Computer Science 2023 CIS 407 Week 5 Transaction Processing Solution

2023 Week 5 Transaction Processing In this lab you will add transaction processing to the database INSERT functionality | Assignment Collections

Week 5: Transaction Processing

In this lab, you will add transaction processing to the database INSERT functionality from the previous week to make it operate more reliably. Changes to the database will be committed (made permanent) only if all operations in a transaction are completed successfully. If any operation in a transaction fails, the entire transaction will be rolled back (undone) so that the database is left in its original state. This prevents storing incomplete or inconsistent information in the database when an error occurs. You will add client side validation controls. You will also add an editable list of database records that will allow the user to view, update, and delete employee records.

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Computer Assignment

2023 Assignment Normalization Suppose that you are the database developer for a local college The Chief | Assignment Collections

Assignment: Normalization

 

Suppose that you are the database developer for a local college. The Chief Information Officer (CIO) has asked you to provide a summary of normalizing database tables that the IT staff will use in the upcoming training session.

 

Write a two to three (2-3) page paper in which you:

  1. Describe the steps that you would use in order to convert database tables to the First Normal Form, the Second Normal Form, and the Third Normal Form.
  2. Provide one (1) example that is relevant to a college environment that illustrates reasons for converting database tables to the First, Second, and Third Normal Forms.
  3. Explain typical situations when denormalizing a table is acceptable. Provide one (1) example of denormalizing a database table to justify your response.
  4. Explain the significant manner in which business rules impact both database normalization and the decision to denormalize database tables.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

·         Recognize the purpose and principles of normalizing a relational database structure.

·         Design a relational database so that it is at least in 3NF.

·         Use technology and information resources to research issues in database systems.

·         Write clearly and concisely about relational database management systems using proper writing mechanics and technical style conventions.

 

 

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Data Structure In Java Quiz Only 15 Short Questions Online Remote Assistance Required

2023 You will have to log in yo my PC via Teamviewer and help | Assignment Collections

You will have to log in yo my PC via Teamviewer and help with these short questions. No coding required! A sample question: 

Given the following recursive function definition:

public static void recursiveMethod (int argument)

if (a rgume nt < ~O) {

System. out . println(argument + ” ” ) ;

return;

}

else {

}

re cursiveMethod( (argument / 2) + 10 ) ;

System. out. princln(argument + ” ” ) ;

return;

If this function is called with an argument of 110, what is the output?

Example 2:

Given a 9-digit key and a hash table that will hold 1007 values,

using the fold shift method, what address would the key 834433699 maps to?

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Program In C++ An Integer Number Is Said To Be A Perfect Number If Its Factors, Including 1 (but Not The Number Itself), Sum To The Number. For Example, 6 Is A Perfect Number

2023 An integer number is said to be a perfect number if its factors | Assignment Collections

 

An integer number is said to be a perfect  number if its factors, including 1 (but not the number itself), sum to  the number. For example, 6 is a perfect number because 6 =1 + 2 + 3.  Write  function perfect that determines if parameter number is a perfect  number. Use this function in a program that determines and prints all  the perfect numbers between 1 and 1000. Print the factors of each  perfect number to confirm that the number is indeed perfect. Challenge  the power of your computer by testing numbers much larger than 1000.

program in  c++

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Nanotechnology

2023 Nanotechnology may sometime be able to provide computers or computing components that are small enough to be injected into people | Assignment Collections

Nanotechnology may sometime be able to provide computers or computing components that are small enough to be injected into people, as well as included in fabrics, paint, and other materials. What do you see as the possible implications of this and the obvious benefits and possible risks? (Please write in your own words)

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Protecting Microsoft Windows Against Malware

2023 To complete this assignment you must read chapter 5 of the book titled protecting Microsoft Windows Against Malware Malware | Assignment Collections

 

To complete this assignment, you must read chapter 5 of the book  titled protecting Microsoft Windows Against Malware. Malware has become a  powerful tool for hackers which they use in various ways to infiltrate  the organizational IT infrastructure.

  1. Amongst various types of malware, name three types of malware and  how it can be used to infect an organizational system. Also, describe  the method and what measures could be taken to prevent such attack.
  2. Describe how buffer overflow and SQL injection can be used by hackers to disable a system.

Note: Please, I don’t want definitions as a way of describing the  concepts.  All I need is practical examples of all the required  concepts.

