Database Design CIW
State_Capitals Physical Database
Create primary and secondary keys for the attached unfinished physical database design.
| CREATE DATABASE STATE_CAPITALS; | ||
| GO | ||
| USE STATE_CAPITALS; | ||
| GO | ||
| CREATE TABLE Country( | ||
| Country_Code varchar(10) NOT NULL, | ||
| Country_Name varchar(50) NOT NULL, | ||
| Population int NOT NULL, | ||
| Country_Size float NOT NULL | ||
| ) | ||
| GO | ||
| CREATE TABLE Region( | ||
| Country_Code varchar(10) NOT NULL, | ||
| Region_Code varchar(10) NOT NULL, | ||
| Region_Name varchar(50) NOT NULL | ||
| ) | ||
| GO | ||
| CREATE TABLE State( | ||
| Region_Code varchar(10) NOT NULL, | ||
| State_Code char(2) NOT NULL, | ||
| State_Name varchar(50) NOT NULL, | ||
| Date_of_Statehood int NOT NULL, | ||
| State_Size float NOT NULL, | ||
| State_Population int NOT NULL | ||
| ) | ||
| GO | ||
| CREATE TABLE Capital( | ||
| State_Code char(2) NOT NULL, | ||
| Capital_Code tinyint NOT NULL, | ||
| Capital_Name varchar(50) NOT NULL, | ||
| Capital_Since smallint NOT NULL, | ||
| Land_Area float NOT NULL, | ||
| Most_Populous_City bit NOT NULL, | ||
| Municipal_Population int NOT NULL, | ||
| Metropolitan_Population int NULL, | ||
| Note varchar(300) NULL | ||
| ) | ||
| GO | ||
Ensure your submission addresses each of these components:
Submit your project in a word document format
In: Computer Science
Assignment task
Use your favorite search engine to find details about (1) virus/piece of malware. Upload an MS Word or .PDF document that summarizes each of the following
Item 1: Introduction - What is meant by malware/viruses? What is their history? Are malware and/or viruses recent developments in computer technology or have they been around for a while? What piece of malware/virus are choosing to write about and why?
Item 2: Virus/Malware details:
What specifically does the virus/malware do? How does it infect targets? What does it do once it infects a host? Does it change registry settings, does it leave behind malicious code, etc...? Is it destructive? If so how?
Item 3 - Malware/Virus removal - How effective is software in removing it? What has to be done to remove it? What can be done to prevent being impacted by it?
Example of what I am looking for: Leading anti-virus/malware products such as <Name some products> are effective in removing the malicious .DLL, They do this by first configuring Internet Explorer to not run the .DLL and then deleting the malicious .DLL itself.
In: Computer Science
Has to be extremely basic, cannot use stuff like move. Very basic.
Here is what I already have and I am stuck.
.data myarray: .word 0,0,0,0,0,0,0,0,0,0 invalid: .asciiz "Number is invalid, store a number in the array that is from 0-10.\n" large: .asciiz "The largest element is " colon: .asciiz " :\t" enter: .asciiz "Store a value in the array " .text main: li $v0, 4 la $a0, enter #asking the user to input how many numbers they would like to enter syscall li $v0, 5 syscall #user input add $s1, $v0, $0 #declaring v0 to s1 blt $s1, $0, error #if # isn't + bgt $s1, 10, error #if # is greater than 10 beq $s1, $0, error #if # is 0 add $s0, $s1, $s2 addi $s0, $s1, -50 la $s6, myarray sw $t0, 32($s6) swap: add $t0, $a1, $0 loop: beq $t0, $t1, done addi $s0, $s0, 4 add $s2, $s2, $t5 j loop done: li $v0, 4 la $a0, large syscall #need to print biggest array here# li $v0, 10 syscall error: li $v0, 4 la $a0, invalid syscall j main
In: Computer Science
Mark up a web page containing the poem "Revelation" by Robert Frost shown in Figure 1–47.
