Questions
PROBLEM 3: Given the following relational database table: Patients(ID, name, symptom, days_in_hospital) The following insertions are...

PROBLEM 3: Given the following relational database table: Patients(ID, name, symptom, days_in_hospital) The following insertions are performed on the table Patients: Insert record <20, Johnson, cough, 3> Insert record <10, Black, fever, 5> Insert record <30, Miller, fever, 10> Insert record <70, Brown, fatigue, 2> Insert record <60, Grant, headache, 4> Insert record <50, Miller, nausea, 15> Insert record <90, Brown, cough, 8 > Assume each block in the Patients file can store up to 2 patient records. Do the following: 1. Assuming that Patients is organized as a heap file, show the contents of the file after the last insertion. 2. Assuming that Patients is organized as a sequential file with days_in_hospital as the ordering field, show the contents (i.e. the data values as well as the associated block/bucket/record addresses) of the file after the last insertion. 3. Assuming that Patients is organized as an index-sequential file on the search key days_in_hospital and assuming that the primary index, the secondary index on ID, and the secondary index on name have been created, show the contents of Patients, the primary index, and the two secondary indices after the last insertion. 4. Given the index-sequential file organization as described in (3), explain step-by-step how the DBMS would conduct search on this file organization to answer the following SQL query: select name from Patients where ID between 30 and 60

In: Computer Science

answer the following question for oracle developer: 1- ____ is the category of SQL commands to...

answer the following question for oracle developer:

1- ____ is the category of SQL commands to create, alter or drop SQL objects (create a table, drop a view)

2-____ handles access to objects. The DBA might grant select on Customers to Bob. This will allow user Bob to read the Customers table.

3- Run this query in SQL Developer:

Select sysdate
from dual
What is sysdate? What is dual?

4-What is a surrogate key? How are surrogate keys implemented in Oracle?

5-Which are DML commands?

6- Rules for a table: choose what is best

a- Name should not contain spaces

b- Name must start with an alpha character

c-Must be unique in the schema

d-Must contain a Primary Key

e-Must be unique in the database

f-Must contain at least one column

g-Primary Key must be first column in the database

7- What is First Normal Form (1NF)? What condition would violate 1NF?

8- ____ are SQL commands used to handle data in tables. Typical commands are Select, Update, Insert, Delete and Merge

9-Which are valid DDL commands?

10-A table has two (or more) columns that make up the Primary Key. This is called a(n) ____ key.

11-A column that's nchar(5) takes up ____ bytes of data.

12- Maximum number of columns for an Oracle table is ____ columns

13-Define: null. What is null? What does it mean? How are nulls treated?

14-

Run the following query in SQL Developer:

select to_char(sysdate + 2,'mm/dd hh24:mm')
from dual

What is returned?

Change the query to return the last day of the month (if sysdate is 2/14/2017, return 2/28/2017).

15- One-to-one relationships between two tables in a database are rare. Why? Give me a scenario where 1:1 relationship would be implemented?

In: Computer Science

Papa Your Mommas Pizza Parlor has 6 meat toppings and 7 vegetable toppings from which to...

Papa Your Mommas Pizza Parlor has 6 meat toppings and 7 vegetable toppings from which to select. The parlor has three different sizes of pizza (individual, large, and giant) and two different types of crust (deep-dish and thin).

(a) How many different two-topping pizzas could be ordered?

(b) How many different two-topping pizzas could be ordered with exactly one meat topping and exactly one vegetable topping?

(c) How many different four-topping vegetarian pizzas could be ordered?

The answers are

a) 468

b) 252

c) 210

I just need the work

In: Statistics and Probability

Case Study 2 – Auditing ACCT3000 (Semester 2, 2019) You are an Audit Senior currently planning...

