Description
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Now done with the work....
Completion Status:
100%
Review
Review
Anonymous
I was stuck on this subject and a friend recommended Studypool. I'm so glad I checked it out!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Week 8 Existing Report Functional Dependencies and Sample Data Questions
I don’t know how to handle this Databases question and need guidance.InstructionsRead Connolly/Begg text:Chapter 19 - Me ...
Week 8 Existing Report Functional Dependencies and Sample Data Questions
I don’t know how to handle this Databases question and need guidance.InstructionsRead Connolly/Begg text:Chapter 19 - Methodology - Monitoring and Tuning the Operational System section 19.2Chapter 20 - Security and AdministrationReview MS Office 365 Access 2016 text:AssignmentHINT: Review the Normalization Process: Parts and Suppliers One-to-Many Example in the Terms and Concepts Discussion.Term Project - week 8 - (17%):You were just hired to create a database to track blood draws at a lab.Discussions with the representatives decided on two entities, Blood Draws and Patients; the following key points were agreed:1) Each blood draw is assigned a unique DrawNum2) Each Patient has a unique PatID3) Each blood draw is taken from one patient, each patient may have more than one blood draw.4) No fields beyond those in the report / spreadsheet are neededDrawNum is a unique number assigned to each blood draw, Date is the date of the blood draw, Nvials is the number vials drawn, PatID is the patient ID – it is unique for each patient, fName is the patient’s first name, lName is the patient’s last name, DOB is the patient’s date of birthThe objective of this exercise is to demonstrate an understanding of basic concepts covered in the course. The exercise is a straightforward application of those concepts – there are no “hidden” complexities – should you identify something in the key points or data that adds complexity, contact the instructor before submission – you may be over thinking the exercise.The sample data may not represent all possible values – consider each field’s domain during the assessment and design.The goal is to replace the following report / spreadsheet with a relational database. The submission will consist of a word compatible document to record the design process, and an Access DB.(A matching Excel spreadsheet is attached. This is provided to reduce typos - do not assume the spreadsheet is a table in the final design.)Here is the un-normalized (UNF) relational schema (table) notation for the above report:BloodDraws (DrawNum, Date, Nvials, PatID, fName, lName, DOB)The functional dependencies are:DrawNum - - > Date, Nvials, PatID, fName, lName, DOBPatID - - > fName, lName, DOBThe specific tasks to perform are listed below, the percentage corresponds to the grade weight for each task: Organize your document to match the tasks.Name your document Last Name_TermProject (i.e. Smith_TermProject). When you are asked to provide an explanation or description, you mustinclude sufficient content to demonstrate that you understand the definition, term, concept, etc. and how it applies to this exercise.SUGGESTION: Review the Terms and Concepts Forum, especially the Normalization One-To-Many example. There is also a normalization MP4 file that can be downloaded from the Resources section.Follow the below outline in your submission – include Task numbers and questions with your answers.1) Review the existing report, functional dependencies, and sample data (consider field domains and common knowledge) then document any assumptions you feel are appropriate (beyond those in the key points) and identify the initial entities. (10%)2 Explain functional dependency and describe each row of the functional dependencies provided above (use field names and values). (15%)(you do not need to describe full, partial or transitive dependency in this task)3) Based on multiplicity – in plain English explain the relationship between the Entities provided in the above description – (either one-to-many, or many-to-many). (15%)4) Design: all tables and fields must be specified at each normal form levela) First Normal Forum (1NF) assessment / action 10%- Copy the 1NF definition from the text (include quotes and page number)- Assess the UNF table provided and if necessary, make the changes needed to conform to the 1NF definition. Explain any action taken and why (use field names and values).- Specify all 1NF table(s) using relational schema notation or spreadsheet format (see - the above example or page 111 Figure 4.2.6 of the text). Ensure primary keys are identified.b) Second Normal Form (2NF) assessment / action 10%- Copy the 2NF definition from the text (include quotes and page number)- Assess the 1NF table(s) in the previous section and if necessary, make the changes needed to conform to the 2NF definition. Explain any action taken and why (use field names and values).- Specify all 2NF table(s) using relational schema notation or spreadsheet format. Ensure primary keys are identified.c) Third Normal Form (3NF) assessment / action 10%- Copy the 3NF definition from the text (include quotes and page number)- Assess the 2NF table(s) in the previous section and if necessary, make the changes needed to conform to the 3NF definition. Explain any action taken and why (use field names and values).- Specify all 3NF table(s) using relational schema notation or spreadsheet format. Ensure primary keys are identified.5) Using the 3NF tables in your design, create a new MS Access database, load the sample data provided, and ensure any table relationships are established.Name your database Last Name_TermProject (i.e. Smith_TermProject). (5%).6) Create a Query, for the following request: List each Patient and their blood draws; include the following fields (in the order provided) PatID, fName, lName, DrawNum, date, and Nvials, sort Ascending by lName. Name the Query BloodDraws. (5%)7) Create a Form: to enter a New Patient, only enter Patient related fields – do not include fields associated with a blood draw in the Form, name the form NewPatient. (5%)8) Create a Report: List all Blood Draws (5%)Upload the database to the assignment area as one of the deliverables9) Submission content organization, clarity, spelling and grammar (10%)Requirements: instructions above
Campbellsville University Enterprise Risk Management Strategy Paper
Research Paper: ERM StrategyThe reading this week discusses strategy and how ERM can be integrated with an organization’ ...
