Description
For assignment 3, please pay attention to detail. You will need to show/list all PKs, FKs (including parent table names and column names), weak entities (if any), partial keys, and relationships (strong vs weak + 1:M, M:1, or M:N).
Unformatted Attachment Preview
Assignments
An Employee Payroll System
We plan to develop an employee payroll system for a certain company. We
have gathered the following requirements:
For each employee, we must record the name, the resident address and
home phone number, and the Social Security Number which actually
will serve as the unique Employee id number for each employee.
• Every employee of the company is paid a monthly salary.
• An employee is paid every month. If the employee gets a pay raise, the
new salary becomes effective immediately on the work day, and the salary
for that month is then computed accordingly, in proportion to the number
of days for which the salary was effective in that month. The database
must also keep track of the employee's salary change history.
A new employee should have his/her salary change history indicating the
starting salary and date.
• In addition to the regular monthly salary, some employees may also get a
commission pay when a customer order comes in by their referral. For
each sales order an employee helped by making referral
, the employee gets
a commission pay, as a percentage of the total sales amount on that order.
• A Sales Order may be involved with any number of employees in making
referral, and an employee may also make referrals for more than one sales
order. Commission - in terms of a percentage of the total sale amount on
that Sales Order - is negotiated in each case by each employee (therefore
may be different in each case, per order per employee).
• For each Sales Order, we will need the Order Number which uniquely
identifies the order, with the customer name, and the total sale amount.
Design a conceptual schema for the database, and illustrate your design in an
Entity-Relationship Diagram, showing all the entities, relationships, and attributes.
Identify key attributes if appropriate, or partial key attributes for weak entity sets.
Specify any structural constraints. Hand-drawn diagrams are acceptable, but please
make sure that they are readable. (Recommended tool is MS Visio; many others
are also good and reasonable.)
Translate your conceptual schema into a relational database schema, showing
the tables and the columns for each table. Indicate the primary key for each table,
as well as any foreign keys. For each foreign key, indicate at the source tables
which columns are involved, and name the target table that the foreign key refers
to, along with the corresponding columns in the target table.
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
Excellent resource! Really helped me get the gist of things.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
KfUPM Internet of Things and Security Perimeters Discussion
During this module, you explored the concepts of security perimeters, application security and attack surfaces of existing ...
KfUPM Internet of Things and Security Perimeters Discussion
During this module, you explored the concepts of security perimeters, application security and attack surfaces of existing and emerging technologies.
Discuss how IoT and mobile technology are impacting the attack surface.
Include in your discussion the steps an organization should take to control the attack surface attributed to BYOD.
ISSC 642 Central Texas College Killing with Keyboards Discussion and Responses
This is a two part questions. First I will need the discussion question answer which will be below in bold, 300 words APA ...
ISSC 642 Central Texas College Killing with Keyboards Discussion and Responses
This is a two part questions. First I will need the discussion question answer which will be below in bold, 300 words APA format. For those response I will need two responses of at least 175 words each.
Please look at the killing with keyboards file then answer the following questions in the context of the best practice concepts covered in chapter 11 and the security professional proficiencies covered in chapter 13. Identify what is at risk here, 5 possible threats and 5 vulnerabilities in this scenario. Analyze measures that could be taken to reduce the risks.
Part two
Student one:
I hope all is well and you are excited to be moving into week 5 of this course. This week, we are able to use our readings and apply it to a training I have seen a few times now. This is a great example of how a bunch of information can be pulled together to get a better picture.
After reviewing “Killing with Keyboards” we are asked to answer these questions:
What is at risk here?
Identify 5 possible threats, and 5 vulnerabilities in this scenario
Discuss measures that could be taken to reduce the risks.
The risk in this situation is not only one but could be many. The first and one that stands out to me the most is lives of the family. Along with family, there are also risk of others. Moving down on my own priority list is risk of leaking sensitive information hurting the organization but also the individual with possible loss of position and clearance. This scenario is an example of aggregation. They put a bunch of what looks like basic information together making it deemed to be a higher classification such as name, family, organization, address, phone numbers, and so on.
Vulnerabilities
The Internet is an open-source tool that anyone can use for potential harmful tasks.
Not being aware of your surroundings at all times.
