Questions
In its Audit of Computerized Criminal History, the Florida Department of Law Enforcement (FDLE) periodically reviews...

In its Audit of Computerized Criminal History, the Florida Department of Law Enforcement (FDLE) periodically reviews the accuracy and completeness of its criminal history database. The database contains thousands of records. The FBI/Bureau of Justice Quality Standards require that at least 95% of all records in the state’s database be complete and accurate. The audit uses a simple random sample to determine whether the state has met the standard. In a recent FDLE audit, the auditor found that only 555 records of the 605 records sampled were perfectly complete and accurate; the others were either incomplete or contained at least one error (source: fdle. state.fl.us/ publications/). Is this sample evidence sufficient to reject, at the 5% significance level, a null hypothesis that the population of Florida criminal records meets FBI/Bureau of Justice Quality Standards? Explain.

In: Statistics and Probability

A new veterinary clinic will like to set up their database. The clinic will like to...

A new veterinary clinic will like to set up their database. The clinic will like to keep record of their customers such as: pet name, pet type, pet age, pet weight, owner name, owner address, owner contact. Also the clinic will like to keep track of the veterinarian name, specialty and schedule. They will like to keep track of the customer appointment date, what the appointment is for, and how much it will cost.

List all of the data that needs to be kept track of for the scenario above in a 1NF (Flat File) table

Use the normalization technique and form the 3NF tables

Write out the Create Table command in SQL for creating the database you have designed, make sure to use the right DATATYPES, CONSTRAINTS, and COSTRAINT REFERENCES.

Write one SQL Insert into Values ( ); command for each table in your database

In: Computer Science

Suppose that a certain authority is running a (publicly accessible) database of users’ public keys. Let...

Suppose that a certain authority is running a (publicly accessible) database of users’ public keys. Let us define the following procedure for revoking a public key from the database. When a user Alice claims that the secret key skA corresponding to his public key pkA was stolen, she sends to the authority the statement “Revoke Alice’s public key pkA” which is signed using skA . Upon receiving such the statement, the authority revokes pkA from the database. Explain why it is not necessary for the authority to check Alice’s identity in this case. In particular, explain why it is not a problem that an adversary who has stolen Alice’s secret key skA can forge signatures for this key. Hint: Consider the following two cases: 1) Alice’s secret key skA was not stolen; 2) Aice’s secret key skA was stolen.

In: Computer Science

Python pls 1. The function only allow having one return statement. Any other statements are not...

Python pls

1. The function only allow having one return statement. Any other statements are not allowed. You only have to have exactly one return statement.

For example

the answer should be

def hello(thatman):

return thatman * thatman

Create a function search_hobby. This function returns a set of hobby names and people's excitement level.

input

database = {'Dio': {'Lottery': 2, 'Chess': 4, 'Game': 3},'Baily': {'Game': 2, 'Tube': 1, 'Chess': 3}, 'Chico': {'Punch': 2, 'Chess': 5}, 'Aaron': {'Chess': 4, 'Tube': 2, 'Baseball': 1}}

def search_hobby(database, num):

#ONLY ONE STATEMENT IS ALLOWED (RETURN STATEMENT)

search_hobby(database,0) -> {'Chess', 'Punch', 'Baseball', 'Game', 'Tube', 'Lottery'}

search_hobby(databalse,3) - > {'Chess', 'Game'}

In: Computer Science

Westlake Research Hospital It is imperative that the database be ready before the actual clinical trials...

Westlake Research Hospital

It is imperative that the database be ready before the actual clinical trials begin. The staff at Westlake is anxious to see some results. It is time you show them the logical design of their database. Follow these steps:

1. Review all the requirements and business rules.

2. Define your entities and attributes and the relations that exist between them.

3. Create a logical model using crow’s feet notation in Visio or hand draw it on graph paper if you prefer.

4. Add all the entities and their attributes. You don’t need to worry about data types for now.

5. Identify the key fields for each entity and the foreign keys.

6. Analyze the diagram. Identify which role (i.e., domain, linking, lookup, or weak) each entity plays in your database.

.

In: Computer Science

Westlake Research Hospital It is imperative that the database be ready before the actual clinical trials...

Westlake Research Hospital

It is imperative that the database be ready before the actual clinical trials begin. The staff at Westlake is anxious to see some results. It is time you show them the logical design of their database. Follow these steps:

1. Review all the requirements and business rules.

2. Define your entities and attributes and the relations that exist between them.

3. Create a logical model using crow’s feet notation in Visio or hand draw it on graph paper if you prefer.

4. Add all the entities and their attributes. You don’t need to worry about data types for now.

5. Identify the key fields for each entity and the foreign keys.

6. Analyze the diagram. Identify which role (i.e., domain, linking, lookup, or weak) each entity plays in your database.

.

