Wednesday, 5 October 2016

CIS 515 Week 10 Technical Paper: Database Administrator for Department Store

CIS 515 Week 10 Technical Paper: Database Administrator for Department Store

CIS 515 Week 10 Technical Paper: Database Administrator for Department Store

The Strayer Oracle Server may be used to test and compile the SQL Queries developed for this assignment. Your instructor will provide you with login credentials to a Strayer University maintained Oracle server.
Imagine that you have been hired as the database administrator for a local department store. The department store has recently expanded by opening five (5) stores within your local region. They have also launched a series of marketing campaigns to attract new customers and increase sales. For your hired role, you will be responsible for creating and maintaining an enterprise-wide database system that will hold the sales and inventory data for the organization. The designed database will help operations in supporting its new business marketing strategy. Using the concepts presented throughout the course, you will develop a plan to create this database and establish a design that aligns with the product sales initiatives of the organization.
Write a twelve to fifteen (12-15) page paper in which you:
  1. Identify the potential sales and department store transactions that can be stored within the database.
  2. Design a database solution and the potential business rules that could be used to house the sales transactions of the department store.
  3. Evaluate all relationships of each entity within your database solution using the Crow’s Foot notation. Include all data elements, entities, relationships (such as 1:M, 1:1, M:N), and cardinalities for the department store database in your diagram. Note:The graphically depicted solution is not included in the required page length.
  4. Research the Internet for best practices of how retail stores use databases for retaining customers and increasing sales and complete the following:
    1. Justify how Big Data tools could be used for forecasting sales and inventory of the department store.
    2. Propose two (2) SQL Stored Procedures that use SQL functions to help sales associates perform explanatory or predictive analytics.
    3. Give your opinion on which of the two (2) ways you proposed in Question four (4) b provide greater value to expanding their business within the region.
    4. Provide a copy of your working SQL code as part of the paper.
  5. Research the Internet for database vendors that provide cloud computing services and complete the following:
    1. Estimate the types of costs involved or the pricing structure required when implementing a cloud-hosted solution for a database.
    2. Analyze security considerations and pricing of the different cloud implementation types.
    3. Rank the cloud services options of Software as a Service, Platform as a Service and Infrastructure as a Service in terms of functionality, mobility, and ability to provide distributed transaction concurrency. Compare how these cloud-based services fit within an environment where users are mobile. Determine the technical provisions that would be required to ensure data integrity.
  6. Evaluate whether the use of a distributed DBMS structure is appropriate and identify the optimization techniques that should be factored in to enhance the operations of the database in your design.
  7. Provide at least two (2) examples of how lost updates and uncommitted data may occur, keeping in mind that five (5) stores will be generating transactions.
  8. Determine the concurrency control factors that can be used to ensure valid execution of transactions within the current multiuser environment.
  9. Research the Internet for backup and restoration recovery solutions and database security threats that could be applicable to the department store. Upon your research, complete the following:
    1. Suggest at least two (2) options that could be made available to provide disaster management functions for the database system within the retail environment.
    2. Assess the types of security threats that may exist when managing the department store database and suggest measure(s) that can be performed to minimize these threats that are particular to retail.
  10. Use at least six (6) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources.

CIST 1122 Hardware Installation & Maintenance Final Exam Answers

CIST 1122 Hardware Installation & Maintenance Final Exam Answers
 Follow Below Link to Download Tutorial

For More Information Visit Our Website (   https://homeworklance.com/  )