Case Study 2 – Auditing ACCT3000 (Semester 2, 2019)
You are an Audit Senior currently planning the 30 June 20X9 audit of Technology Limited, an Australian-owned company that produces and exports computer chips to China. At a recent planning meeting with Technology Limited’s senior staff, you obtained the following overview of this year’s operations:
Tight checks by Australian custom officials have delayed several shipments of computer chips. These delays have angered Chinese customers who are threatening to deduct 20% from the amounts owing as compensation for lost production time.
One of Technology Limited’s customers, Blue Chip Limited, is claiming that the latest batch of computer chips it received was found to be faulty. Blue Chip Limited is refusing to pay its account, which is allegedly seven months overdue. Technology Limited has claimed to have launched an investigation into the allegations, but as yet not been able to substantiate them. Technology Limited has suffered significant cash flow problems because another major customer, Creative Limited (Creative), is experiencing financial difficulties. As a result, Creative is taking well over 120 days to pay outstanding amounts, despite Creative’s terms of trade being payment within 30 days. Creative makes up 40 per cent of Technology Limited’s sales and the board has been reluctant to take any action that might adversely affect those sales. Consequently, Technology Limited has had to increase its dependency on its line of credit, and this has caused it to temporarily breach the debt to equity ratio required in its loan covenant with Big Bank Limited.
One of Technology Limited’s major suppliers went bankrupt one month ago, causing major product shortages. To overcome the problem, Peter James, the husband of the finance director, Natalie James, provided electronic components used in the production of computer chips to Technology Limited through his private company Norton Limited. Norton Limited demands payment in $US prior to the electronic components being supplied. There is no formal agreement in place with Peter James, however, the goods are being provided at competitive prices. You are concerned about the electronic components that Peter James’ company is supplying, because his products are new to the market and you have heard some of Technology Limited’s staff complaining that they are of poor quality.
Due to increased competitive pressure, Technology Limited has recently moved the manufacture of some of its computer chips to Bangladesh. Technology Limited saves around 25 per cent in costs compared to the equivalent Australian made items. However, the manufacturing process takes longer and on a few occasions late delivery from Bangladesh has resulted in lost sales.
Last month, a protester suffered a broken leg, allegedly because he was hit by a company truck. The protester is now suing Technology Limited for damages, claiming the contractor was in fact an employee of Technology Limited at the time of the accident, and was acting on Technology Limited’s instructions. Technology Limited is fighting the case and appears to have a reasonable chance of winning; however, the adverse publicity being generated is making the company nervous about its sales in the future.
During the period, the Australian dollar has remained steady against the Chinese Yuan, although it fell by about 3% against the US dollar. Debtors are invoiced in $US at the time of shipment, and payment is received in $US one month after the shipment is delivered. It takes around six weeks for the charter vessels to travel from Technology Limited’s shipyard at Bigmantle Bay to China. A recent downturn in the Chinese economy is affecting forward orders, which have fallen by 15%.
Required:
Prepare a memorandum to the audit manager, outlining your risk assessment relating to Technology
Limited. When making your risk assessment:
(a) Identify two (2) balance sheet accounts from the information provided that are subjected
to an increase in audit risk. Briefly explain what factors increase the audit risk associated
with the two (2) account balances identified. In your explanation, please mention the key
assertion(s) at risk of material misstatement and the components of the audit risk model
affected for each account balance identified.
(b) Identify how the audit plan will be affected and recommend specific audit procedures to
address the risks associated with each account balance identified.
(Please Note – Maximum Word Limit: 800 Words excluding references)

In: Accounting

Case Study 2 – Auditing ACCT3000 (Semester 2, 2019) You are an Audit Senior currently planning...

