Description
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Just found everythin...
Completion Status:
100%
Review
Review
Anonymous
Great! Studypool always delivers quality work.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
5 pages
Final Project Sections Iii And Iv.edited
Key Consideration for Internet Service Provider (ISP) in Austin Headquarters Availability: The internet service provider s ...
Final Project Sections Iii And Iv.edited
Key Consideration for Internet Service Provider (ISP) in Austin Headquarters Availability: The internet service provider should be reliable, with ...
Purdue University Global Data Science and Virtual Operating System Concepts
Part 1Referring back to your Reading and any other resources you have found, write a 2-page descriptive paper that address ...
Purdue University Global Data Science and Virtual Operating System Concepts
Part 1Referring back to your Reading and any other resources you have found, write a 2-page descriptive paper that addresses the following:What is the cloud?What are at least three potential benefits of the cloud?How can virtual environments reduce the need for new hardware?Would virtualization technology be beneficial to start with versus cloud resources? Why or why not?How would you respond to your manager from the scenario above?Make sure your paper covers the following topics:Infrastructure-as-a-Service (IaaS)Platform-as-a-Service (PaaS)Software-as-a-Service (SaaS)Virtualization technologiesBe sure to also include the following within your submission:Screenshots demonstrating experience installing and configuring a virtual environment. Part 2Explore Data Manipulation Language (DML) statements to manage data within schema objects.In business, things change, and data in an organization’s database must be modified to reflect those changes. In this module assessment, you will insert new data into the Northwind database, and you will then update a table in the database.You are also asked to develop SQL DML statements to retrieve data addressing several business inquiries. You must use the Northwind database for this assessment.Assessment InstructionsYou will need to install and use Microsoft SQL Server Express and Microsoft SQL Server Management Studio (SSMS) for this Assessment. You can download the latest versions of these free software products here:Microsoft SQL Server ExpressMicrosoft SSMSThe module assessment consists of two tasks, and you will generate a Microsoft Word report from the completed work. You will use the Northwind database for both tasks. Deploy the Northwind database into your Microsoft SQL Server instance by executing the following script in a Microsoft SQL Server Management Studio (SSMS) query window:Northwind Database Deployment ScriptIt is very important that you watch the module videos associated with DML prior to completing the assessment. Navigate to the Academic Tools area of this Module and select Library then Required Readings to access your texts and videos.Task 1 - Developing SQL Statements to Query Existing DataOnce the Northwind database is successfully deployed, generate SQL statements to address the problems below. Use the following database design diagram as a guide in forming your statements:Northwind Database Design DiagramYour assessment report needs to show both the generated SQL statements and confirmatory screenshots verifying task completion.Problem 1: Display the product records with unit prices equal to or greater than $100.Expected OutputProblem 2: Present the unit value minimum, maximum, average, and standard deviation for current and discontinued products. Group the results based on the “Discontinued” attribute.Expected OutputProblem 3: List suppliers with names starting with “G” in alphabetical order.Expected OutputProblem 4: Display the full names of all Employees in FirstName, “ ” , LastName format.Expected OutputProblem 5: Display all of the supplier names and HomePage values where the HomePage value is null. Present the results in alphabetical order by supplier name.Expected OutputProblem 6: Get the number of Northwind customers in each country that has five or more customers. Present the results in alphabetical order by country name.Expected OutputProblem 7: Get the total product costs (i.e., multiplying the unit price by quantity) for ProductID = 20 along with the associated orders IDs from the OrderDetails table. Provide the results in ascending order based on the order ID.Expected OutputProblem 8: Select all of the cities where there are employees with no duplicates values displayed. Show the cities in alphabetical order.Expected OutputProblem 9: List first and last names for employees who live in London, Seattle, or Redmond. Show the employee’s city in the output.Expected OutputProblem 10: Display all product IDs and names for out-of-stock products having a unit price in the range of $20 to $25. Show the units-in-stock value in the results.Expected OutputTask 2 - Modifying Database DataYou will use the Northwind database for this task. Leverage the following database design diagram as a guide in forming your DML statements for the problems specified below:Northwind Database Design DiagramYour assessment report needs to show both the generated SQL statements and confirmatory screenshots verifying task completion.Problem 1: Use an SQL INSERT statement to populate the Categories table with a new category called “Fresh Produce” and a description of “Fresh Fruits and Vegetables.” There is no picture for this record insert. Remember, the CategoryID field auto populates so you do not include this in your insert statement. After you have added the category, select all records in the Categories table to see if the record was added.Expected OutputProblem 2: Use the SQL INSERT command to add a new region to handle customers in the Midwest. In this case, the RegionID field does not auto populate so you should first find how many regions are in the table before adding the new region and RegionID. Use a query after completing this to verify that the new region has been added.Expected OutputProblem 3: Northwind has decided to change the employee title that is now called “Sales Representative” to “Sales Specialist.” Use the SQL UPDATE statement to reflect the change in the Employees table. After you have updated the Employees table, select all records in the Employees table to see if the update was performed correctly.Expected OutputProblem 4: The Sales department has realigned and before they implement the new “Midwest” region you added, they noted that it really should be called the “Southeast” region. Change the “Midwest” region name to “Southeast” and show the regions again to confirm this change.Expected OutputProblem 5: An order needs to be deleted. The order number is 11071. However, before you can delete the order, you must delete the order details. Delete all records in the OrderDetails table that references order number 11071. Then execute a query against the OrderDetails table to show that the records associated with order number 11071 have been removed.Expected OutputProblem 6: Delete order number 11071 from the Orders table. Then execute a query against the Orders table to show that the record was removed.Expected OutputProblem 7: An employee named Margaret Peacock just received a 5% raise from Northwind. Update Ms. Peacock’s employee record to reflect this change. In order to do this, her current salary needs to be multiplied by 1.05 in the update statement.Expected OutputProblem 8: A new supplier needs to be added to the Northwind database. Generate an SQL statement to insert the following details:Company Name: Acme EnterprisesContact Name: Wylie CoyoteContact Title: Executive ManagerAddress: 123 Main StreetCity: Las VegasRegion: NVPostal Code: 89108Country: USAPhone: (702) 555-9876Note: You do not need to provide a SupplierID for this record.Expected OutputProblem 9: A customer just purchased 40 units of a product called “Boston Crab Meat” from Northwind. Reduce the current UnitsInStock value in the Products table by 40 for this product.Expected OutputProblem 10: A final call has come in from the Sales Department. After presenting the new regional alignment to the board, the board has rejected this part of the reorganization plan. Please DELETE that new region that was added earlier in Problem 2 and then changed in Problem 4 of this assessment task.Expected Output
Southern New Hampshire Software Security and Certificate Authorities Paper
Prompt
Why would you want to use a CA for security?
What are the advantages of using a CA?
Ideally, you would have a third ...
Southern New Hampshire Software Security and Certificate Authorities Paper
Prompt
Why would you want to use a CA for security?
What are the advantages of using a CA?
Ideally, you would have a third-party vendor CA generate certificates for you, which requires costs for the domain. In this case, the cost of having a third-party vendor CA generate certificates may not be affordable or necessary. In this assignment, you will generate self-signed certificates, which makes you the CA. Acting as the CA and generating certificates using free tools is common practice when you are developing.
Certificate Generation: Use the Java KeyTool to generate a self-signed certificate. There is no additional installation needed if you have Java installed on your computer or through Eclipse, but you need to locate your Java home location to find the keytool.exe. Please note: You will generate certificates in Project Two and use the Java KeyTool through Eclipse.
