Description
- Create a new Microsoft Access database named DryCleaning.
Note that Microsoft Access does not support the use of SQL scripts to create databases. In a Microsoft Word document, type the SQL script that you would use to create the database. - Add a table named Customers. In Microsoft Word, type the SQL script that you would use to create the table. Include the following fields:
- CustomerNumber (AutoNumber, Primary Key, required)
- FirstName (Text(25), required)
- LastName (Text(25), required)
- Phone (Text(12), required)
- Email (Text(100))
- Add a table named Invoice. In Microsoft Word, type the SQL script that you would use to create the table. Include the following fields:
- InvoiceNumber (Number-Long Integer, required, Primary Key)
- CustomerNumber (Foreign Key, Number-Long Integer, Required)
- DateIn (Date/time, required)
- DateOut (Date/time)
- TotalAmount (Currency)
- Add a table named Invoice_Item. In Microsoft Word, type the SQL script that you would use to create the table. Include the following fields:
- ItemNumber (AutoNumber, Primary Key, required)
- InvoiceNumber (Foreign Key,Number-LongInteger, required)
- Item (Text(50), required)
- Quantity (Number-Long integer, required)
- UnitPrice (Currency, required)
- Write INSERT statements to add the data provided to the tables. Click hereto download the data that needs to be added.
paste the SQL statement to meet the following criteria. Put a title above each as stated and save each query with the title name. You will add needed documentation from Part II to this document.
- List the phone and last name of all the customers. Titled this01CustomerPhone-LastName
- List the phone and last name of all the customers with the first name "Nikki." Titled this 02NikkiPhoneLastName
- List the phone, first name, and last name of all the customers having phone numbers with "2" and "3" as the second and third numbers, respectively. Titled this 03PhoneWith?23.
- Determine the maximum and minimum total amount. Save As04AverageTotalAmount.
- Show the first and last names of all the customers who have had an order with total amount greater than $100.00. Use a subquery and present the results first sorted by last names in the ascending order and then by first names in the descending order. Titled this05CustomersTotalAmountGreaterThan100.
- From the Customers table, concatenate each customer's last name and first name by using the comma-space-delimited technique; name the virtual column as "Full Name.” Titled this06CustomerLastFirstNamesConcantenated.
- Use a subquery to show the first and last name of all the customers who have had an order with an item named "Dress Shirt". Present the results first sorted by last name in the ascending order (Titled this07FirstLastNamesDressShirtSortedLastName) and then by first name in the descending order. Titled this08FirstLastNamesDressShirtSortedFirstNameDescending.
- Use a join with a subquery to show the first name, last name, and total amount of all the customers who have had an order with an item named "Dress Shirt". Present the results first sorted by last name in the ascending order (Titled this09FirstLastNamesDressShirtSortedLastNameWithTotal) and then by first name in the descending order. Titled this10FirstLastNamesDressShirtSortedFirstNameDescending
- Calculate the average total amount. Titled this 11AverageTotalAmount.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Awesome! Made my life easier.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
5 pages
Six Sigma And Project Management
Prepare a 2-3 APA formatted paper on Six Sigma using at least three outside references. Discuss your opinions about Six Si ...
Six Sigma And Project Management
Prepare a 2-3 APA formatted paper on Six Sigma using at least three outside references. Discuss your opinions about Six Sigma and how it is affecting ...
American Public University Computer Security & Privacy of Health Data Paper
Research Paper Criteria:
You will be required to write a research paper this semester. Your research paper topic sh ...
American Public University Computer Security & Privacy of Health Data Paper
Research Paper Criteria:
You will be required to write a research paper this semester. Your research paper topic should have been proposed and outlined by the end of Week 2. A draft version of the research paper should have been submitted by the end of Week 5.
The research paper specifications are as follows:
8-10 pages (double-spaced) Times New Roman 12 pt font.
Must have Abstract, Table of Contents, Introduction, Conclusion and section headings
Use at least five references outside of your textbook (you may use your textbook too, but are not required to).
In addition to the required number of pages for the assignment, you must also Include a reference page (bibliography), written in APA style and a title page. Be sure to give all of your papers a descriptive title!
