Computer Science 2023 RELATIONAL DATABASE DESIGN

2023 You have been tasked to turn these data into a relational database You | Assignment Collections

  

You have been tasked to turn these data into a relational database. You will need to build the database and write a report about what you did. You only need to submit the report. It should have the following sections:

a. Introduction – Introduce the business requirements and describe one business rule and one use case you can identify from the scenario given above.

10 marks

b. ER Diagram – Identify the entities and relationships in the scenario given above and draw an ER diagram showing the entities, attributes, relationships, and cardinality. Do not decompose any of the relationships at this point.

10 marks

c. Database Schema – Decompose the design to create a schema to store the data in a suitable normal form (2NF or 3NF). Say which normal form the design is in and justify your choice. List the tables and show the fields, primary keys, and any foreign keys in your schema. Describe any assumptions you have made or any additional fields you have added to your design. Make sure all the primary keys are a sensible choice and introduce new fields if needed. Draw a schema diagram to illustrate your design.

20 marks

d. Create Tables – Create a MySQL database to store the schema that you designed in part c. above. Create the tables using SQL statements and reproduce the code in your answer report. Define the keys and choose appropriate data types and any other restrictions you think are required.

20 marks

e. Insert the Data – Insert the data given above into the appropriate tables. Give a single example of an SQL statement that you used to insert one row of data into one of the tables.

10 marks

f. SQL Queries – Carry out the appropriate SQL queries of answering the following questions. For each query, give the SQL code and the result of running the query on the data in your database. Marks are given by each question.

i. Return a list of all dog names (2).

ii. Return a list of all dog breeds, showing each breed only once (3).

iii. Write a query to count how many dogs have the string “Labr” in their breed (2).

iv. Calculate the average age of all dogs in the kennel (2).

v. Calculate the average age of dogs by breed (3).

vi. Find the breed of dog that has an average age of more than 8 (4).

vii. List all the dog names along with their owners’ names (4).

viii. List all the dogs who have had a vet note recorded. Give the name of the dog and the date of the vet note (5).

ix. List all dogs, giving their name, and if a dog has had a vet visit, give the note for the visit, otherwise, if the dog has not visited the vet, return null in the vet note field (5).

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Information Storage And Retrieval

2023 Decode the following Variable Byte encoded string 10000101 10001111 11011111 00000111 11000101 00000001 11111110 Encode the | Assignment Collections

  1. Decode the following Variable Byte encoded string : 
    10000101 10001111 11011111 00000111 11000101 00000001 11111110
  2. Encode the following postings list using Variable byte Encoding : 
    2, 8, 20, 186, 258, 1032
  3. Decode the following Gamma encoded string : 
    11000110001110100111100110111011011111111001000100
  4. Gamma Encode the following postings list : 
    1,25,36,129,130,132,525

note:

After reviewing several of the quiz submissions, I noticed a pattern of misunderstanding that I wanted to address. I also went back to the posted slides and I noticed a very subtle error in the gamma code example slide that is itself a reflection of this misunderstanding. 

In the gamma code example slide, The intention was to reference two numeric values that were being encoded, but I specifically called them “docIDs”. Based on the process for how we generate a postings list from docIDs, the Postings list below that table is then inherently incorrect!

The gamma code for 13 is 1110,101 and the gamma code for 25 is 11110,1001. If these are both Document IDs rather than simple numeric values being encoded, then the Postings list should be: 

11101011110100 NOT 1110101111101001

The rationale for this was something that was spoken to specifically in the lecture, but I did not explicitly call it out in that example in the slides. Based on the number of responses that are missing this key concept –  and because I feel it’s more important for you to understand the idea rather than to strip away points – If you wish to ponder this and amend your submission you may do so!  

This key rule for how we build postings lists applies to both Variable Byte encoding as well as Gamma codes! 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 E-commerce Security Policy Audit Report

2023 Write a Audit report for E commerce Amazon Backup policy Thinks should cover in backup | Assignment Collections

 Write a Audit report for E-commerce (Amazon ) Backup policy, 

Thinks should cover in backup policy like homogeneous operating system environment like Windows, Linus, or Mac OS.

How it is useful, and Importance of the backup policy with two operating systems like Windows and MacOS

Audit Report should in Passive voice, APA format, Number of pages(4-5) without reference 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Assignment 6 IT520

2023 As the new technical communications manager for International Gadgets IG you have | Assignment Collections

  

As the new technical communications manager for International Gadgets (IG), you have developed a good idea of the various internal and external audiences for communications across the enterprise.
 

