2020 midterm prof.docx
IT 240 Midterm Proficiency Exam Spring 2020 Page 2 of 2
NAME:_______________
Submit:
1. Your Word document for Parts 1 & 2 with documentation.
2. Your working DB with saved SQL query views.
Part 1
Access: make certain to submit the .accdb and NOT the locked DB (in other words, save and close the DB before submitting).
For the selected list of data (playlists_export.csv) included, you must:
1) (15 points) normalize the list into a multiple related tables design
2) (points for submission) build an MS-Access
Note: You must use SQL statements to create your tables.
You may use the Insert statement, or import Excel/CSV files, to populate your tables.
3) (10 points) validate data is built correctly, i.e., use both equi-join and inner-join test queries
Name these queries ‘equi-join’ and inner-join’ respectively.
4) (15 points) solve these specific analysis questions using SQL queries:
· top 3 artists (by playlist tracks; by played tracks);
· bottom 3 playlist tracks (by track duration or length);
· Best Album (by playlist tracks; by played tracks)
5) Document your work in a single Word document with screenshots and descriptions
6) (15) Document your success by validating the DB works as intended, i.e. run (3) additional queries. Provide an explanation of the query (what you were attempting to accomplish), the code, and the results. Make certain you SAVE the query in the DB.
7) Do not encrypt or lock the database with username/password.
8) (25 points) Submit working database (including the saved sql queries) AND the Word document
Part 2 Queen Anne DB (use the DB provided)
T. (5 points) Given your assumptions about cascading deletions in your answer to part B of the Queen Anne case study, write the fewest number of DELETE statements possible to remove all the data in your database, but leave the table structures intact.
Do not run these statements if you are using an actual database!
If you decide to run the code, make a copy of the DB and use it to test your SQL statements.
U. (15 points) Chapter 2 discussed multivalued dependencies and the associated multivalue, multicolumn problem and how to resolve it (pages 96-98). Does the VENDOR table have the multivalue, multicolumn problem?
If so, use the discussion on pages 114-118 as the basis for solving it for the QACS database.
Create a new table named PHONE_NUMBER, link it to the VENDOR table, populate the PHONE_NUMBER table, and finally alter the VENDOR table to remove any unneeded columns. Hint: Read the additional discussion of the SQL ALTER TABLE statement in online Extension B, “Advanced SQL”.
Use the ALTER statement.
Do not run these SQL statements if you are using an actual database!
If you decide to run the code, make a copy of the DB and use it.
Write your SQL code here:
playlists_export.csv.xlsx
playlists_export (1) MidTermtitleartistalbumtrackdurationididtypeplaycountratingyeargenrenotesplaylistThey Call the Wind MariaSam CookeS.
05 Create and Maintain Databases and Tables.pptxMohamedNowfeek1
This document provides an overview of SQL and creating and managing databases and tables in SQL Server 2014. It defines SQL and some common SQL statements used to interact with databases. It then covers creating databases using CREATE DATABASE and creating tables using CREATE TABLE, specifying data types for columns. The document discusses data definition language (DDL) statements for creating, modifying and deleting databases and tables. It provides examples of creating tables with and without attributes like primary keys, foreign keys, check constraints and modifying and deleting tables.
This document provides an overview of SQL and database concepts. It defines SQL as a standard language for accessing and manipulating databases and describes its basic functions like retrieving, inserting, updating and deleting data. It also explains key concepts like RDBMS, database tables, fields, records, data types, aggregation functions and constraints. Examples are given of SQL statements for creating databases and tables, inserting and selecting data, and setting primary keys, foreign keys and indexes.
SQL is a language used to retrieve and manipulate data stored in relational database tables. It allows users to perform operations like selecting data, inserting rows, updating records, and deleting data. The four fundamental SQL statements are SELECT, INSERT, UPDATE, and DELETE. SQL statements follow a basic syntax and include keywords like SELECT, FROM, WHERE to query data and sort results.
This document provides an overview and instructions for installing and using the MySQL database system. It describes MySQL's client-server architecture, how to connect to the MySQL server using the command line client, and provides examples of common SQL commands for creating databases and tables, inserting, selecting, updating, and deleting rows of data. It also introduces some basic SQL functions and provides SQL scripts as examples to create tables and insert data.
This document provides an overview of SQL programming including:
- A brief history of SQL and how it has evolved over time.
- Key SQL fundamentals like database structures, tables, relationships, and normalization.
- How to define and modify database structures using commands like CREATE, ALTER, DROP.
- How to manipulate data using INSERT, UPDATE, DELETE, and transactions.
- How to retrieve data using SELECT statements, joins, and other techniques.
- How to aggregate data using functions like SUM, AVG, MAX, MIN, and COUNT.
- Additional topics covered include subqueries, views, and resources for further learning.
SQLite is an embedded SQL database engine that is public domain, self-contained, serverless, zero-configuration, and transactional. It is used in many applications due to its small size and ease of use. This tutorial covers the basics of SQLite including its database structure, SQL language implementation, and provides sample tables to demonstrate concepts.
This document provides instructions on installing and configuring MySQL on Linux. It discusses downloading and installing the MySQL RPM package, setting the root password for security, starting the MySQL server and client, and running basic queries to test the installation. It also covers additional MySQL commands and configurations including user privileges, database design, backups, and restoring data.
This document provides information and resources for the Cassandra certification workshop, including:
- Details on the Administrator and Developer certifications and required resources
- A 6-step process for obtaining certification, including completing courses on the DataStax Academy platform and scheduling an exam
- Practice questions covering Cassandra query language (CQL) concepts tested in the certification exams
- A demonstration of the certification process
05 Create and Maintain Databases and Tables.pptxMohamedNowfeek1
This document provides an overview of SQL and creating and managing databases and tables in SQL Server 2014. It defines SQL and some common SQL statements used to interact with databases. It then covers creating databases using CREATE DATABASE and creating tables using CREATE TABLE, specifying data types for columns. The document discusses data definition language (DDL) statements for creating, modifying and deleting databases and tables. It provides examples of creating tables with and without attributes like primary keys, foreign keys, check constraints and modifying and deleting tables.
This document provides an overview of SQL and database concepts. It defines SQL as a standard language for accessing and manipulating databases and describes its basic functions like retrieving, inserting, updating and deleting data. It also explains key concepts like RDBMS, database tables, fields, records, data types, aggregation functions and constraints. Examples are given of SQL statements for creating databases and tables, inserting and selecting data, and setting primary keys, foreign keys and indexes.
SQL is a language used to retrieve and manipulate data stored in relational database tables. It allows users to perform operations like selecting data, inserting rows, updating records, and deleting data. The four fundamental SQL statements are SELECT, INSERT, UPDATE, and DELETE. SQL statements follow a basic syntax and include keywords like SELECT, FROM, WHERE to query data and sort results.
This document provides an overview and instructions for installing and using the MySQL database system. It describes MySQL's client-server architecture, how to connect to the MySQL server using the command line client, and provides examples of common SQL commands for creating databases and tables, inserting, selecting, updating, and deleting rows of data. It also introduces some basic SQL functions and provides SQL scripts as examples to create tables and insert data.
This document provides an overview of SQL programming including:
- A brief history of SQL and how it has evolved over time.
- Key SQL fundamentals like database structures, tables, relationships, and normalization.
- How to define and modify database structures using commands like CREATE, ALTER, DROP.
- How to manipulate data using INSERT, UPDATE, DELETE, and transactions.
- How to retrieve data using SELECT statements, joins, and other techniques.
- How to aggregate data using functions like SUM, AVG, MAX, MIN, and COUNT.
- Additional topics covered include subqueries, views, and resources for further learning.
SQLite is an embedded SQL database engine that is public domain, self-contained, serverless, zero-configuration, and transactional. It is used in many applications due to its small size and ease of use. This tutorial covers the basics of SQLite including its database structure, SQL language implementation, and provides sample tables to demonstrate concepts.
This document provides instructions on installing and configuring MySQL on Linux. It discusses downloading and installing the MySQL RPM package, setting the root password for security, starting the MySQL server and client, and running basic queries to test the installation. It also covers additional MySQL commands and configurations including user privileges, database design, backups, and restoring data.
This document provides information and resources for the Cassandra certification workshop, including:
- Details on the Administrator and Developer certifications and required resources
- A 6-step process for obtaining certification, including completing courses on the DataStax Academy platform and scheduling an exam
- Practice questions covering Cassandra query language (CQL) concepts tested in the certification exams
- A demonstration of the certification process
SQL is a relational database language used to define, manipulate, and control access to data in a relational database. SQL statements are used to perform tasks like data retrieval, insertion, deletion, updating and table/database management. The basic structure of an SQL query involves selecting data from one or more tables to display or use. SQL supports features like constraints, indexes, views, triggers that enforce data integrity and security.
1. A database is a collection of structured data organized by metadata that describes the structure.
2. The first normal form requires each attribute contain one value per tuple and each tuple be unique. The second normal form requires satisfying the first normal form and that all attributes depend on the candidate key.
3. The three primary types of relationships in a relational database are one-to-one, one-to-many, and many-to-many.
MySQL is an open-source relational database management system that can be installed on Linux and Windows. The document provides step-by-step instructions for installing and configuring MySQL and describes common SQL commands for creating and managing databases, tables, and data. Key MySQL features and administration tasks such as backup, restoration, user and privilege management are also overviewed.
The document describes a database project involving designing a database to store song data from a provided table with 1,000 songs. Key tasks include:
1. Identifying problems with the original data structure and designing a new ER diagram with entities, attributes, primary keys, and relationships.
2. Creating new tables based on the ER diagram and populating them with data from the original table.
3. Writing queries to retrieve and manipulate data, including finding popular songs, genres within time limits, albums within date ranges, and averages.
4. Creating a view and indexes to optimize query performance and securing the database with users and permissions.
This document provides an introduction to SQL and relational database concepts. It explains that SQL is used to manipulate and retrieve data from relational databases. It then defines key SQL commands like SELECT, UPDATE, DELETE, and INSERT which allow users to query, modify, and manage data. The document also introduces SQL clauses and syntax like WHERE, ORDER BY, AND, OR to filter and sort query results. It provides examples of these commands using sample database tables.
This document provides guidelines for developing databases and writing SQL code. It includes recommendations for naming conventions, variables, select statements, cursors, wildcard characters, joins, batches, stored procedures, views, data types, indexes and more. The guidelines suggest using more efficient techniques like derived tables, ANSI joins, avoiding cursors and wildcards at the beginning of strings. It also recommends measuring performance and optimizing for queries over updates.
Database Slides for DIT students
Slide 3: A Database is defined as a structured set of data. So, in SQL the very first step to store the data in a well-structured manner is to create a database. The CREATE DATABASE statement is used to create a new database in SQL.
Slide 4: Example CREATE DATABASE my_database ;
Slide 5: *create a table in SQL*
The CREATE TABLE statement is used to create a table in SQL.