Social media and Blog Sites can use fake or anonymous accounts. Example of possible social engineering
Disclosure of too much information. Aggregation of unclassified information to produce a classification of secret material.
Utilizing same username and password in many places. This is due to brute force attacks and a single point of failure.
Threats
Users on Social Media and Blog Sites. Due to being able to be anonymous, all users pose a threat to the information you share.
Foreign Government. In this situation, a foreign government is a threat exploiting persistent attack.
The individual is a threat as well. By disclosing information and talking about sensitive topics, he is a threat to the organization.
Public Wi-Fi is a threat because you never know the type of security that it has implemented. Also once you have a password or access, a hacker can begin monitoring all traffic on that network.
Individual met at the unclassified conference is a threat. This individual is a threat to himself, family, information, and the organization.
Preventative Measures
Completed information security training whether that be annual, semi-annual, or quarterly.
Review all information posted on social media. This needs to be done by all individuals no matter the type of work conducted or the organization you work for. Keeping yourself safe is more important than sharing on social media.
Review all information posted about position, project, and more. Best practice is to just not post anything about work. This is mainly focused at blog sites due to the threat they can have.
Do not discuss work with strangers and report to security if they are asking to detail of questions
Understand that because of a clearance everything you do and say become information that someone wants.
Before going on a trip, get security briefings on what to do in different situations you may be faced with
I look forward to reading all your comments and hope you have a great rest of your week.
Reference
Bejtlich, R. (2004). The Tao of Network Security Monitoring: Beyond intrusion detection. Boston, MA: Addison-Wesley.
Segal, C. (n.d.). 8 Cyber Security Best Practices For Your Small To Medium-Size Business. Retrieved March 31, 2020, from https://www.coxblue.com/8-cyber-security-best-prac...
Top 10 Secure Computing Tips. (n.d.). Retrieved March 31, 2020, from https://security.berkeley.edu/resources/best-pract...
Student two:
This presentation was awesome. I have tried many times in explaining to my family, being in the military myself with knowledge, numerous times about posting crumbs on the internet. I will be showing this presentation with the hope that this helps it sink in a it. I will also be showing it to my soldiers. What is at risk here? There are s couple of things that are at risk. The upmost important factor that was at risk was the family. That picture was terrifying. Secondly, the lives of our servicemen and women. Third, the information that was supposed to be confidential. What were some possible threats? One, a foreign government training child to search the internet for vital information. Two, social media. The individual himself was a threat. Three, He was complacent. Four, He talked about classified information with an unknown person. Five, the man at the conference was the final threat. He even had pictures of his family to show Chris if he didn’t get the information organically. What are some vulnerabilities in this scenario? One, let’s start with the individual himself. He was complacent, which makes hm vulnerability to threats. Two, he was lonely at the conference and just wanted someone to talk to and saw a fellow with like interest. Three, social media is always a vulnerability. Four, free Wi-Fi. Five, just the internet itself can make you vulnerability. As in the presentation, everything is one there posted from other sources and then can be compiled to make a profile, big data. Some of these risks can be reduce by be aware of what you are posting on social media and what others are posting about you or with you in social media. Taking the security briefings more seriously and quit thinking they are a joke or outdated. Talk to your security personal about what precautions to take when out of town, like at a conference. It is ok to talk to new people but not ok to talk about classified information even if they brought it up first.
8 pages
Blockchain
The most necessary issue regarding the blockchain is that it'll fully amendment the approach in doing business. This can b ...
Blockchain
The most necessary issue regarding the blockchain is that it'll fully amendment the approach in doing business. This can be an innovative thanks to ...
BUS 517 Strayer Verizon Wireless Company 5G Network System Proposal
Note: This is the third of three assignments which, as a whole, will cover all aspects of the project life cycle relevant ...
BUS 517 Strayer Verizon Wireless Company 5G Network System Proposal
Note: This is the third of three assignments which, as a whole, will cover all aspects of the project life cycle relevant to your selected project.Now, it is time for you to discuss your project’s challenges (e.g., risks); performance management plan (e.g., earned value management); and proposed plan for closing the project when it is done.Write a four to six page paper, in which you define the execution, control, and closure aspects of your chosen project. In your paper you must:Provide a brief summary of your chosen project.Identify and discuss your project’s greatest challenges (at least three) and provide a recommendation for addressing each of the challenges.Examine how you manage your project performance via earned value management. Identify at least three key EVM metrics you will use for your project.Discuss your plan to properly close your project when it is over.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.The specific course learning outcomes associated with this assignment are: Develop a process for measuring the progress of a project, providing oversight, coordinating project closure, and determining project effectiveness.