You have learned that IG is organized into five main areas consisting of Research & Development (R&D), Manufacturing, Sales & Marketing, Technical Support, and Finance/Accounting. Each area has its own structure:

· R&D – New Product Development and Product Enhancement teams

· Manufacturing – Detroit, Shanghai, and Purchasing teams

· Sales & Marketing – U.S. Sales, U.S. Marketing, European Sales, European Marketing, Partner Management, and Online Sales teams

· Technical Support – the exception, as there is only a single team handling this function

· Finance/Accounting – Corporate Finance and Corporate Accounting teams

· Human Resources – Corporate HR team with ties to HR representatives at each work site

In addition to the internal departments, IG staff interface with a wide range of external entities and individuals including customers (large accounts, individuals via web sales), distribution partners, component suppliers, subcontractors (design and occasional manufacturing). IG also contracts with Amazon to handle all its product logistics—warehousing, packaging and shipping, and returns.
 

However, you have noticed that different audiences do not always have the same needs from similar announcements. For example, a communication announcing the launching of a new product means different things to different departments.
 

In a memo to your communications team, instruct them on ways to discover the needs of the stakeholders in different areas of the company so that a new product announcement will be relevant to them.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Please Select A Disaster Recovery Plan (DPR) For Any Selected Scenario

2023 1 Describe the key elements of the Disaster Recovery Plan to be used in case of a Disaster and the | Assignment Collections

1. Describe the key elements of the Disaster Recovery Plan to be used in case of a Disaster and the Plan for testing the DRP

2. Briefly Discuss the Internal and external and environmental risks,which might be likely to affect the business and result in loss of the facility. loss of life, or loss of assets. threats could include weather fire or chemical, earth movement, structural failure, energy, biological, or human

3. Of the strategies of shared-site agreements, alternates sites, hot sites, cold sites, and warm sites, Identify which of these recovery strategies is most appropriate for your selected scenario and why

4.for each testing method listed briefly describe each method and rationale for why it will or will not be include in your DRP test plan.

1000+ Words

one set of Bullet Points

APA format

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Paper

2023 Q1 Ref Jennings M 2018 Business Its legal ethical and global environment 11th Edition Cengage a If a business | Assignment Collections

Q1 

Ref:  Jennings, M. (2018). Business: Its legal, ethical, and global environment (11th Edition). Cengage  

 

a – If a business does not agree with the decision of a hearing officer, may that business appeal the decision directly to the judicial court system?  What steps must the business take to get the case within the judicial system?

b –Peter Plaintiff’s son is killed while working overseas for a United States corporation that deals in proprietary petroleum extraction and production.  Peter Plaintiff brings a wrongful death lawsuit on behalf of his son’s estate against this corporation and requests a wide scope of business documents related to the corporation and its overseas operations under the Freedom of Information Act (FOIA).  What defenses, if any, does the corporation have against revealing the requested information under the FOIA?

…………………………………………………………..

Q2 write in new document

Ref:  

Iacobucci, D. (2018).  Marketing management. 5th ed. Cengage Learning.

 

Activity I: Use the Internet to research and identify 10 ads that have used subliminal messages, prepare a report about these ads. Is it very easy for consumers to identify these hidden messages? What effect do they have if any? If not, why do you think advertisers use them?

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 In Python

2023 in this assignment you need to animate covid 19 numbers in 4 state in dynamic bar | Assignment Collections

 

in this assignment, you need to animate covid-19 numbers in 4 state in dynamic bar graph settings. You need to read data from a url, https://raw.githubusercontent.com/nytimes/covid-19-data/master/us-states.csv .

In the bar graph, randomly choose 4 states and show total number of cases in these state daily in an animated way. It means a frame should  show total number of cases on a given day. The next frame should show next day’s numbers. The animation should update twice a second (interval = 500), i.e., two days of data will be shown in one second. The title of graph should show current date, such as Jun 15, 2020. Both axes should have appropriate title. The animation should start the most earliest date and should stop once all data is consumed. 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 Python Project

2023 Objective Web scraping with Python Due December 7 11 59pm 10 pts will be deduced for each late day | Assignment Collections

Objective: Web scraping with Python

Due: December 7 (11:59pm). 10 pts will be deduced for each late day (24hr). No submission will be accepted after Dec 10 (11:59pm). Total grade for the project is 100.

Grading Procedures: All submission will be checked with a plagiarism software. Submission having more than 70% similarity to any other student submission and/or internet resources will share total points the assignment. For example, 4 submissions having more than 70% similarity will be graded as 100/4 = 25pts, assuming that the program is worth of 100 pts.

