CASE STUDY
Internet/Excel Exercises, page 434, text
Record your findings in a Word document and submit it online
IBM has substantial operations in many countries, including the United States, Canada, and Germany. Go to finance.yahoo.com/q?s=ibm.
1. Click on Historical Prices. (Or apply this exercise to a different MNC.) Set the date range so that you can obtain quarterly values of the U.S. stock index for the last 20 quarters. Insert the quarterly data on a spreadsheet. Compute the percentage change in IBM’s stock price for each quarter. Next go to finance.yahoo.com/stock-center/ and click (under U.S.) on S&P Composite 1500 Index, which represents the U.S. stock market index, so that you can derive the quarterly percentage change in the U.S. stock index over the last 20 quarters. Then run a regression analysis with IBM’s quarterly return (percentage change in stock price) as the dependent variable and the quarterly percentage change in the U.S. stock market’s value as the independent variable. (Appendix C explains how Excel can be used to run regression analysis.) The slope coefficient serves as an estimate of the sensitivity of IBM’s value to the U.S. market returns. Also, check the fit of the relationship based on the R-squared statistic.
2. Go to finance.yahoo.com/stock-center/ and click (under “Europe”) on DAX, which represents the German stock market index. Repeat the process described in exercise 1 so that you can assess IBM’s sensitivity to the German stock market. Compare the slope coefficient between the two analyses. Is IBM’s value more sensitive to the U.S. market or the German market? Does the U.S. market or the German market explain a higher proportion of the variation in IBM’s returns (check the R-squared statistic)? Offer an explanation of your results.
Lab 5 Database Security
Use the script from week 1 for the week 5 lab.
1. Create four new users
a. The first user will have full rights to the database
b. The second user grant access to the Client’s table and allow them the rights to INSERT data into the clients table
c. The third user grant rights to create user logins and reset passwords
d. The fourth user grant column rights to the Course_Activity table allow access to the Course Code and Grade column. Allow user to UPDATE a maximum of 5 times per hour.
2. Login with each user to demonstrate the rights you have given them
a. User 1 login and create a VIEW for user 2 that just displays the Client table
b. User 2 login and add 3 more clients to the Clients table
c. User 3 login create two new users
d. User 4 login and UPDATE two new entries for Course Code and Grade Column for Client 1 and 2
e. For each user run the Show Privileges command to show correct rights and permissions have been applied
3. Show Log Files: For each user show log files (since we do not have MySQL Enterprise we cannot use the Audit function but as a substitute we can use the built-in log file function)
4. Create a Stored Procedure with User ...
Getting Started with Nastel AutoPilot Business Views and Policies - a TutorialSam Garforth
A tutorial presentation introducing the concepts of business views and policies for monitoring IBM MQ and any other middleware or technology for middleware-centric application performance management.
IBM Cognos 10 Framework Manager Metadata Modeling: Tips and TricksSenturus
Senturus shares insights and tips on IBM Cognos 10 Framework Manager Metadata Modeling. View the video recording and download this deck: http://www.senturus.com/resources/cognos-framework-manager-metadata-modeling-tips-tricks/.
Topics Include:
• Use determinants, parameter maps and query macros to implement row level security
• Understand the use of determinants and their importance
• Enhance your metadata by leveraging parameter maps and query macros
See a live demonstration of implementing row-level security based on user attributes, dimensional modeling of relational query subjects and use of Model Design Accelerator.
Senturus, a business analytics consulting firm, has a resource library with hundreds of free recorded webinars, trainings, demos and unbiased product reviews. Take a look and share them with your colleagues and friends: http://www.senturus.com/resources/.
Getting Started with Nastel AutoPilot Business Views and Policies - a TutorialSam Garforth
A tutorial presentation introducing the concepts of business views and policies for monitoring IBM MQ and any other middleware or technology for middleware-centric application performance management.
IBM Cognos 10 Framework Manager Metadata Modeling: Tips and TricksSenturus
Senturus shares insights and tips on IBM Cognos 10 Framework Manager Metadata Modeling. View the video recording and download this deck: http://www.senturus.com/resources/cognos-framework-manager-metadata-modeling-tips-tricks/.
Topics Include:
• Use determinants, parameter maps and query macros to implement row level security
• Understand the use of determinants and their importance
• Enhance your metadata by leveraging parameter maps and query macros
See a live demonstration of implementing row-level security based on user attributes, dimensional modeling of relational query subjects and use of Model Design Accelerator.
Senturus, a business analytics consulting firm, has a resource library with hundreds of free recorded webinars, trainings, demos and unbiased product reviews. Take a look and share them with your colleagues and friends: http://www.senturus.com/resources/.
Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docxsleeperfindley
Lab #1: Develop System Administration Procedures for Windows 8.1 Security Configuration
Purpose:
Develop systems administration procedures to implement systems security configuration guidance and best practices.
Objectives
1.
Develop a Windows
system restore point
systems administration procedure to implement an industry recognized best practice for maintaining system integrity and availability.
2.
Develop a Windows system administration procedure to manage
programs and features
.
3.
Develop a
systems administration
procedure to implement configuration rules from
systems security technical
guidance
issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures which can be incorporated into an organization’s security implementation guidance and documentation. For each procedure, you will develop, test, and document the steps required to implement the selected best practices and security configuration guidance (as provided in the lab instructions and notes). You will write three separate procedures for this lab:
(a)
Creating, Using, Removing System Restore Points for Windows 8.1
(b)
Managing Windows 8.1 Programs and Features
(c)
Implementing Security Configuration Rules for Windows 8.1
Each procedure will have the following major sections (see Figure 1):
·
Title:
·
Operating Environment:
·
Description:
·
Notes, Warnings, & Restrictions:
·
Resources (Further Reading):
·
Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g.
Create System Restore Points
) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for creating System Restore Points using the “System Restore ” tool….)
Title:
Operating Environment:
1.
Hardware
2.
Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
Figure 1. Required Outline for System Administration Procedures
Instructions
Part (a): Implementing System Restore Points
1.
Investigate the
System Restore
tool (used to manage system restore points). To access the tool, open the
System
tool from Control Panel (Control Panel > System and Security > System). Then, click on System Protection (left menu).
2.
Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Windows 8.1 System Restore Point capability. Using those sources, research the procedures required to perform the following tasks:
a.
Create a system restore point for a Windows 8.1 system
b.
Use a system r.
Lab #2 Managing Host Based Security Purpose To develop .docxsmile790243
Lab #2: Managing Host Based Security
Purpose: To develop and verify system administration and vulnerability management procedures which implement host based security capabilities for Windows 8.1
Objectives
1. Develop systems administration procedures to configure and manage host-based security capabilities (firewall and anti-virus/anti-malware).
2. Develop systems management procedures to scan for and remediate software and configuration vulnerabilities in Windows 8.1 systems.
Overview
In this lab, our focus is upon implementing and managing host-based security for Windows 8.1 systems using the following tools:
· Windows Defender
· Windows Firewall
· Microsoft Baseline Security Analyzer (MBSA)
Note: Windows Defender and Windows Firewall are found under Control Panel. MBSA can be found using Windows Search (Windows Key + R).
For each tool, you will research and then write a step-by-step procedure to configure the tool according to security best practices for Windows 8.1 hosts. Each of these tools can be used as part of an overall information security vulnerability management business process.
You will write three separate procedures for this lab:
(a) Managing Windows Defender
(b) Managing Windows Firewall
(c) Managing Vulnerabilities using Microsoft Baseline Security Analyzer
Each procedure will have the following major sections (see Figure 1):
· Title:
· Operating Environment:
· Description:
· Notes, Warnings, & Restrictions:
· Resources (Further Reading):
· Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g. Scanning for Threats) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for running scans using Windows Defender….)
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
InstructionsPart (a): Managing Windows Defender
1. Investigate the use of Windows Defender to protect a Windows 8/8.1 system against viruses, spyware, and other forms of malware. Your investigation should include researching best practices for configuring and using host-based anti-malware software.
2. Develop step by step procedures to implement best practices for protecting a Windows 8/8.1 system from malware. At a minimum, your procedures must accomplish the following:
a. Update anti-virus definition files
b. Configure real-time scanning
c. Full system scanning
d. Fast or quick scan for high vulnerability areas of the system
e. Removable media scanning
f. Reviewing scan results including reviewi ...
Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docxDIPESH30
Lab #1: Develop System Administration Procedures for Windows 8.1 Security Configuration
Purpose: Develop systems administration procedures to implement systems security configuration guidance and best practices.
Objectives
1. Develop a Windows system restore point systems administration procedure to implement an industry recognized best practice for maintaining system integrity and availability.
2. Develop a Windows system administration procedure to manage programs and features.
3. Develop a systems administration procedure to implement configuration rules from systems security technicalguidance issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures which can be incorporated into an organization’s security implementation guidance and documentation. For each procedure, you will develop, test, and document the steps required to implement the selected best practices and security configuration guidance (as provided in the lab instructions and notes).
Your deliverables for this lab will become part of the final project for this course (System Administration Manual).