UC The Utilization of Mobile Browsers Keeps on Growing Essay
People are using their mobile phone browsers more and more every day to find information about businesses, make product de ...
UC The Utilization of Mobile Browsers Keeps on Growing Essay
People are using their mobile phone browsers more and more every day to find information about businesses, make product decisions and purchases, and even determine the quality of a business based on what they can find online. Write a seven to 10 (7 - 10) page paper in which you:
How to Choose a Mobile Web Development Option.
Research and discuss effective use of screen real estate.
Compare and contrast different mobile platforms (i.e. Android, iOS).
The tools of mobile interface design.
Discuss mobile information design.
Choosing mobile web options.
ISE 510 SNHU Risk Remediation Part VI Project Analysis
VI. Risk Remediation: In this section, you will create security controls to ensure that the breach will not reoccur.A. Sec ...
ISE 510 SNHU Risk Remediation Part VI Project Analysis
VI. Risk Remediation: In this section, you will create security controls to ensure that the breach will not reoccur.A. Security Controls: Create at least five security controls that mitigate future risks by ensuring that the security breach will not reoccur. These controls can be technical, administrative, personnel security controls, and so on.B. Vulnerabilities: Determine how the security controls you created mitigate risks by reducing application, website, and network vulnerabilities.C. Evaluation: Discuss the criteria for measuring and evaluating the controls to ensure they are properly implemented.VII. Conclusion: In this section, you will recommend methods to reduce the impact of organizational culture and communication challenges.A. Communication: Document interpersonal communication issues encountered by the risk assessment team, including how they were resolved.B. Organizational Culture: Determine the challenges to the organizational culture that may have occurred as a result of the security breach.C. Reputation: Discuss the impact of the security breach on the reputation of the business or organization.D. Recommendations: Recommend methods to reduce the impact of these communication and organizational cultural issues in future risk assessments. Justify your recommendations.
Similar Content
TIM 7040 Northcentral University Policy Evaluation Tool Workseet
***PLEASE ENSURE ALL REFERENCES ARE SCHOLARLY RESOURCES***
Instructions
Part 1: Create a Policy Evaluation Tool
For this ...
Select an organization, either your own or another. Discuss at least five key drivers of ERM efficiency that are or should be present in your selected organization. Your discussion should include why you selected each key driver, how each one aligns with
Subject: Enterprise Risk ManagementSelect an organization, either your own or another. Discuss at least five key drivers ...
Industry Profile Part 1: Acquisition and Procurement Risk in the Cybersecurity Industry , computer science homework help
Industry Profile Part 1: Acquisition & Procurement Risk in the Cybersecurity Industry For this paper, you will investig...
identifies Riordan Manufacturing current information systems and their functionalities
Write a 1050-1400 word paper that identifies Riordan Manufacturing current information systems and their functionalities...
CS 351T Tafawa Balewa University Furniture Shopping System Proposal Worksheet
for the system that explained on the document attached identify the following :1-Users:
A description of the primary and ...
Multimedia System Development IT441
There are two major types of sound applications for multimedia development: sampled and synthesized sounds. Briefly explai...
Windows Operating Systems Information Technology
The Information Technology (IT) industry is dynamic. Practitioners in this sector need to constantly update their skills a...
Software Defined Network 2
Software-Defined Network (SDN) refers to a set of principles of networking ruled by the projections of forming a flexible,...
111000 5 Investing For The Future.edited
For a successful adoption or implementation of the autonomous cars technology, the organization needs to consider various ...
Related Tags
Book Guides
The Joy Luck Club
by Amy Tan
Twelve Years A Slave
by Solomon Northrup
Treasure Island
by Robert Louis
The Subtle Art of Not Giving a F*ck
by Mark Manson
The Great Gatsby
by Francis Scott Key Fitzgerald
The Age Of Light
by Whitney Scharer
Milkweed
by Jerry Spinelli
The Catcher in the Rye
by J. D. Salinger
The BFG
by Roald Dahl
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
KfUPM Internet of Things and Security Perimeters Discussion
During this module, you explored the concepts of security perimeters, application security and attack surfaces of existing ...
