The document contains SQL commands that define the schema for a wellness application database. It includes tables for users, interests, steps, themes, and relationships between them such as which users are following other users and which interests and themes are associated with different steps. Sample data is inserted into the tables to establish an initial set of 20 users along with their interests, the steps they have taken, and the relationships between them.
create_workbook_store.sql
-- create_store.sql
-- Introcution, Oracle Database 11g PL/SQL Programming Workbook
-- by Michael McLaughlin and John Harper
--
-- This demonstrates building a DVD, Game Cartridge and VHS tape store.
-- It also highlights constraints and compound check constraints and
-- seeds the tables with data.
SPOOL create_store.log
SET ECHO OFF
SET FEEDBACK ON
SET NULL '<Null>'
SET PAGESIZE 999
SET SERVEROUTPUT ON
-- Conditionally drop objects.
BEGIN
FOR i IN (SELECT null
FROM user_tables
WHERE table_name = 'SYSTEM_USER') LOOP
EXECUTE IMMEDIATE 'DROP TABLE system_user CASCADE CONSTRAINTS';
END LOOP;
FOR i IN (SELECT null
FROM user_sequences
WHERE sequence_name = 'SYSTEM_USER_S1') LOOP
EXECUTE IMMEDIATE 'DROP SEQUENCE system_user_s1';
END LOOP;
END;
/
-- ------------------------------------------------------------------
-- Create SYSTEM_USER table and sequence and seed data.
-- ------------------------------------------------------------------
CREATE TABLE system_user
( system_user_id NUMBER CONSTRAINT pk_system_user PRIMARY KEY
, system_user_name VARCHAR2(20) CONSTRAINT nn_system_user_1 NOT NULL
, system_user_group_id NUMBER CONSTRAINT nn_system_user_2 NOT NULL
, system_user_type NUMBER CONSTRAINT nn_system_user_3 NOT NULL
, last_name VARCHAR2(20)
, first_name VARCHAR2(20)
, middle_initial VARCHAR2(1)
, created_by NUMBER CONSTRAINT nn_system_user_4 NOT NULL
, creation_date DATE CONSTRAINT nn_system_user_5 NOT NULL
, last_updated_by NUMBER CONSTRAINT nn_system_user_6 NOT NULL
, last_update_date DATE CONSTRAINT nn_system_user_7 NOT NULL);
CREATE SEQUENCE system_user_s1 START WITH 1000;
INSERT INTO system_user
VALUES ( 1,'SYSADMIN',1,1,1,NULL,NULL,1,SYSDATE,1,SYSDATE);
ALTER TABLE system_user ADD CONSTRAINT fk_system_user_1 FOREIGN KEY(created_by)
REFERENCES system_user(system_user_id);
ALTER TABLE system_user ADD CONSTRAINT fk_system_user_2 FOREIGN KEY(last_updated_by)
REFERENCES system_user(system_user_id);
-- Conditionally drop objects.
BEGIN
FOR i IN (SELECT null
FROM user_tables
WHERE table_name = 'COMMON_LOOKUP') LOOP
EXECUTE IMMEDIATE 'DROP TABLE common_lookup CASCADE CONSTRAINTS';
END LOOP;
FOR i IN (SELECT null
FROM user_sequences
WHERE sequence_name = 'COMMON_LOOKUP_S1') LOOP
EXECUTE IMMEDIATE 'DROP SEQUENCE common_lookup_s1';
END LOOP;
END;
/
-- ------------------------------------------------------------------
-- Create COMMON_LOOKUP table and sequence and seed data.
-- ------------------------------------------------------------------
CREATE TABLE common_lookup
( common_lookup_id .
Starting from the database used in Project 1 (see the slightly cha.docxdessiechisomjj4
Starting from the database used in Project 1 (see the slightly changed schema from the original version used in P1, defined in the attached DDL file), a data warehouse star schema with the following characteristics will be defined:
· Dimension tables:
1. Date
2. Product
3. Customer
· Fact table:
1. Sales
For this final project, perform the following steps:
· Create the tables defined above in a star schema. Add the necessary columns in each table to facilitate the implementation of the queries defined below. Only the four tables listed above are allowed in that star schema
· Write PL/SQL code (anonymous blocks and/or subprograms) to populate the warehouse schema with data from the normalized database provided in the attached DDL script
· Write SQL code to perform the following queries:
1. What customer age group spent the most money in the last year? An age group is defined as a ten years interval, such as: 11 – 20, 21 – 30, etc
2. In what zip codes did the highest number of sales (number of items) occur during April 2015?
3. What day of the week did they do most business (by value of sales) in the last year?
4. What quarter is the worst (by value of sales) for each product category, using the whole set of historical data available in the warehouse?
5. What was the best sales month for each product in the last year?
· Write a couple of paragraphs describing:
. How this small data warehouse can help decision making
. How is it different from the original database used as data source
Submit the PL/SQL blocks and SQL statements as a text file (Notepad) following the document naming convention FirstLastFP.txt.
Grading: this project is awarded 100 points
15 points
DDL Script to create the tables in the star schema
25 points
PL/SQL code to populate the star schema from the original database
5 x 10 points
SQL statements for each of the requested queries
10 points
Description of how this data warehouse helps decision making and how it differs from regular databases
DROP TABLE ORDER_ITEMS;
DROP TABLE ORDERS;
DROP TABLE CUSTOMERS;
DROP TABLE PRODUCTS;
DROP TABLE CATEGORIES;
CREATE TABLE CATEGORIES (
ID NUMBER PRIMARY KEY,
Name VARCHAR2(20) NOT NULL);
CREATE TABLE PRODUCTS (
ID NUMBER PRIMARY KEY,
CatID NUMBER,
Name VARCHAR2(20) NOT NULL,
Price NUMBER NOT NULL,
FOREIGN KEY (CatID) REFERENCES CATEGORIES(ID));
CREATE TABLE CUSTOMERS (
ID NUMBER PRIMARY KEY,
Name VARCHAR2(50) NOT NULL,
DOB DATE NOT NULL,
Email VARCHAR2(50),
ZipCode CHAR(5) NOT NULL);
CREATE TABLE ORDERS (
ID NUMBER PRIMARY KEY,
CustID NUMBER NOT NULL,
DatePlaced DATE DEFAULT SYSDATE,
FOREIGN KEY (CustID) REFERENCES CUSTOMERS(ID));
CREATE TABLE ORDER_ITEMS (
OrderID NUMBER NOT NULL,
ProdID NUMBER NOT NULL,
Quantity NUMBER DEFAULT 1,
DateShipped DATE,
FOREIGN KEY (OrderID) REFERENCES ORDERS(ID),
FOREIGN KEY (ProdID) REFERENCES PRODUCTS(ID));
INSERT INTO CATEGORIES VALUES (1, 'Books');
INSERT INTO CATEGORIES VALUES (2, '.
To buy MBA assignments please use below link
https://ignousolvedassignmentsmba.blog.spot.in/
KIAN PUBLICATION
ignousolvedassignmentsmba@gmail.com
kianpublication1@gmail.com
ignou4you@gmail.com
create_workbook_store.sql
-- create_store.sql
-- Introcution, Oracle Database 11g PL/SQL Programming Workbook
-- by Michael McLaughlin and John Harper
--
-- This demonstrates building a DVD, Game Cartridge and VHS tape store.
-- It also highlights constraints and compound check constraints and
-- seeds the tables with data.
SPOOL create_store.log
SET ECHO OFF
SET FEEDBACK ON
SET NULL '<Null>'
SET PAGESIZE 999
SET SERVEROUTPUT ON
-- Conditionally drop objects.
BEGIN
FOR i IN (SELECT null
FROM user_tables
WHERE table_name = 'SYSTEM_USER') LOOP
EXECUTE IMMEDIATE 'DROP TABLE system_user CASCADE CONSTRAINTS';
END LOOP;
FOR i IN (SELECT null
FROM user_sequences
WHERE sequence_name = 'SYSTEM_USER_S1') LOOP
EXECUTE IMMEDIATE 'DROP SEQUENCE system_user_s1';
END LOOP;
END;
/
-- ------------------------------------------------------------------
-- Create SYSTEM_USER table and sequence and seed data.
-- ------------------------------------------------------------------
CREATE TABLE system_user
( system_user_id NUMBER CONSTRAINT pk_system_user PRIMARY KEY
, system_user_name VARCHAR2(20) CONSTRAINT nn_system_user_1 NOT NULL
, system_user_group_id NUMBER CONSTRAINT nn_system_user_2 NOT NULL
, system_user_type NUMBER CONSTRAINT nn_system_user_3 NOT NULL
, last_name VARCHAR2(20)
, first_name VARCHAR2(20)
, middle_initial VARCHAR2(1)
, created_by NUMBER CONSTRAINT nn_system_user_4 NOT NULL
, creation_date DATE CONSTRAINT nn_system_user_5 NOT NULL
, last_updated_by NUMBER CONSTRAINT nn_system_user_6 NOT NULL
, last_update_date DATE CONSTRAINT nn_system_user_7 NOT NULL);
CREATE SEQUENCE system_user_s1 START WITH 1000;
INSERT INTO system_user
VALUES ( 1,'SYSADMIN',1,1,1,NULL,NULL,1,SYSDATE,1,SYSDATE);
ALTER TABLE system_user ADD CONSTRAINT fk_system_user_1 FOREIGN KEY(created_by)
REFERENCES system_user(system_user_id);
ALTER TABLE system_user ADD CONSTRAINT fk_system_user_2 FOREIGN KEY(last_updated_by)
REFERENCES system_user(system_user_id);
-- Conditionally drop objects.
BEGIN
FOR i IN (SELECT null
FROM user_tables
WHERE table_name = 'COMMON_LOOKUP') LOOP
EXECUTE IMMEDIATE 'DROP TABLE common_lookup CASCADE CONSTRAINTS';
END LOOP;
FOR i IN (SELECT null
FROM user_sequences
WHERE sequence_name = 'COMMON_LOOKUP_S1') LOOP
EXECUTE IMMEDIATE 'DROP SEQUENCE common_lookup_s1';
END LOOP;
END;
/
-- ------------------------------------------------------------------
-- Create COMMON_LOOKUP table and sequence and seed data.
