Structured Query Language for Data Management 2
Sructured Query Language for Data Management 6
Table of Contents
Phase 1- Database Design and DDL 3
Business Rules & Entity Tables 3
Entity Tables: 4
SQL CODE: 4
Screenshots: 8
Phase 2 – Security and DML 13
Task 1 14
Task 2 15
Task 3 16
Task 4 17
Task 5 18
Phase 3 - DML (Select) and Procedures 19
Task 1 19
Task 2 20
Task 3 21
Task 4 22
Task 5 23
Phase 4 – Architecture, Indexes 27
Step 1: CREATE TABLE [Degrees] 27
Step 2: Re-create ‘Classes’ TABLE to add ‘DegreeID’ column and INSERT 6 classes 29
Step 3: ALTER TABLE [Students] 31
Step 5: DML script to INSERT INTO the ‘Students’ table ‘DegreeID’ data 33
Step 6: Display ERD 36
Phase 5 – Views, Transactions, Testing and Performance 37
References 38
Phase 1- Database Design and DDL
My team was recently contracted to design and develop a database for CTU that will store personal and confidential university data. This database is expected to provide the back-end architecture for a front-end web application with an intuitive User/Interface (U/I) to be used by the university HR department. We’ve decided to use Microsoft SQL Server 2012 given the nature of data to be stored because it will be more secure, and it also provides a suite of server maintenance tools to be left behind with the IT Department once the database and web application have been tested and accepted by university stakeholders.
During our preliminary meetings, CTU’s requirements were defined and adequately scoped to begin creation of the database. The following sections contain the business rules and entity tables developed during the preliminary meetings, as well as copies of all the SQL code used to build the database and create the Entity Relationship Diagram (ERD). Business Rules & Entity Tables
Business Rules:
· A student has a name, a birth date, and gender.
· You must track the date the student started at the university and his or her current GPA, as well as be able to inactivate him or her without deleting information.
· For advising purposes, store the student's background/bio information. This is like a little story.
· An advisor has a name and an e-mail address.
· Students are assigned to one advisor, but one advisor may service multiple students.
· A class has a class code, name, and description.
· You need to indicate the specific classes a student is taking/has taken at the university. Track the date the student started a specific class and the grade earned in that class.
· Each class that a student takes has 4 assignments. Each assignment is worth 100 points.Entity Tables:
SQL CODE:
Create Database:
CREATE DATABASE [Cameron_CTU]
CONTAINMENT = NONE
ON PRIMARY
( NAME = N'Cameron_CTU', FILENAME = N'c:\Program Files\Microsoft SQL Server\MSSQL11.SCAMERON_CTU\MSSQL\DATA\Cameron_CTU.mdf' , SIZE = 3072KB , FILEGROWTH = 1024KB )
LOG ON
( NAME = N'Cameron_CTU_log', FILENAME = N'c:\Program Files\Microsoft SQL Server\MSSQL11.SCAMERON_CTU\MSSQL\DATA\Cameron_CTU_.
Charles WilliamsCS362Unit 3 Discussion BoardStructured Query Langu.docxchristinemaritza
Charles WilliamsCS362Unit 3 Discussion Board
Structured Query Language for Data Management 1
Structured Query Language for Data Management 36-04-17
Table of Contents
Phase 1- Database Design and DDL 3
Business Rules & Entity Tables 3
Entity Tables: 4
SQL CODE: 4
Screenshots: 8
Phase 2 – Security and DML 13
Task 1 14
Task 2 15
Task 3 16
Task 4 17
Task 5 18
Phase 3 - DML (Select) and Procedures 19
Task 1 19
Task 2 20
Task 3 21
Task 4 22
Task 5 23
Phase 4 – Architecture, Indexes 27
Step 1: CREATE TABLE [Degrees] 27
Step 2: Re-create ‘Classes’ TABLE to add ‘DegreeID’ column and INSERT 6 classes 29
Step 3: ALTER TABLE [Students] 31
Step 5: DML script to INSERT INTO the ‘Students’ table ‘DegreeID’ data 33
Step 6: Display ERD 36
Phase 5 – Views, Transactions, Testing and Performance 37
References 38
Phase 1- Database Design and DDL
I contracted to design and develop a database for CTU that will store individual and confidential university data. This database is required to give the back-end engineering to a front-end web application with an instinctive User/Interface (U/I) to be utilized by the college HR office. We've chosen to utilize Microsoft SQL Server 2012 given the way of information to be put away because it will be more secure, and it additionally gives a suite of server upkeep apparatuses to be deserted with the IT Department once the database and web application have been tried and acknowledged by college partners.
Amid our preparatory gatherings, CTU's necessities were characterized and enough perused to start making of the database. The accompanying areas contain the business tenets and element tables created amid the preparatory gatherings, and additionally duplicates of all the SQL code used to manufacture the database and make the Entity Relationship Diagram (ERD).
Business Rules & Entity Tables
Business Rules:
· A student has a name, a birth date, and gender.
· You must track the date the student started at the university and his or her current GPA, as well as be able to inactivate him or her without deleting information.
· For advising purposes, store the student's background/bio information. This is like a little story.
· An advisor has a name and an e-mail address.
· Students are assigned to one advisor, but one advisor may service multiple students.
· A class has a class code, name, and description.
· You need to indicate the specific classes a student is taking/has taken at the university. Track the date the student started a specific class and the grade earned in that class.
· Each class that a student takes has 4 assignments. Each assignment is worth 100 points.Entity Tables:
SQL CODE:
Create Database:
CREATE DATABASE [Cameron_CTU]
CONTAINMENT = NONE
ON PRIMARY
( NAME = N'Cameron_CTU', FILENAME = N'c:\Program Files\Microsoft SQL Server\MSSQL11.SCAMERON_CTU\MSSQL\DATA\Cameron_CTU.mdf' , SIZE = 3072KB , FILEGROWTH = 1024KB )
LOG ON
( NAME = N'Cameron_CTU_log', FILENAME = N'c:\Progra ...
SQLite Database in Android used to store persistent data. If you want to store some data into local storage then SQLite Database is the most common storage option. It is lightweight database that comes with Android OS.
SQL provides powerful but reasonably simple tools for data analysis and handling. Mike McClellan, the Senior Product Manager for Paddle8, took beginners through the basics of SQL. He talked about the SQL queries needed to collect data from a database, even if it lives in different places and analyze it to find the answers you’re looking for.
He taught the understanding of essential SQL skills that allow developers to write queries against single and multiple tables, manipulate data in tables, and create database objects.
Charles WilliamsCS362Unit 3 Discussion BoardStructured Query Langu.docxchristinemaritza
Charles WilliamsCS362Unit 3 Discussion Board
Structured Query Language for Data Management 1
Structured Query Language for Data Management 36-04-17
Table of Contents
Phase 1- Database Design and DDL 3
Business Rules & Entity Tables 3
Entity Tables: 4
SQL CODE: 4
Screenshots: 8
Phase 2 – Security and DML 13
Task 1 14
Task 2 15
Task 3 16
Task 4 17
Task 5 18
Phase 3 - DML (Select) and Procedures 19
Task 1 19
Task 2 20
Task 3 21
Task 4 22
Task 5 23
Phase 4 – Architecture, Indexes 27
Step 1: CREATE TABLE [Degrees] 27
Step 2: Re-create ‘Classes’ TABLE to add ‘DegreeID’ column and INSERT 6 classes 29
Step 3: ALTER TABLE [Students] 31
Step 5: DML script to INSERT INTO the ‘Students’ table ‘DegreeID’ data 33
Step 6: Display ERD 36
Phase 5 – Views, Transactions, Testing and Performance 37
References 38
Phase 1- Database Design and DDL
I contracted to design and develop a database for CTU that will store individual and confidential university data. This database is required to give the back-end engineering to a front-end web application with an instinctive User/Interface (U/I) to be utilized by the college HR office. We've chosen to utilize Microsoft SQL Server 2012 given the way of information to be put away because it will be more secure, and it additionally gives a suite of server upkeep apparatuses to be deserted with the IT Department once the database and web application have been tried and acknowledged by college partners.