You must submit a rough draft at the end of Week 5. This is to be a complete paper, meeting the page requirements – not a partially completed paper. Points will be deducted for short or incomplete papers. Your rough draft will not be graded by the rubric, but helpful feedback will be provided to indicate where you are falling short. You may correct any deficiencies before resubmitting your final version at the end of Week 7.
Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).
Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly! It is always better to paraphrase than to directly quote.
Northern Virginia Community College PC Hardware Fundamentals Discussion
Introduction to the PCThe computer consists of at least one processing element, a central processing unit (CPU), and some ...
Northern Virginia Community College PC Hardware Fundamentals Discussion
Introduction to the PCThe computer consists of at least one processing element, a central processing unit (CPU), and some form of memory. This allows the processor to carry out mathematical and logic operations. While mechanical analog computer have been around since medieval times and were used extensively during WWII, the advent of the personal computer is still relatively new. To understand where computer technology is going, one must also understand where it has been.Learn more about the history of the computer and types of computers.Visit the Virtual Timeline of Computer History http://www.computerhistory.org/timeline/computers/Read Computer – Types http://www.tutorialspoint.com/computer_fundamentals/computer_types.htmWatch Is a Mac a PC? Play VideoInvestigate hardware components.First, review Computer – Components http://www.tutorialspoint.com/computer_fundamentals/computer_components.htmThen review Computer Hardware http://www.tutorialspoint.com/computer_fundamentals/computer_hardware.htmInput devices -- keyboard, mouse etc.Output devices -- printer, monitor etc.Secondary storage devices -- Hard disk, CD, DVD etc.Internal components -- CPU, motherboard, RAM etc.Watch Power Mac G5: HardwarePlay VideoInvestigate hard drives.Read Chapter 6: Supporting Hard Drives in the ebook CompTIA Hard Drive Technologies and Interface StandardsHow to Select and installTape Drives and Floppy drivesComplete the review questions to check your understanding. If you do not get all questions right, go back to the chapter and review. https://prx-stratford.lirn.net/login?auth=shibboleth&qurl=http://library.books24x7.com/library.asp%3f%5eB%26bookid=51726%26chunkid=903347938%26rowid=875%26refid=ZOSQK Your neighbor has asked you to set up a home computer system. He plans to use the system for Internet searching, correspondence through email and social media, and to play games. Occasionally, he will have to prepare documents or formal letters to send electronically. You will need to analyze the environment for the system and determine the requirements.In order to determine what computer system your neighbor will need, you will need to determine which system and hardware will best meet his needs.Determine which computer hardware you will use and explain why.
CS 340 SNHU Database indexing & Authentication in Austin Animal Center Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One i ...
CS 340 SNHU Database indexing & Authentication in Austin Animal Center Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One into MongoDB. You will then formulate both a single and a compound index that will optimize the queries for the scenario. Recall that you can use the explain function to verify the use of indexes in your queries. Finally, you will be asked to create an admin and a user account in Mongo to address security needs.Note: Be sure to begin working on your milestone early in the week. One natural stopping point would be after the completion of Part I.PromptPart I: Importing and Indexing a Data SetYou have been asked to import a file for the Grazioso Salvare project. In order to do so, you must complete the following steps:In Apporto, open the terminal window to access the Linux shell. Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution.Tip: How to import a CSV file is covered in the mongoimport documentation in the Module Three Resources. The Austin Animal Center (AAC) Outcomes data set has already been uploaded into Apporto in the /usr/local/datasets/ directory. The filename is “aac_shelter_outcomes.csv”.After importing your data set, start up the mongo shell. Create a simple index on the key “breed”. Show an example query that will use this index and verify that the index will be used with the explain function. Take screenshots of your example query.Create a compound index that will improve the performance of queries looking for breeds that have an “outcome_type” of “Transfer”. Show an example query that will use this compound index and confirm the index will be used with the explain function. Take screenshots of your example query.Part II: User AuthenticationTo comply with your client’s security needs, you have been asked to ensure user authentication to the database by setting up both administrator and user accounts. To achieve this, follow the steps below.Create an administrator account in the mongo shell by following steps #2–3 of the MongoDB Manual Enable Access Control tutorial. Then exit the mongo shell.IMPORTANT: Write down the password for the admin account and keep it somewhere safe. You will need to use this account later in the course.Enable user authentication for the database by typing the following commands exactly into the Linux shell in Apporto:sudo /bin/cp /etc/mongod_withauth.conf /etc/mongod.conf