-- ------------------------------------------------------------------
CREATE TABLE common_lookup
( common_lookup_id .
Starting from the database used in Project 1 (see the slightly cha.docxdessiechisomjj4
Starting from the database used in Project 1 (see the slightly changed schema from the original version used in P1, defined in the attached DDL file), a data warehouse star schema with the following characteristics will be defined:
· Dimension tables:
1. Date
2. Product
3. Customer
· Fact table:
1. Sales
For this final project, perform the following steps:
· Create the tables defined above in a star schema. Add the necessary columns in each table to facilitate the implementation of the queries defined below. Only the four tables listed above are allowed in that star schema
· Write PL/SQL code (anonymous blocks and/or subprograms) to populate the warehouse schema with data from the normalized database provided in the attached DDL script
· Write SQL code to perform the following queries:
1. What customer age group spent the most money in the last year? An age group is defined as a ten years interval, such as: 11 – 20, 21 – 30, etc
2. In what zip codes did the highest number of sales (number of items) occur during April 2015?
3. What day of the week did they do most business (by value of sales) in the last year?
4. What quarter is the worst (by value of sales) for each product category, using the whole set of historical data available in the warehouse?
5. What was the best sales month for each product in the last year?
· Write a couple of paragraphs describing:
. How this small data warehouse can help decision making
. How is it different from the original database used as data source
Submit the PL/SQL blocks and SQL statements as a text file (Notepad) following the document naming convention FirstLastFP.txt.
Grading: this project is awarded 100 points
15 points
DDL Script to create the tables in the star schema
25 points
PL/SQL code to populate the star schema from the original database
5 x 10 points
SQL statements for each of the requested queries
10 points
Description of how this data warehouse helps decision making and how it differs from regular databases
DROP TABLE ORDER_ITEMS;
DROP TABLE ORDERS;
DROP TABLE CUSTOMERS;
DROP TABLE PRODUCTS;
DROP TABLE CATEGORIES;
CREATE TABLE CATEGORIES (
ID NUMBER PRIMARY KEY,
Name VARCHAR2(20) NOT NULL);
CREATE TABLE PRODUCTS (
ID NUMBER PRIMARY KEY,
CatID NUMBER,
Name VARCHAR2(20) NOT NULL,
Price NUMBER NOT NULL,
FOREIGN KEY (CatID) REFERENCES CATEGORIES(ID));
CREATE TABLE CUSTOMERS (
ID NUMBER PRIMARY KEY,
Name VARCHAR2(50) NOT NULL,
DOB DATE NOT NULL,
Email VARCHAR2(50),
ZipCode CHAR(5) NOT NULL);
CREATE TABLE ORDERS (
ID NUMBER PRIMARY KEY,
CustID NUMBER NOT NULL,
DatePlaced DATE DEFAULT SYSDATE,
FOREIGN KEY (CustID) REFERENCES CUSTOMERS(ID));
CREATE TABLE ORDER_ITEMS (
OrderID NUMBER NOT NULL,
ProdID NUMBER NOT NULL,
Quantity NUMBER DEFAULT 1,
DateShipped DATE,
FOREIGN KEY (OrderID) REFERENCES ORDERS(ID),
FOREIGN KEY (ProdID) REFERENCES PRODUCTS(ID));
INSERT INTO CATEGORIES VALUES (1, 'Books');
INSERT INTO CATEGORIES VALUES (2, '.
To buy MBA assignments please use below link
https://ignousolvedassignmentsmba.blog.spot.in/
KIAN PUBLICATION
ignousolvedassignmentsmba@gmail.com
kianpublication1@gmail.com
ignou4you@gmail.com
This paper describes the evolution of the Plan table and DBMSX_PLAN in 11g and some of the features that can be used to troubelshoot SQL performance effectively and efficiently.
To buy MBA assignments please use below link
https://ignousolvedassignmentsmba.blog.spot.in/
KIAN PUBLICATION
ignousolvedassignmentsmba@gmail.com
kianpublication1@gmail.com
ignou4you@gmail.com
Webinar slides: MySQL Query Tuning Trilogy: Working with optimizer and SQL tu...Severalnines
This is the final part of our webinar trilogy on MySQL Query Tuning, in which we looked at query tuning process and tools to help with that. We’ve covered topics such as SQL tuning, indexing, the optimizer and how to leverage EXPLAIN to gain insight into execution plans. Part 3: Working with the optimizer and SQL tuning.
AGENDA
Optimizer
- How execution plans are calculated
- InnoDB statistics
Hinting the optimizer
- Index hints
- JOIN order modifications
- Tweakable optimizations
Optimizing SQL
SPEAKER
Krzysztof Książek, Senior Support Engineer at Severalnines, is a MySQL DBA with experience managing complex database environments for companies like Zendesk, Chegg, Pinterest and Flipboard.
(Lab Project) (2)Table of ContentsIntroduction.docxaryan532920
(
Lab Project
) (
2
)
Table of Contents
Introduction 4
Timeline 5
Conceptual Model: 6
Users: 6
Views: 7
Roles: 7
Logical Model: 8
Physical Model: 9
Security Implementation: 21
USER CREATION 21
CREATE ROLES AND GRANT PRIVILEGES 21
Security Policy A: 22
Test Case scenario 1: 22
Test Case Scenario 2: 23
Test Case scenario 3: 23
Test case scenario 4: 23
Security Policy B: 24
Test case scenario 1: 24
Test Case Scenario 2: 24
Security Policy C: 25
Test case scenario 1: 25
Test case scenario 2: 26
Security Policy D: 27
Test case scenario 1: 27
Test case scenario 2: 28
Security Policy E: 29
Test case scenario 1: 29
Test case scenario 1: 34
Security Policy F: 36
Test case scenario 1: 36
Test case scenario 2: 39
Security Policy G: 40
CREATE TABLE 41
CREATE POLICY 41
CREATE SECURITY LEVELS: U, C, S, TS 41
CREATE SECURITY LABELS: U, C, S, TS 42
GRANT USERS PRIVILEGES TO THE TABLE 42
SET USER LEVELS 43
APPLY THE POLICY TO THE USERLVL TABLE 44
INSERT DATA INTO USERLVL TABLE 44
VIEW ACCESS FOR EACH USER LEVEL 45
Introduction
Purest Retail Store has recently encountered database security breaches. The database stores customer’s personal information and their purchases, so it is important that only authorized users have access to the data in the database. The company’s internal IT staff built the database with no constraints on the tables to prevent duplication and unauthorized users from viewing the data.
The owner of the store lost lots of loyal customers due to the breaches and tasked the Security Manager to find a solution to ensure that the data in the database is more secure and only accessible to authorized users. The security manager did a full risk analysis and determined that the IT department needs to establish better security practices and take the necessary measurements to improve the security of the database and its users. In addition, the security policy and plan should be frequently reviewed and updated to reflect the growing changes of the database and users. The following are the necessary implementation of database security measures:
· Security Policy and Plan
· Security procedures
· Account setup for users that includes passwords
· Assigning roles and privileges to users
· Establishing Access Control
· Granting authorized users access to the databaseTimeline
Because the company has suffered great loss in both revenue and customers, it is important that these security measures are implemented immediately. The following is the timeline of completing the security policy and procedures.
Conceptual Model:
The following table consists of all the users who have access to the database. Each user is assigned a unique userid and password, specific privileges, and a role. The following are roles:
DBA Role – The DBA role will have full control of the database and can review any activities conducted by any of the other users
CustomerLookup Role – The customer lookup role allows authorized users to select from the customers table and the ord ...
Question 7 0 out of 1 points and unit costs As the marginal physical product of U.S. workers ,
the marginal cost of goods produced in the US, competitive in the global marketplace. - This
makes American goods Selected Answer: b. falls; falls; fall; more Answers: a rises; falls; fall;
less b. falls; falls; fall; more c. rises; falls; fall; more d, rises; falls; fall; more
Solution
As the marginal physical product of US workers RISES, the marginal cost of goods produced in
the US FALLS and unit costs FALL. This makes American goods More competitive in the
global market as they are cheaper than the rest. Hence will have larger market share.
Answer uis Part C.
Wellington APAC Groundbreakers tour - Upgrading to the 12c OptimizerConnor McDonald
The 12c optimizer has a vast array of improvements, but of course, functionality changes means that your SQL plans might also change when you upgrade. This slidedeck covers what has changed, and how to ensure better more stable performance when you upgrade.
CompanyDB Problemspage 1 of 3Consider the employee database of .docxmonicafrancis71118
CompanyDB Problems page 1 of 3
Consider the employee database of Figure CompanyDB:
*************************************************
* employee (employee_name, street, city) *
* works (employee_name, company_name, salary) *
* company (company_name, city) *
* manages (employee_name, manager_name) *
*************************************************
Figure CompanyDB.
Using the course database, give an expression in SQL for each of the following queries. The expected results are indicated for each query.
a. Find the names of all employees who work for First Bank Corporation.
EMPLOYEE_NAME
--------------------
Ferris
Johnson
Laikin
Moira
Turner
b. Find the names and cities of residence of all employees who work for First Bank Corporation.
EMPLOYEE_NAME CITY
-------------------- --------------------
Ferris Westchester
Johnson Palo Alto
Laikin Culver City
Moira Kentwood
Turner Palo Alto
c. Find the names, street address, and cities of residence of all employees who work for First Bank Corporation and earn more than $10,000.
EMPLOYEE_NAME STREET CITY
-------------------- ------------------------------ --------------------
Ferris Loyola Westchester
Johnson Alma Palo Alto
Laikin Berryman Culver City
Moira Nancy Kentwood
Turner Alma Palo Alto
d. Find all employees in the database who live in the same cities as the companies for which they work.
EMPLOYEE_NAME
--------------------
August
Brooks
Curry
Hayes
Jones
Smith
e. Find all employees in the database who live in the same cities and on the same streets as do their managers.
EMPLOYEE_NAME
--------------------
Curry
Lindsay
Turner
Williams
f. Find all employees in the database who do not work for First Bank Corporation
EMPLOYEE_NAME
--------------------
Adams
August
Brooks
Curry
Glenn
Green
Hayes
Jones
Lindsay
Schmidt
Smith
Williams
Young
g. Find all employees in the database who earn more than every employee of Small Bank Corporation.