Campbellsville University Enterprise Risk Management Strategy Paper
Research Paper: ERM StrategyThe reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.Your paper should meet these requirements: Be approximately four to six pages in length, not including the required cover page and reference page.Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
ITS 836 UC Wk 2 Benefits and Challenges of Data Gathering Research Paper
As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data ...
ITS 836 UC Wk 2 Benefits and Challenges of Data Gathering Research Paper
As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.Data GatheringStorage and IntegrationData AnalysisKnowledge Discovery and Information InterpretationPlease make your initial post and two response posts substantive. A substantive post will do at least two of the following:Ask an interesting, thoughtful question pertaining to the topicAnswer a question (in detail) posted by another student or the instructorProvide extensive additional information on the topicExplain, define, or analyze the topic in detailShare an applicable personal experienceProvide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)Make an argument concerning the topic.At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.------------------------------------------------------------------AND------------------------------------------------------------------------------------------This week's article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry. Search the UC Library and/or Google Scholar for a "Fortune 1000" company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence. Your paper should meet the following requirements:Be approximately four to eight pages in length, not including the required cover page and reference page.Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
ISSC 411 American Military Week 8 Twitter as A Social Media Site and Threats Paper
Note : Need Original PaperAssignment InstructionsInstructions:You are hired to conduct a vulnerability, threat, and securi ...
ISSC 411 American Military Week 8 Twitter as A Social Media Site and Threats Paper
Note : Need Original PaperAssignment InstructionsInstructions:You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.Pick a site that hosts a social networking functionality other than Facebook. Do not choose Facebook.State the site homepage link, and a short description of the site.Create a clear description of the ideal visitor to this site by considering the details of these demographic elements:Age rangerelationship statusgeographical locationemployment statustype of employmentincome rangehobbiesshopping habitssurfing habitsGenderConduct a vulnerability assessment of the site by observation only then answer these questions:What are some apparent vulnerabilities?What threats are possible on this site?What attacks are possible?What would be exposed in case there were to be an attack?Write an 8-page paper introducing the site, and your findings from the above exercise, and finalizing by giving a clear recommendation for the organization that owns and/or hosts the site?Submission Instructions: Be sure your paper ALL of the above requirements, and the following formatting requirements:8 pages (double-spaced), excluding the title page, the abstract page (if included), and the references pages.Use at least 3 references outside of your textbook (you may use your textbook too, but are not required to).In addition to the required number of pages for the assignment, you must also Include title page, a reference page (bibliography), written in APA style, and a title page.Use APA Style formatting in Arial 11 or 12-point font or Times New Roman styles.Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situationsYour paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 15% of the paper, and use quotations sparingly!This assignment has the embedded TurnItIn feature turned on. When you submit the paper, an originality report will be generated. The report must comply with the acceptable originality criteria displayed in the announcements on Academic Honesty in Week 1 of the course.
University of the Cumberlands Security Architecture & Design Discussion
- If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent ...
University of the Cumberlands Security Architecture & Design Discussion
- If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?
- Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves? --------- Attached figure
4 pages
Network Infrastructure Design Converted
I have designed a network infrastructure for the Kamehameha Institute located in Each of the sites have three floors and e ...
Network Infrastructure Design Converted
I have designed a network infrastructure for the Kamehameha Institute located in Each of the sites have three floors and each floor is categorised for ...
Similar Content
Paper
The Human-Computer InterfaceWrite a four to five (4-5) page paper in which you:
Explain haptic feedback, describe its key ...
Assignment
In a double spaced, 10-point Times New Roman Font with 1-inch Margins. You are to write an APA formatted paper answering t...
Virtualization Software Discussion and Replies
Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or c...
University of the Cumberlands Privacy Concerns due to Data Mining Paper
Your response should be 250-300 words for each discussion.Discussion 1: Why are the original/raw data not readily usable b...
