Questions
Question: 1- A database has four transactions. Let min sup = 60% and min conf =...

Question: 1- A database has four transactions. Let min sup = 60% and min conf = 80%. CID TID Items Bought 0...

1- A database has four transactions. Let min sup = 60% and min conf = 80%. CID TID Items Bought 01 T100 {King’s-Crab, Sunset-Milk, Dairyland-Cheese, Best-Bread } 02 T200 {Best-Cheese, Dairyland-Milk, Goldenfarm-Apple, Tasty-Pie, Wonder-Bread} 01 T300 {Westcoast-Apple, Dairyland-Milk, Wonder-Bread, Tasty-Pie} 03 T400 {Wonder-Bread, Sunset-Milk, Dairyland-Cheese} (a) At the granularity of item category (e.g., itemi could be “Milk”), for the following rule template, ∀X ∈ transaction, buys(X, item1) ∧ buys(X, item2) ⇒ buys(X, item3) [s, c] list the frequent k-itemset for the largest k, and all of the strong association rules (with their support s and confidence c) containing the frequent k-itemset for the largest k. (b) At the granularity of brand-item category (e.g., itemi could be “Sunset-Milk”), for the following rule template, ∀X ∈ customer, buys(X, item1) ∧ buys(X, item2) ⇒ buys(X, item3) list the frequent k-itemset for the largest k (but do not print any rules).

In: Computer Science

Max started working for a large company, NextGen that specialises in development of phone apps. Max...

Max started working for a large company, NextGen that specialises in development of
phone apps. Max is very excited to work for NextGen as he has many ideas about
developing commercially viable phone apps. After a few weeks of starting his manager
asked Max to analyse data for their clients and app users. Max creates a comprehensive
database of users, their personal details (such as age, gender, and preferences), internet
usage and including how they reacted to certain advertisements in free versions of phone
apps. Max’s manager Jack is very happy and tells him that the database is very valuable and
NextGen could sell it to market research companies that target advertising and mailouts
about various products and offers. Max disagrees with this plan. However, the final decision
would be taken by directors who have decided to engage an ethics consultancy, ProEthics
who would present their recommendations to the board within a month. Analyse this case
and work out any ethical issues that may arise. Students are encouraged to read relevant
course materials (lecture, tutorial, and book chapter). Actual questions will be asked during
assessment.
Question:
Work through the steps of the ethical decision-making model and evaluate what NextGen
should decide and what it should do.

In: Accounting

Normalization This is a Database Development problem.  Go through all the steps and process of normalization. Do...

Normalization

This is a Database Development problem.  Go through all the steps and process of normalization. Do normalization/dependency diagram FIRST. Then create a dependency diagram normalizing the following business rules to 3NF. Once normalized, create an accurate Entity Relationship Diagram. (ERD)

Business Scenario: You have been hired by a law firm to create a database that keeps track of the specific areas of law that each of their attorneys currently practice and their current caseload.

Business Rules:

1. An attorney can practice any area of law once he/she is admitted to their state’s Bar Association. However, most attorneys specialize in specific areas of law.

2. Our law firm is organized into departments based on the types of cases we receive in the areas of labor law, family law, and personal injury law.

3. Within these main departments, attorneys have specializations. For example, we have some attorneys who only handle worker’s compensation cases in our labor law area.

4. An attorney can only accept cases in their currently assigned department.

5. A client can have many open cases with our law firm at any one time.

6. Each client’s case is assigned to an attorney who specializes in that case’s form of law

In: Computer Science

1. Create a network diagram and project schedule (illustrated in a Gantt chart) from the following...

1. Create a network diagram and project schedule (illustrated in a Gantt chart) from the following set of tasks. Use the task number, duration, and dependencies of each task given and construct a schedule so that the project is completed in the least number of days possible. Include a management reserve of approximately 10%.

Task

Subject

Duration

Dependencies

Slack (3 pts)

1.0

Project Kickoff

2

none

2.1

Install & Test Database Software

2

1.0

2.2

Configure & Test Database Web API

2

2.1

2.3

Develop & Test Modeling Software

8

1.0

2.4

Develop Reporting Software

5

1.0

3.1

Integration Test: DB API & Model

2

2.2 and 2.3

3.2

Test Reporting Software

2

2.2 and 2.4

4.0

Final Integration/Acceptance Testing

5

3.1 and 3.2

5.0

Closeout

2

4.0

2. Draw the Network Diagram and calculate the early and late schedules

3. What tasks, in order, are on the critical path?

4. Draw the Schedule as a Gantt Chart?

5. What does the graphical representation of the WBS look like for the project?  

Note: only the terminal graph nodes are shown in the tasks above; construct logical section titles where needed!

In: Operations Management

Crescent Bank made it’s name by lending to farmers and agricultural machinery suppliers. Traditionally, Crescent has...

Crescent Bank made it’s name by lending to farmers and agricultural machinery suppliers. Traditionally, Crescent has helped farmers by providing loans for property, plant, and equipment (PPE), and by closing the gap between agricultural machinery retailers and the agricultural machinery original equipment manufacturers (OEM). Associated with these banking activities are CRUD operators - Creating accounts, Reading accounts, Updating accounts, and Deleting accounts...with more accounts being created than deleted. Because of how well Crescent has performed in the agricultural sector, it now has locations in several towns and dabbles with other business customers and several thousand individual accounts.

