Draw An ER Diagram For The Situation Below Including Primary Keys, Attributes, Cardinalities And Necessary Relationships.

Draw an ER diagram for the situation below including primary keys, attributes, cardinalities and necessary relationships.

Be sure to break down any many to many relationships

List any assumptions that you made for your ERD

Thomas Fauci, owner of Fauci Ace Hardware store, has hired you as a contractor to design a database management system for his chain of three stores that sell building equipment and materials. He would like to track sales, clients, and employees. The following list of business rules and specifications must be incorporated in your design:

Clients place orders through a store. Fauci need to track the following about clients: name, address, city, state, zip code, telephone, date of birth, and primary language. A client may place many orders. A client does not always have to order through the same store all the time. Clients may have one or more charge accounts, although they may also have no charge accounts. The following information needs to be recorded about accounts: balance, last payment date, last payment amount, and type. A store may have many clients. The following information about each store needs to be recorded: store number, location (address, city, state, zip code), and square footage. A store may sell all items or may only sell certain items. Orders are composed of one or more items. The following information about each order needs to be recorded: order date and credit authorization status. Items may be sold by one or more stores. We wish to record the following about each item: description, color, size, pattern, and type. An item can be composed of multiple items; for example, a dining room wallcovering set (item 20) may consist of wallpaper (item 22) and borders (item 23). Mr Fauci employs 78 employees. He would like to track the following information about employees: name, address (street, city, state, zip code), telephone, date of hire, title, salary, skill, and age. Each employee works in one and only one store. Each employee may have one or more dependents. We wish to record the name of the dependent as well as the age and relationship. Employees can have one or more skills. Skill efficiencies are important to Mr Fauci.

COSO Framework Paper

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Data Structures and Algorithm Analysis

Data Structures and Algorithm Analysis 

1. How much memory will the following structures take up? Hint: int takes 4 bytes, float takes 4 bytes, char takes 1 byte. – 9 points

a. struct Structure1 {int a,b,c,d,e[10]; float f;};

b. struct Structure2 {int a[12]; float b[5];};

c. struct Structure3 {char a[10][12][4], b[5][5], c[10];};

2. Show the steps when sorting (smallest to largest) the following arrays of numbers using selection sort i.e. every time a swap occurs, show what the current state of the array looks like, including the final sorted array. – 12 points

a. [10, 2, 5, 8, 9, 1, 4, 7]

b. [7, 1, 3, 2, 5, 4, 8, 12, 9]

c. [8, 7, 6, 5, 4, 3, 2, 1]

d. [5, 3, 8, 1, 9, 4, 2, 6]

3. Big-O: What is meant by f(n) = O(g(n))? Give the definition and then explain what it means in your own terms. – 5 points

4. Big-Omega: What is meant by f(n) = Ω(g(n))? Give the definition and then explain what it means in your own terms. – 5 points

5. Show that , make sure you use the definition and justify the inequalities and constants used. – 4 points

6. Show that , make sure you use the definition and justify the inequalities and constants used. – 4 points

7. Show that , make sure you use the definition and justify the inequalities and constants used. – 4 points

8. Show that , make sure you use the definition and justify the inequalities and constants used. – 4 points

9. Show that , make sure you use the definition and justify the inequalities and constants used. – 4 points

10. What principle governs how you add/remove elements in a stack? Spell it out and briefly explain. – 4 points

11. Briefly describe an application of a stack. – 4 points

12. What principle governs how you add/remove elements in a queue? Spell it out and briefly explain. – 4 points

13. Briefly describe an application of a queue. – 4 points

Consider the following graph (pseudocode for BFS and DFS given on page 9):

14. Write the order in which the nodes would be visited in when doing a breadth first search (BFS) traversal starting at node 4. Also, write the distances from 4 to every other node. – 6 points

15. Write the order in which the nodes would be visited in when doing a breadth first search (BFS) traversal starting at node 5. Also, write the distances from 5 to every other node. – 6 points

