Database Assignment SQLite

This exam consist of 3 parts. This is Part 1. Write your answer in one pdf or docx format or type them here.

I. Assuming the schema for a database,

employee (employee-name, street, city)
works (employee-name, company-name, salary)
company (company-name, city)
manages (employee-name, manager-name)

give SQL queries for the following questions, assuming a person can have more than one job and a company can exists in more than one city:

1) A list of the names of those employees who work for the Google.

2) A list of the names and cities of residence for those employees who work for Google.

3) A list of the names, streets and cities of residence for those employees who work for Google and earn more than $250000 a year.

4) A list of the names of those employees who live in the same city as the company for which they work.

5) A list of the names of those employees who live in the same city and on the same street as their managers.

6) A list of the names of those employees who do not work for Google.

7) A create statement for the table works, including the keys.

part 2

This exam consist of 3 parts. This is the 2nd part Write your answer in one pdf or docx format.

II. Write a 1200-2000 words essay about the attribute closure algorithm studied in slides, reproducing the algorithm and describing it line by line with its logic and applications to the detection of candidate keys. The essay should contain the following sections:

a) Motivation

b) The algorithm reproduced from slides

c) A line by line description of its logic and complexity

d) Exemplify computing the attribute closure (C,D)+ for the following problem:

  R=(A,B,C,D,E)

  F={B->A; C->A; DE->AC; E->B }

e) Exemplify the process of finding  and proving a candidate key for the problem at (d)

f) Describe applications of the algorithm to other problems

part 3

This exam consist of 3 parts, this being the 3rd part, and is personalized. Write your answer in one pdf or docx format.

III. Write a 1000 word essay, reproducing the corresponding algorithm or definition and describing it line by line with its logic and applications, for the following personalized topic (find the topic associated with your name).

A. Alfifi     Functional Dependencies closure 

Organization leadership & decision making

  • What factors drive innovation?
  • What is the leader’s role in facilitating the process of innovation?

Requirements

  • Your answer must be substantive, which usually requires 300 or more words
  • Your answer must be well written and well organized
  • Your answer must include one properly formatted APA in-text citation to a scholarly reference other than the assigned course reading. The full reference must be provided at the end of your answer with a link if one is available.
  • No plagiarism 
  • Post two replies

cyber security

 

You may have noticed that when you look at products on a search engine, that same product appears as an advertisement in your social media and other sites you visit. Many search engines provide advertisers with tools for evaluating the impact of different keywords or phrases. These tools typically “track” user behavior patterns and associate products for sale by companies that subscribe to and pay for their services to help identify potential customers. On the other hand, there are also ad blockers that block this type of communication.

  • What constraints, if any, should be applied to this practice? Do not repeat ideas that have been posted by other students.
  • How might your feelings toward the technology be affected if you are the CIO or an executive manager at a small company that depends on this type of advertising to generate revenue?

Managing Transaction Processing using MongoDB

1. Write a research report on the topic “Managing Transaction Processing using MongoDB”.

Instructions:

Please refer to attached Doc for guidelines and please strictly follow all the instructions carefully while writing the report.

2. Prepare a PPT 

·       PPT should reflect a summary of the Research Report.

·       Should have 12-15 slides.

·       The design elements and content will be judged equally.

Note: No Plagiarism, Relevant research goal and questions are must.

Week 9 Assignment

Do a bit of research on File Inclusion Vulnerability and answer below questions.

  • 1. What is it?
  • 2. Why is is dangerous?
  • 3. What is the difference of low and remote inclusion?
  • 4. What methods can me employed to prevent a security breach?
  • 5. What programming languages are vulnerable to this type of attack.

Note: Answer to each of these above questions should be around 75 words.

Write your answer using a WORD document in total about 350 words for all 5 questions. Do your own work and use your own words. Note your Safe Assign score. Score must be less than 25 for full credit.

Paper

TOPICS: Artificial Intelligence, Virtual Reality,Block Chain, Drones, 5G, Internet  of things, Cyber Security.

Please choose a topic from above.
It should be at least 10-15 pages with at least 5 APA citations & matching references. Formatting: Introduction; Image / Table; Conclusion; 12 TNR font; double space; clearly divided small paragraphs; bold & underline headings; have name and course number