sudo /bin/systemctl restart mongod.service
You can verify that you have enabled user authentication by accessing MongoDB with your new username/password. Type the following command into the Linux shell to start mongo:mongo --port 27017 --authenticationDatabase "admin" -u "admin" -p
This will prompt you to enter your password. Then use the command to show databases to verify that you have set up authentication correctly. If you are not logged in with your admin account, no databases will be viewable.Note: These commands have been customized for the Apporto environment. If you are accessing MongoDB on your own machine, refer to the MongoDB Manual Enable Access Control tutorial.If you accidentally messed up user authentication, or if you forgot your password, you can disable user authentication with this set of commands:sudo /bin/cp /etc/mongod_noauth.conf /etc/mongod.conf
sudo /bin/systemctl restart mongod.service
Create a new user account called “aacuser” for the database AAC in the mongo shell. Refer to steps #6–7 of the MongoDB Manual Enable Access Control tutorial, linked above, to help you with this task. You will need to modify the commands so that the account name is “aacuser”.IMPORTANT: Write down the password for the aacuser account and keep it somewhere safe. You will need to use this account later in the course.Take a screenshot of your login process to MongoDB using the mongo shell. Be sure you can access MongoDB and list the databases using both the admin and aacuser accounts, as this will verify that your accounts are working. You should be able to include the login commands for both accounts in one screenshot, but if you can not, include two screenshots to show both login commands.Guidelines for SubmissionSubmit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.
Gannon University Haptic User Interfaces Annotated Bibliography
As a human-computer interaction researcher, finding relevant literature to support a study is also part of preparing an an ...
Gannon University Haptic User Interfaces Annotated Bibliography
As a human-computer interaction researcher, finding relevant literature to support a study is also part of preparing an analytical research paper. You have to find 25 UNIQUE references for 'Haptic User Interfaces.' These references are to be scholarly papers, not wiki, blog, or Website entries. Do not include textbooks or trade publications either. The use of Google Scholar is STRONGLY recommended.
IMPORTANT: To support your research journey, read the Levy & Ellis (2006) article on how to maximize your research opportunities in Information Systems Research.
5 pages
Alexa S Skill To Order From Starbucks 0728
Amazon’s Alexa can control smart gadgets, stream music, get recipe ideas and even order items from Amazon. There are als ...
Alexa S Skill To Order From Starbucks 0728
Amazon’s Alexa can control smart gadgets, stream music, get recipe ideas and even order items from Amazon. There are also other hardy skills that ...
Similar Content
COP 3530 FIU Data Structures and Efficient Algorithms in Java Program
Assignment #1
COP-3530, Data Structures
Fall 2021
Purpose:
This assignment has 4 problems. The purpose of this assignment ...
week 5 computer discussion
Making the Power of Word Work for You" Please respond to the following:Naomi Bishop, who you met in this week's Strayer St...
BHIS 437 Discussion Post
Initial Discussion Post: Post your 500-600 word response to the assigned discovery questions (DQ) to the Group Discussio...
Monroe College Resource Systems for Wellness Essay
Refer to the sample document under Sample Documents/Templates folder.Please refer the attached document....
TAMY Organization Leadership definition of AI Discussion
What is your definition of AI? Please explain.
What is your opinion of AI, is the technology currently availabl...
Tuskegee University Personal Area Networks Discussion
Using APA 7th edition form, write a paper about personal area networks and how they are limited by the range of Bluetooth...
Sentimental Analysis
Sentiment analysis is one key strategy that brands often use to accomplish their tasks. It has helped businesses to make f...
Computer Architecture
AMAT = Hit timeL1 + (Miss rateL1 x Hit timeL2) + Miss rateL2 x Hit timeL2 + Miss rateL1 x...
20180214163720case Study 2 Disaster Recovery Dr Lessons Learned September 11th 1 1
Name: 20180214163720case Study 2 Disaster Recovery Dr Lessons Learned September 11th 1 1...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
5 pages
Six Sigma And Project Management
Prepare a 2-3 APA formatted paper on Six Sigma using at least three outside references. Discuss your opinions about Six Si ...
