Questions
Project Definition - Describe the type of problem you wish to address with a database: Let's...

Project Definition - Describe the type of problem you wish to address with a database:

Let's say, an online video game or movie rental system.

A. Describe the concern or problem you will try to address with a small database

B. Provide examples of the current (possibly hypothetical) approach - include actual or

mock-ups of relevant forms, reports, lists, etc.

C. Discuss how your approach should eliminate Delete/Update/Insert problems and help

manage this issue in the future.

Any help will be greatly appreciated. Thank you!

In: Physics

Recall that a database has many types of users, each of whom may require a different...

  1. Recall that a database has many types of users, each of whom may require a different view of the database. The database user responsible for creating database accounts in a DBMS like Oracle is called the:
    1. The database administrator (DBA)
    2. Database end user
    3. DBMS system builder
    4. Database designer
    5. none of the above

  1. Which of the following can be an example of a multi-valued attribute in ER modeling of a database?
  1. address
  2. last name
  3. middle name
  4. country
  5. none of the above
  1. One limitation of traditional file system, which runs programs with data, that is solved by using a database management system is:
    1. Provision of data independence
    2. Separation of data from program using the three data level architecture
    3. Replication of data and programs
    4. Use of the internet
    5. none of the above
  2. In a database, integrity constraints must not be violated after any database update. Given a database table with schema Customer (Id, Fname, Lname, phone), which has a state having the two tuples <1, ‘Mark’, ‘Adam’, ‘416-555-2233’> and
    <2, ‘Pat’, ‘Moore’, ‘519-333-6161’>, what integrity constraint is violated by inserting the following new tuple into Customer
    <1, NULL, ‘Hardy’, ‘226-222-1234’>.
    1. Semantic Integrity constraint
    2. Foreign key referential integrity constraint
    3. Primary Key integrity constraint
    4. All of the above
    5. none of the above

In: Computer Science

1. Create an ERD that has at least 5 tables in it and include all of...

1. Create an ERD that has at least 5 tables in it and include all of the details and the correct notation (Min/Max cardinality and relationship name.)

2. Write a paragraph that explains the ERD.

3. Write the SQL Create, Insert, and Update statement to insert one of the entities from this ERD into a database.

In: Computer Science

Need answers for Normalization, Physical Design, Sql, And Security exam. 1. The database you're creating will...

Need answers for Normalization, Physical Design, Sql, And Security exam.

1. The database you're creating will be installed on a group of three servers. What feature of an enterprise RDBMS will allow one server to pick up the processing work if the main server becomes nonoperational?
A. Failover
B. Business intelligence
C. Data warehouse
D. Load balancing

2. What type of clause must you always use with DELETE or UPDATE to avoid inadvertently changing data elsewhere in the database?
A. SET
B. WHERE
C. ORDER
D. FROM

3. When users enter data into the database, they find they have to enter a value for every column, as the
database won't allow them to continue otherwise. What type of value has been disallowed for this database?
A. 0
B. Null
C. Duplicate
D. Tab key
4. What term is used to describe any action a database takes?
A. Attribute
B. Function
C. Transaction
D. Dependency

5. Why should you perform the denormalization process on a database?
A. Improve performance
B. Increase data protection
C. Correct attribute names
D. Correct incorrect linkages
6. Which keyword should you use to provide a substitute name for a column?
A. ORDER
B. SELECT
C. UPDATE
D. AS
7. You're working on setting a data type for a field that requires a high degree of precision, as it will be taking scientific values. Which data type should you likely set for this field?
A. Decimal
B. Int
C. Real
D. Money

8. When a database system requests a login name and password to allow a user to enter the database, what process is being performed?
A. Permission
B. Mapping
C. Authorization
D. Authentication

9. You have a field that will be taking a fixed-length-width text entry in different languages, including Russian. Which data type should you likely use?
A. varchar
B. nvarchar
C. char
D. nchar
10. Which keyword yields the same results as using the >= and <= operators?
A. BETWEEN
B. WHERE
C. IS
D. LIKE

In: Computer Science

Square-Root Implementation & Performance Comparisons Square root operation is considered difficult to implement in hardware, in...