EMPLOYEE_NAME SALARY
-------------------- ---------
August 150000.00
Schmidt 120000.00
h. Assume that the companies may be located in several cities. Find all companies located in every city in which Small Bank Corporation is located
COMPANY_NAME
------------------------------
Small Bank Corporation
i. Find all employees who earn more than the average salary of all employees of their company.
EMPLOYEE_NAME
--------------------
Adams
August
Brooks
Ferris
Glenn
Green
Johnson
Laikin
j. Find the company that has the most employees. Show the company name and number of employees.
COMPANY_NAME COUNT(DISTINCT employee_name)
------------------------------ -----------------------------
First Bank Corporation 5
k. Find the company that has the smallest payroll.
COMPANY_NAME
------------------------------
Cathedral Software
l. Find those companies whose employees earn a higher salary, on average, than the average salary at First Bank Corporation.
COMPA.
Reorganizing AQ tables in APPS_TS_QUEUES in ebs r12.1/r12.2maaz khan
Reorganizing AQ tables in APPS_TS_QUEUES
This document covers several aspects on reorganization of advanced queuing tables in APPS_TS_QUEUES tablespace for ebs r12.1/r12.2 customers.
This is relevant to seasoned DBAs/Apps DBAs and can leverage defragmentation activity.
Setting in Fiction Think of your favorite story, boo.docxklinda1
Setting in Fiction
Think of your favorite story, book, movie or play. Consider the elements of its setting (time, place, social environment, and weather). In four-to-five sentences, discuss the impact the setting plays on the story. You can discuss how it affects the characters or how it contributes to the meaning of the story. Be sure to include the name of the story, book, movie or play, and to rely on what you've learned about setting during this lesson.
Your original post should be written using academic language (though some use of first person may be appropriate), and be written clearly in complete sentences. Be sure to proofread carefully.
Some examples:
One of my favorite movies is Devil. Devil takes place in an elevator with 5 people trapped between floors. Unusual things started happening on the elevator every time the lights went out. When the light came back on someone was dead. The police were contacted and detective Bowden took the case. Bowden and a security guard watched and communicated through video camera and speaker. The security guard convented them that this was the work of the devil and to save themselves they needed to see themselves as they are. When down to the last passenger on the elevator the devil reviled itself. The last passenger began to confess to a hit in run that killed a mother and her son which happened to be detective Bowden family.
When thinking of how the setting impacts the movie, I think of my favorite movie- Avengers: Endgame. The setting takes place in different times. Past, present, and future. When all hope is lost in trying to bring everyone back, Scott suggest Time Travel. The avengers have an advantage of gathering all the infinity stones from different times. Particularly, they have an advantage of getting 3 out of the 6 stones which are in New York just different time periods. They succeed with bringing them all back to the present time and bring everyone back. Only for their triumphant day to get ruined by Thanos who attacks with his army.
I can think of many movies that have settings I like a lot but my favorite setting which also was had the story line continuing in it also would be the scene in the movie Radio when the coach ha to tell him he can’t get on the bus to go to the football game with them as he starts to comprehend and get sad as the coach is walking to the bus leaving him there it starts to rain making the already gloomy weather and sad scene more sad because now he is stuck in the rain. They cut to the football field where it is still raining on top of now being dark and radio has the football game on his radio and he takes the field and every play he fails while playing alone in the rain they fail in the game that is actually going on till they lose on his missed field goal.
.
This paper describes the evolution of the Plan table and DBMSX_PLAN in 11g and some of the features that can be used to troubelshoot SQL performance effectively and efficiently.
To buy MBA assignments please use below link
https://ignousolvedassignmentsmba.blog.spot.in/
KIAN PUBLICATION
ignousolvedassignmentsmba@gmail.com
kianpublication1@gmail.com
ignou4you@gmail.com
Webinar slides: MySQL Query Tuning Trilogy: Working with optimizer and SQL tu...Severalnines
This is the final part of our webinar trilogy on MySQL Query Tuning, in which we looked at query tuning process and tools to help with that. We’ve covered topics such as SQL tuning, indexing, the optimizer and how to leverage EXPLAIN to gain insight into execution plans. Part 3: Working with the optimizer and SQL tuning.
AGENDA
Optimizer
- How execution plans are calculated
- InnoDB statistics
Hinting the optimizer
- Index hints
- JOIN order modifications
- Tweakable optimizations
Optimizing SQL
SPEAKER
Krzysztof Książek, Senior Support Engineer at Severalnines, is a MySQL DBA with experience managing complex database environments for companies like Zendesk, Chegg, Pinterest and Flipboard.
(Lab Project) (2)Table of ContentsIntroduction.docxaryan532920
(
Lab Project
) (
2
)
Table of Contents
Introduction 4
Timeline 5
Conceptual Model: 6
Users: 6
Views: 7
Roles: 7
Logical Model: 8
Physical Model: 9
Security Implementation: 21
USER CREATION 21
CREATE ROLES AND GRANT PRIVILEGES 21
Security Policy A: 22
Test Case scenario 1: 22
Test Case Scenario 2: 23
Test Case scenario 3: 23
Test case scenario 4: 23
Security Policy B: 24
Test case scenario 1: 24
Test Case Scenario 2: 24
Security Policy C: 25
Test case scenario 1: 25
Test case scenario 2: 26
Security Policy D: 27
Test case scenario 1: 27
Test case scenario 2: 28
Security Policy E: 29
Test case scenario 1: 29
Test case scenario 1: 34
Security Policy F: 36
Test case scenario 1: 36
Test case scenario 2: 39
Security Policy G: 40
CREATE TABLE 41
CREATE POLICY 41
CREATE SECURITY LEVELS: U, C, S, TS 41
CREATE SECURITY LABELS: U, C, S, TS 42
GRANT USERS PRIVILEGES TO THE TABLE 42
SET USER LEVELS 43
APPLY THE POLICY TO THE USERLVL TABLE 44
INSERT DATA INTO USERLVL TABLE 44
VIEW ACCESS FOR EACH USER LEVEL 45
Introduction
Purest Retail Store has recently encountered database security breaches. The database stores customer’s personal information and their purchases, so it is important that only authorized users have access to the data in the database. The company’s internal IT staff built the database with no constraints on the tables to prevent duplication and unauthorized users from viewing the data.
The owner of the store lost lots of loyal customers due to the breaches and tasked the Security Manager to find a solution to ensure that the data in the database is more secure and only accessible to authorized users. The security manager did a full risk analysis and determined that the IT department needs to establish better security practices and take the necessary measurements to improve the security of the database and its users. In addition, the security policy and plan should be frequently reviewed and updated to reflect the growing changes of the database and users. The following are the necessary implementation of database security measures:
· Security Policy and Plan
· Security procedures
· Account setup for users that includes passwords
· Assigning roles and privileges to users
· Establishing Access Control
· Granting authorized users access to the databaseTimeline
Because the company has suffered great loss in both revenue and customers, it is important that these security measures are implemented immediately. The following is the timeline of completing the security policy and procedures.
Conceptual Model:
The following table consists of all the users who have access to the database. Each user is assigned a unique userid and password, specific privileges, and a role. The following are roles:
DBA Role – The DBA role will have full control of the database and can review any activities conducted by any of the other users
CustomerLookup Role – The customer lookup role allows authorized users to select from the customers table and the ord ...
Question 7 0 out of 1 points and unit costs As the marginal physical product of U.S. workers ,
the marginal cost of goods produced in the US, competitive in the global marketplace. - This
makes American goods Selected Answer: b. falls; falls; fall; more Answers: a rises; falls; fall;
less b. falls; falls; fall; more c. rises; falls; fall; more d, rises; falls; fall; more
Solution
As the marginal physical product of US workers RISES, the marginal cost of goods produced in
the US FALLS and unit costs FALL. This makes American goods More competitive in the
global market as they are cheaper than the rest. Hence will have larger market share.
Answer uis Part C.
Wellington APAC Groundbreakers tour - Upgrading to the 12c OptimizerConnor McDonald
The 12c optimizer has a vast array of improvements, but of course, functionality changes means that your SQL plans might also change when you upgrade. This slidedeck covers what has changed, and how to ensure better more stable performance when you upgrade.
CompanyDB Problemspage 1 of 3Consider the employee database of .docxmonicafrancis71118
CompanyDB Problems page 1 of 3
Consider the employee database of Figure CompanyDB:
*************************************************
* employee (employee_name, street, city) *
* works (employee_name, company_name, salary) *
* company (company_name, city) *
* manages (employee_name, manager_name) *
*************************************************
Figure CompanyDB.
Using the course database, give an expression in SQL for each of the following queries. The expected results are indicated for each query.
a. Find the names of all employees who work for First Bank Corporation.
EMPLOYEE_NAME
--------------------
Ferris
Johnson
Laikin
Moira
Turner
b. Find the names and cities of residence of all employees who work for First Bank Corporation.
EMPLOYEE_NAME CITY
-------------------- --------------------
Ferris Westchester
Johnson Palo Alto
Laikin Culver City
Moira Kentwood
Turner Palo Alto
c. Find the names, street address, and cities of residence of all employees who work for First Bank Corporation and earn more than $10,000.
EMPLOYEE_NAME STREET CITY
-------------------- ------------------------------ --------------------
Ferris Loyola Westchester
Johnson Alma Palo Alto
Laikin Berryman Culver City
Moira Nancy Kentwood
Turner Alma Palo Alto
d. Find all employees in the database who live in the same cities as the companies for which they work.
EMPLOYEE_NAME
--------------------
August
Brooks
Curry
Hayes
Jones
Smith
e. Find all employees in the database who live in the same cities and on the same streets as do their managers.
EMPLOYEE_NAME
--------------------
Curry
Lindsay
Turner
Williams
f. Find all employees in the database who do not work for First Bank Corporation
EMPLOYEE_NAME
--------------------
Adams
August
Brooks
Curry
Glenn
Green
Hayes
Jones
Lindsay
Schmidt
Smith
Williams
Young
g. Find all employees in the database who earn more than every employee of Small Bank Corporation.
EMPLOYEE_NAME SALARY
-------------------- ---------
August 150000.00
Schmidt 120000.00
h. Assume that the companies may be located in several cities. Find all companies located in every city in which Small Bank Corporation is located
COMPANY_NAME
------------------------------
Small Bank Corporation
i. Find all employees who earn more than the average salary of all employees of their company.