A table comprises of rows and columns
So, while creating tables we have to provide all the information to SQL about the names of the columns, type of data to be stored in columns, size of the data etc.
Syntax:
CREATE TABLE table_name ( column1 data_type(size), column2 data_type(size),
column3 data_type(size), .... );
The document discusses installing and configuring MySQL on Linux. It provides steps to install MySQL using RPM files, set passwords for security, test the installation, and configure applications to connect to the database. It also covers basic and advanced MySQL commands like CREATE TABLE, SELECT, JOIN, and more.
This document provides instructions and examples for using the MySQL database system. It discusses MySQL concepts like database, tables, rows, and columns. It also demonstrates common SQL commands like CREATE, SELECT, INSERT, UPDATE, DROP. Examples show how to create databases and tables, insert data, query data, and more. Installation and configuration steps are also covered.
This document provides instructions and examples for using the MySQL database system. It discusses MySQL concepts like database, tables, rows, and columns. It also demonstrates common SQL commands like CREATE, SELECT, INSERT, UPDATE, DROP. Examples show how to create databases and tables, insert and query data, use functions, conditions and wildcards. Script files demonstrate populating tables with sample data.
SQL is a standard language for accessing and manipulating databases. It allows users to retrieve, insert, update, and delete data as well as create new databases and tables. Common SQL statements include SELECT, UPDATE, DELETE, and INSERT. SQL uses clauses, operators, and wildcards to filter records based on conditions. Some key points are that SQL is an ANSI standard but different versions exist, it allows querying and modifying data in databases, and is essential for interacting with relational database systems.
MySQL is a database management system where data is stored in tables which consist of columns and rows. The document provides instructions on installing MySQL on Linux using RPM files and setting the root password. It also describes some basic MySQL concepts like queries, creating/modifying tables, and joining tables.
This document discusses HTML tables and forms. It provides information on how to structure tables using <table>, <tr>, <td>, and <th> tags. It also discusses using CSS to style tables, including properties like border, padding, text-align. The document then covers different form elements like text fields, radio buttons, checkboxes. It lists common form tags and their uses. Examples are given of using CSS to style textareas, buttons, and checked/focused form elements. The document concludes with an assignment to design an employment application form using CSS.
Here are the SQL commands for the questions:
Q1: SELECT PNAME FROM PROJECT WHERE PLOCATION='Houston';
Q2: SELECT FNAME, LNAME FROM EMPLOYEE WHERE HOURS>20;
Q3: SELECT FNAME, LNAME FROM EMPLOYEE, DEPARTMENT WHERE MGRSSN=SSN;
This document provides information on importing and working with different data types in R. It introduces packages for importing files like SPSS, Stata, SAS, Excel, databases, JSON, XML, and APIs. It also covers functions for reading and writing common file types like CSV, TSV, and RDS. Finally, it discusses parsing data and handling missing values when reading files.
This document provides an overview of SQL and relational databases. It discusses basic SQL statements like SELECT, WHERE, and JOINs. It also covers more advanced topics like aggregate functions, views, creating/altering tables, and subqueries. The document uses sample tables to demonstrate how to write queries to retrieve, update, and analyze data stored in relational database tables.
I.Multiple Choice 20 Questions worth 1 point each..docxjewisonantone
I.
Multiple Choice: 20 Questions worth 1 point each.
1
Onscreen text that appears when you position the mouse pointer over certain objects, such as the objects on the taskbar or a toolbar button. ScreenTips tell you the purpose or function of the object to which you are pointing.
a) Point
b) Sort
c) ScreenTip
d) Cut
2
If you want to paste a formula result — but not the underlying formula — to another cell, you would copy the cell with the formula, then place the insertion point in the cell you want to copy to and then:
a) Click the Paste button on the Standard toolbar.
b) Click the arrow on the Paste button on the Standard toolbar, then click Formulas.
c) Click the arrow on the Paste button on the Standard toolbar, then click Formatting.
d) Click the arrow on the Paste button on the Standard toolbar, then click Paste Special and select Values.
3
A color option that uses the Windows default text and background color values.
a) Automatic color
b) Total row
c) Mini toolbar
d) Standard color
4
A fast way to add up this column of numbers is to click in the cell below the numbers and then:
a) Click Subtotals on the Data menu.
b) View the sum in the formula bar.
c) Click the AutoSum button on the Standard toolbar, then press ENTER.
d
)
Click the Toolbox and then press SUMIF+D29
5
Which of the following is an absolute cell reference?
a) G5
b) $A$8
c) B:2
d) #J#9
6
To remove data from a cell and place it on the Office Clipboard.
a) Chart
b) Cut
c) Link
d) Cell
7
On an Excel sheet the active cell is indicated by _____________.
a) A dark wide border
b) A dotted border
c) A blinking border
d) None of the above
8
How do you change column width to fit the contents?
a) Single-click the boundary to the left of the column heading.
b) Double-click the boundary to the right of the column heading.
c) Press ALT and single-click anywhere in the column.
d) Press SHIFT W
9
###### means:
a) You've entered a number wrong.
b) You've misspelled something.
c) The cell is not wide enough.
d) You entered an incorrect formula.
10
Which key do you press to group two or more adjacent rows, columns, or cells?
a) CTRL.
b) SHIFT
c) ALT
d) F5
11
In order to multiply items in Excel you would use which symbol:
a) ^
b) @
c) *
.
3 pagesAfter reading the Cybersecurity Act of 2015, address .docxnovabroom
3 pages
After reading the
Cybersecurity Act of 2015
, address the private/public partnership with the DHS National Cybersecurity and Communications Integration Center (NCCIC), arguably the most important aspect of the act. The Cybersecurity Act of 2015 allows for private and public sharing of cybersecurity threat information.
What should the DHS NCCIC (public) share with private sector organizations? What type of threat information would enable private organizations to better secure their networks?
On the flip side, what should private organizations share with the NCCIC? As it is written, private organization sharing is completely voluntary. Should this be mandatory? If so, what are the implications to the customers' private data?
The government is not allowed to collect data on citizens. How should the act be updated to make it better and more value-added for the public-private partnership in regards to cybersecurity?
.
3 pages, 4 sourcesPaper detailsNeed a full retirement plan p.docxnovabroom
3 pages, 4 sources
Paper details
Need a full retirement plan proposal in excel with cited sources.
My career objective would be to start out of school as an associate accountant, then advance to a Director of Finance until I get promoted as CFO working in the healthcare industry in Las Vegas
.
More Related Content
Similar to 2020 midterm prof.docxIT 240 Midterm Proficiency Exam .docx
SQL is a relational database language used to define, manipulate, and control access to data in a relational database. SQL statements are used to perform tasks like data retrieval, insertion, deletion, updating and table/database management. The basic structure of an SQL query involves selecting data from one or more tables to display or use. SQL supports features like constraints, indexes, views, triggers that enforce data integrity and security.
1. A database is a collection of structured data organized by metadata that describes the structure.
2. The first normal form requires each attribute contain one value per tuple and each tuple be unique. The second normal form requires satisfying the first normal form and that all attributes depend on the candidate key.
3. The three primary types of relationships in a relational database are one-to-one, one-to-many, and many-to-many.
MySQL is an open-source relational database management system that can be installed on Linux and Windows. The document provides step-by-step instructions for installing and configuring MySQL and describes common SQL commands for creating and managing databases, tables, and data. Key MySQL features and administration tasks such as backup, restoration, user and privilege management are also overviewed.
The document describes a database project involving designing a database to store song data from a provided table with 1,000 songs. Key tasks include:
1. Identifying problems with the original data structure and designing a new ER diagram with entities, attributes, primary keys, and relationships.
2. Creating new tables based on the ER diagram and populating them with data from the original table.
3. Writing queries to retrieve and manipulate data, including finding popular songs, genres within time limits, albums within date ranges, and averages.
4. Creating a view and indexes to optimize query performance and securing the database with users and permissions.
This document provides an introduction to SQL and relational database concepts. It explains that SQL is used to manipulate and retrieve data from relational databases. It then defines key SQL commands like SELECT, UPDATE, DELETE, and INSERT which allow users to query, modify, and manage data. The document also introduces SQL clauses and syntax like WHERE, ORDER BY, AND, OR to filter and sort query results. It provides examples of these commands using sample database tables.
This document provides guidelines for developing databases and writing SQL code. It includes recommendations for naming conventions, variables, select statements, cursors, wildcard characters, joins, batches, stored procedures, views, data types, indexes and more. The guidelines suggest using more efficient techniques like derived tables, ANSI joins, avoiding cursors and wildcards at the beginning of strings. It also recommends measuring performance and optimizing for queries over updates.
Database Slides for DIT students
Slide 3: A Database is defined as a structured set of data. So, in SQL the very first step to store the data in a well-structured manner is to create a database. The CREATE DATABASE statement is used to create a new database in SQL.
Slide 4: Example CREATE DATABASE my_database ;
Slide 5: *create a table in SQL*
The CREATE TABLE statement is used to create a table in SQL.
A table comprises of rows and columns
So, while creating tables we have to provide all the information to SQL about the names of the columns, type of data to be stored in columns, size of the data etc.
Syntax:
CREATE TABLE table_name ( column1 data_type(size), column2 data_type(size),
column3 data_type(size), .... );
The document discusses installing and configuring MySQL on Linux. It provides steps to install MySQL using RPM files, set passwords for security, test the installation, and configure applications to connect to the database. It also covers basic and advanced MySQL commands like CREATE TABLE, SELECT, JOIN, and more.
This document provides instructions and examples for using the MySQL database system. It discusses MySQL concepts like database, tables, rows, and columns. It also demonstrates common SQL commands like CREATE, SELECT, INSERT, UPDATE, DROP. Examples show how to create databases and tables, insert data, query data, and more. Installation and configuration steps are also covered.
This document provides instructions and examples for using the MySQL database system. It discusses MySQL concepts like database, tables, rows, and columns. It also demonstrates common SQL commands like CREATE, SELECT, INSERT, UPDATE, DROP. Examples show how to create databases and tables, insert and query data, use functions, conditions and wildcards. Script files demonstrate populating tables with sample data.
SQL is a standard language for accessing and manipulating databases. It allows users to retrieve, insert, update, and delete data as well as create new databases and tables. Common SQL statements include SELECT, UPDATE, DELETE, and INSERT. SQL uses clauses, operators, and wildcards to filter records based on conditions. Some key points are that SQL is an ANSI standard but different versions exist, it allows querying and modifying data in databases, and is essential for interacting with relational database systems.
MySQL is a database management system where data is stored in tables which consist of columns and rows. The document provides instructions on installing MySQL on Linux using RPM files and setting the root password. It also describes some basic MySQL concepts like queries, creating/modifying tables, and joining tables.
This document discusses HTML tables and forms. It provides information on how to structure tables using <table>, <tr>, <td>, and <th> tags. It also discusses using CSS to style tables, including properties like border, padding, text-align. The document then covers different form elements like text fields, radio buttons, checkboxes. It lists common form tags and their uses. Examples are given of using CSS to style textareas, buttons, and checked/focused form elements. The document concludes with an assignment to design an employment application form using CSS.
