In its Audit of Computerized Criminal History, the Florida Department of Law Enforcement (FDLE) periodically reviews the accuracy and completeness of its criminal history database. The database contains thousands of records. The FBI/Bureau of Justice Quality Standards require that at least 95% of all records in the state’s database be complete and accurate. The audit uses a simple random sample to determine whether the state has met the standard. In a recent FDLE audit, the auditor found that only 555 records of the 605 records sampled were perfectly complete and accurate; the others were either incomplete or contained at least one error (source: fdle. state.fl.us/ publications/). Is this sample evidence sufficient to reject, at the 5% significance level, a null hypothesis that the population of Florida criminal records meets FBI/Bureau of Justice Quality Standards? Explain.
In: Statistics and Probability
A new veterinary clinic will like to set up their database. The clinic will like to keep record of their customers such as: pet name, pet type, pet age, pet weight, owner name, owner address, owner contact. Also the clinic will like to keep track of the veterinarian name, specialty and schedule. They will like to keep track of the customer appointment date, what the appointment is for, and how much it will cost.
List all of the data that needs to be kept track of for the scenario above in a 1NF (Flat File) table
Use the normalization technique and form the 3NF tables
Write out the Create Table command in SQL for creating the database you have designed, make sure to use the right DATATYPES, CONSTRAINTS, and COSTRAINT REFERENCES.
Write one SQL Insert into Values ( ); command for each table in your database
In: Computer Science
Suppose that a certain authority is running a (publicly accessible) database of users’ public keys. Let us define the following procedure for revoking a public key from the database. When a user Alice claims that the secret key skA corresponding to his public key pkA was stolen, she sends to the authority the statement “Revoke Alice’s public key pkA” which is signed using skA . Upon receiving such the statement, the authority revokes pkA from the database. Explain why it is not necessary for the authority to check Alice’s identity in this case. In particular, explain why it is not a problem that an adversary who has stolen Alice’s secret key skA can forge signatures for this key. Hint: Consider the following two cases: 1) Alice’s secret key skA was not stolen; 2) Aice’s secret key skA was stolen.
In: Computer Science
Python pls
1. The function only allow having one return statement. Any other statements are not allowed. You only have to have exactly one return statement.
For example
the answer should be
def hello(thatman):
return thatman * thatman
Create a function search_hobby. This function returns a set of hobby names and people's excitement level.
input
database = {'Dio': {'Lottery': 2, 'Chess': 4, 'Game': 3},'Baily': {'Game': 2, 'Tube': 1, 'Chess': 3}, 'Chico': {'Punch': 2, 'Chess': 5}, 'Aaron': {'Chess': 4, 'Tube': 2, 'Baseball': 1}}
def search_hobby(database, num):
#ONLY ONE STATEMENT IS ALLOWED (RETURN STATEMENT)
search_hobby(database,0) -> {'Chess', 'Punch', 'Baseball', 'Game', 'Tube', 'Lottery'}
search_hobby(databalse,3) - > {'Chess', 'Game'}
In: Computer Science
Westlake Research Hospital
It is imperative that the database be ready before the actual clinical trials begin. The staff at Westlake is anxious to see some results. It is time you show them the logical design of their database. Follow these steps:
1. Review all the requirements and business rules.
2. Define your entities and attributes and the relations that exist between them.
3. Create a logical model using crow’s feet notation in Visio or hand draw it on graph paper if you prefer.
4. Add all the entities and their attributes. You don’t need to worry about data types for now.
5. Identify the key fields for each entity and the foreign keys.
6. Analyze the diagram. Identify which role (i.e., domain, linking, lookup, or weak) each entity plays in your database.
.