Amid our preparatory gatherings, CTU's necessities were characterized and enough perused to start making of the database. The accompanying areas contain the business tenets and element tables created amid the preparatory gatherings, and additionally duplicates of all the SQL code used to manufacture the database and make the Entity Relationship Diagram (ERD).
Business Rules & Entity Tables
Business Rules:
· A student has a name, a birth date, and gender.
· You must track the date the student started at the university and his or her current GPA, as well as be able to inactivate him or her without deleting information.
· For advising purposes, store the student's background/bio information. This is like a little story.
· An advisor has a name and an e-mail address.
· Students are assigned to one advisor, but one advisor may service multiple students.
· A class has a class code, name, and description.
· You need to indicate the specific classes a student is taking/has taken at the university. Track the date the student started a specific class and the grade earned in that class.
· Each class that a student takes has 4 assignments. Each assignment is worth 100 points.Entity Tables:
SQL CODE:
Create Database:
CREATE DATABASE [Cameron_CTU]
CONTAINMENT = NONE
ON PRIMARY
( NAME = N'Cameron_CTU', FILENAME = N'c:\Program Files\Microsoft SQL Server\MSSQL11.SCAMERON_CTU\MSSQL\DATA\Cameron_CTU.mdf' , SIZE = 3072KB , FILEGROWTH = 1024KB )
LOG ON
( NAME = N'Cameron_CTU_log', FILENAME = N'c:\Progra ...
SQLite Database in Android used to store persistent data. If you want to store some data into local storage then SQLite Database is the most common storage option. It is lightweight database that comes with Android OS.
SQL provides powerful but reasonably simple tools for data analysis and handling. Mike McClellan, the Senior Product Manager for Paddle8, took beginners through the basics of SQL. He talked about the SQL queries needed to collect data from a database, even if it lives in different places and analyze it to find the answers you’re looking for.
He taught the understanding of essential SQL skills that allow developers to write queries against single and multiple tables, manipulate data in tables, and create database objects.
Databricks Data Analyst Associate Exam Dumps 2024.pdfSkillCertProExams
• For a full set of 270+ questions. Go to
https://skillcertpro.com/product/databricks-data-analyst-associate-exam-questions/
• SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
• It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
• SkillCertPro updates exam questions every 2 weeks.
• You will get life time access and life time free updates
• SkillCertPro assures 100% pass guarantee in first attempt.
Data Manipulation(DML) and Transaction Control (TCL) MuhammadWaheed44
A short course "SQL Fundamentals - Oracle 11g" is being in progress at PMAS Arid Agriculture University. Complete course video and can be found at following link
https://www.youtube.com/playlist?list=PL12t8CWUhXZaUXsmg7M67o_Q37JhhfAKU
Based on the materials for this week, create your own unique Datab.docxJASS44
Based on the materials for this week, create your own unique Database table using MySQL.
The table should contain at least 6 columns (use different data type, as appropriate for your application).
The table should have a Primary Key and one other constraint of your choice.
You should populate the table with 5 records.
Then Query the table to display all columns for all records.
You should provide the SQL script and screen captures of you successfully running the script.
Respond to other students by supplying scripts that add additional records, modiify or query data from the tables. Demonstrate your modifications worked by providing the screen shots of your scripts successfully running.
Business-level strategies are intended to help an organization take advantage of opportunities in its environment to create value for stakeholders. Low-cost and differentiation strategies are the two primary approaches used by organizations to gain competitive advantage at the business level. Describe the two types of strategies. Using the example of a chain of women’s clothing stores, analyze how such an organization might employ each type of strategy. How would the organization design its structure under each type of business-level strategy? How would the culture of the organization differ under each type of business-level strategy?
Should be at least 300 words. Does not have to be in paper format this is only a post
Name: William Clements
Class: SDEV 300
Section: 6380
Date: 6/15/2016
Lab 7
Screen Shot:
1
Introduction to MySQL
Overview
This lab walks you through using MySQL. MySQL is a relational database that can be used as part of Web
and other applications. This lab serves as a primer for using MySQL and will serve as a foundation when
we discuss SQL injection attacks and possible mitigations.
Learning Outcomes:
At the completion of the lab you should be able to:
1. Connect to a MySQL database and show the tables within the Ubuntu virtual machine
2. Create MySQL tables containing popular data types and constraints
3. Insert, update and delete data from MySQL database tables
4. Create and execute SQL Select statements and simple joins on MySQL tables
Lab Submission Requirements:
After completing this lab, you will submit a word (or PDF) document that meets all of the requirements in
the description at the end of this document. In addition, your MySQL file should be submitted. You can
submit multiple files in a zip file.
Virtual Machine Account Information
Your Virtual Machine has been preconfigured with all of the software you will need for this class. The
default username and password are:
Username : umucsdev
Password: umuc$d8v
MySQL Username: sdev_owner
MySQL password: sdev300
MySQL database: sdev
Part 1 – Connect to a MySQL database and show the tables within the Ubuntu virtual machine
The Virtual Machine already has MySQL installed. A MySQL username has also been created alon ...
This presentation features the fundamentals of SQL tunning like SQL Processing, Optimizer and Execution Plan, Accessing Tables, Performance Improvement Consideration Partition Technique. Presented by Alphalogic Inc : https://www.alphalogicinc.com/
Student answer The French and the German were a bit different w.docxjohniemcm5zt
Student answer
The French and the German were a bit different when it came down to decentralized and centralized characteristics. The French on one hand had very high forms of decentralization. One said by Alexis de Tocqueville "Decentralization has, not only an administrative value, but also a civic dimension, since it increases the opportunities for citizens to take interest in public affairs; it makes them get accustomed to using freedom. And from the accumulation of these local, active, persnickety freedoms, is born the most efficient counterweight against the claims of the central government, even if it were supported by an impersonal, collective will.” This shows us how decentralization occurred in France. On the other hand Germany focused more on centralization their value of though was a bit different. About 439 districts have adapted to the centralization characteristics while there were other districts in Germany that still opposed this ideology. There is still a debate whether to adapt to centralization or decentralization even till the year 2005, so I would say that try both characterizes and see what is best for ones country. There is never a exclusively correct answer to any power or characteristics however, one must find where they fit best.
b.) Minimum wage law in Germany, France, Britain and the US were quite different. According to research I have found that in Germany construction workers, electrical workers, janitors, roofers, painters, and letter carriers were set off for minimum wage by the method of collective bargaining agreement. So basically in Germany you choose at what wage you want to work and its wage is decided for you, there is no set rule marked for what you will receive in the minimum wage criteria. On the other hand Britain, U.S. and France have a set minimum wage policy and this provides the nation with order and the workers with security, in case of economic fluctuation their pay will not be affected.
c.) Germany’s rules about co-determination are for the benefit of the working class. Unions were formed and they gave the workers a voice and the power to decide what is beneficial for the company, and thus they can cause the profit margin to either go up or down. I am quite fascinated with this policy, for one if I knew that I will have a say as well as power in a matter of escalating at my work place I would work extremely hard and make my workers and company better. This will not only make the economy stronger but also the society worth of value. The board and the work place level gave the people of Germany a podium to stand on and shine. So if one had any concerns with any matter in relations to the company they can step up and voice their opinion. All employees in a private sector firm are not covered by work counsel even though the law required it because of employee relations is standing on collective bargaining issues so there is no cue in where there should be a clause of protection. Its one s.