Here are the SQL commands for the questions:
Q1: SELECT PNAME FROM PROJECT WHERE PLOCATION='Houston';
Q2: SELECT FNAME, LNAME FROM EMPLOYEE WHERE HOURS>20;
Q3: SELECT FNAME, LNAME FROM EMPLOYEE, DEPARTMENT WHERE MGRSSN=SSN;
This document provides information on importing and working with different data types in R. It introduces packages for importing files like SPSS, Stata, SAS, Excel, databases, JSON, XML, and APIs. It also covers functions for reading and writing common file types like CSV, TSV, and RDS. Finally, it discusses parsing data and handling missing values when reading files.
This document provides an overview of SQL and relational databases. It discusses basic SQL statements like SELECT, WHERE, and JOINs. It also covers more advanced topics like aggregate functions, views, creating/altering tables, and subqueries. The document uses sample tables to demonstrate how to write queries to retrieve, update, and analyze data stored in relational database tables.
I.Multiple Choice 20 Questions worth 1 point each..docxjewisonantone
I.
Multiple Choice: 20 Questions worth 1 point each.
1
Onscreen text that appears when you position the mouse pointer over certain objects, such as the objects on the taskbar or a toolbar button. ScreenTips tell you the purpose or function of the object to which you are pointing.
a) Point
b) Sort
c) ScreenTip
d) Cut
2
If you want to paste a formula result — but not the underlying formula — to another cell, you would copy the cell with the formula, then place the insertion point in the cell you want to copy to and then:
a) Click the Paste button on the Standard toolbar.
b) Click the arrow on the Paste button on the Standard toolbar, then click Formulas.
c) Click the arrow on the Paste button on the Standard toolbar, then click Formatting.
d) Click the arrow on the Paste button on the Standard toolbar, then click Paste Special and select Values.
3
A color option that uses the Windows default text and background color values.
a) Automatic color
b) Total row
c) Mini toolbar
d) Standard color
4
A fast way to add up this column of numbers is to click in the cell below the numbers and then:
a) Click Subtotals on the Data menu.
b) View the sum in the formula bar.
c) Click the AutoSum button on the Standard toolbar, then press ENTER.
d
)
Click the Toolbox and then press SUMIF+D29
5
Which of the following is an absolute cell reference?
a) G5
b) $A$8
c) B:2
d) #J#9
6
To remove data from a cell and place it on the Office Clipboard.
a) Chart
b) Cut
c) Link
d) Cell
7
On an Excel sheet the active cell is indicated by _____________.
a) A dark wide border
b) A dotted border
c) A blinking border
d) None of the above
8
How do you change column width to fit the contents?
a) Single-click the boundary to the left of the column heading.
b) Double-click the boundary to the right of the column heading.
c) Press ALT and single-click anywhere in the column.
d) Press SHIFT W
9
###### means:
a) You've entered a number wrong.
b) You've misspelled something.
c) The cell is not wide enough.
d) You entered an incorrect formula.
10
Which key do you press to group two or more adjacent rows, columns, or cells?
a) CTRL.
b) SHIFT
c) ALT
d) F5
11
In order to multiply items in Excel you would use which symbol:
a) ^
b) @
c) *
.
Similar to 2020 midterm prof.docxIT 240 Midterm Proficiency Exam .docx (20)
3 pagesAfter reading the Cybersecurity Act of 2015, address .docxnovabroom
3 pages
After reading the
Cybersecurity Act of 2015
, address the private/public partnership with the DHS National Cybersecurity and Communications Integration Center (NCCIC), arguably the most important aspect of the act. The Cybersecurity Act of 2015 allows for private and public sharing of cybersecurity threat information.
What should the DHS NCCIC (public) share with private sector organizations? What type of threat information would enable private organizations to better secure their networks?
On the flip side, what should private organizations share with the NCCIC? As it is written, private organization sharing is completely voluntary. Should this be mandatory? If so, what are the implications to the customers' private data?
The government is not allowed to collect data on citizens. How should the act be updated to make it better and more value-added for the public-private partnership in regards to cybersecurity?
.
3 pages, 4 sourcesPaper detailsNeed a full retirement plan p.docxnovabroom
3 pages, 4 sources
Paper details
Need a full retirement plan proposal in excel with cited sources.
My career objective would be to start out of school as an associate accountant, then advance to a Director of Finance until I get promoted as CFO working in the healthcare industry in Las Vegas
.
3 pagesThis paper should describe, as well as compare and contra.docxnovabroom
3 pages
This paper should describe, as well as compare and contrast, Diffie Hellman and Kerberos. You should include data flow diagrams that outline the transaction of both kerberos and Diffie Hellman - one diagram each please using Microsoft Visio or Dia (free open source tool). These diagrams are NOT part of the page total required for this assignment.
single spacing
, normal margins, use 12 pt font - reference what isn't yours please
.
3 assignments listed below1. In a 350 word essay, compare a.docxnovabroom
3 assignments listed below
1.
In a 350 word essay, compare and contrast the healthcare system of the United States with the WHO’s Millennium Development Goals. Be sure that you are providing the significant components of the US system as well as the WHO'S Millennium Development Goals.
The essay must be submitted using 12 point times new roman font double spaced in APA format. You must have at least one reference on a separate reference page. The assignment must be submitted in APA format; you do not need an abstract.
2.
Children have always contributed to the total number of migrants crossing the southern border of the United States illegally, but in 2014, a steady overall increase in unaccompanied minors from Central America reached crisis proportions when tens of thousands of children from El Salvador, Guatemala, and Honduras crossed the Rio Grande and overwhelmed border patrols and local infrastructure (Dart 2014).
Since legislators passed the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 in the last days of the Bush administration, unaccompanied minors from countries that do not share a border with the United States are guaranteed a hearing with an immigration judge where they may request asylum based on a “credible” fear of persecution or torture (U.S. Congress 2008). In some cases, these children are looking for relatives and can be placed with family while awaiting a hearing on their immigration status; in other cases, they are held in processing centers until the Department of Health and Human Services makes other arrangements (Popescu 2014).
The 2014 surge placed such a strain on state resources that Texas began transferring the children to Immigration and Naturalization facilities in California and elsewhere, without incident for the most part. On July 1, 2014, however, buses carrying the migrant children were blocked by protesters in Murrietta, California, who chanted, "Go home" and "We don’t want you.” (Fox News and Associated Press 2014; Reyes 2014).
A functional perspective theorist might focus on the dysfunctions caused by the sudden influx of underage asylum seekers, while a conflict perspective theorist might look at the way social stratification influences how the members of a developed country are treating the lower-status migrants from less-developed countries in Latin America. An interactionist theorist might see the significance in the attitude of the Murrietta protesters toward the migrant children.
Respond to the following questions in a 350-word essay using 12 point times new roman font double spaced: Given the fact that these children are fleeing various kinds of violence and extreme poverty, how should the U.S. government respond? Should the government pass laws granting a general amnesty? Or should it follow a zero-tolerance policy, automatically returning any and all unaccompanied minor migrants to their countries of origin so as to discourage additional immigration tha.
/
3 Communication Challenges in a Diverse, Global Marketplace
LEARNING OBJECTIVES
After studying this chapter, you will be able to
1 (http://content.thuzelearning.com/books/Bovee.7626.18.1/sections/p7001012451000000000000000001b6f#P7001012451000000000000000001B75)
Discuss the opportunities and challenges of intercultural communication.
2 (http://content.thuzelearning.com/books/Bovee.7626.18.1/sections/p7001012451000000000000000001bb4#P7001012451000000000000000001BBA)
De�ine culture, explain how culture is learned, and de�ine ethnocentrism and stereotyping.
3 (http://content.thuzelearning.com/books/Bovee.7626.18.1/sections/p7001012451000000000000000001b�b#P7001012451000000000000000001BFF)
Explain the importance of recognizing cultural variations, and list eight categories of cultural differences.
4 (http://content.thuzelearning.com/books/Bovee.7626.18.1/sections/p7001012451000000000000000001c9b#P7001012451000000000000000001CA0) List
four general guidelines for adapting to any business culture.
5 (http://content.thuzelearning.com/books/Bovee.7626.18.1/sections/p7001012451000000000000000001cc6#P7001012451000000000000000001CCA)
Identify seven steps you can take to improve your intercultural communication skills.
MyBCommLab®
Improve Your Grade!
More than 10 million students improved their results using Pearson MyLabs. Visit mybcommlab.com (http://mybcommlab.com) for simulations, tutorials, and
end-ofchapter problems.
COMMUNICATION CLOSE-UP AT
Kaiser Permanente
kp.org (http://kp.org)
Delivering quality health care is dif�icult enough, given the complexities of technology, government regulations, evolving scienti�ic and medical understanding, and
the variability of human performance. It gets even more daunting when you add the challenges of communication among medical staff and between patients and
their caregivers, which often takes place under stressful circumstances. Those communication efforts are challenging enough in an environment where everyone
speaks the same language and feels at home in a single cultural context—but they’re in�initely more complex in the United States, whose residents identify with
dozens of different cultures and speak several hundred languages.
The Oakland-based health-care system Kaiser Permanente has been embracing the challenges and opportunities of diversity since its founding in 1945. It made a
strong statement with its very �irst hospital when it refused to follow the then-common practice of segregating patients by race. Now, as the largest not-for-pro�it
health system in the United States, Kaiser’s client base includes more than 10 million members from over 100 distinct cultures.
At the core of Kaiser’s approach is culturally competent care, which it de�ines as “health care that acknowledges cultural diversity in the clinical setting, respects
members’ beliefs and practices, and ensures that cultural needs are considered and respected at every point of contact.” These priorities.
2Women with a Parasol-Madame Monet and Her SonClau.docxnovabroom
2
Women with a Parasol-Madame Monet and Her Son
Claud Monet (1840-1926)
1875
Oil on Canvas
100 x 81 cm
119.4 x 99.7 cm
Image from National Gallery of Art.
Working thesis statement
- “Woman with a Parasol” is also called “The Stroll”. Painted 1875 (art, n.d.) in France Argenteuil; The character in the paint are Monet’s wife Camille Monet and his 7-year-old son.
- This paint was finished within a day; he was using the fast-visible brushstrokes to create this work. This work witnessed that Monet got away from the Academy style. (Gallery, n.d.) The theme of the paint is one of kind. (Proving the impressionism)
- “Woman with a Parasol” was exhibited in second impressionist exhibition, 1876. (Art)
- The theme and environment in the paint earned many claps and praises. The whole image provides people with a feeling of freedom and kind. (Art, nga.gov, n.d.)
The controversy parts.
· How much contribution that this paint did to the modern art world.
· The affections about the theme in this paint.
· The viewer nowadays is judging the art value of this paint.