Case Study 2 – Auditing ACCT3000 (Semester 2, 2019)
You are an Audit Senior currently planning the 30 June 20X9 audit of Technology Limited, an Australian-owned company that produces and exports computer chips to China. At a recent planning meeting with Technology Limited’s senior staff, you obtained the following overview of this year’s operations:
Tight checks by Australian custom officials have delayed several shipments of computer chips. These delays have angered Chinese customers who are threatening to deduct 20% from the amounts owing as compensation for lost production time.
One of Technology Limited’s customers, Blue Chip Limited, is claiming that the latest batch of computer chips it received was found to be faulty. Blue Chip Limited is refusing to pay its account, which is allegedly seven months overdue. Technology Limited has claimed to have launched an investigation into the allegations, but as yet not been able to substantiate them. Technology Limited has suffered significant cash flow problems because another major customer, Creative Limited (Creative), is experiencing financial difficulties. As a result, Creative is taking well over 120 days to pay outstanding amounts, despite Creative’s terms of trade being payment within 30 days. Creative makes up 40 per cent of Technology Limited’s sales and the board has been reluctant to take any action that might adversely affect those sales. Consequently, Technology Limited has had to increase its dependency on its line of credit, and this has caused it to temporarily breach the debt to equity ratio required in its loan covenant with Big Bank Limited.
One of Technology Limited’s major suppliers went bankrupt one month ago, causing major product shortages. To overcome the problem, Peter James, the husband of the finance director, Natalie James, provided electronic components used in the production of computer chips to Technology Limited through his private company Norton Limited. Norton Limited demands payment in $US prior to the electronic components being supplied. There is no formal agreement in place with Peter James, however, the goods are being provided at competitive prices. You are concerned about the electronic components that Peter James’ company is supplying, because his products are new to the market and you have heard some of Technology Limited’s staff complaining that they are of poor quality.
Due to increased competitive pressure, Technology Limited has recently moved the manufacture of some of its computer chips to Bangladesh. Technology Limited saves around 25 per cent in costs compared to the equivalent Australian made items. However, the manufacturing process takes longer and on a few occasions late delivery from Bangladesh has resulted in lost sales.
Last month, a protester suffered a broken leg, allegedly because he was hit by a company truck. The protester is now suing Technology Limited for damages, claiming the contractor was in fact an employee of Technology Limited at the time of the accident, and was acting on Technology Limited’s instructions. Technology Limited is fighting the case and appears to have a reasonable chance of winning; however, the adverse publicity being generated is making the company nervous about its sales in the future.
During the period, the Australian dollar has remained steady against the Chinese Yuan, although it fell by about 3% against the US dollar. Debtors are invoiced in $US at the time of shipment, and payment is received in $US one month after the shipment is delivered. It takes around six weeks for the charter vessels to travel from Technology Limited’s shipyard at Bigmantle Bay to China. A recent downturn in the Chinese economy is affecting forward orders, which have fallen by 15%.
Required:
Prepare a memorandum to the audit manager, outlining your risk assessment relating to Technology
Limited. When making your risk assessment:
(a) Identify two (2) balance sheet accounts from the information provided that are subjected
to an increase in audit risk. Briefly explain what factors increase the audit risk associated
with the two (2) account balances identified. In your explanation, please mention the key
assertion(s) at risk of material misstatement and the components of the audit risk model
affected for each account balance identified.
(b) Identify how the audit plan will be affected and recommend specific audit procedures to
address the risks associated with each account balance identified.
(Please Note – Maximum Word Limit: 800 Words excluding references)

In: Accounting

The restaurant owner Lobster Jack wants to find out what the peak demand periods are, during...

The restaurant owner Lobster Jack wants to find out what the peak demand periods are, during the hours of operation, in order to be better prepared to serve his customers. He thinks that, on average, 60% of the daily customers come between 6:00pm and 8:59pm (equally distributed in that time) and the remaining 40% of customers come at other times during the operating hours (again equally distributed). He wants to verify if that is true or not, so he asked his staff to write down during one week the number of customers that come into the restaurant at a given hour each day. His staff gave him the following data:

Time Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 Day 7
5:00pm-5:59pm 15 19 21 20 12 15 15
6:00pm-6:59pm 30 23 24 25 28 29 26
7:00pm-7:59pm 36 29 39 35 39 30 32
8:00pm-8:59pm 29 33 23 29 24 32 27
9:00pm-9:59pm 21 20 12 19 18 14 20
10:00pm-10:59pm 12 12 15 12 10 15 14
11:00pm-11:59pm 8 7 9 10 12 12 9

Help the manager figure out if his instincts are correct or not. Use a Chi-Squared test to see if the observed distribution is similar to the expected. Use the average demand for a given time as your observed value.

