

 

In cell O6, using a   Statistical function, determine the average total sales based on the payment   method type in cell N6. Use absolute referencing where necessary and then   copy the formula through cells O9.

 

In cell P6, using a   Math & Trig function, determine the total sale per payment method based   on the payment method in cell N6. Use absolute referencing and then copy the   formula through cell P9.
  Apply a Gradient Fill Orange Data Bar to P6:P9. 

 

Virginia wants to   determine if the sales goal for the week was met. The sales goal for the week   is met if the total sales is greater than or equal to $3,000.
  In cell L13, enter a logical function to determine if the sales goal for the   week was met. Return a value of Yes if the sales goal was met, or No if the sales goal   was not met. 

 

When Virginia started   gathering client data, she entered her clients’ names in all capital letters   and in column A. She has asked you to change the names of each client to   proper case.
 

  On the Clients worksheet, in cell B2, use a text function to change the text   in cell A2 to proper case. Copy the formula through cell B26. 

 

Virginia is   considering taking out a loan to purchase more products to rent to customers.   In order to purchase the products she needs, she has determined that she   needs to borrow $10,000. She would like you to help her determine her monthly   payment based on the loan amount, an interest rate of 5.5% with a repayment   of the loan after 5 years.
 

  On the LoanData worksheet, in cell B6, determine the monthly payment.
 In cell B6, edit the formula to return   an absolute value.

 

Virginia is curious   about her handbag line of rentals. She has asked you to create a combination   chart that shows the days rented and the total sales.
 

  Using cell ranges A5:A10, E5:E10, and I5:I10 on the RentalData worksheet,   create a combination chart with the Total Sales as the secondary axis. The   secondary axis should be a line chart.
  Move the chart to a new chart sheet named HandbagsChart
  Move the Chart Sheet to the last position (far right).
  Enter the chart title Handbag Rental
  Apply Chart Style 5.
  Add a primary vertical axis label Days Rented
  Add a secondary vertical axis label Total Sales
 

 

Save and close Excel_Capstone_Intro_SmartRental.xlsx.   Exit Excel. Submit the file as directed.