Those controversy parts about the paint were making a progress in modern art and improve the development of art.
Bibliography:
1. “Woman with a Parasol - Madame Monet and Her Son.” Modern Painters 29, no. 1 (March 2017): 45. https://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=121204182&site=eds-live.
2. Goldwater, Robert. "The Glory that was France." Art News 65 (March 1966):42, repro. cover. 1966
3. Hand, John Oliver. National Gallery of Art: Master Paintings from the Collection. Washington and New York, 2004: 382-383, no. 317, color repro. 2004
4. C. Monet Gallery “Woman with a Parasol”. https://www.cmonetgallery.com/woman-with-a-parasol.aspx
5. Woman with a Parasol, 1875 by Claude Monet, Claude Monet Paintings, biography, and Quotes. https://www.claude-monet.com/woman-with-a-parasol.jsp#prettyPhoto
6. Eelco Kappe. “Woman with a Parasol - Madame Monet and Her Son by Claude onet.” TripImprover, (2019/10/16) https://www.tripimprover.com/blog/woman-with-a-parasol-madame-monet-and-her-son-by-claude-monet#comments
7. Google Art and Culture, National Gallery of Art, Washington DC. https://artsandculture.google.com/asset/woman-with-a-parasol-madame-monet-and-her-son/EwHxeymQQnprMg
8. Charles Saatchi. “Charles Saatchi's Great Masterpieces: when a family scene was an act of rebellion.”19 March 2018. 7:00AMhttps://www.telegraph.co.uk/art/artists/charles-saatchis-great-masterpieces-family-scene-act-rebellion/
9. TotallyHistory. “Woman with a Parasol”. http://totallyhistory.com/woman-with-a-parasol/
10.Peter C. Baker. “THE REAl WORLD OF MONET”, The New York. January 10,2013. https://www.newyorker.com/books/page-turner/the-real-world-of-monet
Improving financial literacy in
college of business students:
modernizing delivery tools
Ronald Kuntze
College of Business, University of New Haven, West Haven, Connecticut, USA
Chen (Ken) Wu and Barbara Ross Wooldridge
Soules Colleg.
2The following is a list of some of the resources availabl.docxnovabroom
2
The following is a list of some of the resources available in the Trident Online Library related to the HR field.
Academic Research
Journal of Applied Psychology
This journal focuses on the applications of psychology research. This research journal is a good source for learning about the latest developments in cognitive, motivational and behavioral psychology and implications for the workplace. It is available through Business Source Complete in the Trident Online Library.
Personnel Psychology: A Journal of Applied Research
This scholarly journal has practical utility in that it centers on personnel psychology. The articles focus on the latest research on selection and recruitment, training, leadership, rewards, and diversity. It is available through Business Source Complete in the Trident Online Library.
Academy of Management Journal
This journal focuses on the management side of psychology. The articles are mainly theoretical. This journal would be a good resource for those researchers looking for new managerial theories and methods. It is available through Business Source Complete in the Trident Online Library.
The Academy of Management Review
This journal also focuses on management psychology. It is regarded as a top journal in its field and publishes theoretical and conceptual articles on management and organization theory. It is available through Business Source Complete in the Trident Online Library.
Professional Journals
Harvard Business Review
Harvard Business Review is a cornerstone business journal that has practical applications for HR professionals. This is a great resource to find case studies and expert insights on business practices. It is available through Business Source Complete in the Trident Online Library.
Human Resource Management Journal
This journal has best practices articles for HR professionals in the workplace. It is available (up to 1 year ago) through Business Source Complete in the Trident Online Library.
HRMagazine
This magazine is published by the Society for Human Resource Management. The articles are a great resource for HR professionals dealing with the most recent issues in the workplace. It is available through Business Source Complete in the Trident Online Library.
TD: Talent Development
The Association for Talent Development publishes this magazine. It is targeted to professionals in the human resource development field. It is available through Business Source Complete in the Trident Online Library.
Workforce
Solution
s Review
This magazine that focuses on many topics within human resource management. The articles included are written by industry experts and academics. They are targeted to HR professionals in the workplace. It is available through Business Source Complete in the Trident Online Library.
Adapted from: PennState University Libraries (2017). Retrieved from http://guides.libraries.psu.edu/human-resources/journals.
Assignment
Select three articles (published within the past five years),.
3 If you like to develop a computer-based DAQ measurement syst.docxnovabroom
3:
If you like to develop a computer-based DAQ measurement system or that can provide several functions in a Smart Home System, such as climate control or gas leakage detection functions, answer the following for the climate control systemfunction:
3.1 Draw the hardware connections of the system focusing on the pin connections of the system components, so that the system can provide the 'Climate Control'
function. The available devices are: (5 marks)
Microprocessor-based system (Laptop/PC).
Interface board: NI USB DAQ.
LM35 Temperature sensor Humidity sensor
Micro-switches Variable resistor LEDs Relays
Multi-output power supply
Include any required passive electronic components
3.2 Draw a flowchart for a program that can achieve both the climate control and gas leakage detection functions. (4 marks)
3.3 What are the factors that should be considered when selecting a DAQ card?
(4 marks)
3.4 Discuss the signal aliasing problem and how you can overcome this effect; supportyour answer with figures and drawings(2 marks)
3.5 What are the steps of conversion of continuous signals to digital values (ADC)?
(2 marks)
3.6 Name four types of ADC’s and choose any two to compare between them; what is the ADC type that is used in NI DAQ’s? support your answer with figures anddrawings(7 marks)
3.7 Compare between RTD (Resistance Type Device) and Thermocouples temperature sensors; support your answer with examples and drawings. The LM35 sensor can be classified as which type of temperature sensors? (5 marks)
3.8 Give examples of DAQ cards that can be used to measure the following properties and discuss the reasons for your selection.?
1- Displacement
2- Vibration
3- Strain (6 marks)
Total 35 marks4:
You are to develop a home security system that can be used to monitor a house of two doors and four windows. The output of the system should present the status of each location independently and should provide an audible warning in case of any problem - including the detection of smoke. The available devices are:
− PIC16F877 Microcontroller (given in Figure 4.1)
− two door push button switches
− four window push button switches
− one Motion Detector
− one smoke detector sensor
− eight LEDs
− one buzzer
− Include any passive electronic components required.
According to your study answer the following questions:
4.1 Draw a block diagram for the complete system. (4 marks)
4.2 Using the PIC16F877A microcontroller shown in Figure 4.1, draw the wiring diagram of the proposed system. Include any necessary electronic components required for the microcontroller to function correctly; state the function of each
element. (8 marks)
4.3 Draw a flowchart for a program that can achieve the above function. (4 marks)
4.4 Given the pin confi.
2BackgroundThe research focuses on investigating leaders fro.docxnovabroom
2
Background
The research focuses on investigating leaders from highly rated managed care organizations based on their leadership practices in comparison to leaders from low rated managed care organizations. High rated organizations are managed care organizations who have attained either 4.5 or 5 Medicare Stars ratings whiles low ratings organizations are organizations who have attained 3 Stars or less.
The research design: Survey was sent to leaders from both high Medicare rated and low rated organizations. I believe I have enough sample size so the result will be significant. I have received 35 response from leaders from high rated organizations and 35 from low rated organizations (35 participants each responded, making 70 participants in total). The goal is to find out if there is a significant difference in leadership practice between leaders from highly rated organizations and low rated organizations.
The survey tool used is Leadership Practice Inventory (LPI), which has a total of 30 behavioral statements that reflect on the practices leaders regularly use in managing their organizations. The leaders were invited to complete the survey online. The 30 survey questions are grouped in 5 Models:
1. Model the Way
1. Inspire a Shared Vision
1. Challenge the Process
1. Enable Others to Act
1. Encourage the Heart
The participants completed the LPI self-test, where they must rate themselves depending on the frequency, which they believe in engaging in each of the five models. They rate themselves on a 10 point likert scale, below.
1-Almost Never
3-Seldom
5-Occasionally
7-Fairly Often
9-Very Frequently
2-Rarely
4-Once in a While
6-Sometimes
8-Usually
10-Almost always
1. Dependent Variable: Attaining high Overall Medicare Star Rating
1. Independent Variables:
1. Leadership practice Practices (Model the Way, Inspire a Shared Vision, Challenge the Process, Enable Others to Act, and Encourage the Heart)
1. Years of Experience
1. Leadership Style
Abbreviations meaning:
LP- Leadership Practice
MSR – Medicare Stars Ratings
MSROs – Medicare Stars Ratings Organizations
YoE – Years of Experience
The following hypotheses has been tested, analyzed (page 4-23). SPSS software was used for data analysis.
Hypothesis 1 - There is a significant difference in LP between leaders from high (4.5 or 5) MSROs and low (3 Stars or less) MSROs.
Hypothesis 2 – There is a strong relationship between MSRs and the LP of both high and low MSROs
Hypothesis 3 - In comparison to other 4 models (thus Model the Way, Challenge the Process, Enable Others to Act, Encourage the Hearts), practicing the “Inspire A Shared Vision” model is very significant in helping leaders influence the attainment of high MSR in MCOs.
Hypothesis 4 – The leaders’ leadership style contributes to a leader’s ability to influence the achievement of high Medicare ratings for MCO.
Hypothesis 5 – The Leaders’ of Years of Experience (YoE) is effective in enabling leaders influence the attainment o.
2TITLE OF PAPERDavid B. JonesColumbia Southe.docxnovabroom
2
TITLE OF PAPER
David B. Jones
Columbia Southern University
BBA: 3201 Principles of Marketing
Nancy Ely Mount
Month/Date/ 2020
Marketing is
Four Elements of Marketing:
Creating
Communicating
Delivering
Exchanging
Holistic Marketing Concept is a people oriented approach utilizing the four principles of :
Relationship
Integrated
Internal
Performance marketing
.
2To ADD names From ADD name Date ADD date Subject ADD ti.docxnovabroom
2
To: ADD names From: ADD name Date: ADD date Subject: ADD title
Introduction
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et nisl ante. Etiam pulvinar fringilla ipsum facilisis efficitur. Maecenas volutpat risus dignissim dui euismod auctor. Nulla facilisi. Mauris euismod tellus malesuada dolor egestas, ac vulputate odio suscipit.
Sed pellentesque sagittis diam, sit amet faucibus diam lobortis quis. Sed mattis turpis ligula, in accumsan ante pellentesque eu. Quisque ut nisl leo. Nullam ipsum odio, eleifend non orcinon, volutpat sollicitudin lacus (Cuddy, 2002). Identify Changes
Donec tincidunt ligula eget sollicitudin vehicula. Proin pharetra tellus id lectus mollis sollicitudin. Etiam auctor ligula a nulla posuere, consequat feugiat ex lobortis. Duis eu cursus arcu, congue luctus turpis. Sed dapibus turpis ac diam viverra consectetur. Aliquam placerat molestie eros vel posuere.
