Which of the following represents the greatest risk? Group of answer choices
The director of IT (a key employee) resigned
An IT hardware failure occurred
The president of the company was fired for embezzlement
The company’s database is corrupted with no backup facilities
In: Computer Science
Views are virtual in the database but Materialized view are persistent. Discuss the need to have materialized view instead of views and in what condition No materialization if preferred.
I need a unique answer and without handwriting, please.
In: Computer Science
You have been hired to evaluate an accounting information system for fixed asset inventory tracking to determine if proper controls and security are present for financial reporting. You notice the company has a number of items in inventory but there does not seem to be any pattern to the data they collect. For example, some items have a location or department where the item is located others do not, some items have a tracking tag, others do not, etc. How would you set up a fixed asset database for this company to ensure proper controls over the data, security of the items, and the accuracy of the data for financial reporting?
Provide an example of your database(s) design and why you selected that design.
In: Accounting
topic:- Fundamentals of Databases
*********** no hand writing*********
If there is photo but photo don’t do fax ?
*the answer must be unique not copied "plagiarized "
question One
Consider the following two tables:
Table – EmployeeInformations
EmpId Name ManagerId DateOfJoining
121 Ali 321 01/31/2014
321 Raed 986 01/30/2015
421 Khaled 876 27/11/2016
Table – EmployeeSalary
EmpId Project Salary
121 P1 8000
321 P2 1000
421 P1 12000
Question
Explain the role of SQL authorization mechanisms that allow to differentiate among the users of the database as far as the type of access they are permitted on various data values in the database?
In: Computer Science
a. Which one of the following statements regarding a database index is true?
Group of answer choices
they help improve the security of databases
they reduce the number redundnt entries in a database
they are a way of changing the order of the records in a table
they are required for HIPAA compliance
All of the above
b. Which one of the following represent how Microsoft PowerPoint can be best used:
Group of answer choices
The best use of PowerPoint is to create slides containing the text of a presentation which the speaker can simply read from directly from the screen.
It is best to use sound effects and rapid animation as much as possible to stimulate the audience’s interest in the slides.
PowerPoint is an ideal way to present multimedia support for a presentation, such as audio, video, graphics, and photographs, which are not easily described verbally..
To be fully effective, the screen should be placed in the center of a dark room with the speaker preferably standing out of sight of the audience when speaking so as not to distract the audience from the slides.
A and D.
c. Which of the following database field types would be most appropriate for holding a lengthy written transcript of a telephone conversation?
Group of answer choices
Number (Value or numeric)
Text (Character)
Yes/No (Logical)
Date
Memo
In: Computer Science
Your task in this exercise is to write a function called get_playlist_tracks(database_filename, which_playlist), which formulates a SELECT statement that returns track name, album title, genre name, artist name and track composer for all tracks in the database which are associated with a given playlist. This statement requires several nested INNER JOINs to pull together data from the "tracks", "albums", "genres", "artists", and "playlists" table. The default ordering of tracks should be used. The result of the function is a list of database records. The parameter which_playlist specifies a playlist in the database. You first have to check if the playlist is contained in the "playlists" table, if not an error message as indicated in the examples has to be printed and an empty list has to be returned.
Don't forget to close the database connection after you have finished accessing it!
For example:
| Test | Result |
|---|---|
database_filename = 'chinook.db'
which_playlist = 'On-The-Go 1'
query_result = get_playlist(database_filename, which_playlist)
print(f"Playlist '{which_playlist}'")
for count, database_record in enumerate(query_result):
print(f"{count:<2} Track Name: {database_record[0]}")
print(f" Album Title: {database_record[1]}")
print(f" Genre: {database_record[2]}")
print(f" Artist: {database_record[3]}")
print(f" Composer: {database_record[4]}") |
Playlist 'On-The-Go 1' 0 Track Name: Now's The Time Album Title: The Essential Miles Davis [Disc 1] Genre: Jazz Artist: Miles Davis Composer: Miles Davis |
database_filename = 'chinook.db' which_playlist = 'Independent' query_result = get_playlist(database_filename, which_playlist ) for database_record in query_result: print(database_record) |
ERROR: Could not find playlist 'Independent' in database! |
------------------------------------------------------------------------------------------------------------------------------------------------------------------
This is my code so far but dones't work. the output shows that there is no such table as track;
import sqlite3
def get_playlist(database_filename, which_playlist):
file_in = sqlite3.connect(database_filename)
curser_object = file_in.cursor()
curser_object.execute("""Select T.name, A.Title, G.name, A1.name,
T.composer
From track T
Join Album A On A.AlbumId = T.AlbumId
Join Genre G On G.GenreId = T.GenreId
Join Artist A1
On A1.ArtistId = A.ArtistId
Join PlaylistTrack P2
On P2.TrackId = T.TrackId
Join Playlist P
On P.PlaylistId = p2.PlaylistId
Where P.name =?""",(which_playlist,))
ViewData = curser_object.fetchall()
DataTableCompAndClient([ViewData])
file_in.close()
return ViewData
In: Computer Science
Case Study
(Hundreds of millions of Instagram, TikTok, YouTuube accounts
compromised by data breach) Published on August 18, 2020.
Security researchers have discovered an exposed database online
which contains scraped data from the social media profiles of
nearly 235m Instagram, TikTok and YouTuube users.
For those unfamiliar with the practice, web scraping is an
automated technique used to gather data from websites that is often
employed by analytics firms who use it to create large databases of
user information. Although the practice is legal, it is strictly
prohibited by social media companies as it puts the privacy of
their users and their data at risk.
Comparitech's lead researcher Bob Diachenko discovered three
identical copies of the exposed database online at the beginning of
August. After examining the database, Diachenko and his team
learned that it belonged to a company called Deep Social which has
shut down its operations.
When the team reached out to the now-defunct company, its request
was forwarded to a Hong Kong-based firm called Social Data. While
Social Data denied having any connection to Deep Social, the firm
did acknowledge the breach and was able to secure the exposed
database with a password.
Answer the following question based on case study
Q6. Illustrate the cybersecurity concerns that may affect the
businesses in the $1.5 million Click for Vic campaign that was
launched on 23 August 2020. Write a thorough description of the
descriptive and predictive data analysis importance in
cybersecurity field. Cite your sources.
[6 marks + 8 marks + 1 mark for Referencing Style = 15 marks]
Read the Case Studies given carefully to answer the questions
corresponding to the case studies.
Q7. While scraping user data from social media sites is not
illegal, failing to secure this data after it has been collected
poses a serious risk to the affected users as cybercriminals could
use the information from the database to target them online. What
are your recommendations to the online risk policy makers as you
think it is a breach of PII (Personal Identifiable Information).
Justify your answer. Explain the need for cybersecurity experts in
such a case scenario.
In: Computer Science
restrictive convenants of Lululemon such as non- competition , non- solicitation provision.
In: Economics
Calculate the following project, at cost of capital of 10%
| Years | Cash Flow (RM) |
| 0 | -10,000 |
| 1 | 2000 |
| 2 | 2000 |
| 3 | 4000 |
| 4 | 4000 |
| 5 | 5000 |
i) calculate NPV (8marks)
ii) calculate PI
iii) Justified should we accept or reject the project?
In: Finance
CO(g)+H2O(g)⇌CO2(g)+H2(g)
Kp=0.0611 at 2000 K
A reaction mixture initially contains a CO partial pressure of 1360
torr and a H2O partial pressure of 1768 torr at 2000
K.
Part A
Calculate the equilibrium partial pressure of CO2 and H2
? torr
In: Chemistry