Deliverables
(a) Step-by-Step System Administration Procedure for Creating, Using, Removing System Restore Points for Windows 8.1
(b) Step-by-Step System Administration Procedure for Managing Windows 8.1 Programs and Features
(c) Step-by-Step System Administration Procedure for Implementing Security Configuration Rules for Windows 8.1
Submit your deliverables in a SINGLE FILE in MS Word format (.docx or .doc file types) using the corresponding assignment folder entry (in LEO). (Use the Deliverable Template file from Course Resources > Sample Files > CSIA 310 Lab Deliverable Template.docx.) Every deliverable must use the format shown below. (Replace [Section Name] with the heading for the section, e.g. Creating a System Restore Point).
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Section Name]
Brief Introduction Paragraph
1.
2.
3.
[Section Name]
Brief Introduction Paragraph
1.
2.
3.
InstructionsPart (a): Implementing System Restore Points
1. Investigate the System Restore tool (used to manage system restore points). To access the tool, open the System tool from Control Panel (Control Panel > System and Security > System). Then, click on System Protection (left menu).
2. Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Windows 8.1 System Restore Point capability. Using those sources, research the procedures required to perform the following tasks:
a. Create a system restore point for a Windows 8.1 system
b. Use a system restore point to roll-back changes made to a Windows 8.1 system
c. Remove system restore points from a Windows 8.1 system (some and all)
3. Develop a systems administration procedure which can be used to perfo ...
ENGR 131 Elementary Computer ProgrammingTeam IN – InstructorTanaMaeskm
ENGR 131: Elementary Computer Programming
Team IN – Instructor
Midterm Exam
INSTRUCTIONS
Complete the exercises below and upload them to Canvas as a single MATLAB script file (.m) using the naming convention “ENGR131_21F_Midterm_abc123.m”, replacing abc123 with your Case ID, and ## with the two- digit lab number.
For example, if Dr. Williams were submitting this test, it would be ENGR131_21F_Midterm_mrw8.m For your script, please perform the following:
1. Separate each question into separate, runnable sections using the “%%” comment notation.
2. You may use the code and notes from class, the textbook, and MATLAB’s documentation.
3. Use comments as appropriate to indicate your thoughts and how your code works (or is supposed to work). This is 10 points (10%) of your grade.
QUESTIONS
There are 3 questions for this exam.
(
ENGR 131 21F-IN-060-101-A (Midterm Instructions)
) (
9/23/2021
) (
Page
1
of 5
)
1. SOLVING SYSTEMS OF EQUATIONS (20 PTS)
There’s a chill in the air and Fall is here. There are so many neat things that make Fall so special, as shown in Figure 1. Solve for the value of each Fall icon using a systems of equations approach. DO NOT use the symbolic solver (you will receive 0 points if you do). You will know you have the right answer as the correct values in the correct order, when rounded, transposed, and converted to characters, should spell out a recognizable word. Return your solution values to the Command Window.
580
401
378
740
Key:
474
531
Apple Football Grapes Leaves Pumpkin Tree
Fig. 1. The themes of Fall
2. COMPUTING VOLUMES (20 PTS)
A particular conical red cup is often found at many social gatherings in college filled with apple cider. The dimensions of this cup can be found in Figure 2a. Based on these dimensions, use Matlab to determine the locations at which you would place markings for 5, 9, and 16 oz. of fluid such that the volume at each height computed would match each target volume. Use the method of computing the volume of a revolved solid using a step size of 0.15 in. and iterating the volume calculation (your choice of method) with an increasing height until the correct volume is reached. Report these computed heights to the Command Window and replicate Figure 2b.
5
4.5
4
3.5
(
Fluid Depth (in)
)3
2.5
2
1.5
1
0.5
Cup Profile With Markings for 5, 9, and 16 oz.
0
(a) (b)
(
Cup 3
oz
8
oz
14.5 oz
)0 0.5 1
1.5 2 2.5 3 3.5 4 4.5 5
Cup Radius (in)
Figure 2. Dimensions of popular party cup (a), and profile of cup with the height of each target volume shown (b).
3. CELL SIMULATOR (50 PTS)
Program a basic simulator that uses a few simple rules to govern whether cells in a “dish” persist or die and when new living cells appear. At each step in your simulation it should show those cells that are going to die and those that will become live with red ‘x’s and green stars respectively as shown in Figure 3b before ending the step wi ...
Student Lab Activity A. Lab # CIS CIS170A-A1B. Lab.docxemelyvalg9
Student Lab Activity
A. Lab # CIS CIS170A-A1
B. Lab 5s of 7: Modularization
C. Lab Overview – Scenario / Summary:
TCOs:
TCO: 7
Given a set of program specifications for a simple business problem utilizing a modular design, code and test a program that meets the specifications and employs best programming practices.
TCO: 8
Given a set of program specifications for a simple business problem, code and test a program that implements methods with parameter lists that are passed as supported by the chosen programming language
This lab will familiarize the student with the process of modularizing his or her code.
D. Deliverables:
Step
Deliverable
Points
5
Program Listing, Output, and Project Files
45
The Dropbox deliverables include the following.
1. Include a zipped file with all the files from your Visual Basic project (see directions in Doc Sharing on how to collect and zip files.)
2. Create a single MS Word document and include the following.
· For each lab, copy and paste your code directly into the MS Word file.
· Include screenshot(s) of your test data with test results. Enter enough data to demonstrate that all your code has been tested.
· Include another screenshot of the Visual Basic build output messages. Check your build output to make sure you have a successful build with (0) errors and (0) warnings. NOTE: The build output messages appear at the bottom of your window after you click the Build menu and before you click the Start Without Debugging option. Your build output messages provide a list of compiler warnings or errors and let you know whether your program compiled successfully.
· Include the Word document as part of the zipped project file.
3. Upload each part of the lab into its corresponding weekly Dropbox.
E. Lab Steps:
Preparation:
If you are using the Citrix remote lab, follow the login instructions located in the iLab tab in Course Home.
Locate the Visual Studio 2010 Icon on the desktop. Click to open.
Lab:
Step 1: Create a New Project
Create a new project in VB.NET. Name your project CIS170A_Lab05.
Practically every real-world professional program in existence today uses some type of modular design—this is just the way programs are designed and built. As a result, the primary objective of this lab is for you to understand how modular programs are designed and how data are passed between modules as the program is executing. This may be one of the most important lessons of this course, so it is critical that you focus on the modular design of the program; if you have any questions, post them to the Lab Forum threaded discussion.
In this project, we are going to use the Week 4 Hockey Player Statistics program that you created last week as a starting point and make a few minor changes in the program requirements. What you will do is take the existing project and with only slight modifications to the form design you will modularize the design of the code and then add a few new requirements. As you .
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docxketurahhazelhurst
1. The ALIVE status of each SEX. (SEX needs to be integrated into the only Male, Female, ND, and Other) (bar comparison chart, pie comparison chart)
2. How many Male, Female, ND, and Other are there in each ALIGN. (Bar comparison chart)
3. How many red-haired heroes do Marvel and DC have?
.
1. Some potentially pathogenic bacteria and fungi, including strains.docxketurahhazelhurst
1. Some potentially pathogenic bacteria and fungi, including strains of Enterococcus, Staphylococcus, Candida, and Aspergillus, can survive for one to three months on a variety of materials found in hospitals, including scrub suits, lab coats, plastic aprons, and computer keyboards. What can hospital personnel do to reduce the spread of these pathogens?
2. Human immunodeficiency virus (HIV) preferentially destroys CD4+ cells. Specifically, what effect does this have on antibody and cell-mediated immunity?
**Provide APA references for each
.
More Related Content
Similar to CASE STUDY InternetExcel Exercises, page 434, textRecord your.docx
Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docxsleeperfindley
Lab #1: Develop System Administration Procedures for Windows 8.1 Security Configuration
Purpose:
Develop systems administration procedures to implement systems security configuration guidance and best practices.
Objectives
1.
Develop a Windows
system restore point
systems administration procedure to implement an industry recognized best practice for maintaining system integrity and availability.
2.
Develop a Windows system administration procedure to manage
programs and features
.
3.
Develop a
systems administration
procedure to implement configuration rules from
systems security technical
guidance
issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures which can be incorporated into an organization’s security implementation guidance and documentation. For each procedure, you will develop, test, and document the steps required to implement the selected best practices and security configuration guidance (as provided in the lab instructions and notes). You will write three separate procedures for this lab:
(a)
Creating, Using, Removing System Restore Points for Windows 8.1
(b)
Managing Windows 8.1 Programs and Features
(c)
Implementing Security Configuration Rules for Windows 8.1
Each procedure will have the following major sections (see Figure 1):
·
Title:
·
Operating Environment:
·
Description:
·
Notes, Warnings, & Restrictions:
·
Resources (Further Reading):
·
Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g.
Create System Restore Points
) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for creating System Restore Points using the “System Restore ” tool….)
Title:
Operating Environment:
1.
Hardware
2.
Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
Figure 1. Required Outline for System Administration Procedures
Instructions
Part (a): Implementing System Restore Points
1.