This Photo by Unknown Author is licensed under CC BY-SA
Figure 1. Title (Source: www.source-of-graphic.edu )Product Offerings
Sed facilisis, lacus vel accumsan convallis, massa est ullamcorper mauris, quis feugiat eros ligula eget est. Vivamus nunc turpis, lobortis et magna a, convallis aliquam diam. Lorem ipsum dolor sit amet, consectetur adipiscing elit.
Figure 2. Title (Source of data citation)
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum et nisl ante. Etiam pulvinar fringilla ipsum facilisis efficitur. Maecenas volutpat risus dignissim dui euismod auctor. Nulla facilisi. Mauris euismod tellus malesuada dolor egestas, ac vulputate odio suscipit. Capabilities
Donec tincidunt ligula eget sollicitudin vehicula. Proin pharetra tellus id lectus mollis sollicitudin. Etiam auctor ligula a nulla posuere, consequat feugiat ex lobortis. Duis eu cursus arcu, congue luctus turpis. Sed dapibus turpis ac diam viverra consectetur.
References
Basu, K. K. (2015). The Leader's Role in Managing Change: Five Cases of Technology-Enabled Business Transformation. Global Business & Organizational Excellence, 34(3), 28-42. doi:10.1002/joe.21602.
Connelly, B., Dalton, T., Murphy, D., Rosales, D., Sudlow, D., & Havelka, D. (2016). Too Much of a Good Thing: User Leadership at TPAC. Information Systems Education Journal, 14(2), 34-42.
Rouse, M. (2018). Changed Block Tracking. Retrieved from Techtarget Network: https://searchvmware.techtarget.com/definition/Changed-Block-Tracking-CBT
Change the Chart Title to Fit Your Needs
Series 1 Category 1 Category 2 Category 3 Category 4 4.3 2.5 3.5 4.5 Series 2 Category 1 Category 2 Category 3 Category 4 2.4 4.4000000000000004 1.8 2.8 Series 3 Category 1 Category 2 Category 3 Category 4 2 2 3 5
Assessing Similarities and Differences in Self-Control
between Police Officers and Offenders
Ryan C. Meldrum1 & Christopher M. Donner2 & Shawna Cleary3 &
Andy Hochstetler4 & Matt DeLisi4
Received: 2 August 2019 /Accepted: 21 October 2019 /
Published online: 2 December 2019
# Southern Criminal.
2Megan Bowen02042020 Professor Cozen Comm 146Int.docxnovabroom
2
Megan Bowen
02/04/2020
Professor Cozen
Comm 146
Interest Paper- Mental Health in Student Athletes
I am a communication major so must take this class to fulfill my requirements for the course, however, this class will set me up to understand the in-depth reasoning behind communication. The only rhetoric class I have taken in the past is rhetoric in English, not communication; I learnt about Plato, Socrates and all the pervious rhetors that formed the basis on how we communicate today. You could argue that learning it in English and now in communication it could be very similar or the same, but we aren’t focusing on what they wrote or spoke of but why and how. In this paper I chose to analyze a TedX talk from a student athlete Victoria Garrick called ‘Athletes and mental Health: The hidden opponent’, it discusses the challenges that she faced with mental health, and the struggles maintaining a top sport on a colligate team. The reasons behind this are based on the broad ideas and opinions people have on student athletes and mental health separately and together.
College athletics is a huge industry, an incredible achievement to get into a division 1 college on an athletic scholarship, but behind all this there are some dark truths. The TedX talk from Victoria Garrick explains these truths from an athlete’s perspective, this is conflicting to the ideas that an average student or outsider has, it explains what is happening behind closed doors. This artifact was gripping to me, it is something that I completely relate too; the artifact itself is a more personal approach to understand what is happening in regard to mental health in student athletes than just reading an article online. To me personally it is easier to find an artifact that I can easily relate too, something that is grossly underappreciated and classed as embarrassing, such a topic as mental health. There were no obstacles in retrieving artifacts for this interest, it is such a broad area that I am interested in finding more information about. There are artifacts everywhere about topics such as this, articles, speeches, documentaries, all gripping a relatable.
In this class I am aware that I have much to learn, understand the way in which we communicate and why, the best ways to communicate, and the best evidence and artifacts to find for a specific topic. Finding an artifact for a topic that you are deeply invested in is different than having to find one that your heart isn’t in. With regards to this paper I am already thinking about ideas of where I can focus my information on next, where can I understand different political views behind this topic? What are the families of these student athletes going through? Mental health and student athletes separately. With regards to this class I would like to be able to find these sources and write about them in a way that grips a reader and helps me understand the reasoning behind such communication methods.
1
2
Megan Bowen
P.
2From On the Advantage and Disadvantage of History for L.docxnovabroom
2
From On the Advantage and Disadvantage of History for Life, by Friedrich Nietzsche (1874)
Section 1:
CONSIDER the herds that are feeding yonder: they know not the meaning of yesterday or to-day; they graze and ruminate, move or rest, from morning to night, from day to day, taken up with their little loves and hates, at the mercy of the moment, feeling neither melancholy nor satiety. Man cannot see them without regret, for even in the pride of his humanity he looks enviously on the beast's happiness. He wishes simply to live without satiety or pain, like the beast; yet it is all in vain, for he will not change places with it. He may ask the beast—"Why do you look at me and not speak to me of your happiness?" The beast wants to answer—"Because I always forget what I wished to say": but he forgets this answer too, and is silent; and the man is left to wonder.
He wonders also about himself, that he cannot learn to forget, but hangs on the past: however far or fast he run, that chain runs with him. It is matter for wonder: the moment, that is here and gone, that was nothing before and nothing after, returns like a spectre to trouble the quiet of a later moment. A leaf is continually dropping out of the volume of time and fluttering away and suddenly it flutters back into the man's lap. Then he says, "I remember . . . ," and envies the beast, that forgets at once, and sees every moment really die, sink into night and mist, extinguished for ever. The beast lives unhistorically; for it "goes into" the present, like a number, without leaving any curious remainder. It cannot dissimulate, it conceals nothing; at every moment it seems what it actually is, and thus can be nothing that is not honest. But man is always resisting the great and continually increasing weight of the past; it presses him down, and bows his shoulders; he travels with a dark invisible burden that he can plausibly disown, and is only too glad to disown in converse with his fellows—in order to excite their envy. And so it hurts him, like the thought of a lost Paradise, to see a herd grazing, or, nearer still, a child, that has nothing yet of the past to disown, and plays in a happy blindness between the walls of the past and the future. And yet its play must be disturbed, and only too soon will it be summoned from its little kingdom of oblivion. Then it learns to understand the words "once upon a time," the "open sesame" that lets in battle, suffering and weariness on mankind, and reminds them what their existence really is, an imperfect tense that never becomes a present. And when death brings at last the desired forgetfulness, it abolishes life and being together, and sets the seal on the knowledge that "being" is merely a continual "has been," a thing that lives by denying and destroying and contradicting itself.
If happiness and the chase for new happiness keep alive in any sense the will to live, no philosophy has perhaps more truth than the cynic's: for the beast's happine.
257Speaking of researchGuidelines for evaluating resea.docxnovabroom
This document provides guidelines for evaluating research articles. It describes the typical components and structure of journal articles that report empirical research findings, including the title, abstract, introduction, method, results, discussion, and references sections. The document then analyzes each section in detail and provides examples from rehabilitation research articles. It concludes by outlining a framework that can be used to critically analyze and evaluate the scientific merits and practical utility of published rehabilitation research.
2800 word count.APA formatplagiarism free paperThe paper.docxnovabroom
2800 word count.
APA format
plagiarism free paper
The paper should have:
Title with all the authors.
Introduction
Methods/Materials
Results (graphics and tables encouraged)
Discussion and conclusion
Citations.
.
28 CHAPTER 4 THE CARBON FOOTPRINT CONTROVERSY Wha.docxnovabroom
28
CHAPTER 4: THE CARBON FOOTPRINT CONTROVERSY
What is the carbon footprint controversy?
Nearly all humans consume meat, dairy, and egg products in some form. In recent years the
e i me al m eme ha ed he ece i f ed ci g e ca b f i . Ca e
reduce our footprint without changing our diet? Much controversy surrounds that question. One
very extreme view on the political-left is below.
But when it comes to bad for the environment, nothing literally compares with eating meat. The business of raising
animals for food causes about 40 percent more global warming than all cars, trucks, and planes combined. If you care
about the planet, it's actually better to eat a salad in a Hummer than a cheeseburger in a Prius.
Bill Maher, host of HBO talk show Real Time with Bill Maher, writing in the Huffington Post in 2009. Accessed April 25,
2013 at http://www.huffingtonpost.com/bill-maher/new-rule-a-hole-in-one-sh_b_259281.html.
The last decade has seen a movement advocating a vegan diet in order to reduce carbon emissions,
and in some respects the argument is logical. After all, it takes about 3.388 lbs of corn (and many
other inputs) to produce a single pound of retail beef, making meat seem relatively inefficient to
grains, thus leading to a larger carbon footprint.134 So common is this notion that some schools
e c age Mea le M da for the sake of the environment. The Meatless Monday movement
has even been adopted by the Norwegian military.135 Moreover, there is some scientific research
showing that vegan (and vegetarian) diets do result in a smaller carbon footprint.136
When dealing with issues as big as global warming i ea feel hel le , like he e li le e ca d make a
diffe e ce B he mall cha ge e make e e da ca ha e a eme d im ac . Tha h his Meatless Monday
resolution is important. Together we can better our health, the animals and the environment, one plate at a time.
Los Angeles Councilmember Ed Reyes, co-author of a Meatless Monday resolution in 2012.137
However, equally prestigious research shows that vegan diets can result in a higher carbon
footprint.138 How can this be? One reason is that some carbon footprint estimates are wrong, or
rather, interpreted incorrectly. The idea of livestock production being a large carbon emitter began
with a report by the United Nations (UN) suggesting that livestock contributes 18% f he ld
carbon footprint, more than the transportation sector,139 thus giving Bill Maher reason to point the
blame at burgers instead of Hummers.
It turns out that this 18% is fraught with errors, a lea , d e e e e c di i i he U.S.
For instance, the UN did not account for the carbon emissions involved in making the inputs used
in the transportation sector, but they did for livestock. This would be like saying the production of
tires has zero carbon emissions but the production of corn does. Also, that 18% makes a number of
contestable assumptions, especially regardi.
261
Megaregion Planning
and High-Speed Rail
Petra Todorovich
c h a p t e r 2 4
?