All papers must conform to APA 6th edition standards.  Please, avoid plagiarism by citing correctly and referencing your  citations accordingly. Please, do not write more than two pages. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment 2: RADIUS Implementation

2023 Assignment 2 RADIUS Implementation Suppose you are a Systems Administrator and you have been tasked with implementing | Assignment Collections

Assignment 2: RADIUS Implementation
 
Suppose you are a Systems Administrator, and you have been tasked with implementing RADIUS to support authentication, authorization, and accounting in your organizations Windows network environment.
Write a two to three (2-3) page paper in which you:
  1. Examine the most significant benefits of RADIUS in organizations and provide management with at least three (3) problems / concerns that it helps to solve / relieve in the organization’s computing environment. Provide support for your response.
  2. Suggest the top-three (3) characteristics of Network Policy Server (NPS) in Windows Server 2012 that you believe make it a suitable option for implementing RADIUS in the organization’s environment. Provide support for your response.
  3. Decide whether you would consider utilizing RADIUS templates. Justify your decision based on what you believe to be the most significant benefits offered to or restrictions created for systems administrators.
  4. Propose whether you would consider, with no other variables or restrictions, utilizing password- or certificate-based methods for authentication. Substantiate your selection with appropriate reasoning.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 CRM At Minitrex– Case Study,

2023 Discussion Questions Explain how it is possible for someone at Minitrex to call a customer and not know a that | Assignment Collections

  Discussion Questions 

  1. Explain how it is possible for someone at Minitrex to call a customer and not know (a) that this is a customer and (b) that this is the third time this week that they had been called.
     
  2. Outline the steps that Bettman must take in order to implement CRM at Minitrex. In your plan be sure to include people, processes, and technology.
      

Georges Degas, Director of Sales at Minitrex, looked at his salesman with concern and sympathy as the man described another sales call where he had been made to look unprofessional! It was bad enough that he didn’t know that the company he’d just phoned was already a Minitrex customer, but being told that he was the third caller this week from Minitrex was horrible. “I’d be better off with a Rolodex and handwritten notes than this system,” he grumbled. 

To keep track of customer information, salespeople use the Customer Contacts system, the brainchild of Degas’s boss, Jon Bettman, VP of marketing. Bettman’s posi- tion was created eighteen months ago in an effort to centralize sales and marketing activities at Minitrex. The sales and marketing team is responsible for promoting and selling an array of products to its customers. There are two distinct product lines, each developed by a separate division (insurance and financing) that also pro- vides after-sale customer service. The idea behind having a department dedicated to sales and marketing was to create opportunities for cross-selling and up-selling that didn’t exist when salespeople were tied to just one of the company’s product categories. 

The insurance division, led by Harold Blumfen, VP of insurance, is a major profit maker for Minitrex. Blumfen’s group is divided into industry-specific teams whose goals are to develop deep industry knowledge and design short-term insurance products to meet clients’ needs. Irascible and brilliant, Blumfen believes that comput- ers are good for billing and other accounting functions but cannot replace people for customer knowledge and support. His division uses a credit administration system (developed more than twenty years ago) to track customer billings and payments and a general management system to keep track of which products a customer has bought and what services the customer is entitled to. Both are fundamentally back-end systems. The industry teams keep front-end customer knowledge in their own documentation and in their heads. 

The mission of the financing division is to provide business sectors with financ- ing services that are competitive with those of the big banks. As with the insurance division, its products and customer service are designed and delivered through its own industry-specific teams. However, unlike Blumfen, the VP of financing, Mariella Hopkins, is an IT enthusiast. Hopkins joined Minitrex about four years ago after a successful banking career. Her mandate, which she has undertaken with alacrity, was to “combine big banking services with small company flexibility.” To do this, her division funded the development of a management business center application, which acts as an online customer self-service system. Customers can obtain statements and financing      

online and often can get credit approved instantly. Customer-service representatives use the same basic system, with additional functionality, to track customer transactions and to provide customer support as needed. 

“The company is always promising better systems, ‘thought Degas,’ but when it comes down to it, no one can agree on what to do. Being customercentric seems to depend on whose view of the customer is being used. Meanwhile, salespeople can’t do their jobs properly. Just imagine what our customers think!” 

Bettman has been trying to get the company to see the importance of having timely, accurate, and integrated customer information without much success. To give his sales force a better way to keep track of sales prospects, he developed his Customer Contacts system, which schedules sales calls on a periodic basis and provides mechanisms for generating and tracking new leads; it also forms the basis on which the marketing department pays the salespeople’s commissions. Real-time information on sales by product, salesperson, and region gives Bettman and his team excellent feedback on how well their centralized marketing strategies are perform- ing. For purposes of invoicing and servicing the accounts, the Customer Contacts system also feeds data into the insurance and financing divisions’ systems after sales are made. 