Investigate the
System Restore
tool (used to manage system restore points). To access the tool, open the
System
tool from Control Panel (Control Panel > System and Security > System). Then, click on System Protection (left menu).
2.
Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Windows 8.1 System Restore Point capability. Using those sources, research the procedures required to perform the following tasks:
a.
Create a system restore point for a Windows 8.1 system
b.
Use a system r.
Lab #2 Managing Host Based Security Purpose To develop .docxsmile790243
Lab #2: Managing Host Based Security
Purpose: To develop and verify system administration and vulnerability management procedures which implement host based security capabilities for Windows 8.1
Objectives
1. Develop systems administration procedures to configure and manage host-based security capabilities (firewall and anti-virus/anti-malware).
2. Develop systems management procedures to scan for and remediate software and configuration vulnerabilities in Windows 8.1 systems.
Overview
In this lab, our focus is upon implementing and managing host-based security for Windows 8.1 systems using the following tools:
· Windows Defender
· Windows Firewall
· Microsoft Baseline Security Analyzer (MBSA)
Note: Windows Defender and Windows Firewall are found under Control Panel. MBSA can be found using Windows Search (Windows Key + R).
For each tool, you will research and then write a step-by-step procedure to configure the tool according to security best practices for Windows 8.1 hosts. Each of these tools can be used as part of an overall information security vulnerability management business process.
You will write three separate procedures for this lab:
(a) Managing Windows Defender
(b) Managing Windows Firewall
(c) Managing Vulnerabilities using Microsoft Baseline Security Analyzer
Each procedure will have the following major sections (see Figure 1):
· Title:
· Operating Environment:
· Description:
· Notes, Warnings, & Restrictions:
· Resources (Further Reading):
· Procedures:
Some procedures will contain a large number of steps. To make the procedures easier to read, you should divide your procedures into groups of related steps. Place a group heading (e.g. Scanning for Threats) at the beginning of each group. Each group heading should be followed by a brief paragraph that explains the purpose of the group (e.g. This group (or “section”) contains step by step instructions for running scans using Windows Defender….)
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
[Group Heading]
Brief introduction paragraph for this group of steps
1.
2.
3.
InstructionsPart (a): Managing Windows Defender
1. Investigate the use of Windows Defender to protect a Windows 8/8.1 system against viruses, spyware, and other forms of malware. Your investigation should include researching best practices for configuring and using host-based anti-malware software.
2. Develop step by step procedures to implement best practices for protecting a Windows 8/8.1 system from malware. At a minimum, your procedures must accomplish the following:
a. Update anti-virus definition files
b. Configure real-time scanning
c. Full system scanning
d. Fast or quick scan for high vulnerability areas of the system
e. Removable media scanning
f. Reviewing scan results including reviewi ...
Lab #1 Develop System Administration Procedures for Windows 8.1 Sec.docxDIPESH30
Lab #1: Develop System Administration Procedures for Windows 8.1 Security Configuration
Purpose: Develop systems administration procedures to implement systems security configuration guidance and best practices.
Objectives
1. Develop a Windows system restore point systems administration procedure to implement an industry recognized best practice for maintaining system integrity and availability.
2. Develop a Windows system administration procedure to manage programs and features.
3. Develop a systems administration procedure to implement configuration rules from systems security technicalguidance issued by a vendor or government organization.
Overview
In this lab, our focus is upon developing a set of procedures which can be incorporated into an organization’s security implementation guidance and documentation. For each procedure, you will develop, test, and document the steps required to implement the selected best practices and security configuration guidance (as provided in the lab instructions and notes).
Your deliverables for this lab will become part of the final project for this course (System Administration Manual).
Deliverables
(a) Step-by-Step System Administration Procedure for Creating, Using, Removing System Restore Points for Windows 8.1
(b) Step-by-Step System Administration Procedure for Managing Windows 8.1 Programs and Features
(c) Step-by-Step System Administration Procedure for Implementing Security Configuration Rules for Windows 8.1
Submit your deliverables in a SINGLE FILE in MS Word format (.docx or .doc file types) using the corresponding assignment folder entry (in LEO). (Use the Deliverable Template file from Course Resources > Sample Files > CSIA 310 Lab Deliverable Template.docx.) Every deliverable must use the format shown below. (Replace [Section Name] with the heading for the section, e.g. Creating a System Restore Point).
Title:
Operating Environment:
1. Hardware
2. Software
Description:
Notes, Warnings, & Restrictions:
Resources (Further Reading):
1.
2.
3.
Procedures:
[Section Name]
Brief Introduction Paragraph
1.
2.
3.
[Section Name]
Brief Introduction Paragraph
1.
2.
3.
InstructionsPart (a): Implementing System Restore Points
1. Investigate the System Restore tool (used to manage system restore points). To access the tool, open the System tool from Control Panel (Control Panel > System and Security > System). Then, click on System Protection (left menu).
2. Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Windows 8.1 System Restore Point capability. Using those sources, research the procedures required to perform the following tasks:
a. Create a system restore point for a Windows 8.1 system
b. Use a system restore point to roll-back changes made to a Windows 8.1 system
c. Remove system restore points from a Windows 8.1 system (some and all)
3. Develop a systems administration procedure which can be used to perfo ...
ENGR 131 Elementary Computer ProgrammingTeam IN – InstructorTanaMaeskm
ENGR 131: Elementary Computer Programming
Team IN – Instructor
Midterm Exam
INSTRUCTIONS
Complete the exercises below and upload them to Canvas as a single MATLAB script file (.m) using the naming convention “ENGR131_21F_Midterm_abc123.m”, replacing abc123 with your Case ID, and ## with the two- digit lab number.
For example, if Dr. Williams were submitting this test, it would be ENGR131_21F_Midterm_mrw8.m For your script, please perform the following:
1. Separate each question into separate, runnable sections using the “%%” comment notation.
2. You may use the code and notes from class, the textbook, and MATLAB’s documentation.
3. Use comments as appropriate to indicate your thoughts and how your code works (or is supposed to work). This is 10 points (10%) of your grade.
QUESTIONS
There are 3 questions for this exam.
(
ENGR 131 21F-IN-060-101-A (Midterm Instructions)
) (
9/23/2021
) (
Page
1
of 5
)
1. SOLVING SYSTEMS OF EQUATIONS (20 PTS)
There’s a chill in the air and Fall is here. There are so many neat things that make Fall so special, as shown in Figure 1. Solve for the value of each Fall icon using a systems of equations approach. DO NOT use the symbolic solver (you will receive 0 points if you do). You will know you have the right answer as the correct values in the correct order, when rounded, transposed, and converted to characters, should spell out a recognizable word. Return your solution values to the Command Window.
580
401
378
740
Key:
474
531
Apple Football Grapes Leaves Pumpkin Tree
Fig. 1. The themes of Fall
2. COMPUTING VOLUMES (20 PTS)
A particular conical red cup is often found at many social gatherings in college filled with apple cider. The dimensions of this cup can be found in Figure 2a. Based on these dimensions, use Matlab to determine the locations at which you would place markings for 5, 9, and 16 oz. of fluid such that the volume at each height computed would match each target volume. Use the method of computing the volume of a revolved solid using a step size of 0.15 in. and iterating the volume calculation (your choice of method) with an increasing height until the correct volume is reached. Report these computed heights to the Command Window and replicate Figure 2b.
5
4.5
4
3.5
(
Fluid Depth (in)
)3
2.5
2
1.5
1
0.5
Cup Profile With Markings for 5, 9, and 16 oz.
0
(a) (b)
(
Cup 3
oz
8
oz
14.5 oz
)0 0.5 1
1.5 2 2.5 3 3.5 4 4.5 5
Cup Radius (in)
Figure 2. Dimensions of popular party cup (a), and profile of cup with the height of each target volume shown (b).
3. CELL SIMULATOR (50 PTS)
Program a basic simulator that uses a few simple rules to govern whether cells in a “dish” persist or die and when new living cells appear. At each step in your simulation it should show those cells that are going to die and those that will become live with red ‘x’s and green stars respectively as shown in Figure 3b before ending the step wi ...
Student Lab Activity A. Lab # CIS CIS170A-A1B. Lab.docxemelyvalg9
Student Lab Activity
A. Lab # CIS CIS170A-A1
B. Lab 5s of 7: Modularization
C. Lab Overview – Scenario / Summary:
TCOs:
TCO: 7
Given a set of program specifications for a simple business problem utilizing a modular design, code and test a program that meets the specifications and employs best programming practices.
TCO: 8
Given a set of program specifications for a simple business problem, code and test a program that implements methods with parameter lists that are passed as supported by the chosen programming language
This lab will familiarize the student with the process of modularizing his or her code.
D. Deliverables:
Step
Deliverable
Points
5
Program Listing, Output, and Project Files
45
The Dropbox deliverables include the following.
1. Include a zipped file with all the files from your Visual Basic project (see directions in Doc Sharing on how to collect and zip files.)
2. Create a single MS Word document and include the following.
· For each lab, copy and paste your code directly into the MS Word file.