On April 16, 2009, President Obama stood before an audience at the Eisenhower
Executive Office Building and made an announcement that signaled a new era of
passenger rail in the United States. Months before, the American Recovery and
Reinvestment Act (ARRA) had provided $8 billion for a new program at the
Federal Railroad Administration (FRA) to issue competitive grants to states to
make capital investments in high-speed and conventional passenger rail. Little did
the president know that providing the single largest boost for intercity rail plan-
ning in this country in a generation had also motivated a sudden and giant leap for-
ward in planning and governing megaregions. Luckily, regional planners had been
studying emerging megaregions for the previous five years, in affiliation with the
New York–based Regional Plan Association’s (RPA) America 2050 program. Again
and again, the planners had identified high-speed rail as the key transportation
investment to serve megaregion economies. But high-speed rail was a distant
dream. That all changed with the passage of ARRA at the nadir of the Great
Recession. Now a federal program exists to support high-speed rail planning
and implementation. Making that program a success will largely depend on the
ability of multiple actors at the local, regional, state, and binational levels to come
together as megaregions to coordinate and leverage federal rail investments.
Revisiting Megalopolis: RPA Resurrects
the Megaregion Idea
As if planning for the Tri-State New York metropolitan region was not sufficiently
complicated, in 2005 the Regional Plan Association launched a national program
called America 2050 that focused on the emergence of a new urban scale: the
megaregion. This was not actually a new concept for RPA. In 1967 a volume of the
Second Regional Plan documented the emergence of “The Atlantic Urban Region,”
an urban chain stretching 460 miles from Maine to Virginia (Regional Plan
C
o
p
y
r
i
g
h
t
2
0
1
1
.
R
u
t
g
e
r
s
U
n
i
v
e
r
s
i
t
y
P
r
e
s
s
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
M
a
y
n
o
t
b
e
r
e
p
r
o
d
u
c
e
d
i
n
a
n
y
f
o
r
m
w
i
t
h
o
u
t
p
e
r
m
i
s
s
i
o
n
f
r
o
m
t
h
e
p
u
b
l
i
s
h
e
r
,
e
x
c
e
p
t
f
a
i
r
u
s
e
s
p
e
r
m
i
t
t
e
d
u
n
d
e
r
U
.
S
.
o
r
a
p
p
l
i
c
a
b
l
e
c
o
p
y
r
i
g
h
t
l
a
w
.
EBSCO Publishing : eBook Academic Collection (EBSCOhost) - printed on 5/8/2020 3:56 AM via SAN JOSE STATE UNIV
AN: 435124 ; Montgomery, Carleton.; Regional Planning for a Sustainable America : How Creative Programs Are Promoting Prosperity and Saving the Environment
Account: s7380033.main.cmmc
Association 1967). Earlier that decade, French geographer Jean Gottmann had
coined the term “Megalopolis” to describe the same region in his 1961 book,
Megalopolis: The Urbanized Northeastern Seaboard of the United States (Gottmann
1961). The .
250 WORDS Moyer Instruments is a rapidly growing manufacturer .docxnovabroom
Moyer Instruments is a medical device manufacturer that has experienced rapid growth. To improve internal controls as a result, management modified some procedures and practices, upsetting some employees who feel it shows a lack of trust. Required is an explanation of whether the statement "Internal controls exist because most people can't be trusted" is true.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
1. 2020 midterm prof.docx
IT 240 Midterm Proficiency Exam Spring 2020 Page 2
of 2
NAME:_______________
Submit:
1. Your Word document for Parts 1 & 2 with documentation.
2. Your working DB with saved SQL query views.
Part 1
Access: make certain to submit the .accdb and NOT the locked
DB (in other words, save and close the DB before submitting).
For the selected list of data (playlists_export.csv) included, you
must:
1) (15 points) normalize the list into a multiple related tables
design
2) (points for submission) build an MS-Access
Note: You must use SQL statements to create your tables.
You may use the Insert statement, or import Excel/CSV files, to
populate your tables.
3) (10 points) validate data is built correctly, i.e., use both equi-
join and inner-join test queries
Name these queries ‘equi-join’ and inner-join’ respectively.
4) (15 points) solve these specific analysis questions using SQL
queries:
· top 3 artists (by playlist tracks; by played tracks);
· bottom 3 playlist tracks (by track duration or length);
· Best Album (by playlist tracks; by played tracks)
5) Document your work in a single Word document with
screenshots and descriptions
6) (15) Document your success by validating the DB works as
2. intended, i.e. run (3) additional queries. Provide an explanation
of the query (what you were attempting to accomplish), the
code, and the results. Make certain you SAVE the query in the
DB.
7) Do not encrypt or lock the database with username/password.
8) (25 points) Submit working database (including the saved sql
queries) AND the Word document
Part 2 Queen Anne DB (use the DB provided)
T. (5 points) Given your assumptions about cascading deletions
in your answer to part B of the Queen Anne case study, write
the fewest number of DELETE statements possible to remove
all the data in your database, but leave the table structures
intact.
Do not run these statements if you are using an actual database!
If you decide to run the code, make a copy of the DB and use it
to test your SQL statements.
U. (15 points) Chapter 2 discussed multivalued dependencies
and the associated multivalue, multicolumn problem and how to
resolve it (pages 96-98). Does the VENDOR table have the
multivalue, multicolumn problem?
If so, use the discussion on pages 114-118 as the basis for
solving it for the QACS database.
Create a new table named PHONE_NUMBER, link it to the
VENDOR table, populate the PHONE_NUMBER table, and
finally alter the VENDOR table to remove any unneeded
columns. Hint: Read the additional discussion of the SQL
ALTER TABLE statement in online Extension B, “Advanced
SQL”.
Use the ALTER statement.
3. Do not run these SQL statements if you are using an actual
database!
If you decide to run the code, make a copy of the DB and
use it.
Write your SQL code here:
playlists_export.csv.xlsx
playlists_export (1)
MidTermtitleartistalbumtrackdurationididtypeplaycountratingye
argenrenotesplaylistThey Call the Wind MariaSam CookeSwing
Low3177000Taghhvg3vcgqvpi75kyweitw3v473null1961Classic
SoulLibraryGrandfather's ClockSam CookeSwing
Low7192000T7gx26h2ex7ord3fffatkkqvpji72null1961Classic
SoulLibraryGoin' HomeSam CookeSwing
Low12188000Tjvz5mtuamkd5vxdiwpd77bge2m70null1961Class
ic SoulLibraryIf I Had You (I'd Be Happy)Sam CookeSwing
Low5138000Ts7yeb5d7jn5kbtcssumpiukfme72null1961Classic
SoulLibraryI'm Just a Country BoySam CookeSwing
Low2248000Tm5wfclmto6pbqe2vrh3ahorwki74null1961Classic
SoulLibraryJeanie with the Light Brown HairSam CookeSwing
Low8226000Tauaedgdd5v2f2xo2qryrxoy73i72null1961Classic
SoulLibraryChain Gang (Remastered)Sam CookeSwing
Low6155000T6z5yef6xgdsaw56dud23tifyuq72null1961Classic
SoulLibraryPraySam CookeSwing
Low10132000Tfutisrpxdi4pmhkzrabs7fjoke71null1961Classic
SoulLibraryLong, Long AgoSam CookeSwing
Low9179000Takrxk5fzwploxzc7mspqjhzkxi71null1961Classic
SoulLibraryYou Belong o MeSam CookeSwing
Low11165000Ta2vq2ztzixaxfv7vlzn742at2a71null1961Classic
SoulLibraryTwilight on the TrailSam CookeSwing
Low4192000Tkxfto5kfo63x37euhn6ckjjrya72null1961Classic
SoulLibrarySwing Low, Sweet ChariotSam CookeSwing
Low1187000Tlvhmqjazejf3lecf2j4lt25ksa75null1961Classic
SoulLibraryGreat White SharkPeter GarrettA Version of
4. Now6229000Tkdhduoikplfeja6vnbnpnl5a2a73null2016RockLibr
aryDie A Happy ManThomas RhettTangled
Up4227000Ttjtbrpoftpgveiqkac2zeku54y70null2016CountryLibr
aryRitual / Nous Sommes Du SoleilYesTales From Topographic
Oceans21292000Triq4tvewfs32ql5z6kvr26zse470null1973Progr
essive/Art RockLibraryBlackDierks
BentleyBlack1211000Tjm2yc3aldyhod2v5fn6azfo7uq73null201
6nullLibraryThe Only Way Is Up80s Chartstarz1980's Best
Tunes32232000Tvrllfue4frddppot7mruvumhky70null2015PopLi
braryI Want Candy80s Chartstarz1980's Best
Tunes27159000Tyqu7kcuzxsja7wodxqiqyqiv5m70null2015PopL
ibraryHazy Shade of Winter80s Chartstarz1980's Best
Tunes29161000Tfy4vwzkxgmdljlvjj7d4no6tn470null2015PopLi
braryRock Me Amadeus80s Chartstarz1980's Best
Tunes6191000Trmmrfgtdudsq62kjt2mqiukziy70null2015PopLib
raryBette Davis Eyes80s Chartstarz1980's Best