Begin by accessing the keystore by copying the command below. You must copy this text exactly and paste it into the Command Line. Be sure to revise the text where the word password appears with a unique and secure password. This will be your password for the entire exercise. You may refer to the Oracle Guidelines on the Key and Certificate Management Tool for additional guidance.
keytool.exe -genkey -keyalg RSA -alias selfsigned -keypass password -keystore keystore.jks -storepass password -validity 360 -keysize 2048
A command line screen with the following command entered: keytool.exe -genkey - keyalg RSA -alias selfsigned -keypass changeme -keystore keystore.jks - storepass changeme -validity 360 -keysize 2048.
A series of questions with responses which are used to generate a 2,048-bit RSA key pair and self-signed certificate follow.
Enter a secure password for the keystore (shown as password). You must copy this text exactly and paste it into the Command Line. Be sure to revise the text where the word password appears with a unique and secure password. This password will be used again shortly.
keytool.exe -export -alias selfsigned -storepass password -file server.cer -keystore keystore.jks
A command line screen with the following command entered: keytool.exe -export -alias selfsigned -storepass changeme -file server.cer -keystore keystore.jks The returned line states, 'Certificate stored in file <server.cer data-verified='">
Use a command to print out the CER file using Command Line.
keytool.exe -printcert -file server.cer
To demonstrate that the certificate was effectively generated, submit a screenshot of the print out of the certificate information found in the server.cer file created in the previous step. An example is shown below:
A command line screen with the following command entered: keytool.exe -printcert -file server.cer
This command prints the server.cer file. The details of the CER file which was printed include Owner, Issuer, Serial number, Dates valid, Certificate fingerprints, Signature algorithm name, Subject public key algorithm, Version number, and Extensions.
Answer a series of questions with unique answers. You may use fictional information to fill in answers to the questions. You should submit a screenshot with the questions and answers to show that you have entered all the necessary field information as shown above.
Lastly, you will be prompted to enter the same password as before for the accessing keystore to export the certificate to a CER file.
keytool.exe -export -alias selfsigned -storepass changeme -file server.cer -keystore keystore.jks
5 pages
The Circle Analysis
Dave Eggers utilizes several forms of symbolism, motifs and allegory in his book The Circle. Transparent Shark is a metaph ...
The Circle Analysis
Dave Eggers utilizes several forms of symbolism, motifs and allegory in his book The Circle. Transparent Shark is a metaphor he uses in the book to ...
Campbellsville University IT Project and ERP System Questions
Based on week 13 reading assignment, describe an IT or similar business project you have done or are currently doing. In y ...
Campbellsville University IT Project and ERP System Questions
Based on week 13 reading assignment, describe an IT or similar business project you have done or are currently doing. In your discussion, provide information on the following:1. What is that project? Provide complete description. 2. What was the scope, deliverable, and results of the project?3. What constraints did you experience and how did you handle them?4. If you had to do the same project again, what changes will you recommend?
9 pages
Annotated Bibliography Cybersecurity
Council of Europe (2013) ‘Capacity building on cybercrime’, discussion paper. Data This article discusses capacity bui ...
Annotated Bibliography Cybersecurity
Council of Europe (2013) ‘Capacity building on cybercrime’, discussion paper. Data This article discusses capacity building as a measure against ...
Similar Content
OCC Workplace Allows Workers to Utilize Personal Devices Discussion
This week’s discussion will center on Policy, Legal, Ethics, and Compliance. Be sure to do some online research before p...
Explain the following structure chart?? IT
...
What is the chief difficulty in providing universal service?, computer science homework help
Short essay questions.
Each answer should be two to three paragraphs and be properly cited
(APA).
What is t...
Bellevue University Week 5 Contemporary Project Management Practices Paper
Using the selected RFP or Desktop Lab Project from week 5, develop a risk matrix.Answer the following question:Write a syn...
Schiller International University Week 7 Strategic IT Planning
Strategic IT Planning is required to ensure your resources and assets continue providing the results and the ...
Database Systems, computer science homework help
Database SystemsPlease see the file Complete Problems: #6 through #16...