Six Sigma And Project Management
Prepare a 2-3 APA formatted paper on Six Sigma using at least three outside references. Discuss your opinions about Six Sigma and how it is affecting ...
American Public University Computer Security & Privacy of Health Data Paper
Research Paper Criteria:
You will be required to write a research paper this semester. Your research paper topic sh ...
American Public University Computer Security & Privacy of Health Data Paper
Research Paper Criteria:
You will be required to write a research paper this semester. Your research paper topic should have been proposed and outlined by the end of Week 2. A draft version of the research paper should have been submitted by the end of Week 5.
The research paper specifications are as follows:
8-10 pages (double-spaced) Times New Roman 12 pt font.
Must have Abstract, Table of Contents, Introduction, Conclusion and section headings
Use at least five references outside of your textbook (you may use your textbook too, but are not required to).
In addition to the required number of pages for the assignment, you must also Include a reference page (bibliography), written in APA style and a title page. Be sure to give all of your papers a descriptive title!
You must submit a rough draft at the end of Week 5. This is to be a complete paper, meeting the page requirements – not a partially completed paper. Points will be deducted for short or incomplete papers. Your rough draft will not be graded by the rubric, but helpful feedback will be provided to indicate where you are falling short. You may correct any deficiencies before resubmitting your final version at the end of Week 7.
Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor).
Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations
Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly! It is always better to paraphrase than to directly quote.
Northern Virginia Community College PC Hardware Fundamentals Discussion
Introduction to the PCThe computer consists of at least one processing element, a central processing unit (CPU), and some ...
Northern Virginia Community College PC Hardware Fundamentals Discussion
Introduction to the PCThe computer consists of at least one processing element, a central processing unit (CPU), and some form of memory. This allows the processor to carry out mathematical and logic operations. While mechanical analog computer have been around since medieval times and were used extensively during WWII, the advent of the personal computer is still relatively new. To understand where computer technology is going, one must also understand where it has been.Learn more about the history of the computer and types of computers.Visit the Virtual Timeline of Computer History http://www.computerhistory.org/timeline/computers/Read Computer – Types http://www.tutorialspoint.com/computer_fundamentals/computer_types.htmWatch Is a Mac a PC? Play VideoInvestigate hardware components.First, review Computer – Components http://www.tutorialspoint.com/computer_fundamentals/computer_components.htmThen review Computer Hardware http://www.tutorialspoint.com/computer_fundamentals/computer_hardware.htmInput devices -- keyboard, mouse etc.Output devices -- printer, monitor etc.Secondary storage devices -- Hard disk, CD, DVD etc.Internal components -- CPU, motherboard, RAM etc.Watch Power Mac G5: HardwarePlay VideoInvestigate hard drives.Read Chapter 6: Supporting Hard Drives in the ebook CompTIA Hard Drive Technologies and Interface StandardsHow to Select and installTape Drives and Floppy drivesComplete the review questions to check your understanding. If you do not get all questions right, go back to the chapter and review. https://prx-stratford.lirn.net/login?auth=shibboleth&qurl=http://library.books24x7.com/library.asp%3f%5eB%26bookid=51726%26chunkid=903347938%26rowid=875%26refid=ZOSQK Your neighbor has asked you to set up a home computer system. He plans to use the system for Internet searching, correspondence through email and social media, and to play games. Occasionally, he will have to prepare documents or formal letters to send electronically. You will need to analyze the environment for the system and determine the requirements.In order to determine what computer system your neighbor will need, you will need to determine which system and hardware will best meet his needs.Determine which computer hardware you will use and explain why.
CS 340 SNHU Database indexing & Authentication in Austin Animal Center Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One i ...