NCSNSMT Building the Database Paper
Non-Exam based Assessment (Simulation Performance Project)
Program
Computer and Information Science Division (CIS)
Cours...
PJM 6640 Boston University Week 1 Computer Science Leadership Skills Question
Overview and RationaleThis assignment is intended to increase the understanding of leadership in the BA world and how your...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Week 8 Existing Report Functional Dependencies and Sample Data Questions
I don’t know how to handle this Databases question and need guidance.InstructionsRead Connolly/Begg text:Chapter 19 - Me ...
Week 8 Existing Report Functional Dependencies and Sample Data Questions
I don’t know how to handle this Databases question and need guidance.InstructionsRead Connolly/Begg text:Chapter 19 - Methodology - Monitoring and Tuning the Operational System section 19.2Chapter 20 - Security and AdministrationReview MS Office 365 Access 2016 text:AssignmentHINT: Review the Normalization Process: Parts and Suppliers One-to-Many Example in the Terms and Concepts Discussion.Term Project - week 8 - (17%):You were just hired to create a database to track blood draws at a lab.Discussions with the representatives decided on two entities, Blood Draws and Patients; the following key points were agreed:1) Each blood draw is assigned a unique DrawNum2) Each Patient has a unique PatID3) Each blood draw is taken from one patient, each patient may have more than one blood draw.4) No fields beyond those in the report / spreadsheet are neededDrawNum is a unique number assigned to each blood draw, Date is the date of the blood draw, Nvials is the number vials drawn, PatID is the patient ID – it is unique for each patient, fName is the patient’s first name, lName is the patient’s last name, DOB is the patient’s date of birthThe objective of this exercise is to demonstrate an understanding of basic concepts covered in the course. The exercise is a straightforward application of those concepts – there are no “hidden” complexities – should you identify something in the key points or data that adds complexity, contact the instructor before submission – you may be over thinking the exercise.The sample data may not represent all possible values – consider each field’s domain during the assessment and design.The goal is to replace the following report / spreadsheet with a relational database. The submission will consist of a word compatible document to record the design process, and an Access DB.(A matching Excel spreadsheet is attached. This is provided to reduce typos - do not assume the spreadsheet is a table in the final design.)Here is the un-normalized (UNF) relational schema (table) notation for the above report:BloodDraws (DrawNum, Date, Nvials, PatID, fName, lName, DOB)The functional dependencies are:DrawNum - - > Date, Nvials, PatID, fName, lName, DOBPatID - - > fName, lName, DOBThe specific tasks to perform are listed below, the percentage corresponds to the grade weight for each task: Organize your document to match the tasks.Name your document Last Name_TermProject (i.e. Smith_TermProject). When you are asked to provide an explanation or description, you mustinclude sufficient content to demonstrate that you understand the definition, term, concept, etc. and how it applies to this exercise.SUGGESTION: Review the Terms and Concepts Forum, especially the Normalization One-To-Many example. There is also a normalization MP4 file that can be downloaded from the Resources section.Follow the below outline in your submission – include Task numbers and questions with your answers.1) Review the existing report, functional dependencies, and sample data (consider field domains and common knowledge) then document any assumptions you feel are appropriate (beyond those in the key points) and identify the initial entities. (10%)2 Explain functional dependency and describe each row of the functional dependencies provided above (use field names and values). (15%)(you do not need to describe full, partial or transitive dependency in this task)3) Based on multiplicity – in plain English explain the relationship between the Entities provided in the above description – (either one-to-many, or many-to-many). (15%)4) Design: all tables and fields must be specified at each normal form levela) First Normal Forum (1NF) assessment / action 10%- Copy the 1NF definition from the text (include quotes and page number)- Assess the UNF table provided and if necessary, make the changes needed to conform to the 1NF definition. Explain any action taken and why (use field names and values).- Specify all 1NF table(s) using relational schema notation or spreadsheet format (see - the above example or page 111 Figure 4.2.6 of the text). Ensure primary keys are identified.b) Second Normal Form (2NF) assessment / action 10%- Copy the 2NF definition from the text (include quotes and page number)- Assess the 1NF table(s) in the previous section and if necessary, make the changes needed to conform to the 2NF definition. Explain any action taken and why (use field names and values).- Specify all 2NF table(s) using relational schema notation or spreadsheet format. Ensure primary keys are identified.c) Third Normal Form (3NF) assessment / action 10%- Copy the 3NF definition from the text (include quotes and page number)- Assess the 2NF table(s) in the previous section and if necessary, make the changes needed to conform to the 3NF definition. Explain any action taken and why (use field names and values).- Specify all 3NF table(s) using relational schema notation or spreadsheet format. Ensure primary keys are identified.5) Using the 3NF tables in your design, create a new MS Access database, load the sample data provided, and ensure any table relationships are established.Name your database Last Name_TermProject (i.e. Smith_TermProject). (5%).6) Create a Query, for the following request: List each Patient and their blood draws; include the following fields (in the order provided) PatID, fName, lName, DrawNum, date, and Nvials, sort Ascending by lName. Name the Query BloodDraws. (5%)7) Create a Form: to enter a New Patient, only enter Patient related fields – do not include fields associated with a blood draw in the Form, name the form NewPatient. (5%)8) Create a Report: List all Blood Draws (5%)Upload the database to the assignment area as one of the deliverables9) Submission content organization, clarity, spelling and grammar (10%)Requirements: instructions above
Campbellsville University Enterprise Risk Management Strategy Paper
Research Paper: ERM StrategyThe reading this week discusses strategy and how ERM can be integrated with an organization’ ...