· Include screenshot(s) of your test data with test results. Enter enough data to demonstrate that all your code has been tested.
· Include another screenshot of the Visual Basic build output messages. Check your build output to make sure you have a successful build with (0) errors and (0) warnings. NOTE: The build output messages appear at the bottom of your window after you click the Build menu and before you click the Start Without Debugging option. Your build output messages provide a list of compiler warnings or errors and let you know whether your program compiled successfully.
· Include the Word document as part of the zipped project file.
3. Upload each part of the lab into its corresponding weekly Dropbox.
E. Lab Steps:
Preparation:
If you are using the Citrix remote lab, follow the login instructions located in the iLab tab in Course Home.
Locate the Visual Studio 2010 Icon on the desktop. Click to open.
Lab:
Step 1: Create a New Project
Create a new project in VB.NET. Name your project CIS170A_Lab05.
Practically every real-world professional program in existence today uses some type of modular design—this is just the way programs are designed and built. As a result, the primary objective of this lab is for you to understand how modular programs are designed and how data are passed between modules as the program is executing. This may be one of the most important lessons of this course, so it is critical that you focus on the modular design of the program; if you have any questions, post them to the Lab Forum threaded discussion.
In this project, we are going to use the Week 4 Hockey Player Statistics program that you created last week as a starting point and make a few minor changes in the program requirements. What you will do is take the existing project and with only slight modifications to the form design you will modularize the design of the code and then add a few new requirements. As you .
Similar to CASE STUDY InternetExcel Exercises, page 434, textRecord your.docx (20)
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docxketurahhazelhurst
1. The ALIVE status of each SEX. (SEX needs to be integrated into the only Male, Female, ND, and Other) (bar comparison chart, pie comparison chart)
2. How many Male, Female, ND, and Other are there in each ALIGN. (Bar comparison chart)
3. How many red-haired heroes do Marvel and DC have?
.
1. Some potentially pathogenic bacteria and fungi, including strains.docxketurahhazelhurst
1. Some potentially pathogenic bacteria and fungi, including strains of Enterococcus, Staphylococcus, Candida, and Aspergillus, can survive for one to three months on a variety of materials found in hospitals, including scrub suits, lab coats, plastic aprons, and computer keyboards. What can hospital personnel do to reduce the spread of these pathogens?
2. Human immunodeficiency virus (HIV) preferentially destroys CD4+ cells. Specifically, what effect does this have on antibody and cell-mediated immunity?
**Provide APA references for each
.
1. Taking turns to listen to other students is not always easy f.docxketurahhazelhurst
1. Taking turns to listen to other students is not always easy for young children. What does the research show about promoting good listeners in the classroom setting?
2. How would you help the shyest student to become a confident speaker? How would you help the overly confident speaker to have self-control? Why are these skills important to instill in children at this age? How can becoming a confident speaker encourage stronger advocacy skills for themselves? Likewise, how does maintaining self-control encourage better listening?
.
1. The main characters names in The Shape of Things are Adam and E.docxketurahhazelhurst
1. The main characters names in "The Shape of Things" are Adam and Evelyn, suggesting the play is a retelling of the original creation myth. Compare the original “Adam and Eve” and characters in the Judea-Christian creation account to Adam and Evelyn. How is The Shape of Things similar or different from the traditional Judea-Xian account? (Keep in mind the main difference being art and artistic versus theistic creation).
2. The “garden” is the museum, and roped off sculpture with the fig leaf is, like the tree of good and evil, what you’re not supposed to touch. Why does the author present the museum as a creation space? How is the sculpture like the tree of good and evil? What happens when they cross the line and touch (or photograph) it?
3. Compare Evelyn and Pygmalion as creators. How does their gender effect their position in history and creation? How do both their creations critique the culture in which they exist? Describe the "changes" to society that Evelyn and Pygmalion aspire to in their art.
4. How much are the creators (Evelyn and Pygmalion) in control of creation and their art work? Where does their control break down? What is the difference between creator and creature; or is the creature reducible to its creator?
5. When does Adam assert his own mind, (if at all) or veer towards independence by not relying on the tools to achieve superficial beauty that Evelyn imparts?
.
1. Select one movie from the list belowShutter Island (2010; My.docxketurahhazelhurst
1. Select one movie from the list below:
Shutter Island (2010; Mystery, Thriller; Leonardo DiCaprio, Mark Ruffalo
2. Watch the film you have selected as a psychology student and not merely as an ordinary film viewer (it is suggested that you watch the selected film multiple times).
3. Provide your own summary of the film, using psychological terms and concepts that you have learned in class and from your textbook. State clearly the psychological disorder you have seen portrayed in the film you have chosen, using DSM criteria/language. You should explain the psychological disorder portrayed in the movie. Determine and evaluate if the disorder identified in the film is accurate according to your textbook and other resource materials. Provide evidence using actual behaviors seen in the film. Is the depiction of the psychological disorder in the film accurate or not? Give evidence to support your claims using observable behaviors from the movie.
4. Based on the information from the film, determine what clinical diagnosis (or diagnoses) a character from the movie most likely has/have (can be the main character or supporting characters). Use criteria provided by the DSM-5 and provide an evidence-based diagnosis/diagnoses of the person. You will need to justify their diagnoses by demonstrating how the character’s symptoms meet some or all the criteria outlined in the DSM-5 as evidence of your diagnosis/diagnoses. Everything that you assert should be supported by evidence.
7. Be sure to use APA format using the latest edition of the APA Manual (7th edition).
.
1. Select a system of your choice and describe the system life-cycle.docxketurahhazelhurst
1. Select a system of your choice and describe the system life-cycle. Construct a detailed flow diagram tailored to your situation
2. What characteristics of an airplane would you attribute to the system as a whole rather than to a collection of its parts? Explain why.
.
1. Sensation refers to an actual event; perception refers to how we .docxketurahhazelhurst
1. Sensation refers to an actual event; perception refers to how we interpret the event. What are some cultural differences that might affect responses to particular stimuli, particularly in taste and pain?
2. Most of us feel like we never get enough sleep. What are the stages of sleep and what is the importance of sleep? What are some common sleep disorders and treatments?
.
1. The Institute of Medicine (now a renamed as a part of the N.docxketurahhazelhurst
1. The Institute of Medicine (now a renamed as a part of the
National Academies of Sciences, Engineering, and Medicine
) defined patient-centered care as: "Providing care that is respectful of and responsive to individual patient preferences, needs, and values, and ensuring that patient values guide all clinical decisions.”[1] While this definition clearly emphasizes the importance of a patient’s perspective in the context of clinical care delivery, it does not allow managers to focus on the actual “person” inside the institutional role of the patient.
In the same sense that a person who is incarcerated in a prison may receive extremely humane treatment, the “person” is still defined into the role of an “inmate,” and as such cannot, by definition, be granted the same rights and privileges as a non-institutionalized member of the civil order enjoys. In other words, I may be placed in a cell with great empathy and understanding of my preferences, needs, and values, but I am still being locked-up in jail.
No one is suggesting that being admitted into a jail cell is the same as being admitted into a hospital bed. There are many obvious differences between the two, including the basic purpose of the two institutions.
But while much is different, what is the same is how a pre-existing set of structured behaviors and processes are used to firmly, and without asking or negotiating, radically transform a “regular” person into a defined role of a “patient” that then can be diagnosed, treated, and discharged back into the world once the patient has finished their “time” in the “system.”
While patient-centered care emphasizes the value of increased sensitivity to a patient’s preferences, needs, and values, what we want to focus on is how decisions made by healthcare leaders affect the actual experience of a person receiving that care.
So with the "real person" in mind, this week's question is:
What can healthcare leaders do in improve the actual personal experience that "real people" go through as our "patients?"
(Be sure to develop your answers AFTER you review the definition and roles of "Leadership" in the readings for this week).
[1] Institute on Medicine, Crossing the Quality Chasm: A New Health System for the 21st Century, March, 2001
2. Health Information Technonogy - PPP Discussion
The board has created an innovation fund designed to foster improved quality, increased access, or reduced costs in healthcare delivery. Select a health information technology related to genomics, precision medicine, or diagnostics that you would propose to be funded for implementation. Prepare a PowerPoint presentation that describes the selected health information technology, what it does, why it would be beneficial, and what risks may be involved. Please note, this activity is weighted 5% toward the final grade. The PowerPoint should be no more than 5-6 slides with the presenter's notes. Follow the APA format.
.
1. The Documentary Hypothesis holds that the Pentateuch has a number.docxketurahhazelhurst
1. The Documentary Hypothesis holds that the Pentateuch has a number of underlying documents (alt., sources) that were ultimately gathered and sewn into the Pentateuch as we now have it. The method of separating those underlying documents is called source criticism. Please perform a source-critical analysis of Gen 1-3. In so doing, please identify the significant features that distinguish each underlying document. Note: There are many such features.
2. Why are covenants important in the Bible? What do they accomplish? Are they all the same, whether in structure or outlook? Do the different writers view them differently? What does the ancient Near Eastern background to the biblical covenant contribute to our understanding?