Student Answer and Work Form Unit 4 Ver. AStudent Name (required.docxjohniemcm5zt
Student Answer and Work Form Unit 4 Ver. A
Student Name (required): _______________________________
1a. Answer: _______________
1a. Key work steps
1b. Answer: _______________
1b. Key work steps
1c. Answer: _______________
1c. Key work steps
1d. Answer: _______________
1d. Key work steps
2a. Answer: _______________
2a. Key work steps
2b. Answer: _______________
2b. Key work steps
2c. Answer: _______________
2c. Key work steps
2d. Answer: _______________
2d. Key work steps
2e. Answer: _______________
2e. Key work steps
3a. Answer: _______________
3a. Key work steps
3b. Answer: _______________
3b. Key work steps
3c. Answer: _______________
3c. Key work steps
3d. Answer: _______________
3d. Key work steps
MTH133
Unit 4– Individual Project – A
1. Use the graph of ( ) to match the function to its corresponding graph. In words describe the
transformation that occurs (ex: The graph of f(x) is shifted 6 units to the left).
( )
Choose from the following functions:
( ) ( ) ( ) ( ) ( ) ( ) ( )
a)
Answer:
Function:
Description of transformation:
b)
Answer:
Function:
Description of transformation:
-4
-3
-2
-1
0
1
2
3
4
5
-3 -2 -1 0 1 2 3
-4
-3
-2
-1
0
1
2
3
4
5
-5 -4 -3 -2 -1 0 1 2 3
-4
-3
-2
-1
0
1
2
3
4
5
-3 -2 -1 0 1 2 3
Name:
c)
Answer:
Function:
Description of transformation:
d)
Answer:
Function:
Description of transformation:
2. Find the domain of the function and express the answer in interval notation. Explain in words or show the
calculations.
a) ( )
Answer:
Show Work or Explain in Words:
b) ( )
Answer:
-2
-1
0
1
2
3
4
5
6
7
-3 -2 -1 0 1 2 3
-3
-2
-1
0
1
2
3
4
5
-3 -2 -1 0 1 2 3 4 5
Show Work or Explain in Words:
c) ( ) √
Answer:
Show Work or Explain in Words:
d) ( )
Answer:
Show Work or Explain in Words:
e) ( )
Answer:
Show Work or Explain in Words:
3. Find the specified asymptotes of the following functions. Recall that asymptotes are lines therefore the
answer must be given as an equation of a line.
a) Find the vertical asymptote of the function ( )
Answer:
Show Work or Explain in Words:
b) Find the horizontal asymptote of the function ( )
Answer:
Show Work or Explain in Words:
c) Find the vertical and horizontal asymptotes of the function ( )
Answer:
Vertical:
Horizontal:
Show Work or Explain in Words:
d) Find the vertical and horizontal asymptotes of the function ( )
Answer:
Vertical:
Horizontal:
Show Work or Explain in Words:
.
More Related Content
Similar to Structured Query Language for Data Management 2 Sructu.docx
Databricks Data Analyst Associate Exam Dumps 2024.pdfSkillCertProExams
• For a full set of 270+ questions. Go to
https://skillcertpro.com/product/databricks-data-analyst-associate-exam-questions/
• SkillCertPro offers detailed explanations to each question which helps to understand the concepts better.
• It is recommended to score above 85% in SkillCertPro exams before attempting a real exam.
• SkillCertPro updates exam questions every 2 weeks.
• You will get life time access and life time free updates
• SkillCertPro assures 100% pass guarantee in first attempt.
Data Manipulation(DML) and Transaction Control (TCL) MuhammadWaheed44
A short course "SQL Fundamentals - Oracle 11g" is being in progress at PMAS Arid Agriculture University. Complete course video and can be found at following link
https://www.youtube.com/playlist?list=PL12t8CWUhXZaUXsmg7M67o_Q37JhhfAKU
Based on the materials for this week, create your own unique Datab.docxJASS44
Based on the materials for this week, create your own unique Database table using MySQL.
The table should contain at least 6 columns (use different data type, as appropriate for your application).
The table should have a Primary Key and one other constraint of your choice.
You should populate the table with 5 records.
Then Query the table to display all columns for all records.
You should provide the SQL script and screen captures of you successfully running the script.
Respond to other students by supplying scripts that add additional records, modiify or query data from the tables. Demonstrate your modifications worked by providing the screen shots of your scripts successfully running.
Business-level strategies are intended to help an organization take advantage of opportunities in its environment to create value for stakeholders. Low-cost and differentiation strategies are the two primary approaches used by organizations to gain competitive advantage at the business level. Describe the two types of strategies. Using the example of a chain of women’s clothing stores, analyze how such an organization might employ each type of strategy. How would the organization design its structure under each type of business-level strategy? How would the culture of the organization differ under each type of business-level strategy?
Should be at least 300 words. Does not have to be in paper format this is only a post
Name: William Clements
Class: SDEV 300
Section: 6380
Date: 6/15/2016
Lab 7
Screen Shot:
1
Introduction to MySQL
Overview
This lab walks you through using MySQL. MySQL is a relational database that can be used as part of Web
and other applications. This lab serves as a primer for using MySQL and will serve as a foundation when
we discuss SQL injection attacks and possible mitigations.
Learning Outcomes:
At the completion of the lab you should be able to:
1. Connect to a MySQL database and show the tables within the Ubuntu virtual machine
2. Create MySQL tables containing popular data types and constraints
3. Insert, update and delete data from MySQL database tables
4. Create and execute SQL Select statements and simple joins on MySQL tables
Lab Submission Requirements:
After completing this lab, you will submit a word (or PDF) document that meets all of the requirements in
the description at the end of this document. In addition, your MySQL file should be submitted. You can
submit multiple files in a zip file.
Virtual Machine Account Information
Your Virtual Machine has been preconfigured with all of the software you will need for this class. The
default username and password are:
Username : umucsdev
Password: umuc$d8v
MySQL Username: sdev_owner
MySQL password: sdev300
MySQL database: sdev
Part 1 – Connect to a MySQL database and show the tables within the Ubuntu virtual machine
The Virtual Machine already has MySQL installed. A MySQL username has also been created alon ...
This presentation features the fundamentals of SQL tunning like SQL Processing, Optimizer and Execution Plan, Accessing Tables, Performance Improvement Consideration Partition Technique. Presented by Alphalogic Inc : https://www.alphalogicinc.com/
Student answer The French and the German were a bit different w.docxjohniemcm5zt
Student answer
The French and the German were a bit different when it came down to decentralized and centralized characteristics. The French on one hand had very high forms of decentralization. One said by Alexis de Tocqueville "Decentralization has, not only an administrative value, but also a civic dimension, since it increases the opportunities for citizens to take interest in public affairs; it makes them get accustomed to using freedom. And from the accumulation of these local, active, persnickety freedoms, is born the most efficient counterweight against the claims of the central government, even if it were supported by an impersonal, collective will.” This shows us how decentralization occurred in France. On the other hand Germany focused more on centralization their value of though was a bit different. About 439 districts have adapted to the centralization characteristics while there were other districts in Germany that still opposed this ideology. There is still a debate whether to adapt to centralization or decentralization even till the year 2005, so I would say that try both characterizes and see what is best for ones country. There is never a exclusively correct answer to any power or characteristics however, one must find where they fit best.
b.) Minimum wage law in Germany, France, Britain and the US were quite different. According to research I have found that in Germany construction workers, electrical workers, janitors, roofers, painters, and letter carriers were set off for minimum wage by the method of collective bargaining agreement. So basically in Germany you choose at what wage you want to work and its wage is decided for you, there is no set rule marked for what you will receive in the minimum wage criteria. On the other hand Britain, U.S. and France have a set minimum wage policy and this provides the nation with order and the workers with security, in case of economic fluctuation their pay will not be affected.
c.) Germany’s rules about co-determination are for the benefit of the working class. Unions were formed and they gave the workers a voice and the power to decide what is beneficial for the company, and thus they can cause the profit margin to either go up or down. I am quite fascinated with this policy, for one if I knew that I will have a say as well as power in a matter of escalating at my work place I would work extremely hard and make my workers and company better. This will not only make the economy stronger but also the society worth of value. The board and the work place level gave the people of Germany a podium to stand on and shine. So if one had any concerns with any matter in relations to the company they can step up and voice their opinion. All employees in a private sector firm are not covered by work counsel even though the law required it because of employee relations is standing on collective bargaining issues so there is no cue in where there should be a clause of protection. Its one s.