EMPLOYEE_NAME
--------------------
Adams
August
Brooks
Ferris
Glenn
Green
Johnson
Laikin
j. Find the company that has the most employees. Show the company name and number of employees.
COMPANY_NAME COUNT(DISTINCT employee_name)
------------------------------ -----------------------------
First Bank Corporation 5
k. Find the company that has the smallest payroll.
COMPANY_NAME
------------------------------
Cathedral Software
l. Find those companies whose employees earn a higher salary, on average, than the average salary at First Bank Corporation.
COMPA.
Reorganizing AQ tables in APPS_TS_QUEUES in ebs r12.1/r12.2maaz khan
Reorganizing AQ tables in APPS_TS_QUEUES
This document covers several aspects on reorganization of advanced queuing tables in APPS_TS_QUEUES tablespace for ebs r12.1/r12.2 customers.
This is relevant to seasoned DBAs/Apps DBAs and can leverage defragmentation activity.
Setting in Fiction Think of your favorite story, boo.docxklinda1
Setting in Fiction
Think of your favorite story, book, movie or play. Consider the elements of its setting (time, place, social environment, and weather). In four-to-five sentences, discuss the impact the setting plays on the story. You can discuss how it affects the characters or how it contributes to the meaning of the story. Be sure to include the name of the story, book, movie or play, and to rely on what you've learned about setting during this lesson.
Your original post should be written using academic language (though some use of first person may be appropriate), and be written clearly in complete sentences. Be sure to proofread carefully.
Some examples:
One of my favorite movies is Devil. Devil takes place in an elevator with 5 people trapped between floors. Unusual things started happening on the elevator every time the lights went out. When the light came back on someone was dead. The police were contacted and detective Bowden took the case. Bowden and a security guard watched and communicated through video camera and speaker. The security guard convented them that this was the work of the devil and to save themselves they needed to see themselves as they are. When down to the last passenger on the elevator the devil reviled itself. The last passenger began to confess to a hit in run that killed a mother and her son which happened to be detective Bowden family.
When thinking of how the setting impacts the movie, I think of my favorite movie- Avengers: Endgame. The setting takes place in different times. Past, present, and future. When all hope is lost in trying to bring everyone back, Scott suggest Time Travel. The avengers have an advantage of gathering all the infinity stones from different times. Particularly, they have an advantage of getting 3 out of the 6 stones which are in New York just different time periods. They succeed with bringing them all back to the present time and bring everyone back. Only for their triumphant day to get ruined by Thanos who attacks with his army.
I can think of many movies that have settings I like a lot but my favorite setting which also was had the story line continuing in it also would be the scene in the movie Radio when the coach ha to tell him he can’t get on the bus to go to the football game with them as he starts to comprehend and get sad as the coach is walking to the bus leaving him there it starts to rain making the already gloomy weather and sad scene more sad because now he is stuck in the rain. They cut to the football field where it is still raining on top of now being dark and radio has the football game on his radio and he takes the field and every play he fails while playing alone in the rain they fail in the game that is actually going on till they lose on his missed field goal.
.
Setting Goals and ObjectivesGilbert Burnham, MDJohns Hop.docxklinda1
Setting Goals and Objectives
Gilbert Burnham, MD
Johns Hopkins University
The material in this video is subject to the copyright of the owners of the material and is being provided for educational purposes under
rules of fair use for registered students in this course only. No additional copies of the copyrighted work may be made or distributed.
Part 1: Thinking about Goals, Objectives,
and Indicators
3
Project
Development
Process—1
4
Project
Development
Process—2
5
Project
Development
Process—3
6
The Logical Sequence—1
► The Problem Statement leads to program goals or aims
► These say what you are going to do to address the problems and needs identified
► Goals (general) Objectives (specific)
► Objectives lead to your strategy and methods
► Objectives are the basis of your monitoring system
► Objectives are measured by indicators
► Objectives are what you will be evaluated against during regular and final evaluations
So these have to be right!
7
The Logical Sequence—2
8
Start with the Goal or Aim or Purpose
► An overall end point—where do we want to be at project end?
► Explain why you are doing the project
► Emphasizes consistency with national plans or with other initiatives and your
organizational mandate
► It says what you hope to achieve by addressing your problem statement
► Can help build recognition of activities
► Goals represent general overall project direction
► Not specific, and not quantifiable, but not vague
► There should be only one overall goal—too many confuses the reader
● May be several subgoals—each of which will have one or more objectives, but don’t
make it confusing
► Sets the stage for the objectives, which are specific and quantifiable
9
Objectives—1
An objective…
► Is a statement of a specific and quantifiable accomplishment to be attained in a given time
frame
► This says how you intend to achieve your goal, and how you will make a difference in the
lives of the population you serve
► Includes words like—
► “increase”
► “strengthen”
► “decrease”
► “extend”
► “empower”
10
Objectives—2
11
Objectives—3
12
“SMART”
Objectives
The famous SMART objectives, now taught in primary schools the
world over (with some variations)
► Specific
The objective describes the direct result of the activity, and say
how you will achieve them
► Measurable
The objective can be quantified—how much, how many, how
often
They are the change created
► Achievable (also Attainable, Agreed, Assignable)
The objective can be attained by the organization—capacity,
constraints, resources
► Relevant (also Realistic)
This is something which will have practical benefit
► Time-bound (also Time-limited)
Results will be achieved within in a given time
13
Indicators, Milestones, and Targets
► Indicators—can be qualitative or quantitative
► Variables that help measure changes in health situations and assess the extent to
which the objective and targets of a program .
Set up and diagram an Incident Command System for the following .docxklinda1
Set up and diagram an Incident Command System for the following scenario
. Define all the roles and responsibilities for each functional area that would be included in this scenario.
SCENARIO:
At 10:05a.m. today, a hurricane/earthquake/tornado/flood hit the community of Edenton. The downtown area was the hardest hit. People have reported damage to homes, and businesses have been affected as well. No fatalities have been reported. Three people with injuries have been taken to the Edenton Community Hospital, which is also reporting some damage. As many as 10 people are missing. The downtown fire station is destroyed/inoperable. Two other fire stations are operational. Other possible effects: A large fire has broken out in downtown Water mains are cut. 10 percent of the population has sustained injuries. Utility lines are down. Animals in the zoo have escaped from their cages. Looters are rampaging downtown. Sewers have backed up, endangering public health. Many houses are destroyed/inhabitable and shelters will be needed. A hazardous spill has occurred. A major road has been affected.
Instructions for question 5
. 350-400 words, APA style format and a minimum of 3 references.
.
Set up a Ricardo-type comparative advantage numerical example with.docxklinda1
Set up a Ricardo-type comparative advantage numerical example with two countries and two goods. Distinguish "absolute advantage” from "comparative advantage” in the context of your example. Then select an international terms-or-trade ratio and explain in some detail how trade between the two countries benefits each of them in comparison with autarky. When would either of your countries NOT benefit from engaging in trade? Explain.
Important: Please ensure that you insert your citation for the article as your reference in your discussion post. Depending on which electronic database you use, you should see a "Cite” selection for your article. In addition, there should be a variety of articles summarized and as such, students should have different articles summarized. Your summary MUST include ALL of the following (include every item in the bullet list below, or you will not receive full credit):
Clearly state what the article is about and its purpose
How the article and/or author(s) support your argument(s)
Most important aspects of the article
Any findings and conclusions
Include the article "Abstract” in your posting (your summary should be original)
Include the industry example demonstrating the application of your researched article
"IMPORTANT” - Include the citation for the article
NO less than 3 pages.
With the increase in technological advancements, cyber bullying has been on the rise. The first topic of interest regards the preventive measures of cyber bullying in college. The reason behind this choice of topic for my argumentative essay is that I have fall a victim to the cyber bullying in my first years of college in several occasions . As a victim of cyber bullying, I know just how much the effects of cyber bullying can do to a person. The cases of cyber bullying have increased due to "the prevalence of social media platforms as well as digital forums" (Van Hee et al, 2015).This specifically means that both acquaintances and strangers have access to comments, content, photos and posts that are shared by people. This becomes even more worse if the information shared about an individual is personal or private which is bound to cause embarrassment or humiliation to the victim. The challenges am likely to face during my research is that many people do not admit that cyber bullying exits and that in deed there is a need to curb down the vice.
The second topic that interests me is on the effectiveness of death penalty as a means of punishment for major criminal offences like murder, homicide and forcible. This topic interests me because there has been an increase in violent crime cases in the world. My main interest is to find out if the victims of such crimes get justice through other forms of punishment or entirely require death penalties for the perpetrators. Also, this topic provides information on regarding the effects of death penalty on the crime rates. It provides a ground whether this form.
Session 3 Research Paper - Artist and InspirationThe author .docxklinda1
Session 3 Research Paper - Artist and Inspiration
The author of our course's text, Jerram Barrs, explores the idea that quality art (on some level) truthfully explores what it means to live life as a human. In
Echoes of Eden
, he states, "This principle of representing things as they are is a matter of obedience and honesty. Simple integrity constrains us to communicate faithfully and truthfully not only about the Lord himself and other people whose stories appear in the Bible, but also about our current human condition" (Barrs, 2013).
In our discussion assignment this week, you chose a specific artistic medium for your Session 5 Final Project. Now that you have identified the particular form of art that you'd like to submit, we will engage in an important step of the creative process -- researching the form and technique of those who have come before us. For this paper, identify an artist who has created art in the same category that you have selected for your final project. For example, if you have chosen to compose a poem for your project, you'll need to identify a prominent poet to research.
In 2-3 pages (formatting per APA standards), address these elements:
What do you personally find inspiring about this artist's work?
How do you see universal truths of humanity (pain, joy, love, redemption, etc.) within the artist's work? If you do not see these, explain what you think the artist is attempting to convey.
What makes this artist's work different than other artists who create the same type of art?
Identify a minimum of two elements within his or her artistic technique and explain how you could potentially utilize them your Session 5 Final Project.
Click on the
Session 3 Research Paper - Artist and Inspiration
link to submit your assignment by the posted due date. Review the rubric available in
Due Dates and Grades
for specific grading criteria.
Reference
Barrs, J. (2013).