Square-Root Implementation & Performance Comparisons Square root operation is considered difficult to implement in hardware, in this project, you must Write and test a MIPS assembly language program to implement three algorithms of an 8-bit integer square root. Background: In mathematics, a square root (√) of a number x is a number r such that r 2 = x, or, in other words, a number r whose square (the result of multiplying the number by itself, or r × r) is x. Some of the algorithms for calculating square roots of a positive Integer number N are shown below:

1. Newton Raphson Method The Newton Raphson method was first used in Gray

2. Iterative method starts with an initial (guess) value and improves accuracy of the result with each iteration. Assuming that X the original number the iterative equations for calculating the reciprocal of it's square root is: Yi+1 = Yi (3 – X (Yi)^2) Once Y has been calculated, one can get the square root by multiplying with X. This algorithm has quadratic convergence. In each iteration multiplications and additions or subtractions are needed. In order to speed up the multiplier, there must be a special a algorithm such as Wallace tree to get the partial production and use a carry propagate adder to get the production, because the multiplier requires a rather large number of gates counts, it is not so practical to place many multipliers on FPGA. Also it is hard to get an exact remainder of the square root.

3-The Radix-2 SRT-Redundant and Non-Redundant Algorithm The Radix-2 SRT-Redundant and Non-Redundant method are similar. Since them both based on recursive relation. In each iteration, they will be one digit shift left and addition. The determination of a function is rather complex, especially for high radix SRT algorithm. The implantations are not capable of accepting a square root on every clock cycle. Also notice that these two methods may generate a wrong resulting value at the last digit position.

4- The Non-Restoring Algorithm The operation at each iteration is simple: addition or subtraction based on the result bit generated in previous iteration. The remainder of the addition or subtraction is fed via registers to the next iteration directly even it is negative. At the last iteration, if the remainder is non-negative, it is a precise remainder. Otherwise, we can obtain a precise remainder by an addition operation.

In: Computer Science

Your organization's database needs include the following: Multiple departments will require access to the database, including...

Your organization's database needs include the following:

  • Multiple departments will require access to the database, including eCommerce, manufacturing, sales, and customer service
  • Employees will use the database to:
  • Enter data
  • Reference data
  • Use data to auto-populate new orders and customer service records
  • Analyze data and create reports

Recommend three of the following six database architecture types that would work for your organization:

  • Hierarchical
  • Network
  • Relational
  • Distributed Relational
  • Object-Oriented
  • Cloud

Include the following in your recommendation:

  • Your top three recommended architectures, in order, using the number 1 as your best recommendation
  • Your rationale for recommending each architecture
  • The characteristics that make each architecture a top recommendation
  • The current usage trends of these architectures in the industry and how it affected your recommendation for each
  • Potential concerns or disadvantages of each architecture
  • Summary of reasons for not recommending the remaining three architectures
  • Citations for any graphics, images, video, or audio used

In: Computer Science

Complete the following questions with proper citations; there is a 150-word minimum per question. Questions: What...

Complete the following questions with proper citations; there is a 150-word minimum per question. Questions: What is the difference between a logical backup and an image copy backup? What is a “quiesce” point, and why is it important for point-in-time recovery? Name and describe the three types of database failures that require recovery. Name and describe four factors that impact the duration of recovery.

In: Computer Science

explain the reasons for FASB 2018-08 accouting standards update?

explain the reasons for FASB 2018-08 accouting standards update?

In: Accounting

) Maddow and Wells, Inc. purchased equity securities in 2018. The management of the company has...

) Maddow and Wells, Inc. purchased equity securities in 2018. The management of the company has decided that the securities will not be sold immediately, but will be held for at least three years. This will allow MW to maximize the potential gains from holding the securities. The new accountant at the company wants to classify the securities as held-to-maturity because they will be held for three years; the company has never held securities for this long before. How would you advise the management of the company to classify the securities? At the end of each reporting year, how will the securities be recognized on the company’s books? Support your response with an appropriate ASC reference (ASC xxx-xx-xx-x) or ASU (accounting standard update).

b) Cryptocurrency and Initial Coin Offering are unique investing tools. How does the SEC view these two instruments? Use the SEC’s website to find relevant information about the SEC’s stance on these instruments. Support your discussion with relevant citations from the SEC.

In: Accounting

Find a recent article that discusses either oligopoly and/or game theory and how it relates to...

Find a recent article that discusses either oligopoly and/or game theory and how it relates to a real life situation (the article should be no older than 3 months) and prepare a 1-2 page summary of the article (include in text citations and References).

**2000 words minimum**

In: Economics