3. Dt 6:4 used to be translated
“Hear, O Israel: The LORD [YHWH] our God, the LORD [YHWH] is one.”
Currently, we translate
“Hear, O Israel: The LORD [YHWH] is our God, the LORD [YHWH] alone.”
In all likelihood, the second translation is grammatically preferable. What is the interpretive difference between “one” and “alone”? Is it significant? How, if at all, does this verse relate to the First Commandment? How does this verse relate to Gen 1:26, 3:22, and 11:7? How does this verse relate to the variant non-MT variant in Dt 32:8-9 (as reproduced in HarperCollins)? Why is any of this important?
Be sure to provide a careful, well-written essay which gives ample biblical examples (proof texts) to support the point(s) you wish to make.
.
1. Search the internet and learn about the cases of nurses Julie.docxketurahhazelhurst
1. Search the internet and learn about the cases of nurses Julie Thao and Kimberly Hiatt.
2. List and discuss lessons that you and all healthcare professionals can learn from these two cases.
3. Describe how the principle of beneficence and the virtue of benevolence could be applied to these cases. Do you think the hospital adminstrators handled the situations legally and ethically?
4. In addition to benevolence, which other virtues exhibited by their colleagues might have helped Thao and Hiatt?
5. Discuss personal virtues that might be helpful to second victims themselves to navigate the grieving process.
Scholarly article, APA format, and no grammar error
.
1. Search the internet and learn about the cases of nurses Julie Tha.docxketurahhazelhurst
1. Search the internet and learn about the cases of nurses Julie Thao and Kimberly Hiatt.
2. List and discuss lessons that you and all healthcare professionals can learn from these two cases.
3. Describe how the principle of beneficence and the virtue of benevolence could be applied to these cases. Do you think the hospital adminstrators handled the situations legally and ethically?
4. In addition to benevolence, which other virtues exhibited by their colleagues might have helped Thao and Hiatt?
5. Discuss personal virtues that might be helpful to second victims themselves to navigate the grieving process.
use reference and scholarly nursing article.
.
1. Review the three articles about Inflation that are found below th.docxketurahhazelhurst
1. Review the three articles about Inflation that are found below this.
Globalization and Inflatio
n
Drivers of Inflation
Inflation
and Unemploymen
t
2. Locate two JOURNAL articles which discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.
3. Summarize these journal articles. Please use your own words. No copy-and-paste. Cite your sources.
4.The replies are due by the deadline specified in the Course Schedule.
Please post (in APA format) your article citation.
.
1. Review the following request from a customerWe have a ne.docxketurahhazelhurst
1. Review the following request from a customer:
We have a need to replace the aging Signage Application. This application is housed in District 4 and serves the district as well as two other districts. We would like a new application that can be used statewide to track all information related to road signs.
The current system is old and doesn’t do most of what we need it to.
The current system has a whole bunch of reports, but no way for the user to update them by themselves without getting IT involved.
We also can’t create our own reports, on-demand, when we need to. Currently, data is entered into the application manually by Administrative Staff, but in the future, we would like to be able to take a picture of the road sign using a phone app, and have it automagically populate the database with geospatial location and other information. We thought about having a Smart Watch interface, but we don’t need that. Also, the current method does not have any way to manage the quality of the data that is entered, so there is a lot of garbage information there. There is no way to centrally manage security access, with the existing application. We want to get real time alerts when a sign gets knocked over in an accident and have a dashboard that shows where signs have been knocked over across the state. This is kind of important, but not super-critical. We need to store location information, types of signs, when a new sign is installed, who installed it, etc. We plan to provide the phone app to drivers in each district who will drive around, take pictures of the signs, and upload them to the database at the end of each day, or in realtime, if a data connection is available.
Back in Central Office, reviewers will review the sign information and validate it. A report will be printed every month with the results and a map. There are probably other things, but we can’t think of anything else right now.
2. List the main goal(s) of this request
3. Write all the user stories you see (include value statements and acceptance criteria, if possible)
4. Prioritize the user stories as
a. Critical
b. Important
c. Useful
d. Out of Scope
5. Are the user stories sufficiently detailed? If not, what steps would you take to split them/further define them?
6. What are the known Data Entities?
7. Is there an implied business process? Draw an activity diagram or a flow chart of it
8. Who are the actors/roles?
9. What questions would you ask of the stakeholders to get more information?
10. What technology should be used to implement the solution?
11. What would you do next as the assigned Business Analyst working on an Agile team?
.
1. Research risk assessment approaches.2. Create an outline .docxketurahhazelhurst
1. Research risk assessment approaches.
2. Create an outline for a basic qualitative risk assessment plan.
3. Write an introduction to the plan explaining its purpose and importance.
4. Define the scope and boundaries for the risk assessment.
5. Identify data center assets and activities to be assessed.
6. Identify relevant threats and vulnerabilities. Include those listed in the scenario and add to the list if needed.
7. Identify relevant types of controls to be assessed.
8. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessments.
9. Develop a proposed schedule for the risk assessment process.
10. Complete the draft risk assessment plan detailing the information above. Risk assessment plans often include tables, but you choose the best format to present the material. Format the bulk of the plan similar to a professional business report and cite any sources you used.
.
1. Research has narrowed the thousands of leadership behaviors into .docxketurahhazelhurst
1. Research has narrowed the thousands of leadership behaviors into two primary dimensions. Please list and discuss these two behaviors.
2. Distinguish between charismatic, transformational, and authentic leadership. Could an individual display all three types of leadership?
.
1. Research Topic Super Computer Data MiningThe aim of this.docxketurahhazelhurst
1. Research Topic: Super Computer Data Mining
The aim of this project is to produce a super-computing data mining resource for use by the UK academic community which utilizes a number of advanced machine learning and statistical algorithms for large datasets. In particular, a number of evolutionary computing-based algorithms and the ensemble machine approach will be used to exploit the large-scale parallelism possible in super-computing. This purpose is embodied in the following objectives:
1. to develop a massively parallel approach for commonly used statistical and machine learning techniques for exploratory data analysis
1. to develop a massively parallel approach to the use of evolutionary computing techniques for feature creation and selection
1. to develop a massively parallel approach to the use of evolutionary computing techniques for data modelling
1. to develop a massively parallel approach to the use of ensemble machines for data modelling consisting of many well-known machine learning algorithms;
1. to develop an appropriate super-computing infra-structure to support the use of such advanced machine learning techniques with large datasets.
Research Needs:
Problem definition – In the first phase problem definition is listed i.e. business aims and objectives are determined taking into consideration certain factors like the current background and future prospective.
Data exploration – Required data is collected and explored using various statistical methods along with identification of underlying problems.
Data preparation – The data is prepared for modeling by cleansing and formatting the raw data in the desired way. The meaning of data is not changed while preparing.
Modeling – In this phase the data model is created by applying certain mathematical functions and modeling techniques. After the model is created it goes through validation and verification.
Evaluation – After the model is created, it is evaluated by a team of experts to check whether it satisfies business objectives or not.
Deployment – After evaluation, the model is deployed and further plans are made for its maintenance. A properly organized report is prepared with the summary of the work done.
Research paper Policy
· APA format
. https://apastyle.apa.org/
. https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html
· Min number of pages are 15 pages
· Must have
. Contents with page numbers
. Abstract
. Introduction
. The problem
4. Are there any sub-problems?
4. Is there any issue need to be present concerning the problem?
. The solutions
5. Steps of the solutions
. Compare the solution to other solution
. Any suggestion to improve the solution
. Conclusion
. References
· Missing one of the above will result -5/30 of the research paper
· Paper does not stick to the APA will result in 0 in the research paper
· Submission
. you have multiple submission to check you safe assignments
. The percentage accepted is 1%.
1. Research and then describe about The Coca-Cola Company primary bu.docxketurahhazelhurst
1. Research and then describe about The Coca-Cola Company primary business activities. Include: Minimum 7 Pages. Excluding reference page
2.
A. A brief historical summary,
B. A list of competitors,
C. The company's position within the industry,
D. Recent developments within the company/industry,
E. Future direction, and
F. Other items of significance to your corporation.
3. Include information from a variety of resources. For example:
A. Consult the Form 10-K filed with the SEC.
B. Review the Annual Report and especially the Letter to Shareholders
C. Explore the corporate website.
D. Select at least two significant news items from recent business periodicals
The report should be well written with cover page, introduction, the body of the paper (with appropriate subheadings), conclusion, and reference page.
.
1. Prepare a risk management plan for the project of finding a job a.docxketurahhazelhurst
1. Prepare a risk management plan for the project of finding a job after graduation.
and
2. Develop a reward system for motivating IPT members to do their jobs more conscientiously and to take on more responsibility.
[The assignment should be at least 400 words minimum and in APA format (including Times New Roman with font size 12 and double spaced), and attached as a WORD file.]
Plagiarism free
.
1. Please define the term social class. How is it usually measured .docxketurahhazelhurst
1. Please define the term social class. How is it usually measured? What are some ways that social class is affecting health outcomes for people who become ill with COVID-19?