Description: The university maintains course schedules at http://appsprod.tamuc.edu/Schedule/Schedule.aspx for different semesters (spring, fall, winter, etc ). You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different level: Semester and Department.  Your program will be a menu based application. Assume that you project file is myproject.py. Once you run, it will show last 5 semester (fall, spring, summer only, (not winter, may mini))

> python myproject.py
Choose a semester: 1) Sprint 2021   2)Fall 2020  3)Summer II  4)Summer I 5)Spring 2020 
Selection: 2

Here, your program will parse the data from website and show only last (most recent) 5 semesters. User will make selection, then, you will show departments for the selected semester (Fall 2020). Note that selected semester is visible before a “>” sign.

Fall 2020> Select a department:
1) Undeclared
2) Accounting and Finance
3) Art
4) Ag Science & Natural Resources


30) Social Work
31) Theatre
Q)Go back

Selection: 3

Fall 2020> Art > Select an option:
1) List courses by instruction name
2) List courses by capacity
3) List courses by enrollment size
4) List courses by course prefix
5) Save courses in a csv file
6) Search course by instruction name
7) Search courses by course prefix
Q)Go back
Selection: ??

Here, your program will parse the data from website and show all available department then list of tasks. Q (go back) option will take user to previous level. 

Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by prefix ” should show

PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532

as first 5 rows.

You will follow above headers and order (prefix (col. width 6), ID (5), Sec (5) ,Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left justified. A course name should not have a word more than 5 chars. For instance Algorithms should be abbreviated as “Algor”. The length of course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as .csv format. User will be able to provide a filename for csv file.

For this program you need to develop at least one class (chapter 10) with (possible) many methods.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 ECE 225 Laboratory Experiment 5 Embedded Hardware Design

2023 Background In this assignment you will be designing a 4 bit by 8 bit multiplier Once completed you | Assignment Collections

Background

In this assignment, you will be designing a 4-bit by 8-bit multiplier. Once completed, you will then
have in your “box” of designs this multiplier function, as well as the elementary design blocks.
Before stating the multiplier design problem to be solved, a comment is appropriate regarding the
already completed 8-bit adder and 8-bit register designs. If you find that you need a 16-bit adder or a 32-
bit adder, you should see that you could use your VHDL code for the 8-bit adder and simply change the
entity statement and architecture statement to create the 16-bit or 32-bit adders. In this manner, you could easily add to your “box” of components by simply making changes in the entity/architecture codes from existing components. This also obviously holds for design of 16-bit, 32-bit, or whatever size registers
needed. In the case of the multiplier design done here, it would be easy, given the VHDL
entity/architecture code for the 4×8-bit multiplier, to adapt that code for an 8×16-bit multiplier. I am
keeping the size (4×8) relatively small so that this design is not overly complicated.
Figure 1 illustrates the multiplication of an 8-bit binary number (A7 A6 A5 …A0) by a 4-bit number
(B3 B2 B1 B0) where A0 and B0 are the least significant bits of those numbers.
(0 0 0 C A7 A6 A5 A4 A3 A2 A1 A0 ) *B0
(0 0 C A7 A6 A5 A4 A3 A2 A1 A0 0 ) *B1
(0 C A7 A6 A5 A4 A3 A2 A1 A0 0 0 ) *B2
(C A7 A6 A5 A4 A3 A2 A1 A0 0 0 0 ) *B3
P6 P5 P4 P3 P2 P1 P0 
P7
Discard
8-bit Product

Figure 1: Illustration of multiplication of 8-bit number by 4-bit number giving 8-bit result
In this figure, the 8-bit number is shifted one place to the left and multiplied by the next bit of the 4-
bit number. To create a square set of numbers, zeros have been added both at the right and left hand
sides. The C entry corresponds to the carry from its line that carries being added into the next column.
The overall product, including the final output carry, consists of 8+4+1=13 bits. In the example in Figure
1, I have chosen to keep the 8 most significant binary bits. Details of other choices are beyond the needs
for this course. Figure 1 shows the need to “gate” the 8-bit number, i.e., multiply the 8-bit number by the
corresponding bits of the 4-bit number as the sum of partial products proceeds. This function can easily
be added to our earlier adder design, as illustrated in Figure 2.
B
A
Mgate
Bin
Cout
Ain
Standard Binary
Full Adder
Cin
(adder)
Sout
(a) Binary full adder with gated input
Mgate
C8out
X7
X1
C(7)
C(2)
X0

C(1)
(b) 8-bit adder with gated input A
Figure 2. (a) Addition of gate to binary full adder. (b) Design of gated 8-bit adder
Using 8-bit gated adders such as shown in Figure 2b, an 8×4 bit multiplier can be built as shown in
the Figure below, which implements the additions shown in Figure 1.
CR(0)
H(0)
S0(7)
S0(6)
S0(5)
S0(4)
S0(3)
S0(2)
S0(1)
S0(0)
O0Õ
CR(1)
H(1)
S0(7)
S0(6)
S0(5)
S0(4)
S0(3)
S0(2)
S0(1)
S0(0)
O0Õ
CR(2)
H(2)
S0(7)
S0(6)
S0(5)
S0(4)
S0(3)
S0(2)
S0(1)
S0(0)
O0Õ
CR(3)
S0(7)
S0(6)
S0(5)
S0(4)
S0(3)
S0(2)
S0(1)
S0(0)
H(3)
O0Õ
P(7)
P(6)
P(5)
P(4)
P(3)
P(2)
P(1)
P(0)