Recently, Bainbridge Farms, one of Crescent’s major agricultural customers has asked if the bank would be open to providing insurance for it and it’s employees. Bainbridge understands that the insurance industry isn’t exactly banking, but how could it be that different? Because of the learning curve, Bainbridge was hoping Crescent would start by providing life insurance policies (as the policies are only closed when a customer either closes the account or (unfortunately) dies). But Bainbridge is hoping that Crescent will extend beyond life insurance to provide insurance for crops, property, plant, and equipment.

For the above scenario answer the following questions:

1.

Identify all hierarchy of data elements necessary to create a database for this case. This means identifying the name of the database, all files, records identified, fields, and values as presented in the case.

Please present these items in the following format:

Database Name -

<Name>

Files -

<File1...>

(Field 1 associated with File1) : Value if present

(Field 2 associated with File1) : Value if present...

(Field X associated with File1) : Value if present


<File X>

(Field 1 associated with FileX) : Value if present

(Field 2 associated with FileX) : Value if present...

(Field X associated with FileX) : Value if present

Records -

<Record 1...>

<Record X>

2.

Create an ERD for Crescent Bank that addresses all elements of the case as identified in question 1. Please, only include the primary and foreign keys that will create the appropriate relationships to successfully model the diagram.

In: Computer Science

Question: Which preventive, detective, and/or corrective controls would best mitigate the following threats? An employee’s laptop...

Question: Which preventive, detective, and/or corrective controls would best mitigate the following threats?

An employee’s laptop was stolen at the airport. The laptop contained personal information about the company’s customers that could potentially be used to commit identity theft.

A salesperson successfully logged into the payroll system by guessing the payroll supervisor’s password.

A criminal remotely accessed a sensitive database using the authentication credentials (user ID and strong password) of an IT manager. At the time the attack occurred, the IT manager was logged into the system at his workstation at company headquarters.

An employee received an e-mail purporting to be from her boss informing her of an important new attendance policy. When she clicked on a link embedded in the e-mail to view the new policy, she infected her laptop with a keystroke logger.

A company’s programming staff wrote custom code for the shopping cart feature on its website. The code contained a buffer overflow vulnerability that could be exploited when the customer typed in the ship-to address.

A company purchased the leading “off-the-shelf” e-commerce software for linking its electronic storefront to its inventory database. A customer discovered a way to directly access the back-end database by entering appropriate SQL code.

Attackers broke into the company’s information system through a wireless access point located in one of its retail stores. The wireless access point had been purchased and installed by the store manager without informing central IT or security.

An employee picked up a USB drive in the parking lot and plugged it into his laptop to “see what was on it.” As a result, a keystroke logger was installed on that laptop.

Once an attack on the company’s website was discovered, it took more than 30 minutes to determine who to contact to initiate response actions.

To facilitate working from home, an employee installed a modem on his office workstation. An attacker successfully penetrated the company’s system by dialing into that modem.

An attacker gained access to the company’s internal network by installing a wireless access point in a wiring closet located next to the elevators on the fourth floor of a high-rise office building that the company shared with seven other companies.

In: Economics

3.) What type of formatting is completed based on a certain criteria/conditions being met? Conditional Formatting...

3.) What type of formatting is completed based on a certain criteria/conditions being met?

Conditional Formatting

Bold Formatting

Color Formatting

Criteria Formatting

4.) In a 2 variable data table, which cell location is the formula found?

Northwest Corner

Southwest Corner

Northeast Corner

Southeast Corner

5.) If instructed to create a 1 variable data table using a column input cell starting in cell A5, which cell is the first variable found in?

A6

A5

B5

B6

6.) If instructed to create a 1 variable data table using a column input cell starting in cell A5, which cell is the first formula found in?

B5

A5

B6

A6

7.) How many ifs are found in a nested if statement with 7 outcomes possible?

6

5

7

8

8.) In a vlookup function, which column in the lookup table is the lookup value compared to when the table has 4 columns?

1

2

3

4

9.) In the following formula, which is referring to the rate?

=-PMT(K13/12,K14*12,K15)

K13/12

-PMT

K14*12

K15

10.) In the following formula, which is referring to the principle value of the loan?

=-PMT(K13/12,K14*12,K15)

K15

-PMT

K13/12

K14*12

11.) If instructed to Sort a database by Last Name in Ascending Order, how many levels are used in this sort?

1

2

3

4

12.) What function is used to Average a certain field found in a database?

DAVERAGE

DSUM

AVERAGE

SUM

13.) What function is used to find the largest value in a database field based on certain criteria?

DMAX

SUM

MAX

DSUM

14.) How many ifs are used in a nested if in which there are 5 outcomes?

4

2

3

5

15.) In the following OR statement, what is the minimum that have to be correct to be TRUE?

