Project Definition - Describe the type of problem you wish to address with a database:
Let's say, an online video game or movie rental system.
A. Describe the concern or problem you will try to address with a small database
B. Provide examples of the current (possibly hypothetical) approach - include actual or
mock-ups of relevant forms, reports, lists, etc.
C. Discuss how your approach should eliminate Delete/Update/Insert problems and help
manage this issue in the future.
Any help will be greatly appreciated. Thank you!
In: Physics
In: Computer Science
1. Create an ERD that has at least 5 tables in it and include all of the details and the correct notation (Min/Max cardinality and relationship name.)
2. Write a paragraph that explains the ERD.
3. Write the SQL Create, Insert, and Update statement to insert one of the entities from this ERD into a database.
In: Computer Science
Need answers for Normalization, Physical Design, Sql, And Security exam.
1. The database you're creating will be installed on a group of
three servers. What feature of an enterprise RDBMS will allow one
server to pick up the processing work if the main server becomes
nonoperational?
A. Failover
B. Business intelligence
C. Data warehouse
D. Load balancing
2. What type of clause must you always use with DELETE or UPDATE
to avoid inadvertently changing data elsewhere in the
database?
A. SET
B. WHERE
C. ORDER
D. FROM
3. When users enter data into the database, they find they have
to enter a value for every column, as the
database won't allow them to continue otherwise. What type of value
has been disallowed for this database?
A. 0
B. Null
C. Duplicate
D. Tab key
4. What term is used to describe any action a database takes?
A. Attribute
B. Function
C. Transaction
D. Dependency
5. Why should you perform the denormalization process on a
database?
A. Improve performance
B. Increase data protection
C. Correct attribute names
D. Correct incorrect linkages
6. Which keyword should you use to provide a substitute name for a
column?
A. ORDER
B. SELECT
C. UPDATE
D. AS
7. You're working on setting a data type for a field that requires
a high degree of precision, as it will be taking scientific values.
Which data type should you likely set for this field?
A. Decimal
B. Int
C. Real
D. Money
8. When a database system requests a login name and password to
allow a user to enter the database, what process is being
performed?
A. Permission
B. Mapping
C. Authorization
D. Authentication
9. You have a field that will be taking a fixed-length-width
text entry in different languages, including Russian. Which data
type should you likely use?
A. varchar
B. nvarchar
C. char
D. nchar
10. Which keyword yields the same results as using the >= and
<= operators?
A. BETWEEN
B. WHERE
C. IS
D. LIKE
In: Computer Science
Square-Root Implementation & Performance Comparisons Square root operation is considered difficult to implement in hardware, in this project, you must Write and test a MIPS assembly language program to implement three algorithms of an 8-bit integer square root. Background: In mathematics, a square root (√) of a number x is a number r such that r 2 = x, or, in other words, a number r whose square (the result of multiplying the number by itself, or r × r) is x. Some of the algorithms for calculating square roots of a positive Integer number N are shown below:
1. Newton Raphson Method The Newton Raphson method was first used in Gray
2. Iterative method starts with an initial (guess) value and improves accuracy of the result with each iteration. Assuming that X the original number the iterative equations for calculating the reciprocal of it's square root is: Yi+1 = Yi (3 – X (Yi)^2) Once Y has been calculated, one can get the square root by multiplying with X. This algorithm has quadratic convergence. In each iteration multiplications and additions or subtractions are needed. In order to speed up the multiplier, there must be a special a algorithm such as Wallace tree to get the partial production and use a carry propagate adder to get the production, because the multiplier requires a rather large number of gates counts, it is not so practical to place many multipliers on FPGA. Also it is hard to get an exact remainder of the square root.
3-The Radix-2 SRT-Redundant and Non-Redundant Algorithm The Radix-2 SRT-Redundant and Non-Redundant method are similar. Since them both based on recursive relation. In each iteration, they will be one digit shift left and addition. The determination of a function is rather complex, especially for high radix SRT algorithm. The implantations are not capable of accepting a square root on every clock cycle. Also notice that these two methods may generate a wrong resulting value at the last digit position.
4- The Non-Restoring Algorithm The operation at each iteration is simple: addition or subtraction based on the result bit generated in previous iteration. The remainder of the addition or subtraction is fed via registers to the next iteration directly even it is negative. At the last iteration, if the remainder is non-negative, it is a precise remainder. Otherwise, we can obtain a precise remainder by an addition operation.
In: Computer Science
Your organization's database needs include the following:
Recommend three of the following six database architecture types that would work for your organization:
Include the following in your recommendation:
In: Computer Science
Complete the following questions with proper citations; there is a 150-word minimum per question. Questions: What is the difference between a logical backup and an image copy backup? What is a “quiesce” point, and why is it important for point-in-time recovery? Name and describe the three types of database failures that require recovery. Name and describe four factors that impact the duration of recovery.
In: Computer Science
In: Accounting
) Maddow and Wells, Inc. purchased equity securities in 2018. The management of the company has decided that the securities will not be sold immediately, but will be held for at least three years. This will allow MW to maximize the potential gains from holding the securities. The new accountant at the company wants to classify the securities as held-to-maturity because they will be held for three years; the company has never held securities for this long before. How would you advise the management of the company to classify the securities? At the end of each reporting year, how will the securities be recognized on the company’s books? Support your response with an appropriate ASC reference (ASC xxx-xx-xx-x) or ASU (accounting standard update).
b) Cryptocurrency and Initial Coin Offering are unique investing tools. How does the SEC view these two instruments? Use the SEC’s website to find relevant information about the SEC’s stance on these instruments. Support your discussion with relevant citations from the SEC.
In: Accounting
Find a recent article that discusses either oligopoly and/or game theory and how it relates to a real life situation (the article should be no older than 3 months) and prepare a 1-2 page summary of the article (include in text citations and References).
**2000 words minimum**
In: Economics