Student Answer and Work Form Unit 4 Ver. AStudent Name (required.docxjohniemcm5zt
Student Answer and Work Form Unit 4 Ver. A
Student Name (required): _______________________________
1a. Answer: _______________
1a. Key work steps
1b. Answer: _______________
1b. Key work steps
1c. Answer: _______________
1c. Key work steps
1d. Answer: _______________
1d. Key work steps
2a. Answer: _______________
2a. Key work steps
2b. Answer: _______________
2b. Key work steps
2c. Answer: _______________
2c. Key work steps
2d. Answer: _______________
2d. Key work steps
2e. Answer: _______________
2e. Key work steps
3a. Answer: _______________
3a. Key work steps
3b. Answer: _______________
3b. Key work steps
3c. Answer: _______________
3c. Key work steps
3d. Answer: _______________
3d. Key work steps
MTH133
Unit 4– Individual Project – A
1. Use the graph of ( ) to match the function to its corresponding graph. In words describe the
transformation that occurs (ex: The graph of f(x) is shifted 6 units to the left).
( )
Choose from the following functions:
( ) ( ) ( ) ( ) ( ) ( ) ( )
a)
Answer:
Function:
Description of transformation:
b)
Answer:
Function:
Description of transformation:
-4
-3
-2
-1
0
1
2
3
4
5
-3 -2 -1 0 1 2 3
-4
-3
-2
-1
0
1
2
3
4
5
-5 -4 -3 -2 -1 0 1 2 3
-4
-3
-2
-1
0
1
2
3
4
5
-3 -2 -1 0 1 2 3
Name:
c)
Answer:
Function:
Description of transformation:
d)
Answer:
Function:
Description of transformation:
2. Find the domain of the function and express the answer in interval notation. Explain in words or show the
calculations.
a) ( )
Answer:
Show Work or Explain in Words:
b) ( )
Answer:
-2
-1
0
1
2
3
4
5
6
7
-3 -2 -1 0 1 2 3
-3
-2
-1
0
1
2
3
4
5
-3 -2 -1 0 1 2 3 4 5
Show Work or Explain in Words:
c) ( ) √
Answer:
Show Work or Explain in Words:
d) ( )
Answer:
Show Work or Explain in Words:
e) ( )
Answer:
Show Work or Explain in Words:
3. Find the specified asymptotes of the following functions. Recall that asymptotes are lines therefore the
answer must be given as an equation of a line.
a) Find the vertical asymptote of the function ( )
Answer:
Show Work or Explain in Words:
b) Find the horizontal asymptote of the function ( )
Answer:
Show Work or Explain in Words:
c) Find the vertical and horizontal asymptotes of the function ( )
Answer:
Vertical:
Horizontal:
Show Work or Explain in Words:
d) Find the vertical and horizontal asymptotes of the function ( )
Answer:
Vertical:
Horizontal:
Show Work or Explain in Words:
.
Student 1 Random Student Mrs. Wilson Expository W.docxjohniemcm5zt
Student 1
Random Student
Mrs. Wilson
Expository Writing
5 Dec. 2014
Technology and Video Games – Does The Good Outweigh The Bad?
Video Games may actually improve cognitive ability by up to 20% over non-gamers says
a recent study by The University of Southern California. Despite this evidence, Ed Bell believes,
although admitting that technology has improved some aspects of society, that we do not know
how to distinguish the good uses of technology from the bad. Ed Bell’s assertion that everything
was better back in the “good ole days” is misleading. Although technology is sometimes used
indiscriminately, as Ed Bell believes in Technology, Movement, and Sound; the benefit that
technology has had on our society, I believe, outweighs the cons – although there are cons.
Teachers in America are under constant pressure to improve test scores, and raise
achievement, yet in a society tethered to technology, they are losing the battle to keep kids
engaged. Ed Bell’s discourse about a leaf blower and noise pollution left much to be desired, yet
his appreciation of the “good ole’ days,” may be agreed upon by many teachers. Back in the
“good ole days,” teachers had fewer distractions from their instruction other than the occasional
note-passing or whispering during the lesson. In today’s society, teachers have to contend with
the constant struggle to keep kids engaged in more than the latest app or text from their friend or
parent. The problem has become almost epidemic, leading to kids learning less in addition to
impeding the progress of class. This sometimes makes it necessary to reteach what the students
fail to absorb because they had their head in their phone during the lesson. Unfortunately, this is
not the only negative effect technology has had on our society.
Student 2
Although Ed Bell’s diatribe seems to wage war on technology, it is the message of
inactivity that I think is the greater take-away from the article. For years, with the increasing
presence of modern conveniences in our daily lives, society’s activity level has steadily
decreased. The U.S. Department of Health and Human Services recommends that American
adults should get the equivalent of two and a half hours of moderate-to-vigorous physical activity
each week. Children should get about an hour a day. With the popularity of games, and the
advancement of time-saving technology, there is less of this activity than there used to be – but
that is not all. With the advancement of computers and automation in the workplace, the
American employee is not working as hard either – well, not laboriously, anyway. In 1950,
thirty percent of Americans worked in high-activity occupations; by 2000, that proportion had
dropped to only twenty-two percent, according to a Harvard School of Public Health article. Ed
Bell’s article is seemingly mostly negative, but there are some positive benefits to technology as
well. .
Student Answer and Work Form Unit 3 Ver. CStudent Name ________.docxjohniemcm5zt
Student Answer and Work Form Unit 3 Ver. C
Student Name: ______________________________________
1a. Answer: _______________
1a. Key work steps
1b. Answer: _______________
1b. Key work steps
1c. Answer: _______________
1c. Key work steps
2a. Answer: _______________
2a. Key work steps
2b. Answer: _______________
2b. Key work steps
3a. Answer: _______________
3a. Key work steps
3b. Answer: _______________
3b. Key work steps
4a. Answer: _______________
4a. Key work steps
4b. Answer: _______________
4b. Key work steps
4c. Answer: _______________
4c. Key work steps
Project Proposal
·
· Introduction:
· What you want to do and why you want to do this project
· Lit Review:
· How have other people addressed similar projects?
· Methodology:
· How are you going to do what you plan to do?
· Deliverables:
· Besides a project report, what else are you going to show me when you are done?
· Project plan:
· Meta-analysis of your project. Including timeline and what parts will be hard and what will be easy.
Introduction
In general, cloud computing is the main concern for most of the organizations around the world because it makes their information available and reachable in any where they are. Actually it is a software resource that is delivered on demand as a service. There are different storages of cloud computing such as Dropbox, SkyDrive and amazon cloud drive. Cloud computing has many advantages like saving large files, back up of stored files, file sharing and access from different devices.
The study was designed with an aim of creating a website that can help people in information technology (IT) lo learn through the website and at the same time make money for having knowledge in the areas that they are good in. With this idea in mind, we took advantage of Amazon cloud equipments such as servers, switches and other networking tools to create our own website. To design and create the pages, we used the Adobe CS5 which includes Photoshop and Dreamweaver then used the Amazon web server to upload and publish the website on the browser in order for it to be accessible to everyone on the browser. The researchers had an aim wanted to undertake this project so as to help people in IT help each other learn new things and at the same time benefit financially from passing their knowledge to other people.
Goals
The main goal of this project is to make learning life easier and at the same time make people more helpful to the other people who need helps in IT field. Furthermore, this website will give the chance to earn money from providing lessons to people who wish to learn IT. Another goal that we focused on is when some companies have workload or need some people to do they can just submit it on our website and contact with who is able to be responsible to do it.
Why did we choose this project?
We choose this project to be done in this course to implement .