Echoes of Eden
. Wheaton, IL: Crossway.
.
Session 2 Creativity Reflection PaperIn Echoes of Eden (.docxklinda1
Session 2 Creativity Reflection Paper
In
Echoes of Eden
(2013), Barrs claims that the Christian artist “holds up the mirror to what God has made”. In this sense, we have the opportunity to express our creativity in ways that highlight things that God has created, sustained, redeemed and rebuilt. In 2-3 pages (formatting per APA standards), reflect on your own specific creative talents by addressing these questions:
What are your two most significant creative talents, and how do you currently use them?
What is one creative talent that you would like to develop (or one that that admire in others)?
How do you, in your daily life, work to show the world what is true, beautiful, inspiring, and/or worthy of celebration within God's Kingdom?
Click on the
Session 2 Creativity Reflection Paper
link to submit your assignment by the posted due date. Review the rubric available in
Due Dates and Grades
for specific grading criteria.
Reference
Barrs, J. (2013).
Echoes of Eden
. Wheaton, IL: Crossway.
.
Session 2 Business Strategies based on Value ChainAg.docxklinda1
Session 2
Business Strategies based on Value Chain
Agenda
Opening case & Porter’s Value Chain hypothesis
Porter’s generic strategies framework
Cost leadership
Differentiation
Two views on Value Chain hypothesis
The Consistency View
The Blue Ocean View
Case
Video case: Nintendo Wii Blue Ocean strategy
The Blue Ocean that Disappeared – The Case of Nintendo Wii
Opening case
To offset its market share losses since 2008, Nestle has sought to aggressively promote linkages in the premium, luxury market – that has been immune to the recession and has been growing rapidly
Nestle as a global corporation has five major business groups; in each, Nestle links its resource transforming functions in very different ways, reflecting the personality and the positioning of its specific brands.
Culinary foods
Maggi
Le Creazioni di Casa Buitoni
Beverages
Nescafe
Nespresso
Confecti-onary
Kitkat
Maisen Cailer
Milk products
Nutrition
Cerelac
Nestle Haagen Dazs
Babynes
Porter’s Value Chain hypothesis
According to Porter’s value chain hypothesis, the primary links among the resource transforming functions should be sequenced as a chain, i.e. design, produce, market, deliver and support (Porter, 1985)
Value chain analysis helps to evaluate effectiveness of a firm in different functions
Strategies for manipulating value linkages for improving strategic advantage of a business are referred to as the “Business-level strategies”
Design
Production
Marketing
Support
Delivery
The Value Chain hypothesis
In Porter’s framework, the functions in a firm’s value chain are grouped into two broad categories of activities: primary and secondary
Primary activities are directly involved in transforming inputs into outputs and in delivery and after-sales support
inbound logistics
Support activities are involved in supporting primary activities
procurement
service—installation, usage guidance, maintenance, parts, and returns
operations
outbound logistics
marketing and sales
technology development
human resource management
firm infrastructure—general management, planning, finance, accounting, legal, government affairs and quality management
Porter’s generic strategies framework
Generic Sources of Strategic Advantage in Value Chains
One of the major purposes of Porter’s framework is to explicate two generic sources of strategic advantage for the businesses of a firm.
Value
Cost
If customers perceive a product or service as superior, they are willing to pay a premium relative to the price they will pay for competing offerings
If a firm gains a cost advantage for performing activities in its value chain at a cost lower than its major competitors, then it has flexibility to undercut competitors and offer greater value for money
Two views on Value Chain hypothesis
There are two views on this hypothesis:
Contingency view
The firms that make consistent, persistent and dedicated investments i.
Session 1 Module 2INTRODUCTION TO AUDITING .docxklinda1
Session 1 Module 2
INTRODUCTION TO AUDITING
1
LEARNING OBJECTIVES
After this module you should be able to:
Define auditing
Differentiate between different levels of assurance
Appreciate different audit opinions (covered in depth in session11)
Differentiate between the different role of the preparer of financial statements and the auditor.
Explain the reasons for the demand for audit and assurance services
Appreciate the Corporations Act requirements for company audits
Explain the audit expectation gap.
These are the objectives that students are expected to understand and be able to explain and apply.
Students will only be assessed within the learning objectives provided for each module of the course.
2
AUDITING AND ASSURANCE DEFINED
An audit is an assurance engagement defined as ‘an engagement in which an assurance practitioner expresses a conclusion designed to enhance the degree of confidence of the intended users other than the responsible party about the outcome of the evaluation or measurement of a subject matter against criteria.’
This is a definition of an audit highlighting the main parties involved and their roles
3
1-4
Diagram of assurance engagement
4
*Comment on : main parties and their roles
Jaq (J) - add figure 1-1
1-5
Five elements ofassurance
engagement
Three-party relationships:
assurance practitioner (auditor)
responsible party (preparer)
intended user
Subject matter
Suitable criteria
Sufficient appropriate evidence
Written assurance report
Audit engagement has 5 elements
These are explained on following slides
5
AUDITING AND ASSURANCE DEFINED
‘intended users’ - the people for whom the auditor prepares their report.
Example: shareholders, creditors, employees
‘responsible party’ - the person or organisation responsible for preparing the financial statements. Example: company management
‘subject matter’ – that which the auditor is expressing a conclusion on. i.e. financial reports
‘criteria’ – the rules or principles by which the subject matter is being evaluated. i.e. Accounting standards and interpretations and Corporations laws
Comment on explanations of terms
6
AUDITING AND ASSURANCE DEFINED cont’d.
Sufficient appropriate evidence
The quantity and quality of evidence the auditor requires in order to express a conclusion on the subject matter
*Written assurance report
Written report from the auditor expressing the auditor’s conclusion on the subject matter
Comment on explanations of terms
7
DIFFERENT LEVELS OF ASSURANCE
AUDITORS MAY PROVIDE VARYING LEVELS OF ASSURANCE WHEN CONDUCTING ASSURANCE ENGAGEMENTS.
Reasonable assurance
Limited assurance
No assurance
There are 3 levels of assurance which are described on next slide
8
DIFFERENT LEVELS OF ASSURANCELEVEL OF ASSURANCE
EXAMPLE
THE ASSURANCE EXPRESSIONREASONABLE
Highest level of assurance but not absolute assurance on the reliability of the subject matterFinancial Statement AuditThe auditor has conducted sufficient tests and.
Service-Oriented Architecture Please respond to the followingSe.docxklinda1
"Service-Oriented Architecture" Please respond to the following:
Service Oriented Architecture (SOA) is an architectural style for building software applications that use services available in a network such as the Web. SOA is based on standard protocols such as HyperText Transfer Protocol (HTTP), Simple Object Access Protocol (SOAP), etc. SOA services are consumed by client applications over the Internet. SOA exposes business services to a wide range of service consumers. Assess SOA in terms of business integration, security,interoperability, and IT infrastructure.
A Web service is a set of technologies used for exchanging data between applications. Web services allow businesses to connect their processes to their business partners. This form of business integration results in Business Process Management (BPM) mashups. Assess the benefits of BPM mashups in terms of ease of integration, composition of services, and information sharing.
"Software Provisioning" Please respond to the following:
When a company has a need for software, one option is to buy it from a software vendor or build it internally if the IT department can develop the software.This results in a build-or-buy debate. Take a stance on the build versus buy debate.Justify your decision in regard to cost, flexibility, reliability, and security.
Software development methods include Joint Application Development (JAD), Rapid Application Development (RAD), Extreme Programming (XP), Software Prototyping,and Open-Source Development. Choose the best software development method from those listed here and explain why you believe it is best.
.
Server FarmIP PhoneEnd-usersCorporate Computers.docxklinda1
Server Farm
IP Phone
End-users
Corporate Computers
Switch-1
Dallas Office
10.2.1.0 /24
10.2.2.0 /2410.2.4.0 /24
10.2.5.0 /24
10.2.6.0 /24
SNHUEnergy, Inc.
Logical Network Design
Router
Memphis Office
10.2.1.1 /2410.2.6.1 /24
10.10.1.1 /24
10.2.2.1 /2410.2.5.1 /24
Video
Conferencing
10.2.4.1 /24
10.10.1.2 /24
it640_memphis_office_logical_design_current.vsdxPage-1
Dallas Office
DALLAS_SW_1
PAYROLL
Memphis Office
MEMPHIS_SW-01
MEMPHIS_WKS_002
DALLAS_WKS_003
ACCOUNTING E-MAIL
DALLAS_SW-01
HR
DALL_RTR_03
SNHUEnergy, Inc.
Physical Network Design
CURRENT
NETWORK DESIGN
MEMPHIS_RTR_002DALLAS_WKS_002
DALLAS_WKS_001
MEMPHIS_WKS_001
Operations
Dallas Office:
Total Employees – 90
Applications –
Email
Payroll
Accounting
HR
Services -
VoIP Phone System
Video Conferencing
Hardware –
Routers - 1
Switches - 2
Firewalls - 1
Connectivity –
Internet
Memphis Office:
Total Employees – 30
Applications –
Billing
Operations
Services -
VoIP Phone System
Video Conferencing
Hardware –
Routers – 1
Switches – 1
Firewalls – 0
Connectivity –
Internet
Billing
Internet
it640_final_project_physical_diagram_current.vsdxPage-1
Server Farm
WAP’s
IP Phone
End-users
Corporate Computers
Switch-2
INTERNET
FIREWALL
10.0.1.0 /24
10.0.2.0 /24
10.0.3.0 /24
10.0.4.0 /24
10.0.5.0 /24
10.0.6.0 /24
SNHUEnergy, Inc.
Logical Network Design
Router
Switch-1
Dallas Office
10.0.1.1 /2410.0.6.1 /24
10.1.0.1 /24
10.0.3.1 /24 10.0.4.1 /24
10.0.2.1 /2410.0.5.1 /24
10.1.0.11 /2410.1.0.10 /24
Video
Conferencing
67.0.0.0
it640_dallas_office_logical_design_current.vsdxPage-1
IT 640 Milestone One Guidelines and Rubric
Project Analysis Plan
Overview: For your final project, you will assume the role of a network consultant for SNHUEnergy Inc., an organization looking to expand its communication
reach. Refer to the Final Project Scenario document for details. You have been tasked with analyzing the current network architecture of the organization and
determining any key changes that should occur as the organization prepares for future growth. You will evaluate traffic patterns to determine critical aspects of
your business and provide basic insight into what should be done to the network from a capability aspect and from a security viewpoint as the organization
prepares for future growth. Ultimately, you will recommend a design for the future network architecture of the organization.
