PROBLEM 3: Given the following relational database table: Patients(ID, name, symptom, days_in_hospital) The following insertions are performed on the table Patients: Insert record <20, Johnson, cough, 3> Insert record <10, Black, fever, 5> Insert record <30, Miller, fever, 10> Insert record <70, Brown, fatigue, 2> Insert record <60, Grant, headache, 4> Insert record <50, Miller, nausea, 15> Insert record <90, Brown, cough, 8 > Assume each block in the Patients file can store up to 2 patient records. Do the following: 1. Assuming that Patients is organized as a heap file, show the contents of the file after the last insertion. 2. Assuming that Patients is organized as a sequential file with days_in_hospital as the ordering field, show the contents (i.e. the data values as well as the associated block/bucket/record addresses) of the file after the last insertion. 3. Assuming that Patients is organized as an index-sequential file on the search key days_in_hospital and assuming that the primary index, the secondary index on ID, and the secondary index on name have been created, show the contents of Patients, the primary index, and the two secondary indices after the last insertion. 4. Given the index-sequential file organization as described in (3), explain step-by-step how the DBMS would conduct search on this file organization to answer the following SQL query: select name from Patients where ID between 30 and 60
In: Computer Science
answer the following question for oracle developer:
1- ____ is the category of SQL commands to create, alter or drop SQL objects (create a table, drop a view)
2-____ handles access to objects. The DBA might grant select on Customers to Bob. This will allow user Bob to read the Customers table.
3- Run this query in SQL Developer:
Select sysdate
from dual
What is sysdate? What is dual?
4-What is a surrogate key? How are surrogate keys implemented in Oracle?
5-Which are DML commands?
6- Rules for a table: choose what is best
a- Name should not contain spaces
b- Name must start with an alpha character
c-Must be unique in the schema
d-Must contain a Primary Key
e-Must be unique in the database
f-Must contain at least one column
g-Primary Key must be first column in the database
7- What is First Normal Form (1NF)? What condition would violate 1NF?
8- ____ are SQL commands used to handle data in tables. Typical commands are Select, Update, Insert, Delete and Merge
9-Which are valid DDL commands?
10-A table has two (or more) columns that make up the Primary Key. This is called a(n) ____ key.
11-A column that's nchar(5) takes up ____ bytes of data.
12- Maximum number of columns for an Oracle table is ____ columns
13-Define: null. What is null? What does it mean? How are nulls treated?
14-
Run the following query in SQL Developer:
select to_char(sysdate + 2,'mm/dd hh24:mm')
from dual
What is returned?
Change the query to return the last day of the month (if sysdate is
2/14/2017, return 2/28/2017).
15- One-to-one relationships between two tables in a database are rare. Why? Give me a scenario where 1:1 relationship would be implemented?
In: Computer Science
Papa Your Mommas Pizza Parlor has 6 meat toppings and 7 vegetable toppings from which to select. The parlor has three different sizes of pizza (individual, large, and giant) and two different types of crust (deep-dish and thin).
(a) How many different two-topping pizzas could be ordered?
(b) How many different two-topping pizzas could be ordered with exactly one meat topping and exactly one vegetable topping?
(c) How many different four-topping vegetarian pizzas could be ordered?
The answers are
a) 468
b) 252
c) 210
I just need the work
In: Statistics and Probability
Case Study 2 – Auditing ACCT3000 (Semester 2, 2019)
You are an Audit Senior currently planning the 30 June 20X9 audit
of Technology Limited, an Australian-owned company that produces
and exports computer chips to China. At a recent planning meeting
with Technology Limited’s senior staff, you obtained the following
overview of this year’s operations:
Tight checks by Australian custom officials have delayed several
shipments of computer chips. These delays have angered Chinese
customers who are threatening to deduct 20% from the amounts owing
as compensation for lost production time.
One of Technology Limited’s customers, Blue Chip Limited, is
claiming that the latest batch of computer chips it received was
found to be faulty. Blue Chip Limited is refusing to pay its
account, which is allegedly seven months overdue. Technology
Limited has claimed to have launched an investigation into the
allegations, but as yet not been able to substantiate them.