Student answer A. (1) Use Mancur Olsons theory to explain the b.docxjohniemcm5zt
Student answer
A. (1) Use Mancur Olson's theory to explain the behavior of Angola's government, elite, and general public with respect to the CIF and CSIH's contracts.
Angola’s government and political elite according to Mancur Olson’s theory are seen as distributional coalitions. Both parties have an incentive to partner with the CIF. China requires natural resources and the Angolan government and its elite want money. The funding is distributed amongst the group and society does not benefit at all. This behavior will continuously impede Angola’s economic growth. There is no funding for projects that create jobs to improve infrastructure. The general public suffers at the hands of this partnership. There is no trust of the government.
(2) What is stadium diplomacy? How does it fit Olson's theory?
A form of cultural diplomacy that China uses as a means to gain access to another country’s market. They are presented as gifts or constitute some sort of partnership between China and the host country. What developing country wouldn't want a newly constructed stadium? The return on a project such as this is assumes to be greater than the cost. That being to China shall we say.
B. (1) Are there parallels between China's treatment of miners in Mozambique and Zambia and Eastover Mining Company's treatment of workers in Harlan County, Kentucky? Explain.
There absolutely are parallels between China’s treatment of the Mozambique and Zambia miners and the workers in Harlan County. In both cases the workers were subjected to unsafe working conditions, unfair labor practices, and indecent wages. Fortunately, the Harlan County workers were able to strike and make a difference. In Mozambique and Zambia the state owned companies and the government swept it under the rug.
(2) Use Olson's model to explain the Chinese government's indifference to Aolong's mistreatment and near enslavement of Chinese workers in Gabon.
The main goal of the Chinese government is to increase its presence globally and strengthen its own economy. China has increased in economic strength over the past three decades. The workers that complained to the embassy regarding the treatment they received from Aolong was addressed as a nuisance. The Chinese government has a bigger incentive to turn a blind eye to the treatment of the workers. The cost of improving working conditions and overall treatment of the workers aren't seen as beneficial.
(3) Is Chinese unionism up to the task of defending Chinese workers in situations like Aolong?
It looks as those the state owned companies are protected by the government and has no incentive of changing its labor practices. Unfortunately, because of the relationship between unions and the government, the workers voice will not be heard.
(4) Why haven't Chinese unions worked to improve conditions for non-Chinese workers in places like Zambia?
Chinese unions have no incentive to improve working conditions for the non-Chinese worker. As long as the.
Student 1StudentProfessor ENG 10827 June 2014Instruments.docxjohniemcm5zt
Student 1
Student
Professor
ENG 108
27 June 2014
Instruments of Fate in No Country for Old Men
In this movie, No Country for old men, there are three main characters. Anton Chigurh of a killer, Llewelyn Moss of a welder and Vietnam veteran, and Ed Tom Bell of a soon-to-retire country sheriff. Each of the three men has the fate of their lives. Especially, some instruments in this movie play very important roles to decide the fates of Chigurh and Moss. In this movie, Chigurh and Moss are the completely different characters. While Chigurh is a cold-blooded and kills many people, Moss is a typical Amarican who is a Vietnam veteran, has wife, and fearless man. The only common thing between Chigurh and Moss is that money and gun strongly affect both of their lives and fates. Both of them try to get something they want by using guns, but finally the desires leads them to deaths.
In this movie, money plays an important role as a tool for Chigurh to do coin toss. He uses this tool, or coin when he makes his actions and decisions. He often says, “Call it” to people and bets whether he kills them or not by the result of his coin tosses. For example, he says, “Call it” when he goes to a store and talks to an old man. Fortunately, the man wins and is not killed by Chigurh. This action, coin toss, shows us Chigurh’s power, which can control other people’s fates easily without any coherent reasons. We can also say that the coin toss is the way to escape the responsibility to kill people.
The last time that he says “Call it” to someone is when he meets Moss’s wife, Carla Jean. Jean finds that Chigurh is sitting down on the chair on the corner of a bedroom. Although everyone is afraid of him and said which side of the coin, Jean denies calling the coin. Instead of calling the result of coin toss; she criticizes Chigurh’s actions. She says, “The coin don't have no say. It's just you”(Coen). She argues that he chooses his decisions, not by coin, but by himself. She wants to say that a coin does not have any power to change him. In this scene, many audiences may have the questions about Chigurh. For example, “why did he start to kill people? ”, “does he have any purpose to kill people?” and so on. Thinking the reason why he is doing coin toss, we feel that Chigurh is actually lonely and normal person who want to rely on something. It seems Chigurh is not like a usual human beings because of his behavior, looking, and talking way. However, he actually very looks like a modern people, especially Americans who are isolated rather than independent. American people are becoming to do many things by themselves because of the high technologies such as the Internet, and iPhones. Nowadays, people can find any solutions by searching the information on the Internet. Moreover phones can even hear people’s voice and answer their questions. The coin is like an iPhone for Chigurh, who does not have any relationship with others and want to rely on something.
Although he decid.
Student Project There is no extension of the due date for t.docxjohniemcm5zt
Student Project
There is no extension of the due date for the project. Late projects will not be accepted. A grade of zero will be given if the project is not turned in on time. Hard copy of the paper must be turned in to this instructor on or before the due date . No electronic submission
Paper Requirements
Use the DSM V to identify a coded disorder and use the symptoms of that disorder to create a client and case vignette. The client you create should meet all the criteria for the diagnosis you select. See following page
Student project paper organization and points distribution:
· 2 pts APA cover (page 1)
· 3 pts APA format entire paper (running heads and citations etc.)
· 20pts Accurately completed Multiaxial sheet (page2)
· 50 pts Create a client and present your client in a narrative using clinical language and terminology to describe symptoms of a DSM disorder. DSM V guidelines and criteria. This section must be at least 4 pages long and no longer than 5 pages (pages 3, 4, 5, 6) you will be penalized 5 points for each ½ page short of the 4 page narrative.
Make this person real…
· What do you observe when you meet and speak with this client
· What does this client say and how do they say it
· Describe symptoms of your client that represent indicators for an Axis I diagnosis
· Include medical issues. You must include at least one medical from Axis III
· Describe background and environmental contributors to the diagnosis at least three Axis IV factors Also provide demographics, age, race, sex etc…
· Discussion of the GAF explains criteria as it relates to your client (a paragraph 5pts.)
· You must give your client at least one assessment/ inventory/test relevant to confirming your diagnosis (depression inventory, substance abuse, OCD, bipolar or anxiety inventory etc...)
· Discuss and explain the results of the inventory ( a paragraph 5pts)
· Justify your diagnosis using DSM V criteria, terms and rule outs.( a paragraph 5pts)
· Use information secured from your two peer reviewed journal articles on the subject of the diagnosis to support your diagnosis,(a paragraph for each article 10pts)
· 10pts APA Resource/ reference page (page 7or 8) you must use and document the following:
· DSM V
· You must use, document and cite in text, at least two peer review journal articles on the topic of your diagnosis.
· The articles appear in reputable psychological research journals.
· Articles must have a publication date of 2001 to present.
· Document where you secured your assessment
· 10pts Appendix Place a copy of the inventory/assessment you used with your client in the appendix
Multiaxial Assessment
Multiaxial Evaluation Report Form
AXIS I: Clinical Disorders
Other Conditions That May Be a Focus of Clinical Attention
Diagnostic code DSM-IV name
___________ ___________________________________________
AXIS II: Personality Disorders Mental Re.
Studding abroad has become a major priority to for the higher educ.docxjohniemcm5zt
Studding abroad has become a major priority to for the higher education sectors of many counties. Because studying abroad will make students advance in many aspects of their life. Studying abroad will help students to will help students become better in their life in many aspects it will cater their academic , personal, cultural and carrier growth. Education is the most important thing in life. Without education it is impossible to accomplish anything in life. Students who get a chance to study abroad should not miss this opportunity because it is once in a lifetime opportunity due to the benefits it has.