KfUPM Internet of Things and Security Perimeters Discussion
During this module, you explored the concepts of security perimeters, application security and attack surfaces of existing and emerging technologies.
Discuss how IoT and mobile technology are impacting the attack surface.
Include in your discussion the steps an organization should take to control the attack surface attributed to BYOD.
ISSC 642 Central Texas College Killing with Keyboards Discussion and Responses
This is a two part questions. First I will need the discussion question answer which will be below in bold, 300 words APA ...
ISSC 642 Central Texas College Killing with Keyboards Discussion and Responses
This is a two part questions. First I will need the discussion question answer which will be below in bold, 300 words APA format. For those response I will need two responses of at least 175 words each.
Please look at the killing with keyboards file then answer the following questions in the context of the best practice concepts covered in chapter 11 and the security professional proficiencies covered in chapter 13. Identify what is at risk here, 5 possible threats and 5 vulnerabilities in this scenario. Analyze measures that could be taken to reduce the risks.
Part two
Student one:
I hope all is well and you are excited to be moving into week 5 of this course. This week, we are able to use our readings and apply it to a training I have seen a few times now. This is a great example of how a bunch of information can be pulled together to get a better picture.
After reviewing “Killing with Keyboards” we are asked to answer these questions:
What is at risk here?
Identify 5 possible threats, and 5 vulnerabilities in this scenario
Discuss measures that could be taken to reduce the risks.
The risk in this situation is not only one but could be many. The first and one that stands out to me the most is lives of the family. Along with family, there are also risk of others. Moving down on my own priority list is risk of leaking sensitive information hurting the organization but also the individual with possible loss of position and clearance. This scenario is an example of aggregation. They put a bunch of what looks like basic information together making it deemed to be a higher classification such as name, family, organization, address, phone numbers, and so on.
Vulnerabilities
The Internet is an open-source tool that anyone can use for potential harmful tasks.
Not being aware of your surroundings at all times.
Social media and Blog Sites can use fake or anonymous accounts. Example of possible social engineering
Disclosure of too much information. Aggregation of unclassified information to produce a classification of secret material.
Utilizing same username and password in many places. This is due to brute force attacks and a single point of failure.
Threats
Users on Social Media and Blog Sites. Due to being able to be anonymous, all users pose a threat to the information you share.
Foreign Government. In this situation, a foreign government is a threat exploiting persistent attack.
The individual is a threat as well. By disclosing information and talking about sensitive topics, he is a threat to the organization.
Public Wi-Fi is a threat because you never know the type of security that it has implemented. Also once you have a password or access, a hacker can begin monitoring all traffic on that network.
Individual met at the unclassified conference is a threat. This individual is a threat to himself, family, information, and the organization.
Preventative Measures
Completed information security training whether that be annual, semi-annual, or quarterly.
Review all information posted on social media. This needs to be done by all individuals no matter the type of work conducted or the organization you work for. Keeping yourself safe is more important than sharing on social media.
Review all information posted about position, project, and more. Best practice is to just not post anything about work. This is mainly focused at blog sites due to the threat they can have.
Do not discuss work with strangers and report to security if they are asking to detail of questions
Understand that because of a clearance everything you do and say become information that someone wants.
Before going on a trip, get security briefings on what to do in different situations you may be faced with
I look forward to reading all your comments and hope you have a great rest of your week.
Reference
Bejtlich, R. (2004). The Tao of Network Security Monitoring: Beyond intrusion detection. Boston, MA: Addison-Wesley.
Segal, C. (n.d.). 8 Cyber Security Best Practices For Your Small To Medium-Size Business. Retrieved March 31, 2020, from https://www.coxblue.com/8-cyber-security-best-prac...
Top 10 Secure Computing Tips. (n.d.). Retrieved March 31, 2020, from https://security.berkeley.edu/resources/best-pract...