Figure 3: 4×8 multiplier design
The inputs A(i) of the adder in Figure 2b are the bits of the 8-bit input data word D in Figure 3. The
inputs B(i) of the adder in Figure 2b become the outputs of the previous adder stage in Figure 3 (with
zeros being entered for the first adder). The “Mgate” input signal to the adder in Figure 2b are the binary
bits H(i) of the 4-bit multiplier in Figure 3.

Assignment Statement
Design of the multiplier requires that we complete the design of the 8-bit gated adder in Figure 2b.

Complete the following steps:
1. Design the gated binary full adder in Figure 2a. When doing this, use your earlier design of the basic
binary full adder as one component and simply add the AND gate to create the structural model of the
gated binary full adder. The two components of the gated binary full adder will be your earlier simple
binary full adder and the AND gate. Do the following.
a. Design the AND gate by writing the entity definition and using a behavioral model of the AND
gate. Call the entity AND2.
b. Give the entity description for the gated binary full adder in Figure 2a. Call this GBFA
c. Write the structural architectural model for the gated binary full adder using its two components
(the earlier binary full adder and the AND2 gate).
2. Design the gated 8-bit binary adder in Figure 2b. Do the following.
a. Give the entity description for the gated 8-bit binary adder. Call this G8BFA.
b. Write the structural architectural model of the G8BFA, using the GBFA gated binary full adders as
components.
Having completed the VHDL description for the G8BFA, you next design the 4×8 multiplier shown in
Figure 3 above. In particular,
3. Design the 4×8 multiplier. Do the following:
a. Give the entity description for the 4×8 multiplier. Call this Mult4x8.
b. Write the structural architectural model of the Mult4x8 component using the G8BFA components.
This will require that you use some care when wiring one G8BFA to the next. Use bit-vectors to
allow use of indices. As you work through this, you will see the pattern of indexing that emerges.
c. Simulate the multiplier for a couple of non-trivial pairs of inputs to verify that it is generally
correct.

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

Computer Science 2023 NOTE THE TOPIC IS:Why Dell Sustain Its Competitive Advantages

2023 You are required to write a 4 000 word with 10 over under | Assignment Collections

You are required to write a 4,000 word (with 10% over/under) research paper based on your practical project for this module. The paper should contain rigorous evidence and references from the primary (your own effort of social data harvesting) and/ or secondary data collection (third-party available dataset or current literatures) you undertook.   Research Rationale and MotivationAs part of practical research in this module and learnt from the weekly studios, you will be harvesting a suitable dataset using the relevant tools, i.e. Tableau, Python, Facebook or Twitter API or third party Tool(s) and extracting relevant information from the results.  Therefore, you should start your paper with the motivation or rationale of your research, especially the business aim of your project. The design and approach of your project such as the reasons for the choice of social web harvesting, scope for strategic or tactical decision making, business values, public interest, marketing campaign, product reviews, branding and marketing, customers’ preferences or other etcResearch Tools and MethodsYou need to discuss your research into suitable tools and/ or APIs and the justification for your choice. Based on this, you should then document the design of your project and show clearly how your research project communicates with any third-party service or API. Results and VisualisationsYou should discuss the results with necessary business or social implications and relate that back to the motivation or rationale of your social media project. Visualisation is very important, so the report should also contain suitable visualisations for your business storytelling out of the social data you collected. Limitations and ImplicationsIn addition, project limitations and recommendations are desirable. Conclusion and AppendicesFinally, draw a conclusion with key results to nicely conclude your web harvesting research. You are encouraged to compare various technical tools and techniques to demonstrate the social media analytics skills you have learnt. You can implement your social web harvesting research project using any suitable language / technology / third-party tools you see fit. You can hard-code queries or you can provide a suitable front-end where users can enter search keywords. In addition, you can show the results in any suitable form, e.g. tables, various forms of innovative graphs or information overlaid on a map. The final visualisation needs to be published on Tableau Public and include the link and evidences in the paper as Appendixes. 

Additional Information 

Referencing Requirements (Harvard)

The Harvard (or author-date) format should be strictly used for all references (including images). Further information on Referencing can be found at Cardiff Met’s Academic Skills website. 

Edit question’s 

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now