Working ERD Diagram

  

Purpose: To implement a “prototype” database system application for a eCommerce social-network system called UCOnline where users can explore information about books/music/software, rate your purchase, identify purchase price and see ratings of their friends.

Requirements: (a) Working ERD Diagram.

(b) Explanation of the relationships used in the ERD Diagram (text-based summary).

(c) URL of a WORKING database that maps your database solution. It should be a working prototype. I strongly encourage you testing this and using this as an opportunity. There are many free offers for AWS, Azure, GCP available – especially for students.

Instructions: You will work with book/music/media information, user information, ratings of books, and users’ social network.

Each book has an id, title, publication date, publisher, ISBN, functional category, page count, price (publisher), and product description.

There are 3 categories of book: fiction, non-fiction, and specialty.

There are 2 categories of music: digital and media-based

An author can write one or more books.

A musician can be a solo artist, part of a group, or both

An author can also be associated with one or more publishers.

A musician/group/act can be associated with one or more music houses

An author’s book can have one or more editions.

A song and or album can have more than one version/edition (i.e. EP, LP, CD, DVD etc)

A publisher can have many authors and many books.

A record company can have many artists associated and many albums associated with it. 

A record company can also be the publishing company (i.e. self-publishing)

Many ISBNs can also be associated with a given publisher but only one ISBN per form of medium (ie the ISBN is the PK no matter what).

An author can write many books.

An artist can write many songs, albums etc.

UCOnline needs to keep track of user ratings for each item sold in the online store (e.g., 1-5 and 1 for ‘Dislike’, to 5, for ‘Awesome!’). A particular user rates a particular item at a given time.

A user CANNOT rate the same multiple times unless there are multiple editions of the item. Each edition can be rated separately. Each user who submits a rating will be identified by a unique id and has a name, gender, age, and location. Nothing is anonymous.

There is also a social network between users. Users can send communication requests (i.e. instant messages/emails) to other users. Such requests can be accepted or ignored. Once accepted, the two users are considered ‘book buddies.’ If ignored, the user can send the request again. We want to add a store when the requests were sent (timestamp), the result of the requests and when the request was answered (timestamp).

Systems Design Goals

 

Respond to the following in a minimum of 175 words: 

The components of a system are interdependent; therefore, the design phase is not a series of clearly defined steps. Even though work may start in one area, it will typically involve working with several different elements at a time. For example, a decision to change a report format might require changes in data design or input screens.

The goal of systems design, however, is clear: to build a system that is effective, reliable, and maintainable. In your post, ensure you:

  • Discuss what makes a system effective, reliable, and maintainable.
  • Discuss how you evaluate if a system is effective, reliable, and maintainable.

Discusssin

 List three (3) advantages and three (3) disadvantages cloud-based providers have with respect to security using them as LEVEL 1 HEADINGS. Then, in YOUR  OWN words, and from an IT security manager’s perspective, explain how each advantage can help your business succeed and how each disadvantage can hurt business operations. 

COM303 Week 4 Discussion 10

  

We often place the topic of History on a pedestal (hence why I capitalized it) in our culture.  But as the reading discusses, history is a created, manipulated ‘thing.’ Which moment in history, before your birth, would you like to know more about? Which narratives are missing from that moment in history? Why might someone want to suppress those narratives?

Research Paper 5

This week’s reading centered around Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin). 

Your paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations.  The UC Library is a great place to find resources.

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment: Using Security Policies and Controls to Overcome Business Challenges

  1. Learning Objectives and Outcomes
    • Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
    • Identify four IT security controls for a given scenario.
    • Scenario
    • The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.
    • Online banking and use of the Internet are the bank’s strengths, given limited its human resources.
    • The customer service department is the organization’s most critical business function.
    • The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
    • The organization wants to monitor and control use of the Internet by implementing content filtering.
    • The organization wants to eliminate personal use of organization-owned IT assets and systems.
    • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
    • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.
    • Assignment Requirements
      Using the scenario, identify four possible information technology (IT) security controls for the bank and provide rationale for your choices.

      Required Resources

    • Course textbook
    • Internet
    • Submission Requirements
    • Format: Microsoft Word
    • Citation Style: Your school’s preferred style guide
    • Length: 2 pages
    • Self-Assessment Checklist
    • I listed four IT controls based on the scenario.
    • I provided rationale for my selection of IT security controls.

Research paper for inferential statistics in decision making

Regression test for statistics:

Regression test (2 pages)

Half page introduction(article) 

Image should be like statistical graph

Analysis.

Results of the test

NOTE: – 1.     APA format and should have references to each page 

               2.     Total Document should contain minimum 2 pages