Reflect on your practice and identify a significant nursing clinical issue that you would like to search for evidence in online sources. This issue will be the basis for the Research Database Assignment that you will submit in Week 3. Formulate searchable, clinical questions in the PICO(T) format for your nursing clinical issue. Remember to integrate references.
In: Biology
Using an academic database, research one current issue affecting an organization's management today. Using one paragraph, summarize the article. In a second paragraph, state your opinion. In a third paragraph, state the author's opinion or are they just stating facts. In a fourth paragraph, state what concept/principle/term the article illustrates.
In: Economics
Financial accounting standards normally address the reporting practices of for‐profit business entities. Search the FASB ASC database to discover what the FASB reporting requirements are (if any) for the reporting by not‐for‐profit entities of their outstanding liabilities. Cut and paste your findings, cite your source(s), and write a brief summary of your findings.
In: Accounting
d. A travel agency is frequently asked questions about tourist
destinations. For
example, customers want to know details of the climate for a
particular month,
the population of the city, and other geographic facts. Sometimes
they request
the flying time and distance between two cities. The manager has
asked you to
create a database to maintain these facts.
In: Math
Write, in your own words, a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style that demonstrates your understanding of the difference between a Microsoft Access database and an Excel spreadsheet by comparing the features of each and when they would be used as personal computer applications if applicable.
In: Computer Science
In: Operations Management
Can I get detailed explanation about the following topics
Keyword Queries
Boolean Queries
Phrase Queries
Proximity Queries
Natural Language Queries
Wildcard Queries
Rather than the solution for Chapter 27, proplem 18RQ in Fundamentals of database system (6th Edition) and also provide me with examples
Regards
In: Computer Science
Part 1 – Create a Stock Class
Write a class named Stock.
Stock Class Specifications
Include member variables for name (string), price (double), shares (double).
Write a default constructor.
Write a constructor that takes values for all member variables as parameters.
Write a copy constructor.
Implement Get/Set methods for all member variables.
Implement the CalculateValue function. This function should multiply the prices by the shares and return that value. Use the following function header: double CalculateValue().
Add a member overload for the assignment operator.
Add a non-member operator<< overload. Prints the values of all member variables on the given ostream.
Stock Class Updates
The Stock class should implement all the specifications from the first assignment plus the updates and features listed below.
Change all member variables to pointers. You will need to update code in any functions that use these member variables. Do NOT change any function signatures for this class. All functions should operate the same as before from the user of the classes’ perspective. For example, assume the get/set functions for title have the following signatures:
std::string GetName();
void SetName(std::string n);
These signatures should remain exactly the same. The same goes for any other functions that use these member variables. Only the internal implementation of the functions will change to accommodate the use of pointers.
Update the constructors. The constructors should allocate memory for the pointer member variables.
Add a destructor. The destructor should deallocate memory for the pointer member variables.
Update operator= and copy constructor. The operator= and copy constructor should be updated to perform deep copies.
Update operator<<. Make sure it prints out the values and not the addresses.
Add a non-member operator>> overload. The >> operator is used for input. Reads the values of all member variables from the given istream.
You can assume that a one word string is being used for name in order to make it a little easier to code. This is important because if you did not make that assumption you could not use the >> operator to read a string value. The >> operator only reads up until the first whitespace it encounters.
Part 2 – Create a Portfolio Class
Write a class that will store a collection of Stock. This class will be used to keep track of data for multiple Stock class instances. You MUST implement ALL of the specifications below.
Portfolio Class Specifications
Create a private member variable that is a static array of Stock. The size of the array can be whatever you want it to be.
Your class must implement all of the following functions (use the given function prototypes):
void Set(int index, Stock s) – Sets the value at the given index to the given Stock instance. You should test the index to make sure that it is valid. If the index is not valid then do not set the value.
Stock Get(int index) – Return the Stock located at the given index in the array.
int PriceRangeCount(double lowerBound, double upperBound) – Returns the count of the number of Stocks that fall within the given range. For example, assume the following number of Stock prices: 10, 20, 15, 25, 30, 40
If lowerBound is 20 and upperBound is 30 then the returned value should be 3. Any values that fall on the boundaries should be included in the count. In this example we are getting a count of the number of stocks that have a price between $20 and $30. Remember, this function is using price and not value.
Stock MostShares() – Returns the Stock in the Portfolio that has the most shares.
bool FindByName(string name, Stock &v) – Returns true if the Stock with the given name is in the array and false otherwise. If the Stock is in the array you should copy it into the Stock reference parameter.
double TotalValue() – Returns the sum of all Stock values (not prices) in the collection.
int Size() – Returns the size of the array.
void Initialize() – Initializes all of the elements of the array to reasonable default values.
string GetAuthor() – Returns your name. Just hard code your name into the function.
Create a default constructor that will initialize all elements of the array to default values.
Portfolio Class Updates
The Portfolio class should implement all the specifications from the first assignment plus the updates and features listed below.
Dynamic array. Change the internal implementation of the array so that the array is dynamically allocated.
Add a size member variable to the class. This member variable should ALWAYS contain the number of elements in the array (size of the array). Some functions may cause the size of the array to change so make sure that this member variable is updated to reflect the new size.