1. A HDMI cable is generally used for what computer functions?
2. Where does one go to verify correct hardware settings in a system?
3. What connectors from a power supply should be used with a graphics expansion card?
4. What MUST be performed when installing a Video card for use?
5. What expansion slots is characterized by having an x16 speed?
6. What types of Ethernet should be used if a technician has no choice but to run cable along fluorescent lighting arrays in a suspended ceiling?
7. What laptop accessories would MOST likely be used to support multiple expansion ports?
8. What connector types is used on a CAT5 cable?
9. What can be implemented on a WAP to ensure that only certain client machines can access it?
10. Secure web traffic uses what port?
11. What features can be configured with keyboards to assist users with disabilities?
12. What features makes logical processor cores appear as physical cores to the operating system?
13. What storage media would be used to build a cost-effective RAID 5 array?
14. A network consisting of numerous geographically dispersed networks that cover a large physical distance is referred to as a ______.
15. What connections has 9-pins?
16. What wireless standards is backwards compatible with 802.11g?
Hardware Installation & Maintenance Final Exam Study Guide
17. A technician needs to make several patch cables. What tools would the technician use to attach the RJ-45 ends to the cables?
18. What is the standard loopback address for IPv4?
19. What will provide the BEST protection against power failures and data loss?
20. What is a benefit of using ECC memory?
21. What are components of an “active” CPU cooling solution?
22. What features of a CPU socket is designed to make installation of a CPU easier?
23. What ports are commonly used to send/receive email?
24. What is an example of an IPv4 address?
25. What expansion slots can ONLY be found on a desktop computer?
26. A standard Internet mail account receives incoming messages on what ports?
27. What network devices would be MOST likely to perform Network Address Translation (NAT)?
28. What is MOST likely needed when installing a new POS thermal printer?
29. What network type’s BEST represents a network centered a city?
30. What is LEAST likely to be considered a consumer replaceable part in a laptop?
31. What is the speed limitation for CAT3 wiring?
32. What provides the LEAST network security?
33. What RAM types are compatible with PC2700 and maintain the same performance?
Hardware Installation & Maintenance Final Exam Study Guide
34. What media types is LEAST likely to be affected by electromagnetic interference?
35. A DVI-D cable is generally used for what computer functions?
36. What PC expansion cards need to be installed so you can have hard drive performance and redundancy?
37. What is the FIRST component to transfer heat away from a processor?
38. What BEST describes the function of DNS?
39. What printers is required when carbon paper is used?
40. A technician is looking to install a 3.5 inch desktop hard drive into an external enclosure. What input interfaces would provide the fastest speed for the drive?
41. What encryption methods is considered easily broken and should be avoided when configuring wireless security?
42. What cable types has a MAXIMUM transmission rate of 100 Mb?
43. A user on a wireless network has the IP address 169.254.155.2 but cannot connect to the Internet. What should the user check on the wireless router?
44. What types of RAM is used with the current i-Series CPUs?
45. Where does one go to verify correct hardware settings in a system?
46. What types of RAM can be used in a dual channel configuration?
47. What is representative of a public class B address type?
48. What memory form factors is MOST commonly found in laptops?
49. What describes the port with 3 rows and 15 pins?
50. What BEST describes the function of DNS?
Hardware Installation & Maintenance Final Exam Study Guide
51. What devices transmits data to only certain ports?
52. What connectors is used to connect a DSL modem to a wall outlet?
53. When unable to get an IP address from a server, what represents an APIPA address that a PC might receive?
54. What expansion slots would support the HIGHEST transfer speeds for high-end graphics cards today?
55. What media types is MOST likely to be affected by electromagnetic interference?
56. What cable types has the MAXIMUM transfer rate of 100Mbps?
57. What is referred to as the Hardware address?
58. What settings when used, is MOST likely to result in an IP address conflict on a local network?
59. What is the default subnet mask for a Class B address?
60. What encryption types is the LEAST secure?
61. A technician has just installed two memory modules on a motherboard that supports DDR3 RAM with the bus speed up to 1600 MHz. The specifications of memory are DDR3 1333 MHz for one module and DDR3 1666MHz for another. On What bus speeds will the system function?
62. The helpdesk technician has been tasked to reinstall the OS on a desktop and has already inserted the OS install disk in the CD-ROM. What would MOST likely need to be configured within the BIOS to continue reinstalling the OS?
63. What devices transmits data to only certain ports?
64. What voltages is MOST likely to be supplied from a PC power supply unit? .
65. What network types BEST represents a network centered on one individual?
66. What cable types uses a 4-wire connector?
Hardware Installation & Maintenance Final Exam Study Guide
67. What connection types has the LONGEST transmission limitation in terms of distance?
68. What is the MAXIMUM transfer speed of USB 3.0?
69. Basic web traffic uses what port?
70. What printer types needs to have ink cartridge replaced as part of the normal maintenance cycle?
71. What printers is required when carbon paper is used?
72. Why type of protocol is “connectionless”?
73. What should be considered when building a standard PC?
74. What connectors would terminate a POTS connection?
75. What connection types is MOST likely to be used to connect an internal hard drive to a computer?
76. What allows a user to use an operating system inside an operating system?
77. What devices converts digital signals to analog ones?
78. What should a technician configure to limit access to a small office home office (SOHO) wireless network by the computer’s NIC hardware identification?
79. What level of the OSI model does TCP and UDP operate at?
80. A customer states that since the new firewall has been installed, the customer has not been able to send webmail. What ports on the firewall should be checked?