Same graph (for your convenience):

16. Write the order in which the nodes would be visited in when doing a depth first search (DFS) traversal starting at node 4 (order discovered or order off the stack). – 6 points

17. Write the order in which the nodes would be visited in when doing a depth first search (DFS) traversal starting at node 5 (order discovered or order off the stack). – 6 points

18. Give the definition of a graph. – 5 points

19. Give the definition of a tree (from graph theory). – 4 points

 

BFS Pseudocode (for     graph with n vertices):

Input: grapharray[n][n], source

queue<int> Q

int distance[n] (array to keep     track of nodes distances (from source), all values set to -1 except source     which is set to 0 i.e. -1 = not visited)

Q.push(source)

while(Q is     not empty)

v = Q.front

Q.pop()

for each neighbor w of v

if distance[w] = -1

print w

distance[w] = distance[v]+1

Q.push(w)

end if

end for

end while

 

DFS Pseudocode (for     graph with n vertices):

Input: grapharray[n][n], source

stack<int> S

int visited[n] (array to keep     track of nodes visited, all values set to 0 except source which is set to 1     i.e. 0 = not visited, 1 = visited)

S.push(source)

while(S is     not empty)

v = S.top

S.pop()

for each neighbor w of v

if visited[w] = 0

print w

visited[w] = 1

S.push(w)

end if

end for

end while

Bonus (4 points): Show all of the steps (splitting and merging) when using mergesort to sort (smallest to largest) the following array (they are the numbers 1 through 16):

[16, 1, 15, 2, 14, 3, 13, 4, 12, 5, 11, 6, 10, 7, 9, 8]

Bonus (2 points): describe how you could implement a queue using 2 stacks.

Bonus (4 points) Draw the binary search tree that would be constructed by inserting the following values in the exact order given (starting with an empty tree i.e. first value will be the first node in the tree): –

a. Binary Search Tree A: 8, 9, 2, 7, 1, 10, 3, 5, 6, 4

b. Binary Search Tree B: 10, 7, 9, 12, 4, 2, 5, 3, 1, 14, 11, 19, 13, 18, 20

Database design

Assignment 1

For this assignment, you need to submit your code (SQL script), including structure from the Data Definition Language (DDL) and the Data Manipulation Language (DML).

Use these SQL Statements

As a starting point for your script. The data manipulation language (DML) is used to create, read, update, and delete data from a table. The data definition language (DDL) is used to create and alter the structure of the database itself, like creating a table, it’s columns, define and modify the primary and foreign keys, stored procedures, delete columns, tables, and even the entire database.

  • Your SQL statements should require a variety of SQL capabilities, such as various kinds of join, aggregate functions, etc.
  • Your document must include comments (SQL comments in a text file) that indicate what each test is testing – i.e. a specific requirement (if “good” data) or a specific problem you were catching (if testing a constraint on “bad” data).

 

Follow these steps to complete your assignment:

  • Populate your database with sample data to allow testing of the schema and the various transactions. Each table should have a minimum of ten rows.
  • After you’ve entered data, create some sample queries to see if the output is what you expected.
  • Create some sample reports to make sure these also produce similar results.
  • Make any necessary corrections to the database design during this stage and before you enter all your personal records. If you find any problems, correct the design.
  • Enter all your personal records.
  • Write your SQL Script.

 

The deliverables for this assignment are

  • Cover sheet
  • Updated database creation DDL and table loading DML, and
  • The new DML queries as requested

Assignment 2

  1. What did you accomplish this week? How has what you are learning in your current course assisted with this?
  2. What did you apply and how did you apply it?
  3. Were there problems encountered with job assignments or your work environment? What were your efforts towards resolution?
  4. Directly connect course related content to this week’s experiences at work.

Infotech in global economy

Week 6 Individual Project:  infotech in global economy

Models are only useful if they help us identify key aspects of policy, mimic reality, communicate concepts in a meaningful way, give means by which they can be tested, and hypothesize about the causes and consequences of public policy.