In: Computer Science

1) Two of the major challenges business users face when using big data are finding the...

1) Two of the major challenges business users face when using big data are finding the information they need to make decisions and knowing that the data they have is valid.

(TRUE OR FALSE)

2) In microsoft access, Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database.​

(TRUE OR FALSE)

3) A virtual private network (VPN) supports a secure, encrypted connection between a company's employees and remote users through a third-party service provider.

(TRUE OR FALSE)

4) A client is any computer on a network that sends messages requesting services from the servers on the network.

(TRUE OR FALSE)

5) JavaScript can be used to validate data entry in a Web form.

(TRUE OR FALSE

In: Computer Science

Programming 101 teaches all students that security is the crucial part of any system.

Read the following prompt. Then, create a Word document (.docx) and, following the details provided in the prompt, respond appropriately.

Programming 101 teaches all students that security is the crucial part of any system. You must secure your data! It appears that some people working for the State of Oklahoma forgot this important lesson when tens of thousands of Oklahoma residents had their sensitive data-including numbers-posted on the Internet for the general public to access. You have probably heard this type of report before, but have you heard that the error went unnoticed for three years? A programmer reported the problem, explaining how he could easily change the page his browser was pointing to and grab the entire database for the State of Oklahoma. Also, because of the programming, malicious users could easily tamper with the database by changing data or adding fictitious data. If you are still thinking that isn’t such a big deal, it gets worse. The website also posted the Sexual and Violent Offender’s Registry. Yes, the Department of Corrections employee data were also available for the general public to review. Conduct research on similar breaches and address each of the following questions, citating all sources:

Why is it important to secure data?

What can happen if someone accesses your customer database?

What could happen if someone changes the information in your customer database and adds fictitious data?

Who should be held responsible for the State of Oklahoma data breech? Why?

What are the business risks associated with database security?

In: Operations Management

1. A travel agency would like to track the destination of each flight. Given the following...

1.

A travel agency would like to track the destination of each flight. Given the following business rule, what constraint(s) can you apply to the flight table, given there is also a destination table?

"A flight must be associated with a destination".

Question 1 options:

Referential integrity

Check constraint

Nullability

Default constraint

2.

Constraint applied to a one-to-many relationship when a referenced record (on the 1 side) is deleted, then the referencing records (on the Many side) should also be deleted.

Question 2 options:

Set-to-Null on Delete

Set-to-Default on Delete

Restrict Delete

Cascade Delete

3.

Which of the following is the most appropriate data type for a column named "State" that stores abbreviated names of the states in USA like "TN", "VA" etc.

Question 3 options:

CHAR(3)

VARCHAR2(2)

VARCHAR2(3)

CHAR(2)

4.

How can database performance be improved without changing the logical design of the database? Check all that apply.

Question 4 options:

Combining tables that are in 1:1 relationships

Adding indexes & views

Horizontal Partitioning

Denormalization

Vertical Partitioning

5.

Which of the following statements best describe an index?

Question 5 options:

A mechanism for splitting a table into smaller ones

A database construct that provides direct access to specific fields in a table thus speeding up queries

A database construct that stores the values of all the attributes in a table

A mechanism for improving the design or structure of the database

In: Computer Science

Module 2 Course Work 1. Read Pages 12-30. 2. Use the week 1 video's and this...

Module 2 Course Work

1. Read Pages 12-30.
2. Use the week 1 video's and this week's reading to complete Lab 1.

Lab 1

This week’s assignment must be done using Microsoft Access.

Please use this assignment as a rubric.

Cross-off each step as you complete it.

  1. Create a new Access Database. Name the database using your name.

  2. Create a table called Address.

  3. Within the Address table create the following fields:

  4. FirstName
  5. LastName

  6. StreetAddress

  7. City

  8. State

  9. Zipcode

  10. Telephone
  11. Please note:
    (Database table and field names should never contain spaces)

  12. Default data should be text.

  13. Primary Key is the first and last name.

  14. (Please research how to create 2 primary keys in a table.)
  15. Create another table named Event.

  16. In the Event table create one field named EventName.

  17. The data entered in the EventName field should be text data.
    Primary Key is EventName.
  1. Create another table named Price

  2. In the Price table create one field named Package.

  3. Primary key is Package.

  4. Create another field named Amount.

  5. Create a third field named Discount.

  6. Insert 5 records in the address table – make up the data.

  7. Insert the name of five holidays in the Event table.

  8. Do not insert any records into the Price table.
  1. Save your database with your firstnamelastname (no spaces).

  2. Upload this database by the deadline. See below

In: Computer Science