Cyber Security Question
Meaning Of Information Ownership and How to Classify, Handle, And Label. Information ownership is the right to use and exp...
It Project For A Large Company
Specific and Detailed Requirements and how they are Addressed............................................ 3 What VerdeNet ...
Project Management
Coolman, A. (2018). Don’t Forget These 10 Project Management Best Practices (Infographic). Wrike.com. ......
Related Tags
Book Guides
Sounds Like Titanic
by Jessica Chiccehito Hindman
American Gods
by Neil Gaiman
Slaughterhouse Five
by Kurt Vonnegut
The Handmaids Tale
by Margaret Atwood
Death on the Nile
by Agatha Christie
The Sun Is Also a Star
by Nicola Yoon
The Mayor of Casterbridge
by Thomas Hardy
The Turn of the Screw
by Henry James
The Curious Case of the Dog in the Night Time
by Mark Haddon
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
5 pages
Final Project Sections Iii And Iv.edited
Key Consideration for Internet Service Provider (ISP) in Austin Headquarters Availability: The internet service provider s ...
Final Project Sections Iii And Iv.edited
Key Consideration for Internet Service Provider (ISP) in Austin Headquarters Availability: The internet service provider should be reliable, with ...
Purdue University Global Data Science and Virtual Operating System Concepts
Part 1Referring back to your Reading and any other resources you have found, write a 2-page descriptive paper that address ...
Purdue University Global Data Science and Virtual Operating System Concepts
Part 1Referring back to your Reading and any other resources you have found, write a 2-page descriptive paper that addresses the following:What is the cloud?What are at least three potential benefits of the cloud?How can virtual environments reduce the need for new hardware?Would virtualization technology be beneficial to start with versus cloud resources? Why or why not?How would you respond to your manager from the scenario above?Make sure your paper covers the following topics:Infrastructure-as-a-Service (IaaS)Platform-as-a-Service (PaaS)Software-as-a-Service (SaaS)Virtualization technologiesBe sure to also include the following within your submission:Screenshots demonstrating experience installing and configuring a virtual environment. Part 2Explore Data Manipulation Language (DML) statements to manage data within schema objects.In business, things change, and data in an organization’s database must be modified to reflect those changes. In this module assessment, you will insert new data into the Northwind database, and you will then update a table in the database.You are also asked to develop SQL DML statements to retrieve data addressing several business inquiries. You must use the Northwind database for this assessment.Assessment InstructionsYou will need to install and use Microsoft SQL Server Express and Microsoft SQL Server Management Studio (SSMS) for this Assessment. You can download the latest versions of these free software products here:Microsoft SQL Server ExpressMicrosoft SSMSThe module assessment consists of two tasks, and you will generate a Microsoft Word report from the completed work. You will use the Northwind database for both tasks. Deploy the Northwind database into your Microsoft SQL Server instance by executing the following script in a Microsoft SQL Server Management Studio (SSMS) query window:Northwind Database Deployment ScriptIt is very important that you watch the module videos associated with DML prior to completing the assessment. Navigate to the Academic Tools area of this Module and select Library then Required Readings to access your texts and videos.Task 1 - Developing SQL Statements to Query Existing DataOnce the Northwind database is successfully deployed, generate SQL statements to address the problems below. Use the following database design diagram as a guide in forming your statements:Northwind Database Design DiagramYour assessment report needs to show both the generated SQL statements and confirmatory screenshots verifying task completion.Problem 1: Display the product records with unit prices equal to or greater than $100.Expected OutputProblem 2: Present the unit value minimum, maximum, average, and standard deviation for current and discontinued products. Group the results based on the “Discontinued” attribute.Expected OutputProblem 3: List suppliers with names starting with “G” in alphabetical order.Expected OutputProblem 4: Display the full names of all Employees in FirstName, “ ” , LastName format.Expected OutputProblem 5: Display all of the supplier names and HomePage values where the HomePage value is null. Present the results in alphabetical order by supplier name.Expected OutputProblem 6: Get the number of Northwind customers in each country that has five or more customers. Present the results in alphabetical order by country name.Expected OutputProblem 7: Get the total product costs (i.e., multiplying the unit price by quantity) for ProductID = 20 along with the associated orders IDs from the OrderDetails table. Provide the results in ascending order based on the order ID.Expected OutputProblem 8: Select all of the cities where there are employees with no duplicates values displayed. Show the cities in alphabetical order.Expected OutputProblem 9: List first and last names for employees who live in London, Seattle, or Redmond. Show the employee’s city in the output.Expected OutputProblem 10: Display all product IDs and names for out-of-stock products having a unit price in the range of $20 to $25. Show the units-in-stock value in the results.Expected OutputTask 2 - Modifying Database DataYou will use the Northwind database for this task. Leverage the following database design diagram as a guide in forming your DML statements for the problems specified below:Northwind Database Design DiagramYour assessment report needs to show both the generated SQL statements and confirmatory screenshots verifying task completion.Problem 1: Use an SQL INSERT statement to populate the Categories table with a new category called “Fresh Produce” and a description of “Fresh Fruits and Vegetables.” There is no picture for this record insert. Remember, the CategoryID field auto populates so you do not include this in your insert statement. After you have added the category, select all records in the Categories table to see if the record was added.Expected OutputProblem 2: Use the SQL INSERT command to add a new region to handle customers in the Midwest. In this case, the RegionID field does not auto populate so you should first find how many regions are in the table before adding the new region and RegionID. Use a query after completing this to verify that the new region has been added.Expected OutputProblem 3: Northwind has decided to change the employee title that is now called “Sales Representative” to “Sales Specialist.” Use the SQL UPDATE statement to reflect the change in the Employees table. After you have updated the Employees table, select all records in the Employees table to see if the update was performed correctly.Expected OutputProblem 4: The Sales department has realigned and before they implement the new “Midwest” region you added, they noted that it really should be called the “Southeast” region. Change the “Midwest” region name to “Southeast” and show the regions again to confirm this change.Expected OutputProblem 5: An order needs to be deleted. The order number is 11071. However, before you can delete the order, you must delete the order details. Delete all records in the OrderDetails table that references order number 11071. Then execute a query against the OrderDetails table to show that the records associated with order number 11071 have been removed.Expected OutputProblem 6: Delete order number 11071 from the Orders table. Then execute a query against the Orders table to show that the record was removed.Expected OutputProblem 7: An employee named Margaret Peacock just received a 5% raise from Northwind. Update Ms. Peacock’s employee record to reflect this change. In order to do this, her current salary needs to be multiplied by 1.05 in the update statement.Expected OutputProblem 8: A new supplier needs to be added to the Northwind database. Generate an SQL statement to insert the following details:Company Name: Acme EnterprisesContact Name: Wylie CoyoteContact Title: Executive ManagerAddress: 123 Main StreetCity: Las VegasRegion: NVPostal Code: 89108Country: USAPhone: (702) 555-9876Note: You do not need to provide a SupplierID for this record.Expected OutputProblem 9: A customer just purchased 40 units of a product called “Boston Crab Meat” from Northwind. Reduce the current UnitsInStock value in the Products table by 40 for this product.Expected OutputProblem 10: A final call has come in from the Sales Department. After presenting the new regional alignment to the board, the board has rejected this part of the reorganization plan. Please DELETE that new region that was added earlier in Problem 2 and then changed in Problem 4 of this assessment task.Expected Output
Southern New Hampshire Software Security and Certificate Authorities Paper
Prompt
Why would you want to use a CA for security?
What are the advantages of using a CA?
Ideally, you would have a third ...
Southern New Hampshire Software Security and Certificate Authorities Paper
Prompt
Why would you want to use a CA for security?
What are the advantages of using a CA?