CS 340 SNHU Database indexing & Authentication in Austin Animal Center Worksheet
OverviewIn this milestone you will import the Austin Animal Center (AAC) CSV file that you will be using for Project One into MongoDB. You will then formulate both a single and a compound index that will optimize the queries for the scenario. Recall that you can use the explain function to verify the use of indexes in your queries. Finally, you will be asked to create an admin and a user account in Mongo to address security needs.Note: Be sure to begin working on your milestone early in the week. One natural stopping point would be after the completion of Part I.PromptPart I: Importing and Indexing a Data SetYou have been asked to import a file for the Grazioso Salvare project. In order to do so, you must complete the following steps:In Apporto, open the terminal window to access the Linux shell. Upload the Austin Animal Center (AAC) Outcomes data set into MongoDB by importing a CSV file using the appropriate MongoDB import tool. Use the database name “AAC” and collection name “animals”. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution.Tip: How to import a CSV file is covered in the mongoimport documentation in the Module Three Resources. The Austin Animal Center (AAC) Outcomes data set has already been uploaded into Apporto in the /usr/local/datasets/ directory. The filename is “aac_shelter_outcomes.csv”.After importing your data set, start up the mongo shell. Create a simple index on the key “breed”. Show an example query that will use this index and verify that the index will be used with the explain function. Take screenshots of your example query.Create a compound index that will improve the performance of queries looking for breeds that have an “outcome_type” of “Transfer”. Show an example query that will use this compound index and confirm the index will be used with the explain function. Take screenshots of your example query.Part II: User AuthenticationTo comply with your client’s security needs, you have been asked to ensure user authentication to the database by setting up both administrator and user accounts. To achieve this, follow the steps below.Create an administrator account in the mongo shell by following steps #2–3 of the MongoDB Manual Enable Access Control tutorial. Then exit the mongo shell.IMPORTANT: Write down the password for the admin account and keep it somewhere safe. You will need to use this account later in the course.Enable user authentication for the database by typing the following commands exactly into the Linux shell in Apporto:sudo /bin/cp /etc/mongod_withauth.conf /etc/mongod.conf
sudo /bin/systemctl restart mongod.service
You can verify that you have enabled user authentication by accessing MongoDB with your new username/password. Type the following command into the Linux shell to start mongo:mongo --port 27017 --authenticationDatabase "admin" -u "admin" -p
This will prompt you to enter your password. Then use the command to show databases to verify that you have set up authentication correctly. If you are not logged in with your admin account, no databases will be viewable.Note: These commands have been customized for the Apporto environment. If you are accessing MongoDB on your own machine, refer to the MongoDB Manual Enable Access Control tutorial.If you accidentally messed up user authentication, or if you forgot your password, you can disable user authentication with this set of commands:sudo /bin/cp /etc/mongod_noauth.conf /etc/mongod.conf
sudo /bin/systemctl restart mongod.service
Create a new user account called “aacuser” for the database AAC in the mongo shell. Refer to steps #6–7 of the MongoDB Manual Enable Access Control tutorial, linked above, to help you with this task. You will need to modify the commands so that the account name is “aacuser”.IMPORTANT: Write down the password for the aacuser account and keep it somewhere safe. You will need to use this account later in the course.Take a screenshot of your login process to MongoDB using the mongo shell. Be sure you can access MongoDB and list the databases using both the admin and aacuser accounts, as this will verify that your accounts are working. You should be able to include the login commands for both accounts in one screenshot, but if you can not, include two screenshots to show both login commands.Guidelines for SubmissionSubmit a Word document containing all of your screenshots. Use a screenshot tool, such as the Snipping Tool, for your screenshots and be sure to enlarge the images in the Word document before submitting. This will help make sure that your screenshots are an appropriate size for your instructor to be able to read them. Refer to this Use Snipping Tool to Capture Screenshots guide for help with taking screenshots.
Gannon University Haptic User Interfaces Annotated Bibliography
As a human-computer interaction researcher, finding relevant literature to support a study is also part of preparing an an ...
Gannon University Haptic User Interfaces Annotated Bibliography
As a human-computer interaction researcher, finding relevant literature to support a study is also part of preparing an analytical research paper. You have to find 25 UNIQUE references for 'Haptic User Interfaces.' These references are to be scholarly papers, not wiki, blog, or Website entries. Do not include textbooks or trade publications either. The use of Google Scholar is STRONGLY recommended.
IMPORTANT: To support your research journey, read the Levy & Ellis (2006) article on how to maximize your research opportunities in Information Systems Research.
5 pages
Alexa S Skill To Order From Starbucks 0728
Amazon’s Alexa can control smart gadgets, stream music, get recipe ideas and even order items from Amazon. There are als ...
Alexa S Skill To Order From Starbucks 0728
Amazon’s Alexa can control smart gadgets, stream music, get recipe ideas and even order items from Amazon. There are also other hardy skills that ...
Earn money selling
your Study Documents