Description
Lab 4: Structured Query Language (SQL)
Due Week 7 and worth 75 points
Refer to the database design crested in Lab 2: Modifying a Database Design in Visio to complete this Lab.
Perform the following steps in MySQL:
- Create the tables and relationships from the database design discussed in Lab 2.
- Add at least five (5) records into each table (Note: You must determine the field values).
- Create a query with all fields from the student table, where the student's last name is "Smith".
- Create a query that includes students’ first names, last names, and phone numbers.
- Create a query that includes instructors' first names, last names, and courses they teach.
Include the following screen shots in a Microsoft Word document to show the completion of the steps above:
- Screen shot depicting the tables created within MySQL.
- Screen shots depicting the records added into each table.
- Screen shots depicting the SQL code and the query results from each of the queries created.
Your assignment must follow these formatting requirements:
- Submit the lab as a Microsoft Word document.
- Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page is not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
- Prepare database design documents using the data definition, data manipulation, and data control language components of the SQL language
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Goes above and beyond expectations!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
University of the Cumberlands Market segmentation in Hong Kong Discussion
Task1:words:300Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsvi ...
University of the Cumberlands Market segmentation in Hong Kong Discussion
Task1:words:300Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsville University Staff and Faculty. All three committee members must agree to pass this policy. In this situation you are one of the two agreeing to a dress code. What steps might you take to gain the cooperation of the third party after the policy has been initiated.Task2:words:300During the course of your employment you may have experienced working for both a male and female supervisor. Discuss from your personal point of view the advantages/disadvantages and like/dislike of working for each gender. Use real life experiences if applicable.
University of Maryland Baltimore County National Security Strategy and Cybersecurity Paper
Part 1: National Security Strategy and Cybersecurity After reading the National Security Strategy (2017), comment on the f ...
University of Maryland Baltimore County National Security Strategy and Cybersecurity Paper
Part 1: National Security Strategy and Cybersecurity After reading the National Security Strategy (2017), comment on the following.Should
the United States create a separate cybersecurity strategy to be
published alongside the National Security Strategy (NSS), or do you feel
the NSS is sufficient? Why or why not?Consider your answer in the context of the original National Strategy to Secure Cyberspace (2003). What is not adequately addressed in the National Security Strategy (2017) as it relates to cybersecurity? Part 4: Protecting Critical Infrastructure and the Homeland The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.
Digital forensic in Criminal justice
The flow chart included in this week’s reading depicts how a case passes through the criminal justice system. It also sh ...
Digital forensic in Criminal justice
The flow chart included in this week’s reading depicts how a case passes through the criminal justice system. It also shows some case law that affects digital evidence. While of some interest, this chart is not needed for this class.OK. So what is digital forensics? How does it related to the criminal justice system? Why should a non-criminal justice major take this course?By the end of this course (a short 8 weeks) you will have a better understanding of why IT professionals, and other non-criminal justice professionals, need to have a basic understanding of the criminal justice system, particularly if they plan to work in fields such as digital forensics, incident response, or information security.Let’s start with some historical background.In the 1980s, home computers were not yet popular and desktop systems were being developed for business and government. Early digital forensic techniques were used to detect and investigate hacking and computer compromise. In fact, the most common criminal act involving computers was the use of systems and dial-up modems to connect to the Department of Defense's networks to get free long distance. As home computers and desktop computers became more popular, the main communications systems for interconnectivity among computer users was through the use of dial-up commercial systems. Ultimately, this resulted in the development of more advanced commercial networks, such as America Online (AOL). [Does anyone remember “Prodigy”?]As with any mechanism that makes life easier for consumers, those with criminal intent developed a means to exploit those systems for other-than-lawful purposes. Thus, since they could be used for different types of criminal activity, computers became a bigger focus of the criminal justice system. A computer could be:used to commit a crime, such as hacking or transferring private or illegal information (e.g., stolen social security numbers, credit card information, or child pornography);used to store evidence of a crime (e.g., child pornography, a “murder list,” narcotics ledgers, “cooked” accounting books);Or it could be the target of a crime. As a result, techniques had to be developed to allow criminal justice professionals to search through digital data contained on a computer or network to identify and collect evidence. At first, criminal justice professionals used commercial mainstream software to search for and recover data on a hard drive. Norton Disk Edit tools, for example, could be used to search a computer for digital evidence, but it also caused changes to the computer’s data. Eventually, specialized forensic software was developed (e.g., EnCase, FTK, SMART, etc.) to more accurately collect and search digital evidence without damaging or changing its content. Initially, courts did not understand the technology - neither the computers the forensic processes and software developed to examine them. The law was not up-to-date enough to facilitate the investigation and prosecution of technology-based crimes. Further, there were no universal digital forensic standards or established best practices that practitioners could follow and which would have helped circumvent court challenges to digital evidence. But, fortunately, over the last twenty years, new laws have been enacted to account for technology-based crimes. Digital forensic standards have been developed that are used across the discipline, and specialized tools have been developed to help law enforcement meet those standards. So why is this important to each of you, as non-criminal justice professionals? Part of the answer is this: While conducting a forensic analysis of your organization’s computers systems or networks – whether you’re searching for evidence of hacking or employee misconduct, or in response to a request for discovery in a lawsuit, for example – you may come across information that could lead to a criminal prosecution. If you do not follow the same standards used by criminal justice professionals (e.g., making every effort to analyze a bit-by-bit forensic copy instead of the original evidence directly), any evidence you find could be rendered inadmissible in court. However, if you perform your duties as a forensic examiner with criminal justice standards in mind, not only will it increase the utility of the digital evidence in a criminal or civil court, but it should also provide more certainty in your own results.OK, then. Here’s your task for this week’s discussion. Provide at least one example of how being familiar with and following 1) digital forensic best practices AND 2) criminal justice standards would benefit you, even if you worked in a non-criminal justice digital forensics position. Discuss thoroughly.