Figure 1-47
Do the following:
Tasks
Open the file code1-2.html and in the comment section enter your name (First + Last) and the date (MM/DD/YYYY) into the Author: and Date: fields of the file.
0
Mark the text Revelation as an h1 heading and the text by Robert Frost as an h2 heading.
Mark each stanza of the poem as a paragraph. Within each of the three stanzas, end each line with a line break using the <br /> tag. For alternating lines within the three stanzas, insert three character entities to indent the text of those lines three spaces.
Replace the line of dashes after the poem with the <hr /> tag to indicate a horizontal rule.
Enclose the reference to the poem’s origin within a <footer> tag. Mark the text A Boy’s Will using the <cite> tag. Replace the word "copyright" with the character reference ©.
Verify the final website looks as designed.
Grading
Complete each task listed above. Each task contains automated checks which are used to calculate your grade. You can use the Website Refresh button to refresh your website preview at any point. You view a full-page version of your website by clicking the arrow in the top right corner of your website preview. When you have completed each task by clicking the checkbox, open the task list panel on the left navigation bar and click the "Submit" button.
In: Computer Science
Background: This activity is based on the results of a recent study on the safety of airplane drinking water that was conducted by the U.S. Environmental Protection Agency (EPA). A study found that out of a random sample of 316 airplanes tested, 40 had coliform bacteria in the drinking water drawn from restrooms and kitchens. As a benchmark comparison, in 2003 the EPA found that about 3.5% of the U.S. population have coliform bacteria-infected drinking water. The question of interest is whether, based on the results of this study, we can conclude that drinking water on airplanes is more contaminated than drinking water in general.
Question 1: (Remember write all answer in an MS Word doc and upload)
Let p be the proportion of contaminated drinking water in airplanes. Write down the appropriate null and alternative hypotheses.
Question 2:
Based on the collected data, is it safe to use the z-test for p in this scenario? Explain.
Use the following instructions to conduct the z-test for the population proportion:
Instructions - 2 Options
Option 1: Click on the following link to use the MS Excel
hypothesis test template: hypothesis.xls
R | StatCrunch | Minitab | Excel 2007 | TI Calculator
Question 3:
Now that we have established that it is safe to use the Z-test for p for our problem, go ahead and carry out the test. Paste the output below.
Question 4:
What is the test statistic for this test? (Hint: Calculation already done by either technology option.) Interpret this value.
Question 5:
What is the P-Value? Interpret what that means, and draw your conclusions. Assume significance level of 0.05.
In: Math
Instructions:
Answer the following questions. Submit your answers to questions 1-5 as a Rich Text Format file (.rtf), Word document (.doc), or ASCII text file (.txt). For problem 6 submit an excel sheet containing your chart.
1. (12 points) State the order of magnitude for each of the following mathematical functions. (Hint: Find the dominant term and drop its coefficient)
2. (12 points) Assume you have two algorithms, A and B, both of which perform the same function, although their implementations differ. Assume that algorithm A has a running time of O(N3 + 2N2 +6N +10) and algorithm B has a running time of O(6N2 + 3N +10 ). Also assume that the value of N is restricted to the set of Natural numbers i.e., {1, 2, 3, ...}. Answer the following questions:
3. (8 points)Put the following growth-rate functions in order from the most efficient to the least efficient:
In: Computer Science
C++
Write a program that reads in a list of 10 names as input from a user and places them in an array.
The program will prompt for a name and return the number of times that name was
entered in the list. The program should output total number of instances of that name and then prompt for another name until the word done is typed in.
For this lab, use the string data type as opposed to char to store the names (i.e. don’t use c-strings).
Expected Input/ Output:
Enter name #1: Joe
Enter name #2: Sally
Enter name #3: Joe
Enter name #4: Sue
Enter name #5: Sally
Enter name #6: Adam
Enter name #7: Joe
Enter name #8: Adam
Enter name #9: Adam
Enter name #10: Joe
Who do you want to search for (enter done to exit)? Joe
There are 4 instances of the name Joe.