A. Order and Simplify Reality

Models need to strike a balance between simplifying reality in order to analyze political life and the danger of oversimplifying.

B. Identify What Is Significant

A difficult task in applying any model is determining what aspects of public policy must be included.

C. Be Congruent with Reality

While models are only concepts, they must have a relationship with reality.

D. Provide Meaningful Communication

A model is only meaningful if it is based on ideas for which some consensus exists.

E. Direct Inquiry and Research

Any model must be testable and capable of being validated.

Suggest Explanations Models must go beyond description of public policy to explication

Using at least 2 pages, write a paper describing (1) Do all policy models share certain limitations? (2) What are these limitations? (list limitations for at least 3 models we discussed from chapters 1-6)

Your document should be a Word document. To receive full credit for this individual project, you must include at least two references (APA) from academic resources (i.e. the ebook, U of Cumberlands Library resources, etc.). The research paper must be free of spelling and grammatical errors. References must be cited correctly using APA style. Your Safe

Mobile Device Policy

What type of mobile device policy would you develop?  What  restrictions would you include to ensure safety of data and safety of  information being shared?

Association for Information Systems (AIS)

This week’s assignment – For each prompt please submit a one-page, single spaced response (you will receive 2 grades for this assignment). Please send your responses in a word document. 

1. In chapter 4 of Custer Died For Your Sins, Deloria notes “…Indians have been cursed above all other people in history. Indians have anthropologists.” What evidence does he provide in chapter 4 that leads him to this conclusion?

In chapter 5 of Custer Died For Your Sins, Deloria notes, “It has been said of missionaries that when they arrived they had only The Book and we had the land; now we have The Book and they have the land.” What evidence does Deloria provide in chapter 5 to support this statement and what did he want Indian people to d

Risk Assessment Strategy

Given the following scenario, discuss in depth the risk assessment strategies and components that you would deploy in order to ensure that secure defenses and compliance attributes are embedded into the core of your network and information security deployment. Marketing company X has a need to keep their propriety methods of marketing strategies safe from other companies who may use their information to gain a competitive advantage. The company is choosing cloud storage as their safe haven for information, and has decided not to store any of their data locally. For speed purposes, the company has also chosen to not use two-factor authentication and has chosen basic password security authentication instead, allowing those with a need to know to access the information using a simple password. This was mandated by the CTO of the company in order to make things easy for the staff, who know very little about computer security, and complain about things taking too many steps to access. Discuss and describe how you would handle this situation, and perhaps make note of any recommended changes you would make as you deploy your risk assessment strategy to help the CTO understand the consequences and/or rewards for the decisions made thus far.

Information visualization

Chapter 15 – From the week’s chapter reading, we learn from the author’s case studies that, despite the alleged importance of scientific advice in the policy-making process, its evident that scientific results are often not used.  Why? The authors proposed a science-policy interface that would be realized by the inclusion of information visualization in the policy analysis process.  That way, the gap between both fields can be addressed based on the current challenges of science-policy interfaces with visualizations.

Q1: According to Shneiderman and Bederson (2003), information visualization emerged from research in human-computer interaction, computer science, graphics, visual design, psychology, and business.  With this revelation in mind, identify, and discuss the benefits?

  • identify, and name these benefits,
  • provide a short and clear narrative (no more than 100-words) to support your response

Emerging Threats And Countermeasures ITS 834/Organization Leader And Decision Making ITS 630

Part 1

Reading: Find an article of your choice and discuss it in the forum. Must be a peer-reviewed article published within the last 5 years and located on Google Scholar. Use university library databases to assist (300 words). Respond to 2 posts ( 100 words each)

Part 2

For this week’s discussion – read chapter 16 in the course text. In your own words discuss at least 3 steps for facilitating effective collaboration (150 words). Review and respond to 2 posts (75 words each)

Part 3

 

CRM at Minitrex Case Study on pages 243-245

Read the CRM at Minitrex Case Study on pages 243-245 in the textbook. Answer the Discussion Questions at the end of the Case Study.