Technology Limited has suffered significant cash flow problems
because another major customer, Creative Limited (Creative), is
experiencing financial difficulties. As a result, Creative is
taking well over 120 days to pay outstanding amounts, despite
Creative’s terms of trade being payment within 30 days. Creative
makes up 40 per cent of Technology Limited’s sales and the board
has been reluctant to take any action that might adversely affect
those sales. Consequently, Technology Limited has had to increase
its dependency on its line of credit, and this has caused it to
temporarily breach the debt to equity ratio required in its loan
covenant with Big Bank Limited.
One of Technology Limited’s major suppliers went bankrupt one month
ago, causing major product shortages. To overcome the problem,
Peter James, the husband of the finance director, Natalie James,
provided electronic components used in the production of computer
chips to Technology Limited through his private company Norton
Limited. Norton Limited demands payment in $US prior to the
electronic components being supplied. There is no formal agreement
in place with Peter James, however, the goods are being provided at
competitive prices. You are concerned about the electronic
components that Peter James’ company is supplying, because his
products are new to the market and you have heard some of
Technology Limited’s staff complaining that they are of poor
quality.
Due to increased competitive pressure, Technology Limited has
recently moved the manufacture of some of its computer chips to
Bangladesh. Technology Limited saves around 25 per cent in costs
compared to the equivalent Australian made items. However, the
manufacturing process takes longer and on a few occasions late
delivery from Bangladesh has resulted in lost sales.
Last month, a protester suffered a broken leg, allegedly because he
was hit by a company truck. The protester is now suing Technology
Limited for damages, claiming the contractor was in fact an
employee of Technology Limited at the time of the accident, and was
acting on Technology Limited’s instructions. Technology Limited is
fighting the case and appears to have a reasonable chance of
winning; however, the adverse publicity being generated is making
the company nervous about its sales in the future.
During the period, the Australian dollar has remained steady
against the Chinese Yuan, although it fell by about 3% against the
US dollar. Debtors are invoiced in $US at the time of shipment, and
payment is received in $US one month after the shipment is
delivered. It takes around six weeks for the charter vessels to
travel from Technology Limited’s shipyard at Bigmantle Bay to
China. A recent downturn in the Chinese economy is affecting
forward orders, which have fallen by 15%.
Required:
Prepare a memorandum to the audit manager, outlining your risk
assessment relating to Technology
Limited. When making your risk assessment:
(a) Identify two (2) balance sheet accounts from the information
provided that are subjected
to an increase in audit risk. Briefly explain what factors increase
the audit risk associated
with the two (2) account balances identified. In your explanation,
please mention the key
assertion(s) at risk of material misstatement and the components of
the audit risk model
affected for each account balance identified.
(b) Identify how the audit plan will be affected and recommend
specific audit procedures to
address the risks associated with each account balance
identified.
(Please Note – Maximum Word Limit: 800 Words excluding
references)
In: Accounting
Case Study 2 – Auditing ACCT3000 (Semester 2, 2019)
You are an Audit Senior currently planning the 30 June 20X9 audit
of Technology Limited, an Australian-owned company that produces
and exports computer chips to China. At a recent planning meeting
with Technology Limited’s senior staff, you obtained the following
overview of this year’s operations:
Tight checks by Australian custom officials have delayed several
shipments of computer chips. These delays have angered Chinese
customers who are threatening to deduct 20% from the amounts owing
as compensation for lost production time.
One of Technology Limited’s customers, Blue Chip Limited, is
claiming that the latest batch of computer chips it received was
found to be faulty. Blue Chip Limited is refusing to pay its
account, which is allegedly seven months overdue. Technology
Limited has claimed to have launched an investigation into the
allegations, but as yet not been able to substantiate them.