“I’ll see what I can do about this,” Degas had promised his frustrated salesman, knowing that it would take a miracle to improve the situation. “I’ll speak with the direc- tor of IT today and get back to you.” 

Degas put in a call to Denny Khan, Minitrex’s long-suffering director of IT. Khan, who reported to the CFO, was outranked by Bettman, Blumfen, and Hopkins. To his surprise, Khan answered the phone right away. “I was just leaving for lunch,” he explained. “What can I do for you?” 

As soon as Degas began to explain what had happened that morning, Khan cut him off. “I know, I know. But the VPs would say, ‘Our systems work fine for our needs, so why change them? We have a lot more urgent IT needs to spend our money on.’ Blumfen doesn’t want to spend a nickel on IT and doesn’t want to have to work with Hopkins. Hopkins is open to collaboration, but she doesn’t want to compromise her existing system, which is working well. And Bettman can’t do anything without their cooperation. Furthermore, none of them will assign dedicated business staff to help us put together a business case and requirements. Their line is ‘We don’t have the budgets for this. Of course, we’ll answer IT’s questions, but it’s their job to give us the systems we need.’” 

“I see the same attitude in our business activities,” agreed Degas. “Our sales force often doesn’t know what services the business teams are providing to the customers. I don’t see how management can expect to make informed decisions when they’re not sharing basic information. Isn’t there some way we could at least get common customer data—even if we use the data in different ways? And surely, with each unit identifying, prioritizing, and paying for IT opportunities, the duplication of support services must cost an arm and a leg.” 

“Sure,” Khan agreed, “but each unit developed its own terminology and special- ized data items over time, so these only work for their systems. Sharing is impossible unless everyone agrees on what information everyone needs about our customers. I’d like to see something done about this, but when I take it to the IT prioritization      

committee, it always seems to get bumped off the list. To the best of my knowledge, there has never been an effective business case to improve CRM. And anyway, I don’t own this issue!” 

“You’re probably right, but I’m not sure how to go about this,” said Degas. “Let me think about it and get back to you.” 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Java progamming

2023 Extend our Crawler program see attached zip file such that the game goes on until | Assignment Collections

Extend our Crawler program (see attached zip file) such that the game goes on until a user finally loses. The game should start with a map of size 4, then increases by 2 each time. So the first map is size 4, the next is 6, 8, and so on. Winning a cave means that you found all of the treasure within the number of moves available. For each cave, a new set of stats should be established. You should be able to accomplish this with our reset method.

Your program should ultimately display the level that the user was on when they finally lost.

Youtube link of class:

 

 

Small Questions for the expert after the assignment is completed:

1) Which parts of the assignment were you not able to complete fully? For each, explain why you were unable to complete this part and what steps you took to attempt to complete it. Give me as much detail as possible such that I may award partial credit where it is due

2)what would you do differently if you could do this assignment again?

 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Normalization Approach

2023 Your team has been asked by a small retail client SmallMart to create the underlying database for a new | Assignment Collections

Your team has been asked by a small retail client, SmallMart, to create the underlying database for a new point of sale (POS) system. You will be going through the Database Development Life Cycle, beginning with the analysis of requirements and ending with the creation of a physical database, the creation of queries that will be used in reporting, and a presentation that will be delivered to the CEO of SmallMart.

Week Four Deliverable:

Include the following specifications in your database: •The POS database must support the following subsystems: Invoicing, Inventory Management, Customer Management, and Employee Management. •Each of these subsystems must include a primary key and at least five different attributes using appropriate data types and the overall database must be normalized to at least the 3rd Normal Form. Foreign keys must be set up with constraints and relationships established between entities. •The database will need to be populated with test data. At least ten records for each subsystem. •At least four queries must be created to provide management insight into each subsystem. Two of these queries must join data from one or more other entities.

Include the following specifications in your presentation: •The presentation to the CEO should include information on the database development life cycle which includes: ◦An ERD. ◦How you approached normalization. ◦Any decisions that were made around keys, data types, constraints, etc. ◦Considerations that were made around the creation of the physical database ◦The value of queries included in the project.

Record audio speaker notes that are attached to the presentation. The presentation should be 7- to 10-slides long and delivered in 10 minutes. Remember to include a slide to cite your references.

Note: The scripts for the database and the presentation are to be turned in during Week Four.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now