The owner now wants you to help him analyze his sales data. The restaurant is famous for its Lobo lobster roll. You were given some information based on which you deduced that the demand for the lobster roll was normally distributed with a mean of 220 and standard deviation of 50. You also know that the lobster supplier can provide lobster at a rate that mimics a uniform distribution between 170 and 300. One Lobster is used per roll and the lobsters need to be fresh (i.e. the restaurant can only use the lobsters that are delivered that day).

You decide to run 200 simulations of 1000 days each.

Calculate the expected sales of Lobster roll per day based on your simulation results. Use the expected sales from each of your 200 simulations to create a confidence interval for the average expected sales. What is the 95% confidence interval, L (Your confidence interval is mean +/- L), for this estimate?

In: Statistics and Probability

1. Write at least two sentences in your own words to explain the difference between the...

1. Write at least two sentences in your own words to explain the difference between the confined aquifer and unconfined aquifer.

2. Answer True or False and justify your answer:

    a. The porosity of a clayey soil is about 40% while the porosity of a medium sand soil is also 40%. Therefore, both of these soil types will have the same specific yield.

    b. Confined aquifers have a larger specific yield than the one from the unconfined aquifer.

In: Civil Engineering

Male and female populations of tortoises under 80 years old are represented by age in the...

Male and female populations of tortoises under 80 years old are represented by age in the table below. Complete parts​ (a) through​ (d).

Age Males Females ​0-9 15 9 ​10-19 12 10 ​20-29 16 16 ​30-39 19 15 ​40-49 24 21 ​50-59 23 22 ​60-69 19 20 ​70-79 12 15

​(a) Approximate the population mean and standard deviation of age for males. muequals nothing years ​(Round to two decimal places as​ needed.) sigmaequals nothing years ​(Round to two decimal places as​ needed.) ​(b) Approximate the population mean and standard deviation of age for females. muequals nothing years ​(Round to two decimal places as​ needed.) sigmaequals nothing years ​(Round to two decimal places as​ needed.) ​(c) Which gender has the higher mean​ age? ▼ Neither Males Females have the higher mean age. ​(d) Which gender has the higher dispersion in​ age? ▼ Males Females Neither have the greater dispersion.

In: Statistics and Probability

I want to learn how to calculate the call-value/price for the binomial model tree, so that...

I want to learn how to calculate the call-value/price for the binomial model tree, so that i can calculate the call and put option.

I just need to find out how to get the call value.

The current price of Natasha Corporation stock is $6. In each of the next two years, this stock

price can either go up by $2.50 or go down by $2. The stock pays no dividends. The one-year

risk-free interest rate is 2% and will remain constant. Using the Binomial Model

a) calculate the price of a two-year European call option on Natasha stock with a strike

price of $7.

b) calculate the price of a two-year European put option on Natasha stock with a strike

price of $7.

In: Finance

PART 5: Learn about commands used to view contents of files: use the cat command to...

PART 5: Learn about commands used to view contents of files:

  1. use the cat command to review the contents of the /home/test/passwd.bak

type:   cat passwd.bak

2. now add the |more to the last command (see what happens when you push the up arrow curser key-it recalls the last command)

3. now try to cat the passwd.bak file but look at the first few lines and then the last few lines using the head and tail commands

type:  head passwd.bak   and    tail passwd.bak

4. let’s now add the n2 option to the head and tail commands and see what happens

5. let’s look more at the cat command and redirection of output to a file:

type:  cat > file1 and enter a paragraph about how you feel about Unix. Hit the ctrl and d to exit

6. create another file:  ls -ali > file50

7. add to that file:  cat /passwd.bak >> file50

8. review your work using the cat command

9. try to pull out any lines from the file50 with root:  grep root file50

10. HAND-IN: Screen Capture #4 of of the above activities

PART 6: Let’s practice utilizing files and directories in our file systems structure:

  1. create the following hierarchical directory structures:

      test

         |

              dir1         dir2        dir3          dir4

                                               |

                                      dir5      dir6

2. create some files in all of these directories using the cat or touch command

3. try a new command: move or mv. Use the mv command to move a file from one directory to another but notice that the inode number stays the same

4. use rm and rmdir to remove two files and dir4

5. HAND-IN: Screen Capture #5 of of the above activities

In: Computer Science