Questions
Which of the following represents the greatest risk? Group of answer choices The director of IT...

Which of the following represents the greatest risk? Group of answer choices

The director of IT (a key employee) resigned

An IT hardware failure occurred

The president of the company was fired for embezzlement

The company’s database is corrupted with no backup facilities

In: Computer Science

Views are virtual in the database but Materialized view are persistent. Discuss the need to have...

Views are virtual in the database but Materialized view are persistent. Discuss the need to have materialized view instead of views and in what condition No materialization if preferred.

I need a unique answer and without handwriting, please.

In: Computer Science

You have been hired to evaluate an accounting information system for fixed asset inventory tracking to...

You have been hired to evaluate an accounting information system for fixed asset inventory tracking to determine if proper controls and security are present for financial reporting. You notice the company has a number of items in inventory but there does not seem to be any pattern to the data they collect. For example, some items have a location or department where the item is located others do not, some items have a tracking tag, others do not, etc. How would you set up a fixed asset database for this company to ensure proper controls over the data, security of the items, and the accuracy of the data for financial reporting?

Provide an example of your database(s) design and why you selected that design.  

In: Accounting

topic:- Fundamentals of Databases *********** no hand writing********* If there is photo but photo don’t do...

topic:- Fundamentals of Databases

*********** no hand writing*********

If there is photo but photo don’t do fax ?

*the answer must be unique not copied "plagiarized "

question One

Consider the following two tables:

Table – EmployeeInformations

EmpId Name ManagerId DateOfJoining

121 Ali 321 01/31/2014

321 Raed 986 01/30/2015

421 Khaled 876 27/11/2016

Table – EmployeeSalary

EmpId Project Salary

121 P1 8000

321 P2 1000

421 P1 12000

Question

Explain the role of SQL authorization mechanisms that allow to differentiate among the users of the database as far as the type of access they are permitted on various data values in the database?

In: Computer Science

a. Which one of the following statements regarding a database index is true? Group of answer...

a. Which one of the following statements regarding a database index is true?

Group of answer choices

they help improve the security of databases

they reduce the number redundnt entries in a database

they are a way of changing the order of the records in a table

they are required for HIPAA compliance

All of the above

b. Which one of the following represent how Microsoft PowerPoint can be best used:

Group of answer choices

The best use of PowerPoint is to create slides containing the text of a presentation which the speaker can simply read from directly from the screen.

It is best to use sound effects and rapid animation as much as possible to stimulate the audience’s interest in the slides.

PowerPoint is an ideal way to present multimedia support for a presentation, such as audio, video, graphics, and photographs, which are not easily described verbally..

To be fully effective, the screen should be placed in the center of a dark room with the speaker preferably standing out of sight of the audience when speaking so as not to distract the audience from the slides.

A and D.

c. Which of the following database field types would be most appropriate for holding a lengthy written transcript of a telephone conversation?

Group of answer choices

Number (Value or numeric)

Text (Character)

Yes/No (Logical)

Date

Memo

In: Computer Science

Your task in this exercise is to write a function called get_playlist_tracks(database_filename, which_playlist), which formulates a...

Your task in this exercise is to write a function called get_playlist_tracks(database_filename, which_playlist), which formulates a SELECT statement that returns track name, album title, genre name, artist name and track composer for all tracks in the database which are associated with a given playlist. This statement requires several nested INNER JOINs to pull together data from the "tracks", "albums", "genres", "artists", and "playlists" table. The default ordering of tracks should be used. The result of the function is a list of database records. The parameter which_playlist specifies a playlist in the database. You first have to check if the playlist is contained in the "playlists" table, if not an error message as indicated in the examples has to be printed and an empty list has to be returned.

Don't forget to close the database connection after you have finished accessing it!

For example:

Test Result
database_filename = 'chinook.db'
which_playlist = 'On-The-Go 1'
query_result = get_playlist(database_filename, which_playlist)

print(f"Playlist '{which_playlist}'")
for count, database_record in enumerate(query_result):
   print(f"{count:<2} Track Name: {database_record[0]}")
   print(f"   Album Title: {database_record[1]}")
   print(f"   Genre: {database_record[2]}")
   print(f"   Artist: {database_record[3]}")
   print(f"   Composer: {database_record[4]}")
Playlist 'On-The-Go 1'
0  Track Name: Now's The Time
   Album Title: The Essential Miles Davis [Disc 1]
   Genre: Jazz
   Artist: Miles Davis
   Composer: Miles Davis
database_filename = 'chinook.db'
which_playlist = 'Independent'
query_result = get_playlist(database_filename, which_playlist )

for database_record in query_result:
   print(database_record)
ERROR: Could not find playlist 'Independent' in database!