Technology Limited has suffered significant cash flow problems
because another major customer, Creative Limited (Creative), is
experiencing financial difficulties. As a result, Creative is
taking well over 120 days to pay outstanding amounts, despite
Creative’s terms of trade being payment within 30 days. Creative
makes up 40 per cent of Technology Limited’s sales and the board
has been reluctant to take any action that might adversely affect
those sales. Consequently, Technology Limited has had to increase
its dependency on its line of credit, and this has caused it to
temporarily breach the debt to equity ratio required in its loan
covenant with Big Bank Limited.
One of Technology Limited’s major suppliers went bankrupt one month
ago, causing major product shortages. To overcome the problem,
Peter James, the husband of the finance director, Natalie James,
provided electronic components used in the production of computer
chips to Technology Limited through his private company Norton
Limited. Norton Limited demands payment in $US prior to the
electronic components being supplied. There is no formal agreement
in place with Peter James, however, the goods are being provided at
competitive prices. You are concerned about the electronic
components that Peter James’ company is supplying, because his
products are new to the market and you have heard some of
Technology Limited’s staff complaining that they are of poor
quality.
Due to increased competitive pressure, Technology Limited has
recently moved the manufacture of some of its computer chips to
Bangladesh. Technology Limited saves around 25 per cent in costs
compared to the equivalent Australian made items. However, the
manufacturing process takes longer and on a few occasions late
delivery from Bangladesh has resulted in lost sales.
Last month, a protester suffered a broken leg, allegedly because he
was hit by a company truck. The protester is now suing Technology
Limited for damages, claiming the contractor was in fact an
employee of Technology Limited at the time of the accident, and was
acting on Technology Limited’s instructions. Technology Limited is
fighting the case and appears to have a reasonable chance of
winning; however, the adverse publicity being generated is making
the company nervous about its sales in the future.
During the period, the Australian dollar has remained steady
against the Chinese Yuan, although it fell by about 3% against the
US dollar. Debtors are invoiced in $US at the time of shipment, and
payment is received in $US one month after the shipment is
delivered. It takes around six weeks for the charter vessels to
travel from Technology Limited’s shipyard at Bigmantle Bay to
China. A recent downturn in the Chinese economy is affecting
forward orders, which have fallen by 15%.
Required:
Prepare a memorandum to the audit manager, outlining your risk
assessment relating to Technology
Limited. When making your risk assessment:
(a) Identify two (2) balance sheet accounts from the information
provided that are subjected
to an increase in audit risk. Briefly explain what factors increase
the audit risk associated
with the two (2) account balances identified. In your explanation,
please mention the key
assertion(s) at risk of material misstatement and the components of
the audit risk model
affected for each account balance identified.
(b) Identify how the audit plan will be affected and recommend
specific audit procedures to
address the risks associated with each account balance
identified.
(Please Note – Maximum Word Limit: 800 Words excluding
references)
In: Accounting
The restaurant owner Lobster Jack wants to find out what the peak demand periods are, during the hours of operation, in order to be better prepared to serve his customers. He thinks that, on average, 60% of the daily customers come between 6:00pm and 8:59pm (equally distributed in that time) and the remaining 40% of customers come at other times during the operating hours (again equally distributed). He wants to verify if that is true or not, so he asked his staff to write down during one week the number of customers that come into the restaurant at a given hour each day. His staff gave him the following data:
| Time | Day 1 | Day 2 | Day 3 | Day 4 | Day 5 | Day 6 | Day 7 |
|---|---|---|---|---|---|---|---|
| 5:00pm-5:59pm | 15 | 19 | 21 | 20 | 12 | 15 | 15 |
| 6:00pm-6:59pm | 30 | 23 | 24 | 25 | 28 | 29 | 26 |
| 7:00pm-7:59pm | 36 | 29 | 39 | 35 | 39 | 30 | 32 |
| 8:00pm-8:59pm | 29 | 33 | 23 | 29 | 24 | 32 | 27 |
| 9:00pm-9:59pm | 21 | 20 | 12 | 19 | 18 | 14 | 20 |
| 10:00pm-10:59pm | 12 | 12 | 15 | 12 | 10 | 15 | 14 |
| 11:00pm-11:59pm | 8 | 7 | 9 | 10 | 12 | 12 | 9 |
Help the manager figure out if his instincts are correct or not. Use a Chi-Squared test to see if the observed distribution is similar to the expected. Use the average demand for a given time as your observed value.