Who do you want to search for (enter done to exit)?Sally
There are 2 instances of the name Sally.
Who do you want to search for (enter done to exit)? Adam
There are 3 instances of the name Adam.
Who do you want to search for (enter done to exit)? Sue
There is one instance of the name Sue.
Who do you want to search for (enter done to exit)? John
John’s name does not exist in this list.
Who do you want to search for(enter done to exit)?done
Thank you for using my program.
In: Computer Science
Objective: The purpose of this assignment is to introduce declaration of list objects, the forstatement and the def keyword used to define functions.
Problem: Write a Python module (a text file containing valid Python code) named p3.py. This file will contain the following.
Definition of a list containing strings which are in turn integers. These integers represent years, which will be used as inputs to the next item in the file
Definition of a function named isLeap. This function must accept a string containing an integer that will be interpreted by this function as a year. If the year is prior to the introduction of the Gregorian calendar, it will print “Not Gregorian.” If the year is aGregorian year and a leap year, it will print “Leap year!”. If the year is a Gregorian year butnot a leap year, it will print “Not a leap year!”.
A for loop that will call isLeap with each of the year strings in the list of year strings defined above.
While you are free to use any name for your list of year strings, you must use the name isLeap for the function.
Submission: Submit the code you write in a text file named p3.py to the Blackboard folder for this assignment.
Also –
As you implement the code for this assignment, consider what might be added to the testing process and program output to make it clearer what the unit testing is accomplishing. For up to five points extra credit, you also submit a Word document describing any improvements you think would help in testing the function you created, including any additional output that would be useful or testing cycles.
In: Computer Science
Priam Designs Inc. is recruiting fashion designers through LinkedIn. This recruiting mode typically provides direct access to the _________________ (related to the components of the labor market). What is it called when the performance measure includes criteria that are not part of the job (one word)? How do we determine/calculate whether or not a predictor will result in adverse impact? One of the best ways people learn is through ______, imitating or copying someone else’s behavior. The “Big Five” personality trait of _______ has been found to relate to job performance across most organizations and occupations. 6. To qualify as a tax preparer for a seasonal job at a tax preparation chain, Marin must answer written questions on tax terminology covered in an e-learning course provided by the company. This evaluation is a _________ -level evaluation according to Kirkpatrick’s model. 7. Alvin, a sales representative for a company making industrial solvents, lost a major customer last month. Until then, Alvin's year has been about average in the level of sales. Early in the year, Alvin brought in two new customers of about the size of the customer he lost last month. Alvin's supervisor gives Alvin an unsatisfactory rating in his annual performance appraisal. It is likely that Alvin's supervisor has committed the ___________ error. 8. The purpose of a/an ____________ is to give applicants an accurate idea of the positive and negative aspects of the job so that they can more accurately evaluate the employment situation. 9. What is one disadvantage of internal recruiting? 10. A collection of instruments and exercises designed to diagnose individuals’ developmental needs is called a/an _____________.
In: Operations Management
One of the most highly touted advantages of Linux is the fact that it is open source and anyone can view, modify, and contribute to the Linux source code. In this project, you will make a small change to the Linux source code.
Follow the instructions called Linux Kernel Modules beginning on page 96 of the textbook. Take screenshots of the code that you add to the Linux source as you go and paste them into a Word document.
In the final part of the assignment, you will also need to take screenshots of the kernel log buffer to show successful addition, traversal, and deletion of the linked list elements. Finally, you will need to write a one to two-page reflection paper documenting the steps you have been through to complete the project, lesson learned, things that you like and dislike most about this project, difficulties you encountered and how you solved them, and what you should have done to avoid such difficulties.
Helpful Information on C and Linux:
In: Computer Science