The Value of a Reference Architecture Framework, assignment help
The Value of a Reference Architecture Framework - Discussion Assignment (Forum Post)Reference architectures are typically ...
The Value of a Reference Architecture Framework, assignment help
The Value of a Reference Architecture Framework - Discussion Assignment (Forum Post)Reference architectures are typically catalogued within a reference architecture framework or “continuum.” This framework captures an increasing level of detail as it goes from the common to the industry-specific, company-wide, and project-specific categories of reference architecture.Regardless of where along this continuum the reference architecture is extracted, the reference architecture will serve as a starting point for the architectural analysis and design of a specific system. A reference architecture framework is beneficial when it comes to selecting an existing reference architecture, or cataloguing a new reference architecture.Search the virtual Library or the web to find a case study showing an enterprise that implemented a reference architecture framework.For this assignment, post a cohesive response that addresses the following:Illustrate the value of a reference architecture framework in the context of your case study.Identify one benefit and one limitation of that reference architecture framework.Propose ways to increase the benefits and reduce the limitations of reference architecture frameworks in a practical situation. Explain your reasoning.
Similar Content
CSIS 294 Grossmont College Java Drone Recon Data Collection Project 2
...
University of the Cumberlands Most Popular Spreadsheet Software for PC Discussion
Need writing for the below question in 350 words in APA format. Please refer to chapter 8 from the attached textbook and o...
Create a Visual Basic, computer science homework help
Create a Visual Basic .NET Application – User Interface Design Diagram (Lesson A Exercise 1, Zak, 2016, p. 70) The ...
Which authentication protocol is the VPN connection using?
...
New England College Network Security Cybercrime Research Paper
The Assignment must be a Word document that is 4-5 pages (double-spaced) on a cybersecurity topic of your choice....
MGMT415 Oklahoma Christian Fifth Discipline Discussion
What are the main themes of The Fifth Discipline? Describe and explain each discipline.How are each of these disciplines r...
Microsoft Office Applications On Demand
Excel, Word, and PowerPoint are the three most sought-after Microsoft office applications. Financial functions are useful ...
Coding
out ...
Part A
The relationship type is 1 to many from Course to Training. As, one course will have one or more trainee, so the relations...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
University of the Cumberlands Market segmentation in Hong Kong Discussion
Task1:words:300Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsvi ...
University of the Cumberlands Market segmentation in Hong Kong Discussion
Task1:words:300Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsville University Staff and Faculty. All three committee members must agree to pass this policy. In this situation you are one of the two agreeing to a dress code. What steps might you take to gain the cooperation of the third party after the policy has been initiated.Task2:words:300During the course of your employment you may have experienced working for both a male and female supervisor. Discuss from your personal point of view the advantages/disadvantages and like/dislike of working for each gender. Use real life experiences if applicable.
University of Maryland Baltimore County National Security Strategy and Cybersecurity Paper
Part 1: National Security Strategy and Cybersecurity After reading the National Security Strategy (2017), comment on the f ...
University of Maryland Baltimore County National Security Strategy and Cybersecurity Paper
Part 1: National Security Strategy and Cybersecurity After reading the National Security Strategy (2017), comment on the following.Should
the United States create a separate cybersecurity strategy to be
published alongside the National Security Strategy (NSS), or do you feel
the NSS is sufficient? Why or why not?Consider your answer in the context of the original National Strategy to Secure Cyberspace (2003). What is not adequately addressed in the National Security Strategy (2017) as it relates to cybersecurity? Part 4: Protecting Critical Infrastructure and the Homeland The Department of Defense (DoD) Cyber Strategy 2018 discusses the protection of critical infrastructure and the homeland.