Campbellsville University Enterprise Risk Management Strategy Paper
Research Paper: ERM StrategyThe reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.Your paper should meet these requirements: Be approximately four to six pages in length, not including the required cover page and reference page.Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
ITS 836 UC Wk 2 Benefits and Challenges of Data Gathering Research Paper
As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data ...
ITS 836 UC Wk 2 Benefits and Challenges of Data Gathering Research Paper
As outlined within this weeks topic, there are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.Data GatheringStorage and IntegrationData AnalysisKnowledge Discovery and Information InterpretationPlease make your initial post and two response posts substantive. A substantive post will do at least two of the following:Ask an interesting, thoughtful question pertaining to the topicAnswer a question (in detail) posted by another student or the instructorProvide extensive additional information on the topicExplain, define, or analyze the topic in detailShare an applicable personal experienceProvide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)Make an argument concerning the topic.At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.------------------------------------------------------------------AND------------------------------------------------------------------------------------------This week's article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry. Search the UC Library and/or Google Scholar for a "Fortune 1000" company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence. Your paper should meet the following requirements:Be approximately four to eight pages in length, not including the required cover page and reference page.Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
ISSC 411 American Military Week 8 Twitter as A Social Media Site and Threats Paper
Note : Need Original PaperAssignment InstructionsInstructions:You are hired to conduct a vulnerability, threat, and securi ...
ISSC 411 American Military Week 8 Twitter as A Social Media Site and Threats Paper
Note : Need Original PaperAssignment InstructionsInstructions:You are hired to conduct a vulnerability, threat, and security assessment on a web application and submit your clear recommendation for corrective actions based on your assessment.Pick a site that hosts a social networking functionality other than Facebook. Do not choose Facebook.State the site homepage link, and a short description of the site.Create a clear description of the ideal visitor to this site by considering the details of these demographic elements:Age rangerelationship statusgeographical locationemployment statustype of employmentincome rangehobbiesshopping habitssurfing habitsGenderConduct a vulnerability assessment of the site by observation only then answer these questions:What are some apparent vulnerabilities?What threats are possible on this site?What attacks are possible?What would be exposed in case there were to be an attack?Write an 8-page paper introducing the site, and your findings from the above exercise, and finalizing by giving a clear recommendation for the organization that owns and/or hosts the site?Submission Instructions: Be sure your paper ALL of the above requirements, and the following formatting requirements:8 pages (double-spaced), excluding the title page, the abstract page (if included), and the references pages.Use at least 3 references outside of your textbook (you may use your textbook too, but are not required to).In addition to the required number of pages for the assignment, you must also Include title page, a reference page (bibliography), written in APA style, and a title page.Use APA Style formatting in Arial 11 or 12-point font or Times New Roman styles.Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situationsYour paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 15% of the paper, and use quotations sparingly!This assignment has the embedded TurnItIn feature turned on. When you submit the paper, an originality report will be generated. The report must comply with the acceptable originality criteria displayed in the announcements on Academic Honesty in Week 1 of the course.
University of the Cumberlands Security Architecture & Design Discussion
- If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent ...
University of the Cumberlands Security Architecture & Design Discussion
- If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?
- Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves? --------- Attached figure
4 pages
Network Infrastructure Design Converted
I have designed a network infrastructure for the Kamehameha Institute located in Each of the sites have three floors and e ...
Network Infrastructure Design Converted
I have designed a network infrastructure for the Kamehameha Institute located in Each of the sites have three floors and each floor is categorised for ...
Earn money selling
your Study Documents