Prompt: Your first milestone for this project will be the creation of a project analysis plan. Your plan will identify the network applications of the current network
including a description of how the current network is designed by explaining how the different layers of the Open Systems Interconnection (OSI) model relate to
each other within the network.
Refer to the following files when completing this milestone:
Dallas Office Logical Design - Current
Final Project Physical Diagram - Curren.
\\server05\productn\C\CRY\45-3\CRY305.txt unknown Seq: 1 22-AUG-07 10:10
THE LABELING OF CONVICTED FELONS
AND ITS CONSEQUENCES FOR
RECIDIVISM*
TED CHIRICOS
KELLE BARRICK
WILLIAM BALES
College of Criminology and Criminal Justice
Florida State University
STEPHANIE BONTRAGER
Justice Research Associates
KEYWORDS: labeling, felony conviction, recidivism
Florida law allows judges to withhold adjudication of guilt for individ-
uals who have been found guilty of a felony and are being sentenced to
probation. Such individuals lose no civil rights and may lawfully assert
they had not been convicted of a felony. Labeling theory would predict
that the receipt of a felony label could increase the likelihood of recidi-
vism. Reconviction data for 95,919 men and women who were either
adjudicated or had adjudication withheld show that those formally
labeled are significantly more likely to recidivate in 2 years than those
who are not. Labeling effects are stronger for women, whites, and those
who reach the age of 30 years without a prior conviction. Second-level
indicators of county characteristics (e.g., crime rates or concentrated
disadvantage) have no significant effect on the adjudication/recidivism
relationship.
Traditional labeling theory explains the potential “escalating” conse-
quences of a criminal or delinquent labeling experience in two ways (Lof-
land, 1969; Sherman et al., 1992). The first consequence involves a
* The authors would like to thank the anonymous reviewers as well as Carter Hay,
Dan Mears, Brian Stults, and especially Xia Wang for their helpful comments on
an earlier version of this article. Direct correspondence to Ted Chiricos (e-mail:
[email protected]).
CRIMINOLOGY VOLUME 45 NUMBER 3 2007 547
\\server05\productn\C\CRY\45-3\CRY305.txt unknown Seq: 2 22-AUG-07 10:10
548 CHIRICOS, BARRICK, BALES & BONTRAGER
transformation of identity,1 and the second emphasizes structural impedi-
ments to conventional life that result from a labeling event.2 Although
labeling events have been variably operationalized to include police con-
tact, arrest, conviction, and imprisonment, it is arguable that felony convic-
tion is the most consequential in relation to the development of structural
impediments. The label of “convicted felon” strips an individual of the
right to vote, serve on juries, own firearms, or hold public office. In many
states, convicted felons are prohibited from obtaining student loans,
employment in state-licensed occupations, or employment with state-
licensed companies. In addition, the label of convicted felon may contrib-
ute to various informal exclusions that can make access to noncriminal
activities more difficult and criminal alternatives more attractive.3
The state of Florida has a law that allows individuals who have been
found guilty of a felony, either by a judge, jury, or plea, to literally avoid
the label of convicted felon. Judges have the option of “withholding adju-
dication” of guilt for convic.
Service Area- The geographic area from which organization dr.docxklinda1
Service Area
- The geographic area from which organization draws the majority of its customers/patients. For some service categories the service area may be quite large (organ translate) whereas for other service categories it might be quite small (emergency room).
External Analysis
- A strategic thinking activity directed toward identifying, aggregating, and interoperating the issues that are outside the organization to determine the implications of those issues on the organization as well as to provide information for internal analysis and the development of the directional strategies.
Monitoring (External Change)
- The tracking of various issues identified in the scanning process to add data concerning the item under consideration to confirm or disconfirm the issue or its impact.
Service Category
- A distinct health care offering that may be defined very broadly (hospital care) or very narrowly (pediatric hematology) depending on the level of analysis.
Focus Groups
- A facilitated process typically using 10-15 people to surface, develop, evaluate, and reach conclusion about an issue.
APA format
reffo
.
Share your written proposal with your manager, supervisor or other c.docxklinda1
Share your written proposal with your manager, supervisor or other colleague in a formal leadership position within a health care organization. Request their feedback using the following questions as prompts:
1. Do you believe the proposal would be approved if formally proposed?
2. What are some strengths and weaknesses of the proposal?
.
Shareholder or stakeholder That is the question.In recent years.docxklinda1
Shareholder or stakeholder? That is the question.
In recent years debate has intensified over the role of governments in regulating markets and conducting economic activity? Has capitalism runs its course? Should corporations maximize value for shareholders or all stakeholders (e.g., employees)? What should be the role of the corporation? And the government? Are CEOs overpaid? The COVID crisis has brought these and related matters into greater scrutiny. Minimum wage earners (e.g., Amazon delivery) became essential workers! In the meantime, CEO pay ratios (CEO pay/average worker pay) have increased over time from 40 to 400. Safety nets do not appear to exist.
Please read the attachment. Please refrain from making political statements or attributions (about half a page). Keep your discussion civil and professional.
.
Share your thoughts and opinions on predictive versus adaptive S.docxklinda1
Share your thoughts and opinions on predictive versus adaptive SDLC in this week's discussion.
Flesh out your thoughts and interact with your classmates. Post your initial response by the middle of each week and then return on a couple of other days to see what's going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.
.
Share your thoughts on Chapters 4 and 5. How much experience do you .docxklinda1
Share your thoughts on Chapters 4 and 5. How much experience do you have with interviewing? What are some of the biggest challenges you see or questions you have about interviewing or attributions? Also, Susan Orlean's process and The Rabbit Outbreak.
Quality posts and responses contribute to a rich learning community by citing readings, sharing examples, and building on the ideas of others in a collegial manner.
.
Share your thoughtsYou are the most important generation. EVER..docxklinda1
Share your thoughts
“You are the most important generation. EVER.” The reason why I say this to YOU is that there are so many challenges that your generation needs to address. Among the most important ones is climate change. So, please discuss in an open and respectful way where you stand on climate change. Do you think it is real? If so, what do we need to do to adapt to and mitigate its consequences?
.
Share your thoughts on some of the questions below. Research is not .docxklinda1
Share your thoughts on some of the questions below. Research is not required, but if you represent the thoughts, ideas, words, or images of others, be sure to give credit and cite your sources by indicating the author, date, title, and website link where this information was found.
What does leadership mean to you?
How important do you think effective leadership is, and why?
Share your personal observations of any other leaders you are familiar with, or have heard, seen or read about. These can be from personal experiences, news, websites, TV or movies. They might be business leaders, community leaders, coaches, mentors, or anyone you think has acted in a leadership role. Describe the leader(s) and the situation(s) you have observed.
What do you think were some positive leadership traits or successes that you observed? Explain why you think this.
What do you think were some negative leadership traits or failures you observed? Explain why you think this.
.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
set FOREIGN_KEY_CHECKS=false;-- --------------------------.docx
1. set FOREIGN_KEY_CHECKS=false;
-- -----------------------------------------------------
-- uncomment and run these 3 SCHEMA commands if you are
using your own server
-- -----------------------------------------------------
DROP SCHEMA IF EXISTS wellness_app ;
CREATE SCHEMA IF NOT EXISTS wellness_app DEFAULT
CHARACTER SET utf8 ;
USE wellness_app ;
-- ----------------------------------------------------
-- End uncomment
-- ----------------------------------------------------
-- -----------------------------------------------------
-- Table user
-- -----------------------------------------------------
DROP TABLE IF EXISTS user ;
CREATE TABLE IF NOT EXISTS user (
id INT NOT NULL AUTO_INCREMENT,
first_name VARCHAR(128) NOT NULL,
last_name VARCHAR(128) NOT NULL,
DOB DATE NULL,
PRIMARY KEY (id))
ENGINE = InnoDB
ROW_FORMAT = COMPRESSED;