Ideally, you would have a third-party vendor CA generate certificates for you, which requires costs for the domain. In this case, the cost of having a third-party vendor CA generate certificates may not be affordable or necessary. In this assignment, you will generate self-signed certificates, which makes you the CA. Acting as the CA and generating certificates using free tools is common practice when you are developing.
Certificate Generation: Use the Java KeyTool to generate a self-signed certificate. There is no additional installation needed if you have Java installed on your computer or through Eclipse, but you need to locate your Java home location to find the keytool.exe. Please note: You will generate certificates in Project Two and use the Java KeyTool through Eclipse.
Begin by accessing the keystore by copying the command below. You must copy this text exactly and paste it into the Command Line. Be sure to revise the text where the word password appears with a unique and secure password. This will be your password for the entire exercise. You may refer to the Oracle Guidelines on the Key and Certificate Management Tool for additional guidance.
keytool.exe -genkey -keyalg RSA -alias selfsigned -keypass password -keystore keystore.jks -storepass password -validity 360 -keysize 2048
A command line screen with the following command entered: keytool.exe -genkey - keyalg RSA -alias selfsigned -keypass changeme -keystore keystore.jks - storepass changeme -validity 360 -keysize 2048.
A series of questions with responses which are used to generate a 2,048-bit RSA key pair and self-signed certificate follow.
Enter a secure password for the keystore (shown as password). You must copy this text exactly and paste it into the Command Line. Be sure to revise the text where the word password appears with a unique and secure password. This password will be used again shortly.
keytool.exe -export -alias selfsigned -storepass password -file server.cer -keystore keystore.jks
A command line screen with the following command entered: keytool.exe -export -alias selfsigned -storepass changeme -file server.cer -keystore keystore.jks The returned line states, 'Certificate stored in file <server.cer data-verified='">
Use a command to print out the CER file using Command Line.
keytool.exe -printcert -file server.cer
To demonstrate that the certificate was effectively generated, submit a screenshot of the print out of the certificate information found in the server.cer file created in the previous step. An example is shown below:
A command line screen with the following command entered: keytool.exe -printcert -file server.cer
This command prints the server.cer file. The details of the CER file which was printed include Owner, Issuer, Serial number, Dates valid, Certificate fingerprints, Signature algorithm name, Subject public key algorithm, Version number, and Extensions.
Answer a series of questions with unique answers. You may use fictional information to fill in answers to the questions. You should submit a screenshot with the questions and answers to show that you have entered all the necessary field information as shown above.
Lastly, you will be prompted to enter the same password as before for the accessing keystore to export the certificate to a CER file.
keytool.exe -export -alias selfsigned -storepass changeme -file server.cer -keystore keystore.jks
5 pages
The Circle Analysis
Dave Eggers utilizes several forms of symbolism, motifs and allegory in his book The Circle. Transparent Shark is a metaph ...
The Circle Analysis
Dave Eggers utilizes several forms of symbolism, motifs and allegory in his book The Circle. Transparent Shark is a metaphor he uses in the book to ...
Campbellsville University IT Project and ERP System Questions
Based on week 13 reading assignment, describe an IT or similar business project you have done or are currently doing. In y ...
Campbellsville University IT Project and ERP System Questions
Based on week 13 reading assignment, describe an IT or similar business project you have done or are currently doing. In your discussion, provide information on the following:1. What is that project? Provide complete description. 2. What was the scope, deliverable, and results of the project?3. What constraints did you experience and how did you handle them?4. If you had to do the same project again, what changes will you recommend?
9 pages
Annotated Bibliography Cybersecurity
Council of Europe (2013) ‘Capacity building on cybercrime’, discussion paper. Data This article discusses capacity bui ...
Annotated Bibliography Cybersecurity
Council of Europe (2013) ‘Capacity building on cybercrime’, discussion paper. Data This article discusses capacity building as a measure against ...
Earn money selling
your Study Documents