Your responses must be complete, detailed and in APA format. All work must be 1 FULL page, single-spaced, 12 font Times New Roman. (500 words) The cover and reference page must be on separate pages. Please DO NOT include the question in your work as only your findings should be submitted.

The textbook is attached that is needed for parts 2 and 3.

Roadmap To ICT Enabled Energy-Efficiency In Buildings And Constructions

In Figure 18.1, Janssen, Wimmer, and Deljoo (2015) shows the five different information and communications technology (ICT) enablers of energy efficiency identified by European strategic research Roadmap to ICT enabled Energy-Efficiency in Buildings and constructions (REEB) (2010). The roadmap encompasses the ICT’s contributions to the energy of buildings with regards to design tools, automation & control systems, decision support to various stakeholders throughout the whole life of buildings, etc.

Select and elaborate on a section of the REEB. Use the “Roadmap” section of the following to help you with your selection:  reeb_ee_construction.pdf

Reference: Janssen, M., Wimmer, M. A., & Deljoo, A. (Eds.). (2015). Policy practice and digital science: Integrating complex systems, social simulation and public administration in policy research (Vol. 10).

COSO Framework Of Internal Controls

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.

Your paper should meet the following requirements:

• Be approximately 2-4 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Coso Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cloud Computing (ITS-532-06)

For this project, select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

Must use the following databases for your research:

  • ACM Digital Library
  • IEEE/IET Electronic Library
  • SAGE Premier

URL: https://ucumberlands.libguides.com/security

  • The paper must adhere to APA guidelines including Title and Reference pages.
  • There should be at least three scholarly sources listed on the reference page.
  • Each source should be cited in the body of the paper to give credit where due.
  • Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.
  • The body of the paper should be 3 – 5 pages in length.
  • The Title and Reference pages do not count towards the page count requirement

Submit a MS Word document, please and use APA standards and formatting. Include a Title and Reference page. Do not paste your paper into the text box, please.

Circuit City Case Study

 Circuit City was an American consumer electronics company founded by Samuel Wurtzel in 1949. By 1990s, Circuit City became the second largest consumer electronics store in the United States with annual sales of $12 billion. On March 8 2009, Circuit City shut down all its stores.

On January 8th at the 2018 Consumer Electronics Show in Las Vegas, Circuit City CEO announced a comeback and relaunch of Circuit City into “a dynamic, a social-focused e-commerce site” and a new business strategy for its retail stores12.

In this case, study, assume that Circuit City hired you as the new chief information officer (CIO) to help relaunch the company into a global e-commerce multinational company.

Question

1. History of Circuit City

2. What were the issues and challenges that caused the collapse of Circuit City in 2009?

3. What are the issues and challenges with Circuit City 2018 latest e-commerce initiative?

4. Discuss the major competitors in global e-commerce.

5. How would IT deliver value to the business?

6. Proposed the IT infrastructure required to support global e-commerce

7. Proposed the IT budget for the e-commerce initiative

8. Discuss the IT based risks associated with global e-commerce

9. Discuss how IT can leverage innovative technologies such as social media, big data and business intelligence to provide value to the business

10. Discuss the future or emerging technologies that would be leveraged to give Circuit City a competitive advantage.

Note: Your initial post will be your answer to the Question and is to be 10 pages or 2500 words with at least two references. Initial post will be graded on length, content, grammar and use of references. References should always be below each question as they are a different topic and not related in any way.

Reference:

Please minimum 5 peer-reviewed references apart from the given references.

1 http://circuitcitycorporation.com/circuit-city-to-announce-official-company-relaunch-at-the-2018-consumer-electronics-show-on-january-8th/

2 http://fortune.com/2018/01/09/circuit-city-relaunch-website/