One primary incentive of studying abroad is better education. Studying abroad ensures better educational opportunities’ compared to my home country due to a wider selection of study options to choose from. This will enable students to better specialize in their carrier that they chose. International education is also better because in many Asian countries the teaching method is more focused on theoretical knowledge more than practical. The result of this teaching style will make students gain a vast amount of information will no clue on how to use or apply them correctly. On the other hand the education system in west countries such as the united states will focus on both gaining knowledge and making sure that a student knows how to apply them correctly, so international education is better because it will make students gain a balance education between gaining a lot of knowledge and on how to apply them correctly, this will result in a balance and better rounded education.
Apart from getting better education studding abroad will help make students more independent and will make them get out from their comfort zone and face life. It will also make students to face various situations and crisez that they have to resolve with the help of the parents. And students will have to manage their on money and manage their own life which will help make students more mature. For example when I was back home at Kuwait everything was managed by my parents, such as paying bills, buying grocery. And other life aspects were also done by other people, such as cleaning the house, doing the dishes and cleaning my clothers. All those things I have never done befor in my life because we have house mades which help to do the chores. But when I came to the United states by self and I have never traved befor. I came to a foreign country when I was 18 years old and never had any responsablity to do back in Kuwait. But when I first landed I knew that I was by self and I had to take care of my own self; I searched to apartments and rented one within a weak or two from arriving, I stated to pay my own bills for water, electricity and many other responsibilities that I had to take care of. I have learned in one month to manage my life and became mature and I am grateful for this.
Other great aspect of studying abroad is that it will provide a great chance for cultural .
Student 1Student ENG 11008 March 2015The King of Equalit.docxjohniemcm5zt
Student 1
Student
ENG 1100
8 March 2015
The King of Equality Comment by Katie: Thoughtful title!
On August 28, 1936 Martin Luther King Jr. gave one of the best known speeches in American history. When people commemorate the “I Have a Dream” speech, as it has come to be identified, they recall King’s powerful message about civil rights and the true meaning of freedom in America. In the famous “I Have a Dream” speech, Martin Luther King Jr. uses a number of rhetorical devices in order to match his word choice to the strength of his message. Numerous examples of allusion, parallelism, and anaphora are used as tactics to amplify the intensity of his message. Comment by Katie: Great thesis—it makes a clear claim and provides a forecast of your paper’s outline.
King begins his speech with a reference to the Gettysburg address, “Five score years ago…” (King par. 2).The opening allusion is exceptionally moving given that King spoke in front of the Lincoln Memorial. King uses examples of allusions, or references to a person, place, thing or idea of historical, cultural, literary or political significance. Allusions can be direct or indirect, and are often used to broaden the reader’s understanding. The Gettysburg Address is not the only historical piece referenced in King’s speech; the Declaration of Independence is also referenced in paragraph four of the “I Have a Dream” speech. The speech reads, “This note was a promise that all men, yes, black men as well as white men, would be guaranteed the ‘unalienable Rights’ of ‘Life, Liberty and the pursuit of Happiness’" (King par. 4). Martin Luther King Jr. addresses the Declaration of Independence in order to get his supporters to recognize the equal rights that they deserve as Americans. In order to provide an honorable basis, King uses numerous biblical allusions. Two examples of biblical allusions used in the speech include Psalms 30:5 and Jeremiah 2:13. King cries ‘It came as a joyous daybreak to end the long night of their captivity.” (King par. 2) referring to Psalms 30:5, “For his anger is but for a moment; his favor is for a lifetime. Weeping may linger for the night, but joy comes with the morning” (Dlugan, Andrew). Martin Luther King Jr. is expressing that the struggle for the black community was long and hard but the freedom they will receive will last a lifetime. Jeremiah 2:13 was also a biblical verse King evokes in his speech proclaiming, “Let us not seek to satisfy our thirst for freedom by drinking from the cup of bitterness and hatred,” (King par. 8) referring to Jeremiah 2:13, “For my people have committed two evils: they have forsaken me, the fountain of living water, and dug out cisterns for themselves, cracked cisterns that can hold no water” (Dlugan, Andrew). King is using this biblical verse to explain to his people that they must fight peacefully, without violence and hatred, and if they do they will be rewarded for their peaceful behavior. Comment by Katie: It may be a good .
Studcnft Cl.nthiaEdnads fnrtructor: HilaryCla* Assignmenf W2:Homeworlqpt I
Dtut 3128/13 Cmrcc; CollegelU*&ernatics I
6:45 PM MATI500 S02 (l)
Booh: Angel: A Sunrey of }vfathemdics
with Applicatiorx,9e
2"5.5. 86 cities were surv€yd to dctermine spofis
team$ 23 hd soccer,20had football, t8 had
volle5fuall, ll had socc€rmd fooitball, Il had
soccerard vollgfuall, 12 had footba[ and
volleyball. 6 had all three.
Let A = sosser, B: football" C: vollqfull.
Howrnmyhad only a soccerteam?
,ffi
many had soccer md football, but not volleyball?
mny had soccer or foortball?
many had soccer s foothll, but not vollq&alt?
many had exactly two teams?
How
T
Hocr
n
How
tr
How
T
U
Page I
.
Structure!Thesis British politics were changed in such a fa.docxjohniemcm5zt
Structure!
Thesis: British politics were changed in such a fashion because the changes caused something.
If these changes had not occurred, it is possible that x could have happened!
Before the 19th century Reform Acts, British politics possessed a conservative, statesmanlike,
and stable character. The Reform Acts introduced modern republicanism without significant
disruption because the working class British that became incorporated respected British
hierarchical society and the parliamentary system. Furthermore, many of the substantial social
changes from the 19th-20th centuries occurred because of substantial economic changes, not
political reform. If the franchise had not been enlarged to eventually encompass the working
class, it is quite possible that radical political movements, such as the Charterists, would have
gained a political hold.!!
Bagehot and Government!
Bagehot writes from within the period studied!
Bagehot takes an aristocratic view of government!
Ruling takes education, experience, and sobriety--this is what he calls “statesmanship”!
Statesmanship!
The job of the political elites is to provide sober judgment on issues!
His condemnation of American politics largely rests on the inability of the Americans to reach
sober conclusions on politically necessary issues!
Because the President and Congress are in constant competition, there can be no
statesmanship (37)!
The introduction of the working class endangers this statesmanship!
Bagehot writes, “I am exceedingly afraid of the ignorant multitude of the new constituencies.” (p.
17)!
The introduction of the working class would require specific actions on the parts of the
statesmen, and provide a real danger!
However, while Bagehot is anxious about reform, he does not dismiss it out of hand -- it is a
challenge but could provide reasonable results of the Parliament is followed!
Was he right or wrong? Were his concerns justified?!
Bagehot’s concerns are legitimate. The course of other countries’ attempts to reform would
demonstrate that. However, organized, radical labor movements did not form in Britain!
1832 Reform Act!
On its face, the 1832 Reform Act was substantial!
It brought 10-pound householders into the vote!
Functionally, this extended the franchise!
In practice, Bagehot, argues, it was not so extreme!
In the first place, constitutional changes take time to be discovered, as generational changes
matter (7)!
Most of the pre-1832 elites, such as Lord Pemberton, remained in power until the mid-1860s (7)!
Secondly, England is a “deferential society,” argues Bagehot.!
The newly-incorporated members did not participate directly in politics -- they remained
shopkeepers (8)!
“If a hundred small shopkeepers had by miracle been added to any of the ‘32 Parliaments, they
would have felt outcasts there.” (8)!
Parliament remained the space of the elite!
The newly-incorporated did not vote to push their personal interest in politics at the national
level!
They voted .
Student #1 I have chosen to write about the history of data anal.docxjohniemcm5zt
Student #1
I have chosen to write about the history of data analysis for the Los Angeles Police Department. While I currently reside in Colorado Springs, Colorado and work as a deputy sheriff in Denver, Colorado I grew up in the greater Los Angeles area and I know that they should have a large amount of data to draw from.