CJ415 Final Exam 100% Correct Answers

CJ415 Final Exam 100% Correct Answers
 Follow Below Link to Download Tutorial

For More Information Visit Our Website (   https://homeworklance.com/  )


The ________ hypothesis regarding crime argues that as a country undergoes economic development, its crime rate increases.
slippery slope
globalization
modernization
transnational crime
2 points
Question 2

Generally, the police forces of any given country are much more likely to be dealing with ___________ crime and much less likely, if ever, to be dealing with _________ crime.
transnational, international
international, transnational
national, global
organized, international
2 points
Question 3

Offenses, whose inception, prevention, and/or direct or indirect effects involved more than one country is an example of:
international
transnational
global
world
2 points
Question 4

The process used by criminals to convert funds acquired illegally into what appears to be legitimate income that can the used for legal purposes such as investment and purchase, is an example of:
bank fraud
drug trafficking
money laundering
corruption
2 points
Question 5

The movement of mood altering substances from their points of origin to their points of consumption is an example of:
drug trafficking
drug laundering
drug distribution
corruption
2 points
Question 6

Although not in itself a crime, buying a legal business may be deemed ________, if it is used a means for laundering money that may have been acquired illegally.
criminal
illegal
unethical
morally wrong
2 points
Question 7

_______ crimes call for a great deal of ingenuity and versatility on the part of law enforcement in terms of learning, investigation, and prevention.
sex
cyber
drug
victimless
2 points
Question 8

Most victims of __________ theft are likely to be looking for recompense, and not criminal punishment, and therefore, not generally likely to involve police agencies.
identity
intellectual property
property
vehicle
2 points
Question 9

____________ may be localized or may operate transnationally.
drug trafficking
illegal arms sales
terrorism
identity theft
2 points
Question 10

The illegal commandeering of ________ for the purpose of either demanding ransom payments or for making a political statement has been a feature of much of the late twentieth century.
watercraft
trains
subway cars
airplanes
2 points
Question 11

_____________ is an age-old offense, which is considered the first to result in multinational cooperative law enforcement efforts continues to exist in certain parts of the world, particularly in and around Central and South America, Southeast Asia, and West Africa.
aircraft hijacking
sea piracy
terrorism
treason
2 points
Question 12

___________ is defined as the procurement of illegal entry of a person into a state of which the latter person is not a national with the objective of making a profit.
illegal immigration
prostitution
human smuggling
spying
2 points
Question 13

Transnational ____________ crime is a fact of contemporary life.
drug
environmental
illegal arms
terrorism
2 points
Question 14

Over the past 20 years, there has been a growing preoccupation with ____________ crime.
transnational
drug
gang
organized
2 points
Question 15

The most discussed and least understood international police organization in the world is:
EUROPOL
CIA
INTERPOL
BATFE
2 points
Question 16

The _________ by the police can be defined as occurring “any time the police attempt to have citizens act in a certain way.”
brutality
use of force
authority
corruption
2 points
Question 17

Incidents of police use of excessive force have included all except:
deliberate choking
beating civil rights protesters
handcuffing
deliberate kicking
2 points
Question 18

The philosophy of __________ police officers in which the police subculture becomes a way of life can thus lead to police misconduct.
brother and sister
us vs. them
we have the power
I am the law
2 points
Question 19

In the twentieth century, the United States Supreme Court, to protect citizens from governmental abuses from the states and their agents, extended the Bill of Rights to be applicable to the _____.
police
local governments
states
people
2 points
Question 20

The police __________ is an extreme version of a phenomenon that exists in many human groups.
subculture
thin blue line
corruption
code of silence
2 points
Question 21

Many people, specifically _________, believe that the police are often engaged in excessive and unnecessary physical force.
government officials
minority groups
older citizens
youth
2 points
Question 22

Some forms of police brutality have also been referred to as _________.
the third degree
throwing the book at them
hazing
us vs. them
2 points
Question 23

What made the King-beating incident significantly different from earlier alleged incidents of police brutality was that a private citizen __________ this incident.
videotaped
reported
helped officers in
helped King in
2 points
Question 24

The police can trace their authority to use _______ back to the Common Law of England, which was developed during the Middle Ages.
less than lethal
force
deadly force
weapons
2 points
Question 25

In 1986, the U.S. Supreme Court struck down the fleeing felon rule, which allowed police officers to use deadly force, i.e., to shoot to kill a suspect escaping from the scene of a crime. This historical case is:
Brandenburg v. Ohio
Tennessee v. Gardner
Miranda v. Arizona
Mapp v. Ohio
2 points
Question 26

Dysfunctional behavior such as police violence comes about when looking at police brutality from a ___________ perspective.
conflict theorist
functionalist
interactionist
emergent theorist
2 points
Question 27