2. What is the CARES Act? Has it been enough? What has happened to people's ability to pay their bills since it expired?
3. As things stand now, data is showing higher COVID-19 related mortality rates for African Americans. Given what you know from the textbook and from the attached articles, what are some explanations for the disparity?
4. What is environmental racism (injustice)? How does environmental racism put some populations at higher risk for severe medical complications than others? (Vice article)
https://www.theatlantic.com/ideas/archive/2020/07/600-week-buys-freedom-fear/613972/
https://www.vox.com/2020/4/10/21207520/coronavirus-deaths-economy-layoffs-inequality-covid-pandemic
https://www.vice.com/en_us/article/pke94n/cancer-alley-has-some-of-the-highest-coronavirus-death-rates-in-the-country
https://www.theguardian.com/us-news/2020/apr/12/coronavirus-us-deep-south-poverty-race-perfect-storm
.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
CASE STUDY InternetExcel Exercises, page 434, textRecord your.docx
1. CASE STUDY
Internet/Excel Exercises, page 434, text
Record your findings in a Word document and submit it online
IBM has substantial operations in many countries, including the
United States, Canada, and Germany. Go
to finance.yahoo.com/q?s=ibm.
1. Click on Historical Prices. (Or apply this exercise to a
different MNC.) Set the date range so that you can obtain
quarterly values of the U.S. stock index for the last 20 quarters.
Insert the quarterly data on a spreadsheet. Compute the
percentage change in IBM’s stock price for each quarter. Next
go to finance.yahoo.com/stock-center/ and click (under U.S.) on
S&P Composite 1500 Index, which represents the U.S. stock
market index, so that you can derive the quarterly percentage
change in the U.S. stock index over the last 20 quarters. Then
run a regression analysis with IBM’s quarterly return
(percentage change in stock price) as the dependent variable and
the quarterly percentage change in the U.S. stock market’s value
as the independent variable. (Appendix C explains how Excel
can be used to run regression analysis.) The slope coefficient
serves as an estimate of the sensitivity of IBM’s value to the
U.S. market returns. Also, check the fit of the relationship
based on the R-squared statistic.
2. Go to finance.yahoo.com/stock-center/ and click (under
“Europe”) on DAX, which represents the German stock market
index. Repeat the process described in exercise 1 so that you
can assess IBM’s sensitivity to the German stock market.
Compare the slope coefficient between the two analyses. Is
IBM’s value more sensitive to the U.S. market or the German
market? Does the U.S. market or the German market explain a
higher proportion of the variation in IBM’s returns (check
the R-squared statistic)? Offer an explanation of your results.
2. Lab 5 Database Security
Use the script from week 1 for the week 5 lab.
1. Create four new users
a. The first user will have full rights to the database
b. The second user grant access to the Client’s table and allow
them the rights to INSERT data into the clients table
c. The third user grant rights to create user logins and reset
passwords
d. The fourth user grant column rights to the Course_Activity
table allow access to the Course Code and Grade column.
Allow user to UPDATE a maximum of 5 times per hour.
2. Login with each user to demonstrate the rights you have
given them
a. User 1 login and create a VIEW for user 2 that just displays
the Client table
b. User 2 login and add 3 more clients to the Clients table
c. User 3 login create two new users
d. User 4 login and UPDATE two new entries for Course Code
and Grade Column for Client 1 and 2
e. For each user run the Show Privileges command to show
correct rights and permissions have been applied
3. Show Log Files: For each user show log files (since we do
not have MySQL Enterprise we cannot use the Audit function
but as a substitute we can use the built-in log file function)
4. Create a Stored Procedure with User 1 that displays describes
the database and grant user 3 access to the stored procedure.
5. Login with user 3 and demonstrate calling the Store
Procedure created in step 4.
6. Login with User 2 run an ALTER TABLE command on the
COURSE table and show results.
7. Login with User 4 and run an UPDATE command on
Course_Activity for client 1 and 2 on column Activity Code and
3. show results.
McAfee Audit Module Download and Installation (all
environments)
8. CHECKPOINT QUESTION: In order to proceed with the
installation of the McAfee Audit Plugin for MySQL, you will
need to gather some additional information. These checkpoint
questions will help you to clarify this task: What version of
LINUX are you running, and how do you determine this? Are
you running a 32-bit or 64-bit version of the Operating system,
and how do you determine this? How can you obtain/Where can
you download an appropriate version of the McAfee Audit
Plugin for your use? Once downloaded, how do you unpack the
package to access the plugin components? What is the path of
the plugin directory into which you must copy the
unpacked/unzipped plugin? Record your answers to these
questions, and paste them into your lab report. Download,
unpack, and copy all files where they belong. (Hint: If you are
unable to find a pre-built installation options through your
desktop controls, such as Ubuntu Software Center, you can also
download the package using a browser, or by using the wget
command line interface statement. This latter statement would
begin similar to: sudo wget…)
9. CHECKPOINT QUESTION: The installation of the plugin
is done from within the MySQL console. What is the command
you must issue to install the plugin? Record your answer in your
lab report.
10. Issue the MySQL console command to install the plugin.
11. From the MySQL console, issue the command: show
plugins;. Take a screenshot showing your successful results, and
paste it into your lab report.
Configuring the McAfee Audit Module (all environments)
4. 12. CHECKPOINT QUESTION: Even though the McAfee
Audit Plugin in now installed, it is not yet monitoring things as
we would wish. First, the Plugin must be configured. Research
what events the plugin is capable of logging, and how to edit
the configuration to log them. What command must be entered
or what files edited in order to cause the plugin to log the
following events: Connect, Quit, Failed Login, Insert, Drop,
Create? Record the exact steps you must take and the
commands you must enter in order to begin logging the events
specified. Next, consider what actions you would need to take
to generate each of these events, and document your plan for
doing so. Paste both the configuration steps, and the commands
you will execute to test the logging of each event into your lab
report.
13. Execute each of the actions planned in the previous step to
generate an event in the audit log.
14. Determine the location of the audit log (this is commonly
/var/lib/mysql/mysql-audit.json). Display the log contents, and
analyze them to show that each event you triggered appears in
the log. Note: the log file format is not optimized for human
readability. The default format generated by this plugin is a
.json file, which is easily read and processed for many purposes,
including generating pager or system alerts, automated threat
responses, as well as reporting. Reporting software that uses
such logs is known as Security Information and Event
Management (SIEM) software. You may also find utilities that
will read and format .json file format into a layout that is easier
for humans to read. In any event, take screen shots of your log
results, and annotate them to show that each of the required
events was captured by the log. Paste a copy of this result into
your lab report.
15. CHECKPOINT QUESTION: What has been achieved by
this lab, and what steps would remain to provide a
comprehensive security system, including reporting, monitoring,
alerting, and Automated Threat Response (automatic
countermeasures)? In your answer, give an example of a
5. specific example of each of these, and discuss how it would
operate (e.g., an Automated Threat Response might be to
disable a user account, or to dynamically add a firewall rule
rejecting any further traffic from a specific host computer from
which a prohibited event was generated). Record your answer in
the lab report.
Make sure to provide screenshots either from the command line
or workbench demonstrating each of these steps.
-- Table `CLIENT`
-- -----------------------------------------------------
DROP TABLE IF EXISTS `CLIENT` ;
CREATE TABLE IF NOT EXISTS `CLIENT` (
`CLIENT_NO` CHAR(8) NOT NULL,
`CLIENT_COMPANY` VARCHAR(35) NOT NULL,
`CLIENT_NAME` VARCHAR(35) NOT NULL,
`CLIENT_EMAIL` VARCHAR(35) NULL,
`CLIENT_PROGRAM` CHAR(3) NOT NULL,
`CLIENT_SCORE` DECIMAL(10,0) NOT NULL,
PRIMARY KEY (`CLIENT_NO`))
ENGINE = InnoDB;
-- -----------------------------------------------------
-- Table `COURSE`
-- -----------------------------------------------------
DROP TABLE IF EXISTS `COURSE` ;
CREATE TABLE IF NOT EXISTS `COURSE` (
`COURSE_CODE` CHAR(8) NOT NULL,
`COURSE_NAME` VARCHAR(35) NOT NULL,
`COURSE_DATE` DATE NOT NULL,
`COURSE_INSTRUCTOR` VARCHAR(35) NOT NULL,
6. `COURSE_LOCATION` VARCHAR(20) NOT NULL,
PRIMARY KEY (`COURSE_CODE`))
ENGINE = InnoDB;
-- -----------------------------------------------------
-- Table `COURSE_ACTIVITY`
-- -----------------------------------------------------
DROP TABLE IF EXISTS `COURSE_ACTIVITY` ;
CREATE TABLE IF NOT EXISTS `COURSE_ACTIVITY` (
`ACTIVITY_CODE` CHAR(8) NOT NULL,
`CLIENT_NO` CHAR(8) NOT NULL,
`COURSE_CODE` CHAR(8) NOT NULL,
`GRADE` CHAR(1) NULL,
`INSTR_NOTES` VARCHAR(50) NULL,
PRIMARY KEY (`ACTIVITY_CODE`))
ENGINE = InnoDB;
-- -----------------------------------------------------
-- Table `CORP_EXTRACT1`
-- -----------------------------------------------------
DROP TABLE IF EXISTS `CORP_EXTRACT1` ;
CREATE TABLE IF NOT EXISTS `CORP_EXTRACT1` (
`EXTRACT_NO` CHAR(3) NOT NULL,
`CLIENT_NO` CHAR(8) NOT NULL,
`CLIENT_NAME` VARCHAR(35) NOT NULL,
`CLIENT_EMAIL` VARCHAR(35) NULL,
`CLIENT_COMPANY` VARCHAR(35) NOT NULL,
`CLIENT_PROGRAM` CHAR(3) NOT NULL,
`CLIENT_SCORE` DECIMAL(10,0) NOT NULL,
`COURSE_NAME` VARCHAR(35) NOT NULL,
`COURSE_DATE` DATE NOT NULL,
`COURSE_INSTRUCTOR` VARCHAR(35) NOT NULL,
7. `COURSE_LOCATION` VARCHAR(20) NOT NULL,
`COURSE_STATUS` VARCHAR(10) NOT NULL,
PRIMARY KEY (`EXTRACT_NO`))
ENGINE = InnoDB;
SET [email protected]_SQL_MODE;
SET [email protected]_FOREIGN_KEY_CHECKS;
SET [email protected]_UNIQUE_CHECKS;
-- CLIENT rows --
INSERT INTO CLIENT VALUES('C2122542','Bryson, Inc.'