Currently the Los Angeles Police Department uses COMPSTAT to compile their data. They have a unit, known as the COMPSTAT unit, whose sole job is to compile crime statistics and analyze the data (Los Angeles Police Department, 2016) COMPSTAT is short for computer statistics. COMPSTAT was developed by Police Commissioner William Bratton in 1994 for use by the New York Police Department. According to the University of Maryland by the year 2000 over a third of police agencies with over 100 officers were utilizing some sort of COMPSTAT like program (University of Maryland, 2015). In 2002 William Bratton became the Chief of Police for the Los Angeles Police Department and brought with him the concept of COMPSTAT. During the first six years of his tenure Los Angeles saw a steady decrease in the cities crime rates thanks largely in part to COMPSTAT policing.
Mean, mode and median play a large part in analyzing criminal data. The mean is the average number. An example of this for crime data analysis would be in neighborhood C there was 14 robberies committed on Monday between 1 and 3 AM, 17 robberies on Tuesday at the same time period and 9 on Wednesday during the same time period. The mean would be 13.3 robberies per night for those 3 nights. Knowing this is high for the city the data could be used to justify extra police presence in Neighborhood C. An example of the mode would be if in the same neighborhood in the same week there were 17 robberies on both Friday and Saturday, 12 on Thursday and 11 on Sunday. The mode would be 17 and it would also be a reason to add extra police presence in the neighborhood until a significant decrease was seen in the amount of robberies taking place. Finally we come to the median. This is simply line the numbers up for the week and take the number that falls in the middle. In the case of the robberies occurring in neighborhood C the number would be 14. All of this data can be combined to show watch commanders and captain’s areas where they should be focusing their officer’s time. If there is a neighborhood that has seen only one or two robberies during the week, it is definitely not in as much need of a heavy police presence as Neighborhood C is.
Student #2
Beginning in the mid-1990’s, police in New York began to run statistical analysis of the city’s crime reports, arrests and other police activity known as COMPSTAT. Law enforcement agencies since this analysis began, has implemented their own data-driven approaches to tracking and adapting to crime trends. The LAPD is both heavily armed and thoroughly computerized. The Real-Time Analysis and Critical Response Division is its central processor..
Student answer (a) In US business unionism focuses on benefits t.docxjohniemcm5zt
Student answer
(a) In US business unionism focuses on benefits to existing members, (opposed to other countries like Britain) employers’ organizations are not prominent at any level, however, employer’ organizations that seek to maintain unions away from employees have been prominent.
(b) Diversity creates a wider range of variation employment practices, (to mention one factor) but Britain lacks such factor, in addition, the government does not support employment regulation as it happens in US. (i) New modernized methods of union organizing have been implemented such as intensive direct communication with prospective members through young well-educated organizers. (ii) In the US diversity has been a strong factor leading to wider employment arrangements.
(c) (i) (i) according to Olson the likelihood of cross-national cooperation confronts different barriers such as, divergent interests, national differences in language, culture, law and union structure. However the potential exists.
Student answer
US employers are amongst the most anti union employers in the world because unions tend to hurt productivity and reduce profit margin.
Business Unionism uses the principle that unions should operate like a business. It has been attractive to the US employees because business union jobs pay better wages than non-union equivalents. It is operated by employers and employees, therefore the interest of all parties is advocated.
To expand union membership, the US confederation, the AFL-CIO tried to modernise and broaden issues that attract union members such as child care and equal pay. They have also used young well-educated organisers and involve extensive direct communication with prospective members and links to community groups such as churches.
The union density plummeted in the US because of the split of the major unions forming a coalition called the CTW - change to win coalition. In the UK the fall was due to state labour policies, management resistance and workplace practices, changing composition employment and the labour force and issues internal to unionism.
Non union personnel practices have developed the furthest in the US.
Cross-national cooperation is possible through trade and treaty agreements. The major difference between liberal and coordinated is the ability to obtain capital without having to plead with a bank. The liberal has the access to capital via public markets such as stocks and bonds while this is not so with the coordinated.
Olson will say that cross-national cooperation will break barriers and economic incentives such as increased trade will be gained.
Student answer
(a) The U.S. operates on "Employment at will" where employers do not have to provide just cause for dismissal, reasonable notice or severance pay on dismissal of an employee. The U.S. business unionism, focuses narrowly on providing benefits to existing members.
(b) The AFL-CIO tried to modernize and broaden issues that attract union members, (.
strict
man-
lPer-
)nger
,n Of
raced
rhfies
s the
rator,
nore,
L best
e was
eaker
I was
ctive
utive
lP99r
df-
rated
ettle-
tially
iih a
weie
igz).
Iow-
I the
the
ies.
rably
)rm-
:es as
kers,
:ived
nore
shed
rda
dren
nent
roth-
lblic
967;
hted
rent,
:articularly the importance of organization and
:uldraising. In fact, in their early years, their
appeal was enhanced by the application of cor-
:orate and scientific methods to social reform,
:articularly among the educated middle and
:nper classes. Unlike the COS, however, settle-
=ents lacked clarity on their basic organizational
:i- rm and struggled with persistent contradic-
:Lans between their democratic values and their
,-::iance on elites for funding and political sup-
f,ort (Wenocur & Reisch, 1989).
During World War I, most local nonprofits
:egan to be coordinated by business-dominated
-cmmunity Chests, the antecedents of today's
lfited Way. The presence of business leaders
qstlred the primary of corporate methods and
r"r.-ues in the private human services field
i,:illiant, 1990). As these agencies professional-
-red during the 1920s, this federated structure
xrtr&me the logical vehicle to rationalize philan-
lrropv and help nonprofit human services orga-
'r'nv* tions survive fi nancially.
-{t the same time, there was a shift in the over-
iunc.t of public services, from volunte er organiza-
tr:ns administered by boards to executive-based
,Ffl',ffi.rns of supervision. This reflected an increase
m frate and local government involvement in and
a'ntol of societal change. The emergence of the
fdc of public administration led to increased
um:ressionalism in government departments of
lmu*::-l rr'elfare. These bureaucracies were receptive
m 3e expertise social workers had acquired in
umr'ersities and private charitable organizations.
fhe appearance of "welfare capitalism" in the
rrn= of company unions and other employee
mm,edt packages during the 1920s, however,
rum:e,rmined advocates of governmental inter-
tmtron in the social welfare arena by promoting
ffic rage of the socially responsible corporation
urr,ru:se profits were linked to American progress
mrc mell-being (Berkowitz & McQuaid, 1980).
imer developments that shaped human services
mnmrn rlistration in this era included the expansion
m rrecialized organizations in such fields as
mreadon, mental health, juvenile and criminal
nuum=" child welfare, and occupational social
General Themes in the Evolution of HSA 33
work; the formation of a professional infrastruc-
ture through such organizations as the American
Association for Organizing Family Social Work,
the Child Welfare League of America, the
National Social Work Council, the Community
Chests and Councils of America, and a wide range
of professional associations; the nearly 3O0o/o
increase in the number of schools of social work
between World War I and the Great Depression;
the growth of professional journals; and the use
of the medical model and corporate.
STRIKING A BALANCE BETWEEN PUBLIC INTEREST OFTRANSPARENCY OF.docxjohniemcm5zt
STRIKING A BALANCE BETWEEN PUBLIC INTEREST OF
TRANSPARENCY OF GOVERNMENT AND THE PRIVACY
OF PERSONAL IDENTIFICATION AND SECURITY
INFORMATION: AN EXAMINATION OF TRIBUNE-REVIEW
PUBLISHING CO. V BODACK
I. INTRODUCTION
Pennsyivanians generally want the government to work
properly and to be free from corruption. They also generally want
to know how tax dollars are spent and how efficiently the
government works. The Right-to-Know Law provides access to
state government public records to any individual or entity that
properly requests them. ' The purpose of this law is to give a level
of transparency to the inner workings of the state government.^
However, this right to access public records could lead to the
inadvertent disclosure of important personal identification and
security information of innocent, private citizens.