Tunes19226000Tayp4cjap3goxsw4dsvs37vlidu70null2015PopLi
braryShe Works Hard for the Money80s Chartstarz1980's Best
Tunes11250000Tpilit7d6saq3hapvvhopfi7ieu70null2015PopLibr
aryListen to Your Heart80s Chartstarz1980's Best
Tunes23339000Txgbzrk2kgmuarnemb2g7u6zdeq70null2015Pop
LibraryI Just Called to Say I Love You80s Chartstarz1980's
Best
Tunes14263000Tgq2qmy2woq7nofjnrrmmjup2qq70null2015Pop
LibraryI Still Haven't Found What I'm Looking For80s
Chartstarz1980's Best
Tunes26272000Tkoxzjl6xrfau5bcvozzbfpt65m70null2015PopLi
braryAy Ay Ay Ay Moosey80s Chartstarz1980's Best
Tunes4171000Tsuw5c2ncvprcr6tplyx7yzzegy70null2015PopLib
raryJump80s Chartstarz1980's Best
Tunes7240000Tlxrmfx3uwbwqm6y3j3b7zdqcua70null2015PopL
ibraryFight the Power80s Chartstarz1980's Best
Tunes3257000Tr3w3ge6c56ag77cqkjkbbp5rvi70null2015PopLib
raryStraight Up80s Chartstarz1980's Best
Tunes17235000Tx5d34coxtilzqrpnixd2jlsfz470null2015PopLibr
aryAll of My Heart80s Chartstarz1980's Best
5. Tunes20226000T454o66tpbawe66lr5tycofcjki70null2015PopLib
raryYou Came80s Chartstarz1980's Best
Tunes12198000Tzce6k3t2fttkmzsm4oapbu5xeq70null2015PopLi
braryBelfast Child80s Chartstarz1980's Best
Tunes28353000T4gdbt2psynrv5dmefhek2fwiiy70null2015PopLi
braryInvisible80s Chartstarz1980's Best
Tunes31223000Thcd4sjhvcoeapii5izj6qqchji70null2015PopLibr
aryStop Draggin' My Heart Around80s Chartstarz1980's Best
Tunes30244000T3whrfkrwzu3lzf4ezuwt6kp7zu70null2015PopLi
braryWe Are the World80s Chartstarz1980's Best
Tunes25351000Tgyonnnfqlfjywjli3piak2257470null2015PopLib
raryWhenever You Need Somebody80s Chartstarz1980's Best
Tunes24215000Tcyhj6iwpfkbucxjygyvbv7arbi70null2015PopLi
brarySing Our Own Song80s Chartstarz1980's Best
Tunes16212000T2dk4ikp3cxodfbet5dmyvdyxa470null2015PopL
ibraryMony Mony80s Chartstarz1980's Best
Tunes21254000Tdlkya4dotldijxpils5f6dor5m70null2015PopLibr
aryBrass in Pocket (I'm Special)80s Chartstarz1980's Best
Tunes10188000Tzy2owqsqg57qili6qw2uv7t6pu70null2015PopL
ibraryI'm Still Standing80s Chartstarz1980's Best
Tunes9176000T7fit2iliiapcl7peaaeyiip2cy70null2015PopLibrary
Out of Touch80s Chartstarz1980's Best
Tunes18204000Tor6xlqd7qjsjxnc3bxr3tkbpgy70null2015PopLib
raryAnother Day in Paradise80s Chartstarz1980's Best
Tunes8294000Tlynqs4r2pd7nhhcw6jhriqpqnq70null2015PopLib
rarySimply Irresistible80s Chartstarz1980's Best
Tunes2254000Tjvyam7pgt6edpgm5ya2bfurgny71null2015PopLi
braryI Found Someone80s Chartstarz1980's Best
Tunes13233000Tfgzwfwhuyttrhjtuhxkapo45fy70null2015PopLib
raryDanger Zone80s Chartstarz1980's Best
Tunes1212000Txm677sxryryagzkvjxdbbpk72q71null2015PopLi
braryThe Captain of Her Heart80s Chartstarz1980's Best
Tunes5239000T7yngn6ybpza3yzqoahbj3dcbna70null2015PopLi
braryJack & Diane80s Chartstarz1980's Best
Tunes22250000Tz72lsacseojt7uj2onsgm3va4i70null2015PopLib
raryRhythm Is Gonna Get You80s Chartstarz1980's Best
6. Tunes15237000Trguw7s6vcdvv3chddux6czohtu70null2015PopL
ibraryNight And DayJimmy
BrunoSolo12239000Tzcbnbyogxgn6v37itwmg4q5bpa70null2004
JazzLibraryLash OutAlice MertonNo Roots
EP2194000Tvkpbmzydjweqvmrzpcpmfatifu70null2017Alternati
ve/IndieLibraryBody Like A Back RoadSam HuntBody Like A
Back
Road1165000T74fdrq3trpmdivax7ghfz5lxha75null2017Country
LibraryFire At Midnight (2003 Remastered Version)Jethro
TullSongs From The
Wood9147000Te7qfvgf75ej25i5xqj22mblsii74null1977Progressi
ve/Art RockLibraryHigh Noon NeonJason AldeanRearview
Town15175000Tfgzmqqrfgafhu6tbm3dxmkwkwu5252018Countr
ycountryWalk, Don't RunThe VenturesWalk Don't
Run6122000Tblpjrwwcfzuebbz3mjflekpt7u55null1960RockSurfi
n' MikeTequilaThe
ChampsTequila1135000Tqo5ixyvqswkgiwp636lup4ogu454null2
009PopSurfin' MikePipelineThe
VenturesGold12143000T6g6hiuqxpwatu35pkf437o3biy53null20
06RockSurfin' MikeWipeoutBeach BoysBeach
Boys3136000Tje3a4z77clrwassqt7dz5axodm53null2014'60s
PopSurfin' MikeSurfer GirlBeach BoysBeach
Boys6138000Tzicgozv7pldsw4gkesteg3g2pi53null2014'60s
PopSurfin' MikeSurfin' SafariBeach BoysBeach
Boys1119000Ts5uhic64vvhffwtfc2uhv5tda452null2014'60s
PopSurfin' MikeSurfinBeach BoysBeach
Boys8133000T5jb2cxzo6hukh7krjvjdczywqe52null2014'60s
PopSurfin' MikeI Get AroundBeach BoysBeach
Boys15131000Tjdgtq42ut4qn3ilt3xwdptebpi52null2014'60s
PopSurfin' MikeMeant to Be (feat. Florida Georgia Line)Bebe
RexhaAll Your Fault: Pt.
26163000T3nxypw72ewkt3nr4ub2pb4id5m51252017PopThumbs
UpHigh Noon NeonJason AldeanRearview
Town15175000Tfgzmqqrfgafhu6tbm3dxmkwkwu5252018Countr
yThumbs UpMeant to Be (feat. Florida Georgia Line)Bebe
RexhaAll Your Fault: Pt.
7. 26163000T3nxypw72ewkt3nr4ub2pb4id5m51252017PopAugust
31, 2018 QueueIssues (Alan Walker Remix)Julia MichaelsIssues
(Alan Walker
Remix)1181000Tigeilxwbqketwpmurwmrnu6vhu51null2017Dan
ce/ElectronicAugust 31, 2018 QueueThe WaveR3HAB, Lia
Marie JohnsonThe
Wave2158000T35b3caqbvmmvnxlfsgtglckl7u51null2018PopAu
gust 31, 2018 QueueNo Promises (feat. Demi Lovato)Cheat
CodesNo Promises (feat. Demi
Lovato)1222000Tovudjlv2i2qaptv2e6uio6ajuy51null2017PopAu
gust 31, 2018 QueueLights Down LowMAXHell's Kitchen
Angel5223000Tsmwhvgvorgirpowjnbgfot24bi51null2016PopAu
gust 31, 2018
QueueGoldKiiaraGold1225000Tjn6f7feql3t4jpjx53jd7jppde51nu
ll2015PopAugust 31, 2018 QueueNow Or NeverHalseyhopeless
fountain kingdom
(Deluxe)6214000Tk3nzcvded7yxseifn7wgy6fcs451null2017Elec
tropopAugust 31, 2018 QueueI Got TimeBebe RexhaAll Your
Fault: Pt.
22230000Tg4x7xbljx5sa5pmkfncir3o3vi53null2017PopAugust
31, 2018 QueueHide AwayDayaSit Still, Look
Pretty6192000Tlvfrrrrckcvl4ovvup4f7f3vee51null2016PopAugu
st 31, 2018 QueueSolo (feat. Demi Lovato)Clean BanditSolo
(feat. Demi
Lovato)1222000Tqwwn7xrqxobxbiumq743t6wmgu51null2018D
ance/ElectronicAugust 31, 2018 QueueGirls Like You (feat.
Cardi B)Maroon 5Red Pill
Blues11235000Tbjnigbhufbsor4u3ls2fegjeoq54null2017PopAug
ust 31, 2018 QueueTip Toe (feat. French Montana)Jason
DeruloTip Toe (feat. French
Montana)1187000T3g2zzrfixiupdagq22okn6tzxu51null2017Pop
August 31, 2018 QueueRise (feat. Jack & Jack)Jonas
BlueRise1194000Tdmxuabsnst4vy3cq4p5tb343sy51null2018Dan
ce/ElectronicAugust 31, 2018 QueueMama SaidLukas
GrahamLukas
Graham3206000Telcjy4kpr4aosim5gp4s5pjrb451null2015PopAu
8. gust 31, 2018 QueueMercy (Loote Remix)Shawn MendesMercy
(Loote
Remix)1203000Tkykzdwev6qobdel76f4fykbqpu53null2016PopA
ugust 31, 2018 QueueAttention (Acoustic)Charlie PuthAttention
(Acoustic)1206000Tvnf7mblieuxfk2zy6devt4lz6454null2017Pop
August 31, 2018 QueueDancerFlo
RidaDancer1182000Twyqignxeu2r3a7rbqg2d4zy36451null2018
Hip-Hop/RapAugust 31, 2018 QueueGateway DrugBebe
RexhaAll Your Fault: Pt.
15212000Te4frlkxkppjxrdsqcbvuaa7isu53null2017Contemporar
y R&BAugust 31, 2018 QueueTG4MZara LarssonSo
Good5172000T76h4dwcgz5q3zbrcn3rqtap6pi51null2017PopAug
ust 31, 2018 QueueDon't LeaveSnakehips & MØDon't
Leave1214000T3srnlbpmywaqpwbdnndaoff5wa52null2017PopA
ugust 31, 2018 QueueYour Song (Acoustic)Rita OraYour Song
(Acoustic)1181000Tjyeff5rml2jvunyxekr2dpfwtm51null2017Po
pAugust 31, 2018
QueueHunterGalantisHunter1183000T72fnnnefn2i2d5ttrgwbqpit
se51null2017Dance/ElectronicAugust 31, 2018
QueueOverdoseAlessia CaraKnow-It-All
(Deluxe)8208000Twjzqhdbbo57jpwggtckmt545ty52null2015Con
temporary R&BAugust 31, 2018 QueueKnow No Better (feat.
Camila Cabello, Travis Scott & Quavo)Major LazerKnow No
Better1225000Tuqmq5xap36zpmtvmbspdfftxym51null2017Worl
dAugust 31, 2018 QueueI'll Be ThereJess GlynneI'll Be
There1193000Tolomkcdqro7her3zpwgztodurq50null2018PopAu
gust 31, 2018 QueueLove LiesKhalid & NormaniLove
Lies1201000Titldrdny22pkcw7re7fawnfgku50null2018R&B/Sou
lAugust 31, 2018 QueueLove MyselfHailee SteinfeldHow To Be
Single: Original Motion Picture
Soundtrack11217000Tkegig55zeeqkg4x5ke4icxwka450null2016
PopAugust 31, 2018 QueueKeep It Mello (feat. Omar
LinX)Marshmello & Omar
LinXJoytime10243000T3lvsqmnvvezvsnnep5edkqpknq50null20
16HouseAugust 31, 2018 QueueHappierEd Sheeran÷
(Deluxe)7207000Tvojp5xcrfhrgzvjudwivdz7wfq50null2017Pop
9. August 31, 2018 QueueBad At LoveHalseyhopeless fountain
kingdom
(Deluxe)11181000Twimc4ymgil5kzri5gyjuberz6u52null2017Ele
ctropopAugust 31, 2018 QueueFirst Love (feat. Sabrina
Carpenter)Lost KingsFirst
Love1207000T73wkc6xlvn6dffptk3g3ofqor450null2017Dance/E
lectronicAugust 31, 2018 QueueI'm a MessBebe
RexhaExpectations2195000T7kzpul4pmhmpuzeg2llcaxoy3q55n
ull2018PopAugust 31, 2018 QueueBad TogetherDua LipaDua
Lipa
(Deluxe)16238000Tt7pgcxmodaihnccny4zji7jddu50null2017Pop
August 31, 2018 Queuerockstar (feat. 21 Savage)Post
MaloneCrowd Pleasers (Vol.