In: Computer Science
Westlake Research Hospital
It is imperative that the database be ready before the actual clinical trials begin. The staff at Westlake is anxious to see some results. It is time you show them the logical design of their database. Follow these steps:
1. Review all the requirements and business rules.
2. Define your entities and attributes and the relations that exist between them.
3. Create a logical model using crow’s feet notation in Visio or hand draw it on graph paper if you prefer.
4. Add all the entities and their attributes. You don’t need to worry about data types for now.
5. Identify the key fields for each entity and the foreign keys.
6. Analyze the diagram. Identify which role (i.e., domain, linking, lookup, or weak) each entity plays in your database.
.
In: Computer Science
1) Two of the major challenges business users face when using big data are finding the information they need to make decisions and knowing that the data they have is valid.
(TRUE OR FALSE)
2) In microsoft access, Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database.
(TRUE OR FALSE)
3) A virtual private network (VPN) supports a secure, encrypted connection between a company's employees and remote users through a third-party service provider.
(TRUE OR FALSE)
4) A client is any computer on a network that sends messages requesting services from the servers on the network.
(TRUE OR FALSE)
5) JavaScript can be used to validate data entry in a Web form.
(TRUE OR FALSE
In: Computer Science
Read the following prompt. Then, create a Word document (.docx) and, following the details provided in the prompt, respond appropriately.
Programming 101 teaches all students that security is the crucial part of any system. You must secure your data! It appears that some people working for the State of Oklahoma forgot this important lesson when tens of thousands of Oklahoma residents had their sensitive data-including numbers-posted on the Internet for the general public to access. You have probably heard this type of report before, but have you heard that the error went unnoticed for three years? A programmer reported the problem, explaining how he could easily change the page his browser was pointing to and grab the entire database for the State of Oklahoma. Also, because of the programming, malicious users could easily tamper with the database by changing data or adding fictitious data. If you are still thinking that isn’t such a big deal, it gets worse. The website also posted the Sexual and Violent Offender’s Registry. Yes, the Department of Corrections employee data were also available for the general public to review. Conduct research on similar breaches and address each of the following questions, citating all sources:
Why is it important to secure data?
What can happen if someone accesses your customer database?
What could happen if someone changes the information in your customer database and adds fictitious data?
Who should be held responsible for the State of Oklahoma data breech? Why?
What are the business risks associated with database security?
In: Operations Management
1.
A travel agency would like to track the destination of each flight. Given the following business rule, what constraint(s) can you apply to the flight table, given there is also a destination table?
"A flight must be associated with a destination".
Question 1 options:
|
Referential integrity |
|
|
Check constraint |
|
|
Nullability |
|
|
Default constraint |
2.
Constraint applied to a one-to-many relationship when a referenced record (on the 1 side) is deleted, then the referencing records (on the Many side) should also be deleted.
Question 2 options:
|
Set-to-Null on Delete |
|
|
Set-to-Default on Delete |
|
|
Restrict Delete |
|
|
Cascade Delete |
3.
Which of the following is the most appropriate data type for a column named "State" that stores abbreviated names of the states in USA like "TN", "VA" etc.
Question 3 options:
|
CHAR(3) |
|
|
VARCHAR2(2) |
|
|
VARCHAR2(3) |
|
|
CHAR(2) |
4.
How can database performance be improved without changing the logical design of the database? Check all that apply.
Question 4 options:
|
Combining tables that are in 1:1 relationships |
|
|
Adding indexes & views |
|
|
Horizontal Partitioning |
|
|
Denormalization |
|
|
Vertical Partitioning |
5.
Which of the following statements best describe an index?
Question 5 options:
|
A mechanism for splitting a table into smaller ones |
|
|
A database construct that provides direct access to specific fields in a table thus speeding up queries |
|
|
A database construct that stores the values of all the attributes in a table |
|
|
A mechanism for improving the design or structure of the database |
In: Computer Science
Module 2 Course Work
1. Read Pages 12-30.
2. Use the week 1 video's and this week's reading to complete Lab
1.
Lab 1
This week’s assignment must be done using Microsoft Access.
Please use this assignment as a rubric.
Cross-off each step as you complete
it.
In: Computer Science