,'Smithson','[email protected]' ,'DBA',47);
INSERT INTO CLIENT VALUES('C2122356','SuperLoo, Inc.'
,'Flushing','[email protected]' ,'DBA',38);
INSERT INTO CLIENT VALUES('C2123871','D&E Supply'
,'Singh' ,'[email protected]' ,'EAI',42);
INSERT INTO CLIENT VALUES('C2134452','Gomez Bros.'
,'Ortega' ,'[email protected]' ,'DBA',39);
INSERT INTO CLIENT VALUES('C2256716','Dome Supply'
,'Smith' ,'[email protected]' ,'ADM',41);
-- COURSE rows --
INSERT INTO COURSE VALUES('DBA12345','DBA 101'
,'2005-10-03','Phung' ,'Kaanapali');
INSERT INTO COURSE VALUES('DBA12346','Advanced
DBA' ,'2005-11-23','Browne' ,'San Mateo');
INSERT INTO COURSE VALUES('EAI12345','EAI Intro'
,'2005-11-30','Luss' ,'Danbury');
INSERT INTO COURSE VALUES('DBA12347','DBA 101'
,'2006-01-08','Fiorillo' ,'Paramus');
INSERT INTO COURSE VALUES('DBA12348','DBA 101'
,'2006-02-28','Majmundar' ,'Racine');
-- COURSE ACTIVITY rows --
INSERT INTO COURSE_ACTIVITY
VALUES('A0000001','C2122542','DBA12345','A',NULL);
8. INSERT INTO COURSE_ACTIVITY
VALUES('A0000002','C2122356','DBA12347','F',NULL);
INSERT INTO COURSE_ACTIVITY
VALUES('A0000003','C2134452','DBA12345','B',NULL);
INSERT INTO COURSE_ACTIVITY
VALUES('A0000004','C2122542','DBA12346','A',NULL);
INSERT INTO COURSE_ACTIVITY
VALUES('A0000005','C2123871','EAI12345','A',NULL);
INSERT INTO COURSE_ACTIVITY
VALUES('A0000006','C2122356','DBA12345',NULL,NULL);
-- CORP_EXTRACT1 rows --
INSERT INTO CORP_EXTRACT1 VALUES
('001','C2122542','Smithson','[email protected]','Bryson,
Inc.','DBA',47,'EAI Intro','2007-03-01','Luss','Hilo','Enrolled');
INSERT INTO CORP_EXTRACT1 VALUES
('002','C2122356','Flushing','[email protected]','SuperLoo,
Inc.','DBA',38,'DBA 101','2005-10-03','Luss','Hilo','Dropped');
INSERT INTO CORP_EXTRACT1 VALUES
('003','C2172249','Bizet','[email protected]','Bryson,
Inc.','EAI',44,'EAI Intro','2007-03-01','Luss','Hilo','Enrolled');
Laboratory Report
DeVry University
College of Engineering and Information Sciences
Course Number: DBM449
Laboratory Number: 4
Laboratory Title: Spatial Indices
Note: There is no limit on how much information you will enter
under the three topics below. It is important to be clear and
complete with your comments. Like a scientist you are
documenting your progress in this week’s lab experiment.
9. Objectives: (In your own words what was this lab designed to
accomplish? What was its purpose?)
Understand and become familiar with current capabilities and
limitations of the OpenGIS implementation in MySQL. Learn to
create, update, and use spatial indices. Explore practical
approaches to calculating distances between points on the
Earth’s surface. Understand fundamentals of geotagging. Create
stored procedures to determine real-world distances, and to
process spatial queries returning result sets of data points
within a bounding rectangle. Explore visualization of GIS data.
Results: (Discuss the steps you used to complete your lab. Were
you successful? What did you learn? What were the results?
Explain what you did to accomplish each step. You can include
screen shots, code listings, and so on. to clearly explain what
you did. Be sure to record all results specifically directed by the
lab procedure. Number all results to reflect the procedure
number to which they correspond.)
3. DDL
5. Insert GIS Data
USE DBM449Lab4;
INSERT INTO Points (name, location) VALUES ( 'DeVry
University' , GeomFromText('POINT(41.882844 -
87.634982)'));
INSERT INTO Points (name, location) VALUES ( 'Museum of
Science' , GeomFromText('POINT(41.8357734 -87.7009021)' )
);
10. INSERT INTO Points (name, location) VALUES ( 'Horseshoe
Casino' , GeomFromText('POINT(41.7869902 -87.7162545)' )
);
INSERT INTO Points (name, location) VALUES ( 'Bensenville'
, GeomFromText('POINT(41.9620321 -87.976798)'));
INSERT INTO Points (name, location) VALUES ( 'BAPS Shri
Mandir' , GeomFromText('POINT(41.8704303 -88.13295)' ) );
INSERT INTO Points (name, location) VALUES ( 'Aurora IL' ,
GeomFromText('POINT(41.7509511 -88.3767589)' ) );
6. Explain what use GeoFromText
GeoFromText is used to populate data to spatial columns as
values are stored in internal geometry format so we need to use
the location text to convert it to format for storing geometry
data. In this case we got the point with longitude/latitude and
used to GeoFromText function format it for storage.
7. Results of insert statements
8. Select *from Location
9. Explain ASTEXT()
ASTEXT() function gets the data form binary format and
displays it in readable format. So as in this case we want to
display the Location in text format we need to convert the
geometry data to readable data by using the astext() function.
Otherwise the binary data will display the garbage values which
are not readable.
10. Show Location as-text
11. 11. Explain
To calculate the distance between two points the mathematical
formula is used:
Math.sin(dLat/2) * Math.sin(dLat/2) +
Math.sin(dLon/2) * Math.sin(dLon/2) * Math.cos(lat1) *
Math.cos(lat2);
The coefficient used for this formula is 3959 which shows the
results in miles.
12. Stored procedure to calculate distance
13.Explain
To calculate the boundary and check the other points are within
that range on not, first we have to calculate the distance from
all the points and then need to check that the distance from the
point is within the range or not.
14. Stored procedure to calculate the boundary
15. Show points within 20miles
16. Bounding box limitations
There can be few points which are less than the 20 miles but is
not showing in the results because the Bounding box is a
polygon.
17. Explain
12. Google maps can be used to visualize by mapping and
displaying the spatial data.
18. Query to get nearest location
SELECT B.Name, X(B.location) as longitude, Y(B.location) as
latitude, ( 3959 * acos( cos( radians(Y(center.Location)) )
* cos( radians( Y(B.location) ) )
* cos( radians( X(B.location) ) -
radians(X(center.Location)) )
+ sin( radians(Y(center.Location)) )
* sin( radians( Y(B.location) ) ) ) ) AS distance
FROM POINTS center JOIN POINTS B ON center.Name <>
B.Name
WHERE center.Name = 'DeVry University'
ORDER BY Distance LIMIT 1;
19. Results of query to get nearest location
22. Format google map url for the nearest location
24. Google map result
The image is showing the route from store to friends’ home. It
shows different routes that can be taken from the source to the
destination.
Conclusions: (After completing this lab, in your own words,
what conclusions can you draw from this experience?)
13. In this lab I learned to work with OpenGIS support in MySQL.
Practical hands on experience on working with spatial data.
Understanding the available functions to manipulate geometry
data. I learned to develope the functions to calculate distance
between two locations and was also able to check the locations
near me with in a bounded rectangle. Finally, I was able to
generate the google map-url and seeing it visually.
Laboratory Report
DeVry University
College of Engineering and Information Sciences
Course Number: DBM449
Laboratory Number: 4
Laboratory Title: Spatial Indices
Note: There is no limit on how much information you will enter
under the three topics below. It is important to be clear and
complete with your comments. Like a scientist you are
documenting your progress in this week’s lab experiment.