=OR(A1>1,A2<5.A3=10,A4<20)

1

2

3

4

In: Accounting

Question 1 (Chapter 1 Exercise 2) One important exercise a bioinformatician performs is to compare amino...

Question 1 (Chapter 1 Exercise 2)

One important exercise a bioinformatician performs is to compare amino acid sequences. One reason to make comparisons is to determine the parts of the proteins that are critical for function. These regions are generally conserved within proteins that perform the same duties. Conserved regions are those that have nearly the same amino acid sequences. Proteins that perform the same duties are called homologs and can be found in different species. For example, p53 from humans and p53 from frogs perform the same functions. There are some regions within these proteins that will be similar in both humans and frogs. We call these regions conserved sequences. A multiple sequence alignment allows the bioinformatician to readily line up amino acid sequences of related proteins. The conserved regions are identified in the alignment. For this exercise, perform a multiple sequence alignment of three homologs of cytochrome C. The three homologs are from human, yeast, and dog, and the accession numbers for these sequences are AAA35732, NP_001183974, and 1YCC. The first two sequences can be found in the protein database at the NCBI. The last sequence can be found in the structure database at the Protein Data Bank. ***Print out your multiple sequence alignment result and attach a short paragraph. EXPLAIN how the alignment gives you a clue as to which parts of the cytochrome C protein are MOST important to its function.*** (The function is the same in all three organisms.)

For those of you unfamiliar with NCBI, here are specific instructions:

Go to the NCBI website.

Use the dropdown menu to search in the “Protein” database.

Enter the accession number and click “Search.”

Change the format to FASTA.

Copy the FASTA output into a sequence alignment window of a website that hosts a sequence alignment program. Make sure the header (the line with the > symbol) is placed on top of the sequence within the window.

Repeat for each FASTA output of the remaining two proteins.

Once all three sequences are pasted into the sequence alignment input window, run the program

***please help I starred the portion in the paragraph that I do not know how to answer.

In: Biology

In JAVA : There are two text files with the following information stored in them: The...

In JAVA :

There are two text files with the following information stored in them:

The instructor.txt file where each line stores the id, name and affiliated department of an instructor separated by a comma The department.txt file where each line stores the name, location and budget of the department separated by a comma

You need to write a Java program that reads these text files and provides user with the following menu:

1. Enter the instructor ID and I will provide you with the name of the instructor, affiliated department and the location of that department.

2. Enter the department name and I will provide you with the location, budget and names of all instructors that work for the department.

3. Insert a record about a new instructor.

4. Exit

The above menu should continue to be displayed in a loop until the user selects option 4.

When the user selects option 1 above, the following should be displayed:

Enter the instructor ID:

If the user enters an instructor id that is not present in the text file, display "The ID doesnot appear in the database.", otherwise, display the name of the instructor, affiliated department and the location of that department.

When the user selects option 2 above, the following should be displayed:

Enter the department name:

If the user enters a name that is not present in the text file, display "The department name doesnot appear in the database.", otherwise, display the location, budget and names of all instructors that work for the department.

If the user selects option 3 above, display the following:

Enter the instructor id:

Enter the instructor name:

Enter the affiliated department name:

Once the user enters the above information, store the information in the instructor file only if the following two conditions are met: 1. The department already exists in the department file. If not, display "The department doesnot exist and hence the instructor record cannot be added to the database". 2. The instructor id should not already be present in the file. If so, display "Instructor id already exists in the file"

The program should work for any number of rows in the two text files.

The code should use good programming practices with sensible variable names, proper indentation and comments where needed.

In: Computer Science

Instructions: Complete the following queries using the Colonial Adventure Tours database. You will find the description...

Instructions: Complete the following queries using the Colonial Adventure Tours database. You will find the description including data of this database in page 16 to page 20 in Chapter 1 in your Concepts of Database Management textbook. For each following question, create a query using the Query Design option in Access. Make sure that you save and name each query in the following manner: Query1, Query2......Query14. Query Questions:

Queries:

1. List the name of each trip that does not start in New Hampshire (NH).

2. List the last name of each guide that does not live in Massachusetts (MA).

3. List the name and start location for each trip that has the type Biking.

4. List the name of each trip that has the type Hiking and that has a distance greater than six miles.

5. List the name of each trip that has the type Paddling or that is located in Vermont (VT).

6. List the customer number, customer last name, and customer first name of each customer that lives in New Jersey (NJ), New York (NY) or Pennsylvania (PA).

7. How many trips have a type of Hiking or Biking?

8. List the trip name and state for each trip that occurs during the Summer season. Sort the results by trip name within state.

9. How many trips originate in each state?

10. How many reservations include a trip with a price that is greater than $20 but less than $75?

11. Colonial Adventure Tours calculates the total price of a trip by adding the trip price plus other fees and multiplying the result by the number of persons included in the reservation. List the reservation ID, trip ID, customer number, and total price for all reservations where the number of persons is greater than four. Use the column name TOTAL_PRICE for the calculated field.

12. What is the average distance and the average maximum group size for each type of trip?

13. How many current reservations does Colonial Adventure Tours have and what is the total number of persons for all reservations?

In: Computer Science