2. -- -----------------------------------------------------
-- Table interest
-- -----------------------------------------------------
DROP TABLE IF EXISTS interest ;
CREATE TABLE IF NOT EXISTS interest (
id INT NOT NULL AUTO_INCREMENT,
name VARCHAR(100) NOT NULL,
PRIMARY KEY (id))
ENGINE = InnoDB;
-- -----------------------------------------------------
-- Table step
-- -----------------------------------------------------
DROP TABLE IF EXISTS step ;
CREATE TABLE IF NOT EXISTS step (
id INT NOT NULL AUTO_INCREMENT,
title VARCHAR(50) NOT NULL,
PRIMARY KEY (id))
ENGINE = InnoDB;
3. -- -----------------------------------------------------
-- Table theme
-- -----------------------------------------------------
DROP TABLE IF EXISTS theme ;
CREATE TABLE IF NOT EXISTS theme (
id INT NOT NULL AUTO_INCREMENT,
name VARCHAR(100) NOT NULL,
PRIMARY KEY (id))
ENGINE = InnoDB;
-- -----------------------------------------------------
-- Table user_follow
-- -----------------------------------------------------
DROP TABLE IF EXISTS user_follow ;
CREATE TABLE IF NOT EXISTS user_follow (
id INT NOT NULL AUTO_INCREMENT,
following_user_id INT NOT NULL,
followed_user_id INT NOT NULL,
weight INT NOT NULL DEFAULT 0,
PRIMARY KEY (id),
INDEX fk_user_user_connection_user1_idx
(following_user_id ASC),
INDEX fk_user_user_connection_user2_idx (followed_user_id
4. ASC),
CONSTRAINT fk_user_user_connection_user1
FOREIGN KEY (following_user_id)
REFERENCES user (id)
ON DELETE NO ACTION
ON UPDATE NO ACTION,
CONSTRAINT fk_user_user_connection_user2
FOREIGN KEY (followed_user_id)
REFERENCES user (id)
ON DELETE NO ACTION
ON UPDATE NO ACTION)
ENGINE = InnoDB;
-- -----------------------------------------------------
-- Table user_interest
-- -----------------------------------------------------
DROP TABLE IF EXISTS user_interest ;
CREATE TABLE IF NOT EXISTS user_interest (
user_id INT NOT NULL,
interest_id INT NOT NULL,
INDEX fk_user_interest_user1_idx (user_id ASC),
INDEX fk_user_interest_interest1_idx (interest_id ASC),
PRIMARY KEY (user_id, interest_id),
CONSTRAINT fk_user_interest_user1
FOREIGN KEY (user_id)
REFERENCES user (id)
ON DELETE NO ACTION
ON UPDATE NO ACTION,
CONSTRAINT fk_user_interest_interest1
FOREIGN KEY (interest_id)
REFERENCES interest (id)
ON DELETE NO ACTION
ON UPDATE NO ACTION)
ENGINE = InnoDB;
5. -- -----------------------------------------------------
-- Table step_taken
-- -----------------------------------------------------
DROP TABLE IF EXISTS step_taken ;
CREATE TABLE IF NOT EXISTS step_taken (
id INT NOT NULL AUTO_INCREMENT,
user_id INT NOT NULL,
step_id INT NOT NULL,
when_started TIMESTAMP NOT NULL DEFAULT
CURRENT_TIMESTAMP,
when_finished TIMESTAMP NULL,
rating TINYINT NULL,
INDEX fk_StepsTaken_User1 (user_id ASC),
INDEX fk_steps_taken_step1_idx (step_id ASC),
PRIMARY KEY (id),
CONSTRAINT fk_StepsTaken_User1
FOREIGN KEY (user_id)
REFERENCES user (id)
ON DELETE NO ACTION
ON UPDATE NO ACTION,
CONSTRAINT fk_steps_taken_step1
FOREIGN KEY (step_id)
REFERENCES step (id)
ON DELETE NO ACTION
ON UPDATE NO ACTION)
ENGINE = InnoDB;
6. -- -----------------------------------------------------
-- Table step_theme
-- -----------------------------------------------------
CREATE TABLE IF NOT EXISTS step_theme (
theme_id INT NOT NULL,
step_id INT NOT NULL,
PRIMARY KEY (theme_id, step_id),
INDEX fk_pathway_step_pathway1_idx (theme_id ASC),
INDEX fk_pathway_step_step1_idx (step_id ASC),
CONSTRAINT fk_pathway_step_pathway1
FOREIGN KEY (theme_id)
REFERENCES theme (id)
ON DELETE NO ACTION
ON UPDATE NO ACTION,
CONSTRAINT fk_pathway_step_step1
FOREIGN KEY (step_id)
REFERENCES step (id)
ON DELETE NO ACTION
ON UPDATE NO ACTION)
ENGINE = InnoDB;
INSERT INTO user VALUES(1,'Alice','Smith', '1999-01-01');
INSERT INTO user VALUES(2,'Bob','Singh', '2000-03-04');
INSERT INTO user VALUES(3,'Charlie','Nguyen', '2001-05-
23');
INSERT INTO user VALUES(4,'Dan','Williams', '1999-01-11');
INSERT INTO user VALUES(5,'Eve','Brown', '1995-07-07');
7. INSERT INTO user VALUES(6,'Frank','Jones', '1998-02-22');
INSERT INTO user VALUES(7,'Grace','Wilson', '2001-10-02');
INSERT INTO user VALUES(8,'Heidi','Taylor', '1997-04-21');
INSERT INTO user VALUES(9,'Ian','Lee', '1997-12-30');
INSERT INTO user VALUES(10,'Judy','Tran', '1995-05-12');
INSERT INTO user VALUES(11,'Kath','Anderson', '1996-09-
11');
INSERT INTO user VALUES(12,'Lee','Thomas', '1998-02-02');
INSERT INTO user VALUES(13,'Mallory','White', '2002-05-
13');
INSERT INTO user VALUES(14,'Nick','Johnson', '1999-11-
14');
INSERT INTO user VALUES(15,'Olivia','Martin', '2000-11-
01');
INSERT INTO user VALUES(16,'Pat','Wang', '1995-01-01');
INSERT INTO user VALUES(17,'Quentin','Chen', '1996-04-
12');
INSERT INTO user VALUES(18,'Robbie','Ryan', '1997-06-21');
INSERT INTO user VALUES(19,'Sam','Thompson', '2000-02-
15');
INSERT INTO user VALUES(20,'Tracey','Young', '2001-03-
25');
INSERT INTO user_follow VALUES(1, 1,2,0);
INSERT INTO user_follow VALUES(2, 2,1,0);
INSERT INTO user_follow VALUES(3, 3,20,0);
INSERT INTO user_follow VALUES(4, 4,14,0);
INSERT INTO user_follow VALUES(5, 5,6,0);
INSERT INTO user_follow VALUES(6, 19,3,0);
INSERT INTO user_follow VALUES(7, 19,4,0);
INSERT INTO user_follow VALUES(8, 4,20,0);
INSERT INTO user_follow VALUES(9, 15,7,0);
INSERT INTO user_follow VALUES(10, 7,8,0);
INSERT INTO user_follow VALUES(11, 7,15,0);
INSERT INTO user_follow VALUES(12, 14,12,0);
INSERT INTO user_follow VALUES(13, 14,13,0);
8. INSERT INTO user_follow VALUES(14, 5,7,0);
INSERT INTO user_follow VALUES(15, 5,8,0);
INSERT INTO user_follow VALUES(16, 3,2,0);
INSERT INTO user_follow VALUES(17, 3,18,0);
INSERT INTO user_follow VALUES(18, 18,17,0);
INSERT INTO user_follow VALUES(19, 16,11,0);
INSERT INTO user_follow VALUES(20, 11,10,0);
INSERT INTO interest VALUES(1, 'Rock Climbing');
INSERT INTO interest VALUES(2, 'The Simpsons');
INSERT INTO interest VALUES(3, 'Football');
INSERT INTO interest VALUES(4, 'Tennis');
INSERT INTO interest VALUES(5, 'Python');
INSERT INTO interest VALUES(6, 'SQL');
INSERT INTO interest VALUES(7, 'Data Science');
INSERT INTO interest VALUES(8, 'Science Fiction');
INSERT INTO interest VALUES(9, 'Cycling');
INSERT INTO interest VALUES(10, 'Cinema');
INSERT INTO interest VALUES(11, 'Classical Music');
INSERT INTO interest VALUES(12, 'Poetry');
INSERT INTO user_interest VALUES(1, 1);
INSERT INTO user_interest VALUES(2, 2);
INSERT INTO user_interest VALUES(3, 3);
9. INSERT INTO user_interest VALUES(4, 4);
INSERT INTO user_interest VALUES(5, 5);
INSERT INTO user_interest VALUES(6, 6);
INSERT INTO user_interest VALUES(7, 7);
INSERT INTO user_interest VALUES(8, 8);
INSERT INTO user_interest VALUES(9, 9);
INSERT INTO user_interest VALUES(10, 10);
INSERT INTO user_interest VALUES(11, 11);
INSERT INTO user_interest VALUES(12, 12);
INSERT INTO user_interest VALUES(9, 1);
INSERT INTO user_interest VALUES(10, 2);
INSERT INTO user_interest VALUES(11, 3);
INSERT INTO user_interest VALUES(12, 4);
INSERT INTO user_interest VALUES(13, 5);
INSERT INTO user_interest VALUES(14, 6);
INSERT INTO user_interest VALUES(15, 7);
INSERT INTO user_interest VALUES(16, 8);
INSERT INTO user_interest VALUES(17, 9);
INSERT INTO user_interest VALUES(18, 10);
INSERT INTO user_interest VALUES(19, 11);
INSERT INTO user_interest VALUES(20, 12);
INSERT INTO user_interest VALUES(7, 1);
INSERT INTO user_interest VALUES(6, 2);
INSERT INTO user_interest VALUES(5, 3);
INSERT INTO user_interest VALUES(3, 5);
INSERT INTO user_interest VALUES(2, 6);
INSERT INTO user_interest VALUES(1, 7);
INSERT INTO user_interest VALUES(20, 8);
INSERT INTO user_interest VALUES(19, 9);
INSERT INTO user_interest VALUES(10, 18);
INSERT INTO user_interest VALUES(17, 11);
INSERT INTO user_interest VALUES(16, 12);
INSERT INTO user_interest VALUES(14, 1);
INSERT INTO user_interest VALUES(15, 2);
INSERT INTO user_interest VALUES(16, 3);
INSERT INTO user_interest VALUES(17, 4);
10. INSERT INTO user_interest VALUES(18, 5);
INSERT INTO user_interest VALUES(19, 6);
INSERT INTO user_interest VALUES(20, 7);
INSERT INTO user_interest VALUES(1, 8);
INSERT INTO user_interest VALUES(2, 9);
INSERT INTO user_interest VALUES(3, 10);
INSERT INTO user_interest VALUES(4, 11);
INSERT INTO user_interest VALUES(5, 12);
INSERT INTO step VALUES(51, 'Body scan');
INSERT INTO step VALUES(54, 'Body and breath');
INSERT INTO step VALUES(55, 'Tuning in');
INSERT INTO step VALUES(56, 'Anchor yourself');
INSERT INTO step VALUES(57, 'Everyday mindfulness');
INSERT INTO step VALUES(67, 'Mindful movement');
INSERT INTO step VALUES(68, 'Mindful emotions');
INSERT INTO step VALUES(69, 'Mindful thoughts');
INSERT INTO step VALUES(70, 'Heartfulness');
INSERT INTO step VALUES(73, 'Being with difficulty');
INSERT INTO step VALUES(74, 'Self talk');
INSERT INTO step VALUES(75, 'Compassion for others');
INSERT INTO step VALUES(111, 'Introduction to
mindfulness');
INSERT INTO step VALUES(112, 'Introduction to self
11. compassion');
INSERT INTO step VALUES(113, 'Things that go bump in the
night');
INSERT INTO step VALUES(115, 'Introduction to anxiety');
INSERT INTO step VALUES(116, 'The banshee');
INSERT INTO step VALUES(117, 'Breathing relaxation');
INSERT INTO step VALUES(122, 'Introduction to depression');
INSERT INTO step VALUES(123, 'Rumination');
INSERT INTO step VALUES(124, 'Introduction to social
anxiety');
INSERT INTO step VALUES(125, 'Fortune telling');
INSERT INTO step VALUES(126, 'Unpopular mechanics');