The __________ perspective takes a critical stance and believes that the police represent the group that has power, prestige, and wealth in a given society.
interactionist
fundamentalist
conflict
democratic
2 points
Question 28

From a ____________ perspective, a lot of attention would be devoted to considering the nature and meanings of acts that are defined as police brutality or excessive use of force.
conflict
interactionist
functionalist
classical
2 points
Question 29

Based on a perceived increase in police violence, a ___________________ was established by the Israeli police in 1992.
civilian complaint board
commission of law enforcement abuse
zero tolerance policy
law prohibiting excessive force
2 points
Question 30

One whose members, because of physical or cultural characteristics, are disadvantaged and subjected to unequal treatment by the dominant group and who regard themselves as objects of collective discrimination is the definition of a:
subordinate group
subculture
parent group
dominant group
2 points
Question 31

A __________ group is one that is advantaged and has superior resources and rights in a society.
suburbanite
sub
dominate
focus
2 points
Question 32

__________ refers to an attitude that evaluates an individual member of a subordinate group negatively on the basis of certain negative characteristics that are associated with that group even if the individual does not conform to those expected characteristics.
racism
prejudice
racial profiling
ethnic bias
2 points
Question 33

One who harbors negative attitudes toward any particular subordinate group and will act negatively toward them can be referred to as a:
unprejudiced nondiscriminator
apartheid
prejudiced discriminator
subordinate group
2 points
Question 34

The most common pattern, based on perceived biological differences such as skin color, complexion, hair color, and or eye color is referred to as _________.
racism
prejudiced discriminator
ethnic bias
sexism
2 points
Question 35

Prejudice and discrimination that is based on cultural differences among groups, sometimes even if they are of the same race is the definition of:
racial profiling
ethnic bias
prejudice
discrimination
2 points
Question 36

The pattern of prejudice and discrimination that negatively targets either the young or the elderly is known as:
discrimination
ethnic bias
apartheid
ageism
2 points
Question 37

__________ is defined as a fairly rigid, oversimplified view or image of a particular social group that is then applied to individuals who belong to that group.
ageism
stereotyping
heterosexism
ethnic bias
2 points
Question 38

A process by which members of subordinate groups are blamed for the problems and frustrations experienced by members of the dominant group is an example of:
scapegoating
stereotyping
ethnic bias
cultural diversity
2 points
Question 39

Societies that are made up of more than one ethnic group are referred to as:
dominate societies
diverse societies
plural societies
multicultural societies
2 points
Question 40

When women are treated less harshly than male suspects by the police and the criminal justice system given traditional gender expectations and notions of them being the “weaker sex”, we are defining:
sexism
chivalry hypothesis
stereotyping
sexual bias
2 points
Question 41

Conduct which the people of a group are considered so dangerous or embarrassing or irritating that they bring special sanctions to bear against the persons who exhibit it is an example of:
deviance
police misconduct
use of force
corruption
2 points
Question 42

_____________ is when individuals who happen to be in the police force engage in activities that violate departmental policies, laws, and social norms and misuse the powers of their office.
corruption
occupational deviance
deviance
organizational deviance
2 points
Question 43

_____________ has been coined by sociologists to encompass serious situations occurring within entire organization. This behavior includes police brutality and corruption.
occupational deviance
the slippery slope
organizational deviance
deviance
2 points
Question 44

___________ was a New York City police officer in the 1970s who fought against corruption.
Donnie Brasco
Frank Serpico
Joe Pistone
O.W. Wilson
2 points
Question 45

The ________ requires that police officers look the other way when they observe their fellow officers involved in acts of deviance.
thin blue line
code of the streets
informal handbook
code of silence
2 points
Question 46

___________ can be explained as receiving money or some monetary gain for not performing a legal duty or responsibility by a police officer.
organizational deviance
corruption
occupational deviance
the slippery slope
2 points
Question 47

In the late 1990s, the ________________ experienced a corruption scandal that made national and international headlines.
New York PD
Los Angeles PD
Chicago PD
Philadelphia PD
2 points
Question 48

____________ are payments in the form of money, goods, or services that a law enforcement agent receives for directing people, that he or she comes in contact with, toward a particular service provider.
kickbacks
payoffs
bribes
internal payoffs
2 points
Question 49

In the approximately 160-year history of the NYPD a major corruption scandal seems to occur approximately every _____ years.
10
20
15
30
2 points
Question 50

A grass eater is a officer who:
does not actively seek out gratuities
seeks out gratuities
takes complaints to internal affairs
refuses to accept gratuities
2 points