Digital forensic in Criminal justice
The flow chart included in this week’s reading depicts how a case passes through the criminal justice system. It also sh ...
Digital forensic in Criminal justice
The flow chart included in this week’s reading depicts how a case passes through the criminal justice system. It also shows some case law that affects digital evidence. While of some interest, this chart is not needed for this class.OK. So what is digital forensics? How does it related to the criminal justice system? Why should a non-criminal justice major take this course?By the end of this course (a short 8 weeks) you will have a better understanding of why IT professionals, and other non-criminal justice professionals, need to have a basic understanding of the criminal justice system, particularly if they plan to work in fields such as digital forensics, incident response, or information security.Let’s start with some historical background.In the 1980s, home computers were not yet popular and desktop systems were being developed for business and government. Early digital forensic techniques were used to detect and investigate hacking and computer compromise. In fact, the most common criminal act involving computers was the use of systems and dial-up modems to connect to the Department of Defense's networks to get free long distance. As home computers and desktop computers became more popular, the main communications systems for interconnectivity among computer users was through the use of dial-up commercial systems. Ultimately, this resulted in the development of more advanced commercial networks, such as America Online (AOL). [Does anyone remember “Prodigy”?]As with any mechanism that makes life easier for consumers, those with criminal intent developed a means to exploit those systems for other-than-lawful purposes. Thus, since they could be used for different types of criminal activity, computers became a bigger focus of the criminal justice system. A computer could be:used to commit a crime, such as hacking or transferring private or illegal information (e.g., stolen social security numbers, credit card information, or child pornography);used to store evidence of a crime (e.g., child pornography, a “murder list,” narcotics ledgers, “cooked” accounting books);Or it could be the target of a crime. As a result, techniques had to be developed to allow criminal justice professionals to search through digital data contained on a computer or network to identify and collect evidence. At first, criminal justice professionals used commercial mainstream software to search for and recover data on a hard drive. Norton Disk Edit tools, for example, could be used to search a computer for digital evidence, but it also caused changes to the computer’s data. Eventually, specialized forensic software was developed (e.g., EnCase, FTK, SMART, etc.) to more accurately collect and search digital evidence without damaging or changing its content. Initially, courts did not understand the technology - neither the computers the forensic processes and software developed to examine them. The law was not up-to-date enough to facilitate the investigation and prosecution of technology-based crimes. Further, there were no universal digital forensic standards or established best practices that practitioners could follow and which would have helped circumvent court challenges to digital evidence. But, fortunately, over the last twenty years, new laws have been enacted to account for technology-based crimes. Digital forensic standards have been developed that are used across the discipline, and specialized tools have been developed to help law enforcement meet those standards. So why is this important to each of you, as non-criminal justice professionals? Part of the answer is this: While conducting a forensic analysis of your organization’s computers systems or networks – whether you’re searching for evidence of hacking or employee misconduct, or in response to a request for discovery in a lawsuit, for example – you may come across information that could lead to a criminal prosecution. If you do not follow the same standards used by criminal justice professionals (e.g., making every effort to analyze a bit-by-bit forensic copy instead of the original evidence directly), any evidence you find could be rendered inadmissible in court. However, if you perform your duties as a forensic examiner with criminal justice standards in mind, not only will it increase the utility of the digital evidence in a criminal or civil court, but it should also provide more certainty in your own results.OK, then. Here’s your task for this week’s discussion. Provide at least one example of how being familiar with and following 1) digital forensic best practices AND 2) criminal justice standards would benefit you, even if you worked in a non-criminal justice digital forensics position. Discuss thoroughly.
The Value of a Reference Architecture Framework, assignment help
The Value of a Reference Architecture Framework - Discussion Assignment (Forum Post)Reference architectures are typically ...
The Value of a Reference Architecture Framework, assignment help
The Value of a Reference Architecture Framework - Discussion Assignment (Forum Post)Reference architectures are typically catalogued within a reference architecture framework or “continuum.” This framework captures an increasing level of detail as it goes from the common to the industry-specific, company-wide, and project-specific categories of reference architecture.Regardless of where along this continuum the reference architecture is extracted, the reference architecture will serve as a starting point for the architectural analysis and design of a specific system. A reference architecture framework is beneficial when it comes to selecting an existing reference architecture, or cataloguing a new reference architecture.Search the virtual Library or the web to find a case study showing an enterprise that implemented a reference architecture framework.For this assignment, post a cohesive response that addresses the following:Illustrate the value of a reference architecture framework in the context of your case study.Identify one benefit and one limitation of that reference architecture framework.Propose ways to increase the benefits and reduce the limitations of reference architecture frameworks in a practical situation. Explain your reasoning.
Earn money selling
your Study Documents