INSERT INTO step VALUES(127, 'Navigating physical
symptoms');
INSERT INTO step VALUES(128, 'Ice breaking and
conversation making');
INSERT INTO step VALUES(129, 'Chameleon dreams');
INSERT INTO step VALUES(130, 'Perfectly rolled');
INSERT INTO step VALUES(131, 'Dark skies, bright stars');
INSERT INTO step VALUES(132, 'Monsters, kittens and
popcorn');
INSERT INTO step VALUES(133, 'Beautiful broken things');
INSERT INTO step VALUES(134, 'Connecting with strengths');
INSERT INTO step VALUES(135, 'Three minute breathing
space');
INSERT INTO step VALUES(136, 'Coping with strengths');
INSERT INTO step VALUES(137, 'Enhancing with strengths');
INSERT INTO step VALUES(138, 'Introduction to strengths');
INSERT INTO step VALUES(139, 'Strengths for work and
study');
INSERT INTO step VALUES(140, 'Savouring');
INSERT INTO step VALUES(141, 'Doing and being');
INSERT INTO step VALUES(142, 'Exposure song');
INSERT INTO step VALUES(143, 'Panic');
INSERT INTO step VALUES(144, 'Negative thought spirals');
INSERT INTO step VALUES(145, 'Positive thought spirals');
12. INSERT INTO step VALUES(146, 'A thought is a thought');
INSERT INTO step VALUES(148, 'Triggers and warning
signs');
INSERT INTO step VALUES(149, 'Wellness action plan');
INSERT INTO step VALUES(150, 'Depression and
motivation');
INSERT INTO step VALUES(152, 'Night of the Bloodstones');
INSERT INTO step VALUES(155, 'What ifs');
INSERT INTO step VALUES(156, 'The problem with
perfection');
INSERT INTO theme VALUES(1, 'Social Anxiety');
INSERT INTO theme VALUES(2, 'Your Strengths');
INSERT INTO theme VALUES(6, 'Depression');
INSERT INTO theme VALUES(7, 'Anxiety');
INSERT INTO theme VALUES(8, 'Self Compassion');
INSERT INTO theme VALUES(9, 'Mindfulness');
INSERT INTO step_theme VALUES(6, 51);
INSERT INTO step_theme VALUES(9, 51);
INSERT INTO step_theme VALUES(9, 54);
INSERT INTO step_theme VALUES(9, 55);
INSERT INTO step_theme VALUES(9, 56);
INSERT INTO step_theme VALUES(7, 57);
INSERT INTO step_theme VALUES(9, 57);
13. INSERT INTO step_theme VALUES(6, 67);
INSERT INTO step_theme VALUES(9, 67);
INSERT INTO step_theme VALUES(9, 68);
INSERT INTO step_theme VALUES(7, 69);
INSERT INTO step_theme VALUES(9, 69);
INSERT INTO step_theme VALUES(9, 70);
INSERT INTO step_theme VALUES(6, 73);
INSERT INTO step_theme VALUES(7, 73);
INSERT INTO step_theme VALUES(8, 73);
INSERT INTO step_theme VALUES(7, 74);
INSERT INTO step_theme VALUES(8, 74);
INSERT INTO step_theme VALUES(8, 75);
INSERT INTO step_theme VALUES(9, 111);
INSERT INTO step_theme VALUES(8, 112);
INSERT INTO step_theme VALUES(7, 113);
INSERT INTO step_theme VALUES(7, 115);
INSERT INTO step_theme VALUES(7, 116);
INSERT INTO step_theme VALUES(7, 117);
INSERT INTO step_theme VALUES(6, 122);
INSERT INTO step_theme VALUES(6, 123);
INSERT INTO step_theme VALUES(1, 124);
INSERT INTO step_theme VALUES(1, 125);
INSERT INTO step_theme VALUES(1, 126);
INSERT INTO step_theme VALUES(1, 127);
INSERT INTO step_theme VALUES(1, 128);
INSERT INTO step_theme VALUES(1, 129);
INSERT INTO step_theme VALUES(1, 130);
INSERT INTO step_theme VALUES(1, 131);
INSERT INTO step_theme VALUES(1, 132);
INSERT INTO step_theme VALUES(1, 133);
INSERT INTO step_theme VALUES(2, 134);
INSERT INTO step_theme VALUES(6, 135);
INSERT INTO step_theme VALUES(2, 136);
INSERT INTO step_theme VALUES(2, 137);
INSERT INTO step_theme VALUES(2, 138);
INSERT INTO step_theme VALUES(2, 139);
14. INSERT INTO step_theme VALUES(6, 141);
INSERT INTO step_theme VALUES(7, 142);
INSERT INTO step_theme VALUES(7, 143);
INSERT INTO step_theme VALUES(6, 144);
INSERT INTO step_theme VALUES(6, 146);
INSERT INTO step_theme VALUES(6, 148);
INSERT INTO step_theme VALUES(6, 149);
INSERT INTO step_theme VALUES(6, 150);
INSERT INTO step_theme VALUES(7, 152);
INSERT INTO step_theme VALUES(7, 155);
INSERT INTO step_theme VALUES(7, 156);
21. 1
Written Assessment ECO10004 Economic Principles
Part B
Due Date – See Canvas under the assessment tab
All work must be submitted using the turnitin link (see below
for more instructions)
Please do not attach a coversheet to your assignment. Also,
do not include a copy of the questions in your document.
You can insert pictures in your document but they must be
low resolution pictures. If your file is larger than 1 to 2 MB
then convert your file to pdf and upload this into turnitin.
Marking Scheme and word count
• The total marks for the written assessment is 50 and represents
50% of
your total mark for the unit. Part A is worth 12; Part B is worth
20 and
Part C is worth 18.
• Each question is worth either 1, 2 or 4 marks as indicated (at
the end of
each question).
22. • A word count is set for each question (at the end of each
question).
Answers should be within 10% of the word count.
2
Task 2: Elasticity
1. Consider the following two products: an ‘overseas trip’ and
‘prescription medication’
(prescribed by a doctor). Which product would have a higher
price elasticity of demand in
absolute value? Explain your answer including identifying the
determinant of elasticity. (1
mark) – Word count 60
2. Consider the following two products: ‘coffee’ sold in a café
and ‘hotel accommodation’ in
Sydney during the Olympic Games. Which product would have
a higher price elasticity of
supply in absolute value? Explain your answer including
identifying the determinant of
elasticity. (1 mark) – Word count 60
23. 3. A storm in North Coast of New South Wales destroyed
thousands of hectares of pineapple
crops. Pineapple farmers whose crops were destroyed by the
storm were much worse off, but
those whose crops were not destroyed benefited from the floods.
Assume that the demand
curve for pineapples is inelastic. Have pineapple farmers as a
group been hurt or helped by the
floods? Explain using supply and demand diagrams. (2 marks)
Word count 100.
3
Task 3: Costs of Production
Explain whether the following events in questions 1 and 2 will
affect fixed costs or variable costs
(make sure you justify your answer):
1. The federal government applies a licence fee on every
‘television network’ of 1 million AUD. (1
mark) Word count 40
2. Samsung signs a new contract changing the price it pays for
the ‘camera lens’ that are used in
its mobile phones. (1 mark) Word count 40
24. 3. With the use of a graph explain what is minimum efficient
scale? What is likely to happen in
the long run to firms that do not reach minimum efficient scale?
(2 marks) Word count 100.
4. What is the difference between explicit costs and implicit
costs? List three examples each of
explicit costs and implicit costs that may be experienced by a
small business. (1 mark) Word
count 80.
4
Task 4: Market Power
1. 'Being the only seller in the market, the monopolist can
choose any price and quantity it
desires. It can therefore price its product as high as it wants.'
Evaluate this statement: Is it true
or false? Explain your answer using a graph. (2 marks) – Word
count 120
2. Callaway is a company that sells golf clubs. Callaway
25. recently engaged in research and
development leading to the production, and released, of a new
set of clubs designed for
women that provides a significant advantage to players.
Explain, using a graph, how will this
impact on the price, quantity and profit of Callaway in the long
run if the company is a
monopoly? Explain, using a graph, how this will change if many
other companies start selling
similar products? (2 marks) – Word count 200
5
Task 5: Business Strategy and Market Failure
Read the following excerpt and answer question 1.
TRAFFIC on Sydney’s clogged roads and motorways is now so
congested it is
costing the majority of businesses in Western Sydney up to
$5000 a year. The
startling figures were revealed as part of the NRMA Motoring &
Services
BusinessWise survey of almost 730 businesses that run vehicle
fleets.
Frustrated local businesses who took part in the survey said
travel times for
each of their work vehicles had jumped, on average, by 59
minutes every day
26. due to roads clogged by commuters forced into their cars
because of poor
public transport options. In the past year about six out of 10
Western Sydney
firms said their fuel bills had risen as a result of congestion
…….
Author Jim O’Rourke
Source: The Australian web site April 08, 2014 12:00AM
(http://www.theaustralian.com.au/news/fair-go-for-the-west-
theres-a-costly-message-in-a-
bottleneck-on-our-congested-roads/story-e6frg6n6-
1226877298328) accessed 8th April 2014
1. Identify the negative externality discussed in the article?
Explain, using a graph, how the
negative externality leads to an inefficient price and level of
output. Provide two solutions
that you would recommend to the government to address the
externality? (4 marks) Word
count 350.
Consider the example where Intel and AMD are a duopoly that
produces CPU chips. Intel and AMD
can conduct R&D or they cannot conduct R&D. The table below
shows the payoff matrix for the
two firms. The numbers are millions of dollars of profit.
Answer questions 2 and 3.
2. Define Nash equilibrium. (1 mark) – Word count 50
27. 3. What is (are) the Nash equilibrium(s) in this game. Explain.
(2 marks) – Word count 150
http://www.theaustralian.com.au/news/fair-go-for-the-west-
theres-a-costly-message-in-a-bottleneck-on-our-congested-
roads/story-e6frg6n6-1226877298328
http://www.theaustralian.com.au/news/fair-go-for-the-west-
theres-a-costly-message-in-a-bottleneck-on-our-congested-
roads/story-e6frg6n6-1226877298328