Update all the necessary code in the class so that it is usable with a dynamic array. One example of this is to change the ending condition of loops that visit all elements of the array. The ending limit should not be hard coded. They should use the new size variable as the ending condition.
Add a one parameter constructor that takes a size. This constructor should dynamically allocate an array of the given size. It should also set the size member variable to reflect the size.
Add a copy constructor. This function should make a deep copy of the passed in instance.
Add a destructor. This function should perform any necessary cleanup.
Add a member overload of operator= (assignment operator). This method should perform a deep copy of the passed in instance. After this function ends the size of the current instance’s array should be the same as the other instance’s array and all the data from the other instance should be copied into the current instance’s array.
Hint: C++ arrays have a fixed size. You may need to delete and then reallocate memory for the current instance’s array in order to make the current instance’s array the same size as the other instance’s array. Be careful for memory leaks.
Add a non-member operator<< overload. Prints the values of all elements of the array on the given ostream.
Add a Resize function. Here is the function signature:
void Resize(int newSize);
This function should create a new array that has the passed in size. You MUST retain any values that were previously in the array. The new array size can be larger or smaller. If the new array size is SMALLER just retain as many elements from the previous array that can fit.
Hint: C++ arrays have a fixed size. You may need to delete and then reallocate memory. Be careful for memory leaks.
Add a function named Clone with the following signature:
Portfolio *Clone();
This method should allocate a new dynamic instance of Portfolio that is a deep copy of the current instance. This method should return a pointer to the new instance.
Part 4 – Main Function
Main should create instances of Stock and Portfolio and contain an automated unit test for both of them.
Automated Test
Part 2 – Console Application - Main Function
Create a C++ console application that imports and uses the static library solution that you created. The console application should have a main function. In main you should create instances of the updated Portfolio class and demonstrate that ALL functions work properly. You can write unit testing code if you want but you are not required to.
In: Computer Science
You work for a landscaping company named A-Cut-Above, Inc. During the night of 10/9/18, the company’s headquarters burns down. Unfortunately, the company did not complete off-site backups of its database and had no disaster recovery plan in place. As a result, it must build a new database from scratch. Thankfully, one of the managers had printed out a summary of the activity completed during the week of the fire (see next page). You decide to use this information to start creating a database. You also remember some aspects of A-Cut-Above’s process for creating and assigning routes. Each morning, the ERP selects a list of customers that require a mowing on the current day of the week (using the Cust_Day attribute). Then, the computer uses a web service through Google to find the optimal routes for the day, which may include multiple stops. Each route is then assigned to an employee, who picks their equipment (i.e. truck and mower) for the day and notifies the computer of the truck ID and mower ID corresponding with the equipment they selected. Before departing, the employee also inputs the beginning mileage for the truck they selected. When a route is completed, the employee returns their equipment, notes all stops were completed (stored as Comp_Desc), and enters the ending mileage reading for the truck that they used to complete the route. If the employee is unable to finish a route for whatever reason, they return to headquarters and enter a completion description (Comp_Desc) of “Not Complete” for any unfinished stops and “Complete” for finished stops. They may also add notes describing why a route was stopped. At that point, the computer formulates a new route (or routes) that include all unfinished jobs. The new routes are then assigned to employees similar to how they are assigned each morning. Using the information from above and the report on the next page, specify a database in UNF, 1NF, 2NF, and 3NF using the notation taught during Week 4’s lecture. Place repeating groups inside of the following brackets: “{“ and “}”. Place tables inside the following brackets: “[“ and “]”. Do not use character values as part of the primary key. Name tables if there is more than one. Underline the attributes comprising the primary key for each table. Finally, designate foreign keys for 3NF.
In: Accounting
Upon opening your browser early one morning, you see a Yahoo! News story about an arrest that was made the previous day involving a major cybercrime ring. As you read more of the story, it seems that authorities are going through computers and servers seized from the criminals' offices and have identified more than 20 companies that may have had their customer and retail transactions compromised. One of the companies listed, it turns out, was SuperMart, Inc., the company for which you have been employed as a database administrator for the past nine years. You leave a message on the office phone of your superior, John Dalton, the CIO of SuperMart.
SuperMart is a medium-sized retail company that evolved from a grocery chain in the 1980s. While the corporation has 200 stores, primarily in your region of the country, it carries a full line of grocery and household items in large outlets that are linked by a very up-to-date computer network with real-time integration of data into a series of databases. Your department has been working on a project that will be transferring all data into a data warehouse and streamlining data mining operations. Security for the system is handled by a security department for physical security, an IT security division of the network administration department, and by the team of data security and privacy specialists within your own data management department.
Even in these early moments of this possible breach of security, after your shock wears off, you understand that the CIO's response will be to meet immediately with all security personnel, with the database administrator, the network manager, the corporate legal team, and possibly the CEO and CFO. You have assigned your assistant to get as much information as possible from authorities, and you are making initial notes on a plan to proceed with SuperMart's response to such a potentially toxic data breach.
Using the scenario above research and discuss the 3 topics below.
In: Computer Science