------------------------------------------------------------------------------------------------------------------------------------------------------------------

This is my code so far but dones't work. the output shows that there is no such table as track;

import sqlite3

def get_playlist(database_filename, which_playlist):
  
file_in = sqlite3.connect(database_filename)
curser_object = file_in.cursor()
curser_object.execute("""Select T.name, A.Title, G.name, A1.name, T.composer
From track T
Join Album A On A.AlbumId = T.AlbumId
Join Genre G On G.GenreId = T.GenreId
Join Artist A1
On A1.ArtistId = A.ArtistId
Join PlaylistTrack P2
On P2.TrackId = T.TrackId
Join Playlist P
On P.PlaylistId = p2.PlaylistId
Where P.name =?""",(which_playlist,))
  
ViewData = curser_object.fetchall()
DataTableCompAndClient([ViewData])
  
file_in.close()
return ViewData

In: Computer Science

Case Study (Hundreds of millions of Instagram, TikTok, YouTuube accounts compromised by data breach) Published on...


Case Study
(Hundreds of millions of Instagram, TikTok, YouTuube accounts compromised by data breach) Published on August 18, 2020.
Security researchers have discovered an exposed database online which contains scraped data from the social media profiles of nearly 235m Instagram, TikTok and YouTuube users.
For those unfamiliar with the practice, web scraping is an automated technique used to gather data from websites that is often employed by analytics firms who use it to create large databases of user information. Although the practice is legal, it is strictly prohibited by social media companies as it puts the privacy of their users and their data at risk.
Comparitech's lead researcher Bob Diachenko discovered three identical copies of the exposed database online at the beginning of August. After examining the database, Diachenko and his team learned that it belonged to a company called Deep Social which has shut down its operations.
When the team reached out to the now-defunct company, its request was forwarded to a Hong Kong-based firm called Social Data. While Social Data denied having any connection to Deep Social, the firm did acknowledge the breach and was able to secure the exposed database with a password.

Answer the following question based on case study

Q6. Illustrate the cybersecurity concerns that may affect the businesses in the $1.5 million Click for Vic campaign that was launched on 23 August 2020. Write a thorough description of the descriptive and predictive data analysis importance in cybersecurity field. Cite your sources.
[6 marks + 8 marks + 1 mark for Referencing Style = 15 marks]
Read the Case Studies given carefully to answer the questions corresponding to the case studies.
Q7. While scraping user data from social media sites is not illegal, failing to secure this data after it has been collected poses a serious risk to the affected users as cybercriminals could use the information from the database to target them online. What are your recommendations to the online risk policy makers as you think it is a breach of PII (Personal Identifiable Information). Justify your answer. Explain the need for cybersecurity experts in such a case scenario.

In: Computer Science

restrictive convenants of Lululemon such as non- competition , non- solicitation provision.

restrictive convenants of Lululemon such as non- competition , non- solicitation provision.

In: Economics

Calculate the following project, at cost of capital of 10% Years Cash Flow (RM) 0 -10,000...

Calculate the following project, at cost of capital of 10%

Years Cash Flow (RM)
0 -10,000
1 2000
2 2000
3 4000
4 4000
5 5000

i) calculate NPV (8marks)

ii) calculate PI

iii) Justified should we accept or reject the project?

In: Finance

CO(g)+H2O(g)⇌CO2(g)+H2(g) Kp=0.0611 at 2000 K A reaction mixture initially contains a CO partial pressure of 1360...

CO(g)+H2O(g)⇌CO2(g)+H2(g)
Kp=0.0611 at 2000 K
A reaction mixture initially contains a CO partial pressure of 1360 torr and a H2O partial pressure of 1768 torr at 2000 K.

Part A
Calculate the equilibrium partial pressure of CO2 and H2

? torr

In: Chemistry