Objectives: (In your own words what was this lab designed to
accomplish? What was its purpose?)
Understand and become familiar with current capabilities and
limitations of the OpenGIS implementation in MySQL. Learn to
create, update, and use spatial indices. Explore practical
approaches to calculating distances between points on the
Earth’s surface. Understand fundamentals of geotagging. Create
stored procedures to determine real-world distances, and to
process spatial queries returning result sets of data points
within a bounding rectangle. Explore visualization of GIS data.
14. Results: (Discuss the steps you used to complete your lab. Were
you successful? What did you learn? What were the results?
Explain what you did to accomplish each step. You can include
screen shots, code listings, and so on. to clearly explain what
you did. Be sure to record all results specifically directed by the
lab procedure. Number all results to reflect the procedure
number to which they correspond.)
3. DDL
5. Insert GIS Data
USE DBM449Lab4;
INSERT INTO Points (name, location) VALUES ( 'DeVry
University' , GeomFromText('POINT(41.882844 -
87.634982)'));
INSERT INTO Points (name, location) VALUES ( 'Museum of
Science' , GeomFromText('POINT(41.8357734 -87.7009021)' )
);
INSERT INTO Points (name, location) VALUES ( 'Horseshoe
Casino' , GeomFromText('POINT(41.7869902 -87.7162545)' )
);
INSERT INTO Points (name, location) VALUES ( 'Bensenville'
, GeomFromText('POINT(41.9620321 -87.976798)'));
INSERT INTO Points (name, location) VALUES ( 'BAPS Shri
Mandir' , GeomFromText('POINT(41.8704303 -88.13295)' ) );
INSERT INTO Points (name, location) VALUES ( 'Aurora IL' ,
GeomFromText('POINT(41.7509511 -88.3767589)' ) );
6. Explain what use GeoFromText
GeoFromText is used to populate data to spatial columns as
values are stored in internal geometry format so we need to use
the location text to convert it to format for storing geometry
15. data. In this case we got the point with longitude/latitude and
used to GeoFromText function format it for storage.
7. Results of insert statements
8. Select *from Location
9. Explain ASTEXT()
ASTEXT() function gets the data form binary format and
displays it in readable format. So as in this case we want to
display the Location in text format we need to convert the
geometry data to readable data by using the astext() function.
Otherwise the binary data will display the garbage values which
are not readable.
10. Show Location as-text
11. Explain
To calculate the distance between two points the mathematical
formula is used:
Math.sin(dLat/2) * Math.sin(dLat/2) +
Math.sin(dLon/2) * Math.sin(dLon/2) * Math.cos(lat1) *
Math.cos(lat2);
The coefficient used for this formula is 3959 which shows the
results in miles.
12. Stored procedure to calculate distance
13.Explain
16. To calculate the boundary and check the other points are within
that range on not, first we have to calculate the distance from
all the points and then need to check that the distance from the
point is within the range or not.
14. Stored procedure to calculate the boundary
15. Show points within 20miles
16. Bounding box limitations
There can be few points which are less than the 20 miles but is
not showing in the results because the Bounding box is a
polygon.
17. Explain
Google maps can be used to visualize by mapping and
displaying the spatial data.
18. Query to get nearest location
SELECT B.Name, X(B.location) as longitude, Y(B.location) as
latitude, ( 3959 * acos( cos( radians(Y(center.Location)) )
* cos( radians( Y(B.location) ) )
* cos( radians( X(B.location) ) -
radians(X(center.Location)) )
+ sin( radians(Y(center.Location)) )
* sin( radians( Y(B.location) ) ) ) ) AS distance
FROM POINTS center JOIN POINTS B ON center.Name <>
B.Name
WHERE center.Name = 'DeVry University'
ORDER BY Distance LIMIT 1;
17. 19. Results of query to get nearest location
22. Format google map url for the nearest location
24. Google map result
The image is showing the route from store to friends’ home. It
shows different routes that can be taken from the source to the
destination.
Conclusions: (After completing this lab, in your own words,
what conclusions can you draw from this experience?)
In this lab I learned to work with OpenGIS support in MySQL.
Practical hands on experience on working with spatial data.
Understanding the available functions to manipulate geometry
data. I learned to develope the functions to calculate distance
between two locations and was also able to check the locations
near me with in a bounded rectangle. Finally, I was able to
generate the google map-url and seeing it visually.
Laboratory Report
DeVry University
College of Engineering and Information Sciences
Course Number: DBM449
Laboratory Number: 4
Laboratory Title: Spatial Indices
18. Note: There is no limit on how much information you will enter
under the three topics below. It is important to be clear and
complete with your comments. Like a scientist you are
documenting your progress in this week’s lab experiment.
Objectives: (In your own words what was this lab designed to
accomplish? What was its purpose?)
Understand and become familiar with current capabilities and
limitations of the OpenGIS implementation in MySQL. Learn to
create, update, and use spatial indices. Explore practical
approaches to calculating distances between points on the
Earth’s surface. Understand fundamentals of geotagging. Create
stored procedures to determine real-world distances, and to
process spatial queries returning result sets of data points
within a bounding rectangle. Explore visualization of GIS data.
Results: (Discuss the steps you used to complete your lab. Were
you successful? What did you learn? What were the results?
Explain what you did to accomplish each step. You can include
screen shots, code listings, and so on. to clearly explain what
you did. Be sure to record all results specifically directed by the
lab procedure. Number all results to reflect the procedure
number to which they correspond.)
3. DDL
5. Insert GIS Data
USE DBM449Lab4;
INSERT INTO Points (name, location) VALUES ( 'DeVry
University' , GeomFromText('POINT(41.882844 -
19. 87.634982)'));
INSERT INTO Points (name, location) VALUES ( 'Museum of
Science' , GeomFromText('POINT(41.8357734 -87.7009021)' )
);
INSERT INTO Points (name, location) VALUES ( 'Horseshoe
Casino' , GeomFromText('POINT(41.7869902 -87.7162545)' )
);
INSERT INTO Points (name, location) VALUES ( 'Bensenville'
, GeomFromText('POINT(41.9620321 -87.976798)'));
INSERT INTO Points (name, location) VALUES ( 'BAPS Shri
Mandir' , GeomFromText('POINT(41.8704303 -88.13295)' ) );
INSERT INTO Points (name, location) VALUES ( 'Aurora IL' ,
GeomFromText('POINT(41.7509511 -88.3767589)' ) );
6. Explain what use GeoFromText
GeoFromText is used to populate data to spatial columns as
values are stored in internal geometry format so we need to use
the location text to convert it to format for storing geometry
data. In this case we got the point with longitude/latitude and
used to GeoFromText function format it for storage.
7. Results of insert statements
8. Select *from Location
9. Explain ASTEXT()
ASTEXT() function gets the data form binary format and
displays it in readable format. So as in this case we want to
display the Location in text format we need to convert the
geometry data to readable data by using the astext() function.
Otherwise the binary data will display the garbage values which
are not readable.
20. 10. Show Location as-text
11. Explain
To calculate the distance between two points the mathematical
formula is used:
Math.sin(dLat/2) * Math.sin(dLat/2) +
Math.sin(dLon/2) * Math.sin(dLon/2) * Math.cos(lat1) *
Math.cos(lat2);
The coefficient used for this formula is 3959 which shows the
results in miles.
12. Stored procedure to calculate distance
13.Explain
To calculate the boundary and check the other points are within
that range on not, first we have to calculate the distance from
all the points and then need to check that the distance from the
point is within the range or not.
14. Stored procedure to calculate the boundary
15. Show points within 20miles
16. Bounding box limitations
There can be few points which are less than the 20 miles but is
21. not showing in the results because the Bounding box is a
polygon.
17. Explain
Google maps can be used to visualize by mapping and
displaying the spatial data.
18. Query to get nearest location
SELECT B.Name, X(B.location) as longitude, Y(B.location) as
latitude, ( 3959 * acos( cos( radians(Y(center.Location)) )
* cos( radians( Y(B.location) ) )
* cos( radians( X(B.location) ) -
radians(X(center.Location)) )
+ sin( radians(Y(center.Location)) )
* sin( radians( Y(B.location) ) ) ) ) AS distance
FROM POINTS center JOIN POINTS B ON center.Name <>
B.Name
WHERE center.Name = 'DeVry University'
ORDER BY Distance LIMIT 1;
19. Results of query to get nearest location
22. Format google map url for the nearest location
24. Google map result
The image is showing the route from store to friends’ home. It
shows different routes that can be taken from the source to the
destination.
22. Conclusions: (After completing this lab, in your own words,
what conclusions can you draw from this experience?)
In this lab I learned to work with OpenGIS support in MySQL.
Practical hands on experience on working with spatial data.
Understanding the available functions to manipulate geometry
data. I learned to develope the functions to calculate distance
between two locations and was also able to check the locations
near me with in a bounded rectangle. Finally, I was able to
generate the google map-url and seeing it visually.