Student two:
This presentation was awesome. I have tried many times in explaining to my family, being in the military myself with knowledge, numerous times about posting crumbs on the internet. I will be showing this presentation with the hope that this helps it sink in a it. I will also be showing it to my soldiers. What is at risk here? There are s couple of things that are at risk. The upmost important factor that was at risk was the family. That picture was terrifying. Secondly, the lives of our servicemen and women. Third, the information that was supposed to be confidential. What were some possible threats? One, a foreign government training child to search the internet for vital information. Two, social media. The individual himself was a threat. Three, He was complacent. Four, He talked about classified information with an unknown person. Five, the man at the conference was the final threat. He even had pictures of his family to show Chris if he didn’t get the information organically. What are some vulnerabilities in this scenario? One, let’s start with the individual himself. He was complacent, which makes hm vulnerability to threats. Two, he was lonely at the conference and just wanted someone to talk to and saw a fellow with like interest. Three, social media is always a vulnerability. Four, free Wi-Fi. Five, just the internet itself can make you vulnerability. As in the presentation, everything is one there posted from other sources and then can be compiled to make a profile, big data. Some of these risks can be reduce by be aware of what you are posting on social media and what others are posting about you or with you in social media. Taking the security briefings more seriously and quit thinking they are a joke or outdated. Talk to your security personal about what precautions to take when out of town, like at a conference. It is ok to talk to new people but not ok to talk about classified information even if they brought it up first.
8 pages
Blockchain
The most necessary issue regarding the blockchain is that it'll fully amendment the approach in doing business. This can b ...
Blockchain
The most necessary issue regarding the blockchain is that it'll fully amendment the approach in doing business. This can be an innovative thanks to ...
BUS 517 Strayer Verizon Wireless Company 5G Network System Proposal
Note: This is the third of three assignments which, as a whole, will cover all aspects of the project life cycle relevant ...
BUS 517 Strayer Verizon Wireless Company 5G Network System Proposal
Note: This is the third of three assignments which, as a whole, will cover all aspects of the project life cycle relevant to your selected project.Now, it is time for you to discuss your project’s challenges (e.g., risks); performance management plan (e.g., earned value management); and proposed plan for closing the project when it is done.Write a four to six page paper, in which you define the execution, control, and closure aspects of your chosen project. In your paper you must:Provide a brief summary of your chosen project.Identify and discuss your project’s greatest challenges (at least three) and provide a recommendation for addressing each of the challenges.Examine how you manage your project performance via earned value management. Identify at least three key EVM metrics you will use for your project.Discuss your plan to properly close your project when it is over.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.The specific course learning outcomes associated with this assignment are: Develop a process for measuring the progress of a project, providing oversight, coordinating project closure, and determining project effectiveness.
UC The Utilization of Mobile Browsers Keeps on Growing Essay
People are using their mobile phone browsers more and more every day to find information about businesses, make product de ...
UC The Utilization of Mobile Browsers Keeps on Growing Essay
People are using their mobile phone browsers more and more every day to find information about businesses, make product decisions and purchases, and even determine the quality of a business based on what they can find online. Write a seven to 10 (7 - 10) page paper in which you:
How to Choose a Mobile Web Development Option.
Research and discuss effective use of screen real estate.
Compare and contrast different mobile platforms (i.e. Android, iOS).
The tools of mobile interface design.
Discuss mobile information design.
Choosing mobile web options.
ISE 510 SNHU Risk Remediation Part VI Project Analysis
VI. Risk Remediation: In this section, you will create security controls to ensure that the breach will not reoccur.A. Sec ...
ISE 510 SNHU Risk Remediation Part VI Project Analysis
VI. Risk Remediation: In this section, you will create security controls to ensure that the breach will not reoccur.A. Security Controls: Create at least five security controls that mitigate future risks by ensuring that the security breach will not reoccur. These controls can be technical, administrative, personnel security controls, and so on.B. Vulnerabilities: Determine how the security controls you created mitigate risks by reducing application, website, and network vulnerabilities.C. Evaluation: Discuss the criteria for measuring and evaluating the controls to ensure they are properly implemented.VII. Conclusion: In this section, you will recommend methods to reduce the impact of organizational culture and communication challenges.A. Communication: Document interpersonal communication issues encountered by the risk assessment team, including how they were resolved.B. Organizational Culture: Determine the challenges to the organizational culture that may have occurred as a result of the security breach.C. Reputation: Discuss the impact of the security breach on the reputation of the business or organization.D. Recommendations: Recommend methods to reduce the impact of these communication and organizational cultural issues in future risk assessments. Justify your recommendations.
Earn money selling
your Study Documents