II)24218000Tq6dyp5qiywncim2d6h4b33lpae50null2018Hip-
Hop/RapAugust 31, 2018 QueueConfidentDemi
LovatoConfident (Deluxe
Edition)1205000Tozrhnsqopnd5727nb3pu5yggmq50null2015Po
pAugust 31, 2018 QueueFamiliarLiam
PayneFamiliar1196000Trexknxckxx5ifspp73snksjmg450null201
8PopAugust 31, 2018 QueueScared To Be Lonely (DubVision
Remix)Martin GarrixScared To Be Lonely Remixes Vol.
12190000Tqbyqoyedt3iug4mrzsjuo4adau50null2017Dance/Elect
ronicAugust 31, 2018 QueueThunder / Young Dumb & Broke
(Medley)Imagine DragonsThunder / Young Dumb & Broke
(Medley)1251000Tzgpmgpij2sxn3xrezykspoyk7a51null2017Alte
rnative/IndieAugust 31, 2018
QueueDANCEDNCEDANCE1179000Tkjtmvyg22p6us6sxzpxcnl
3rbq50null2018PopAugust 31, 2018 QueueCloser (R3hab
Remix) (feat. Halsey)The ChainsmokersCloser
(Remixes)1161000Tp2bqjdkctpazdi65bklbli2kbm54null2016Dan
ce/ElectronicAugust 31, 2018 Queue2002Anne-MarieSpeak
Your Mind
(Deluxe)10187000T7eqmc5em5jgcg6soledbozx6le50null2018Po
pAugust 31, 2018 QueueInside OutCamila
CabelloCamila5182000Tjj32hmxf4peie3uucjtgngjpjm50null201
8PopAugust 31, 2018
10. QueueNewDayaNew1230000Ttmykv6jghxr7luellum5esu3xm50n
ull2017PopAugust 31, 2018 QueueGoneBebe
RexhaGone1227000Tkwv2lghd4v3xbtvdvgc2qd7vku52null2014
PopAugust 31, 2018 QueueSymphony (feat. Zara Larsson)
[Alternative Version]Clean BanditSymphony (feat. Zara
Larsson) [Alternative
Version]1212000Titpebf5hunyssm7sr3etcmnfau50null2017Danc
e/ElectronicAugust 31, 2018 QueueStand By YouRachel
PlattenWildfire1219000T56f73wcyfmuawsrdkc5gsdnbhm50null
2016PopAugust 31, 2018 QueueFuneralZara LarssonSo
Good13215000Tcud4lre2khftdf6qztisvtezbu50null2017PopAugu
st 31, 2018 QueueI Don’t Wanna Live Forever (Fifty Shades
Darker)ZAYN & Taylor SwiftFifty Shades Darker (Original
Motion Picture
Soundtrack)1245000Tdmbigeaqkedngvs2qdauwn5qca51null2017
SoundtracksAugust 31, 2018 QueueBorn To Be YoursKygoBorn
To Be
Yours1193000Tjylul6lautfumtl4snfea4rurm50null2018Dance/El
ectronicAugust 31, 2018 QueueDessert (Remix) (feat.
Silentó)DawinDessert2211000Tjyvioj62pcrpybamyjy2m6wd6q
50null2015PopAugust 31, 2018 Queue
answers a3_4 DBC-e08-QACS
(MIDTERM).accdbCustomerIDLastNameFirstNameAddressCity
StateZIPPhoneEmailAddressReferredBy1Shire
Robert 6225 Evanston Ave N Seattle
WA98103 206-524-2433[email protected]2Goodyear
Katherine 7335 11th Ave NE Seattle
WA98105 206-524-3544[email protected]13Bancroft
Chris 12605 NE 6th Street Bellevue
WA98005 425-635-9788[email protected]4Griffith
John 335 Aloha Street Seattle
WA98109 206-524-4655[email protected]25Tierney
Doris 14510 NE 4th Street Bellevue
WA98005 425-635-8677[email protected]36Anderson
Donna 1410 Hillcrest Parkway Mt. Vernon
11. WA98273 360-538-7566[email protected]7Svane
Jack 3211 42nd Street Seattle
WA98115 206-524-5766[email protected]48Walsh
Denesha 6712 24th Avenue NE Redmond
WA98053 425-635-7566[email protected]59Enquist
Craig 534 15th Street Bellingham
WA98225 360-538-6455[email protected]610Anderson
Rose 6823 17th Ave NE Seattle
WA98105 206-524-
6877[email protected]7EmployeeIDLastNameFirstNamePhoneE
mailAddressSupervisorTraining1Stuart Anne
206-527-0010[email protected]Completed2Stuart
George 206-527-
0011[email protected]1Completed3Stuart Mary
206-527-0012[email protected]1Completed4Orange
William 206-527-0013[email protected]3In
process5Griffith John 206-527-
0014[email protected]3In
processItemIDItemDescriptionPurchaseDateItemCostItemPriceV
endorID1Antique Desk11/7/161800.03000.022Antique Desk
Chair11/10/16300.0500.043Dining Table
Linens11/14/16600.01000.014Candles11/14/1630.050.015Candl
es11/14/1627.045.016Desk Lamp11/14/16150.0250.037Dining
Table Linens11/14/16450.0750.018Book
Shelf11/21/16150.0250.059Antique
Chair11/21/16750.01250.0610Antique
Chair11/21/161050.01750.0611Antique Candle
Holders11/28/16210.0350.0212Antique
Desk1/5/171920.03200.0213Antique
Desk1/5/172100.03500.0214Antique Desk
Chair1/6/17285.0475.0915Antique Desk
Chair1/6/17339.0565.0916Desk
Lamp1/6/17150.0250.01017Desk
Lamp1/6/17150.0250.01018Desk
Lamp1/6/17144.0240.0319Antique Dining
Table1/10/173000.05000.0720Antique
12. Sideboard1/11/172700.04500.0821Dining Table
Chairs1/11/175100.08500.0922Dining Table
Linens1/12/17450.0750.0123Dining Table
Linens1/12/17480.0800.0124Candles1/17/1730.050.0125Candle
s1/17/1736.060.01VendorIDPhonePhoneType1206-325-
67551206-329-9675Fax 2206-325-78662206-329-
9786Fax 3206-325-89773206-329-9897Fax
4425-746-54335425-746-43226206-325-90886206-329-9908Fax
7425-635-75668425-635-97888425-639-9978Fax
9415-422-21219415-423-5212Fax 10415-422-
323210415-429-9323Fax
SaleIDCustomerIDEmployeeIDSaleDateSubTotalTaxTotal11112
/14/163500.0290.53790.522112/15/161000.083.01083.033112/1
5/1650.04.1554.1544312/23/1645.03.7448.745151/5/17250.020.
75270.756551/10/17750.062.25812.257641/12/17250.020.75270
.758211/15/173000.0249.03249.09551/25/17350.029.05379.051
0712/4/1714250.01182.7515432.7511852/4/17250.020.75270.75
12542/7/1750.04.1554.1513922/7/174500.0373.54873.5141032/
11/173675.0305.033980.0315222/11/17800.066.4866.4SaleIDSa
leItemIDItemIDItemPrice1113000.0122500.02131000.031450.0
41545.0516250.0617750.0718250.08191250.082101750.091113
50.0101195000.0102218500.010322750.011117250.01212450.0
131204500.0141123200.014214475.015123800.0VendorIDCom
panyNameContactLastNameContactFirstNameAddressCityState
ZIPPhoneFaxEmailAddress1Lamps and Lighting
Huntington Anne 1515 NW Market
Street Seattle WA98107 206-325-
6755206-329-9675[email protected]2European Specialties
Tadema Ken 6123 15th Avenue NW
Seattle WA98107 206-325-7866206-329-
9786[email protected]3Lamps and Lighting
Swanson Sally 506 Prospect Street
Seattle WA98109 206-325-8977206-329-
9897[email protected]4Lee Andrew
1102 3rd Street Kirkland
WA98033 425-746-5433[email protected]5Harrison
13. Denise 533 10th Avenue Kirkland
WA98033 425-746-4322[email protected]6New York
Brokerage
Smith Mark 621 Roy Street
Seattle WA98109 206-325-9088206-329-
9908[email protected]7Walsh Denesha
6712 24th Avenue NE Redmond
WA98053 425-635-7566[email protected]8Bancroft
Chris 12605 NE 6th Street Bellevue
WA98005 425-635-9788425-639-
9978[email protected]9Specialty Antiques
Nelson Fred 2512 Lucky Street
San Francisco CA94110 415-422-2121415-423-
5212[email protected]10General Antiques
Garner Patty 2515 Lucky Street
San Francisco CA94110 415-422-3232415-429-
9323[email protected]
SELECT *
FROM CUSTOMER;
SELECT *
FROM EMPLOYEE;
SELECT *
FROM VENDOR;
SELECT *
FROM ITEM;
SELECT *
FROM SALE_ITEM;
SELECT ItemID, ItemDescription
FROM ITEM
WHERE ItemPrice >= 1000;
SELECT ItemID, ItemDescription
FROM ITEM, VENDOR
WHERE ItemPrice >= 1000
ANDCompanyName LIKE 'New*'
14. ANDITEM.VendorID = VENDOR.VendorID;
SELECT LastName, FirstName, Phone
FROM CUSTOMER
WHERE CustomerID IN
(SELECT CustomerID
FROM SALE
WHERE SaleID = 1);
SELECT LastName, FirstName, Phone
FROM CUSTOMER AS C INNER JOIN SALE AS S ON
C.CustomerID = S.CustomerID
WHERE SaleID = 1;
SELECT LastName, FirstName, Phone
FROM CUSTOMER
WHERE CustomerID IN
(SELECT CustomerID
FROM SALE
WHERE SaleID IN (1, 2, 3));
SELECT LastName, FirstName, Phone
FROM CUSTOMER AS C INNER JOIN SALE AS S ON
C.CustomerID = S.CustomerID
WHERE SaleID IN (1, 2, 3);
SELECT LastName, FirstName, Phone
FROM CUSTOMER
WHERE CustomerID IN
(SELECT CustomerID
FROM SALE
WHERE SubTotal > 500);
15. SELECT DISTINCT LastName, FirstName, Phone
FROM CUSTOMER AS C INNER JOIN SALE AS S ON
C.CustomerID = S.CustomerID
WHERE SubTotal > 500;
SELECT LastName, FirstName, Phone
FROM CUSTOMER
WHERE CustomerID IN
(SELECT CustomerID
FROM SALE
WHERE SaleID IN
(SELECT SaleID
FROM
SALE_ITEM
WHERE
ItemPrice > 500));
SELECT DISTINCT LastName, FirstName, Phone
FROM (CUSTOMER AS C INNER JOIN SALE AS S ON
C.CustomerID = S.CustomerID) INNER JOIN SALE_ITEM AS
SI ON S.SaleID = SI.SaleID
WHERE ItemPrice > 500;
SELECT LastName, FirstName, Phone
FROM CUSTOMER
WHERE CustomerID IN
(SELECT CustomerID
FROM SALE
WHERE SaleID IN