In: Computer Science
In: Computer Science
In: Computer Science
Discuss the interdependence that exists between Database System Development Life Cycle stages.
In: Computer Science
Assignment 1: Build a simple class called DBTester.java. This class should have only one method, main method. In the main method you should read in all of the rows of data from the Instructors Table in the Registration Database, then print out this data. Follow the steps outlined in class. Remember to use try-catch blocks for all database access code. The example in the book does not use Try-catch blocks, but you should
In: Computer Science
Create a program in visual basic that allows the user to manage vehicle information including: • License plate number • Owner name • Owner phone number The user interface will be GUI-based providing the following capabilities: • Add up to 100 vehicles • Remove specified vehicles • View a sorted list of all known license plates • View the data for a specified vehicle • Save the database contents into a file • Load a saved database from a file
In: Computer Science
After reading the required resources for this module and
reviewing the database you just designed for your final project,
think about what security considerations should be taken with the
design. Write these considerations in the form of a database design
security checklist that includes your top six to eight security
implications for the database design.
A security assessment checklist is a common practice in the
industry and proves to a CIO or IT auditor that you are following
best practices in securing a database. It also serves as a living
document to assist you in your design process. For example, on the
networking side of IT, Cisco provides this checklist for small and
medium business to evaluate their network infrastructure. You will
use the information from this website to assist you in creating
your own checklist.
For this discussion, you will develop something similar, but for
databases. Post your checklist to the discussion forum. You will
not see your peers’ initial posts until you have posted your own
checklist.
Upon reviewing your classmates’ checklists, provide substantive
responses to at least two of your classmates on their checklist.
Your responses should include items such as whether their checklist
will manage risk appropriately and whether the checklist will
maintain the databases’ confidentiality, integrity, and
availability.
In: Computer Science
Using WORKBENCH:
1. Create the database below via an ER Diagram in Workbench (take screen shots of the diagram)
2. Go to the database table view and take a screen shot of the table(s)
3. Go to the data entry tool and enter at least three lines of data (in each table). Take screen shots.
Create a database that is in third normal form for the following:
You are a nerd and have decided to organize your comic books in a database.
You have decided to create categories for the books. The categories a a separate table because it includes the category name and a description of the category. The names might not be unique.
You also want to keep track of the size (width and length) of each book (I did say you were a nerd..LOL). Since several books are the same size, you decide to also keep this in a separate table.
You have books from several publishers, so you decide to create a publishers table. In the table you have the publisher and the address of their home office.
Finally, of course, you have the books table. The books table (of course) includes the name and author but also links to the other tables.
Be creative!
Make sure to populate all tables!
In: Computer Science
Write a GUI that allows the user to do the following:
Create a new Patient Database if it doesn’t exist yet by the click of a button.
Create a second button that populates the database with the appropriate Asset table if it does not exist yet, and fill the table with at least 10 patients.
Connect to the Patient Database and display all current patients in a List by default. You will have to create a Patient Class. This class needs at a minimum the following attributes: Name, Id, Age, Gender, Blood type, Weight, Height. Use appropriate data types. (use UUID for the Id property).
Next to the list displaying the patients, create at least three ways to filter that list. For instance, you only want to display patients over the age of 30. Or only patients who are "Female". Or only patients with weight above 200 lbs. Be creative in which filters would make real sense and use appropriate JFoeniX controls for them. Make sure the controls you use send the appropriate SQL Query to the database and display the results in the patients list view.
It needs to be in Java and JavaFX. Does not have any files provided. Just need it in code. Especially for the Patient class
There is no GUI specification. Just a simple one will do.
In: Computer Science
Metal Holdings Inc.
You have been assigned the task of creating a simple relational database using SQLite database by the owner of “Metal Holdings” who is in the business of selling industrial metals to customers (mostly wholesale suppliers) who buy from the company.
Your goal is to design and build a database that would be responsible for:
The following is a list of metals sold by the company (these below metals should be available in your uploaded SQLite database):
In: Computer Science