The owner now wants you to help him analyze his sales data. The restaurant is famous for its Lobo lobster roll. You were given some information based on which you deduced that the demand for the lobster roll was normally distributed with a mean of 220 and standard deviation of 50. You also know that the lobster supplier can provide lobster at a rate that mimics a uniform distribution between 170 and 300. One Lobster is used per roll and the lobsters need to be fresh (i.e. the restaurant can only use the lobsters that are delivered that day).
You decide to run 200 simulations of 1000 days each.
Calculate the expected sales of Lobster roll per day based on your simulation results. Use the expected sales from each of your 200 simulations to create a confidence interval for the average expected sales. What is the 95% confidence interval, L (Your confidence interval is mean +/- L), for this estimate?
In: Statistics and Probability
1. Write at least two sentences in your own words to explain the difference between the confined aquifer and unconfined aquifer.
2. Answer True or False and justify your answer:
a. The porosity of a clayey soil is about 40% while the porosity of a medium sand soil is also 40%. Therefore, both of these soil types will have the same specific yield.
b. Confined aquifers have a larger specific yield than the one from the unconfined aquifer.
In: Civil Engineering
Male and female populations of tortoises under 80 years old are represented by age in the table below. Complete parts (a) through (d).
Age Males Females 0-9 15 9 10-19 12 10 20-29 16 16 30-39 19 15 40-49 24 21 50-59 23 22 60-69 19 20 70-79 12 15
(a) Approximate the population mean and standard deviation of age for males. muequals nothing years (Round to two decimal places as needed.) sigmaequals nothing years (Round to two decimal places as needed.) (b) Approximate the population mean and standard deviation of age for females. muequals nothing years (Round to two decimal places as needed.) sigmaequals nothing years (Round to two decimal places as needed.) (c) Which gender has the higher mean age? ▼ Neither Males Females have the higher mean age. (d) Which gender has the higher dispersion in age? ▼ Males Females Neither have the greater dispersion.
In: Statistics and Probability
I want to learn how to calculate the call-value/price for the binomial model tree, so that i can calculate the call and put option.
I just need to find out how to get the call value.
The current price of Natasha Corporation stock is $6. In each of the next two years, this stock
price can either go up by $2.50 or go down by $2. The stock pays no dividends. The one-year
risk-free interest rate is 2% and will remain constant. Using the Binomial Model
a) calculate the price of a two-year European call option on Natasha stock with a strike
price of $7.
b) calculate the price of a two-year European put option on Natasha stock with a strike
price of $7.
In: Finance
PART 5: Learn about commands used to view contents of files:
type: cat passwd.bak
2. now add the |more to the last command (see what happens when you push the up arrow curser key-it recalls the last command)
3. now try to cat the passwd.bak file but look at the first few lines and then the last few lines using the head and tail commands
type: head passwd.bak and tail passwd.bak
4. let’s now add the n2 option to the head and tail commands and see what happens
5. let’s look more at the cat command and redirection of output to a file:
type: cat > file1 and enter a paragraph about how you feel about Unix. Hit the ctrl and d to exit
6. create another file: ls -ali > file50
7. add to that file: cat /passwd.bak >> file50
8. review your work using the cat command
9. try to pull out any lines from the file50 with root: grep root file50
10. HAND-IN: Screen Capture #4 of of the above activities
PART 6: Let’s practice utilizing files and directories in our file systems structure:
test
|
dir1 dir2 dir3 dir4
|
dir5 dir6
2. create some files in all of these directories using the cat or touch command
3. try a new command: move or mv. Use the mv command to move a file from one directory to another but notice that the inode number stays the same
4. use rm and rmdir to remove two files and dir4
5. HAND-IN: Screen Capture #5 of of the above activities
In: Computer Science