Under the Right-to-Know Act, the state court system took
responsibility for determining not only what fits into the definition
of a "public record," but also whether the public interest in the
information outweighs the possible " 'impairment of a person's
reputation or personal security' " by the disclosure of that
information.^ Because, historically, Pennsylvania courts have
broadly interpreted the public record definition, individuals are at a
' Right-to-Know Law, 65 PA. STAT. ANN. §§ 67.101- .1102 (West Supp.
2009). The Right-to-Know Law completely overhauled public records access in
Pennsylvania, effective January 1, 2009. Id. §67.101. However, this act only
applies to requests for public records after December 31, 2008. Id. § 67.3101. So
any case pending with a request for information prior to December 31, 2008,
should be decided under the former Right-to-Know Act. The implications of the
revised Right-to-Know Law are discussed in the evaluation section. See infra pt.
IV.
' Pa. State Univ. v. State Employees' Ret. Bd. {Penn State), 935 A.2d 530,
533 (Pa. 2007) (citing Sapp Roofmg Co. v. Sheet Metal Workers' Int'l Ass'n,
Local Union No. 12, 713 A.2d 627, 629 (Pa. 1998)).
^ Id. at 538 (quoting § 66.1(2), repealed by Right-to-Know Law, 65 PA.
STAT. ANN. §67.102 (West Supp. 2009)) (citing Goppelt v. City of Phila.
Revenue Dep't, 841 A.2d 599, 603-04 (Pa. Commw. Ct. 1998)).
577
578 WiDENER LAW JOURNAL [Vol. 19
greater risk of having personal identification and security
information released to the public; and therefore, the courts have
been forced to carefully balance the competing interests of the
public and of the private individual.'*
This survey will examine how Pennsylvania courts have
attempted to achieve a balance between the public's interest in the
transparency of government and the private individual's interest in
the confidentiality of personal identification and security
information. Part II examines the case law prior to Tribune-Review
Publishing Co. v. Bodaclê as well as the development of the
exception to the required disclosure of information in public
records. Part III discusses Tribune-Review Publish.
Strengths Insight and Action-Planning Guide SURVEY COMPLETION DA.docxjohniemcm5zt
Strengths Insight and Action-Planning Guide SURVEY COMPLETION DATE: 09-29-2015
xxxxxxxxxxx
Your Top 5 Themes
Responsibility Relator Competition Analytical Futuristic
What's in This Guide?
Section I: Awareness
A brief Shared Theme Description for each of your top five themes
Your Personalized Strengths Insights, which describe what makes you stand out from others with the same theme in their top five
Questions for you to answer to increase your awareness of your talents
Section II: Application
10 Ideas for Action for each of your top five themes Questions for you to answer to help you apply your talents
Section III: Achievement
Examples of what each of your top five themes "sounds like" -- real quotes from people who also have the theme in their top five
Steps for you to take to help you leverage your talents for achievement
Section I: Awareness
Responsibility
Shared Theme Description
People who are especially talented in the Responsibility theme take psychological ownership of what they say they will do. They are committed to stable values such as honesty and loyalty.
Your Personalized Strengths Insights
What makes you stand out?
By nature, you prefer to work with teammates who share your concern about doing everything correctly and ethically. It’s very likely that you bring an exceptionally mature perspective to your team. Most people regard you as the dependable and reliable one. Because of your strengths, you sometimes open yourself to diverse types of people. You ordinarily welcome individuals who otherwise would feel out of place or ignored. Instinctively, you may reject the idea that telling a falsehood about something unimportant is acceptable. Perhaps you refuse to make an innocent social excuse to protect someone’s feelings. Driven by your talents, you experience pangs of remorse when you realize you failed to do something you promised to do. You feel awful when you do not do something correctly. You probably regret having compromised your basic values about right and wrong.
Questions
As you read your personalized strengths insights, what words, phrases, or lines stand out to you?
Out of all the talents in this insight, what would you like for others to see most in you?
Relator
Shared Theme Description
People who are especially talented in the Relator theme enjoy close relationships with others. They find deep satisfaction in working hard with friends to achieve a goal.
Your Personalized Strengths Insights
What makes you stand out?
Because of your strengths, you have the ability to instruct, train, or offer suggestions to people who look to you for assistance. It’s very likely that you probably are quite willing to welcome all kinds of individuals regardless of their appearance, education, social class, native language, religious preference, or political persuasion. This explains why your circle of friends or acquaintances is so diverse and interesting. Your openness might encourage people to seek your c.
Strategy Project/.DS_Store
__MACOSX/Strategy Project/._.DS_Store
Strategy Project/EXAMPLECompleted Strategy Team Project.docx
Issue: Given the success of being one of the world’s largest global payments technology companies, MasterCard has an opportunity to enter into the country of North Korea to expand its technology basis and help build the North Korean economy.
Recommendation: MasterCard should research and investigate the costs and benefits of expanding itself into North Korea.
Justification: In its current state, MasterCard is the second largest global payments technology organization and could use this strength to enter into North Korea to help build their economy not only by introducing its products and services into the country, but to help a weak economy become stronger with the proper use of a global payment technology.
Issue: Attempting to expand into other third world countries increases the security threat. The security at MasterCard needs an update to prevent their customers from becoming targets of credit card breaches and fraud.
Recommendation: MasterCard should design a new digital debit/credit card that uses a thumbprint to authorize the use of the card.
Justification: Fingerprints are a unique feature that can provide great security assurance when dealing with theft. The fact that no two fingerprints are identical will make it hard for fraud to take place.
Task 1: A Research and Development (R & D) team will be established for a 12 month period beginning May 2014 and continuing through May 2015 to determine what areas within North Korea would be in the best interest for MasterCard to locate. The team would consist of accountants, lawyers, management, and several other individuals who would work solely on this project for the year. The estimated cost for this project could reach up to $2 million. The current budget is listed at $2.5 million. All correspondence and findings will be reported to the current CEO, CFO, and COO as well as the Board of Directors.
Throughout the year, the R & D team will spend ample time traveling and speaking with the delegates of North Korea to get a good feel of the acceptance of a large corporation entering into their country. Travel expenses during the complete project are estimated to be a total of $150,000 of the expected budget.
The initial expense per visit to North Korea is a $1000 required tour that does not include any other amenities such as airfare, hotel, or food. The estimated complete “tour” expense for the year is $5,000. The flight expense during the year for the R & D team estimates the cost of $18,150 during the year. It is estimated that each ticket would cost $726 and no more than 5 team members would travel at a time, with an estimated 5 trips per year. A budget of $25,000 has been allotted for flight expenses alone due to the current trips per year estimation. As the end of the research gets closer, there may need to be an additional trip or two that need.
STRAYER BUS475 WEEK 10 QUIZ 10Report this Question as Inappropri.docxjohniemcm5zt
STRAYER BUS475 WEEK 10 QUIZ 10
Report this Question as Inappropriate
Question 1
Which of the following sectors receives the largest percentage of corporate cash and in-kind contributions?
Health and human services.
Education.
Civic and community.
Culture and arts.
Question 2
Which company paid its employees to volunteer in their communities two days a week after a tsunami in Japan disrupted operations at its U.S. facilities?
General Electric.
UPS.
Sony.
Honda Motor Company.
Question 3
As communications improve and people around the world are able to witness the horrors of natural disasters, terrorism, and war, international relief efforts by corporations are becoming:
Less important.
More important.
Obsolete because of social media.
A liability because of negative media.
Question 4
Which company donates 5 percent of its branches or stores’ total sales revenue to a worthy local nonprofit organization three days a year?
H&M.
Whole Foods Markets.
Bank of America.
Citigroup.
Question 5
What company gives all of its earnings to charity?
Seventh Generation.
The Body Shop.
Newman’s Own.
Patagonia.
Question 6
Foreign-owned corporations use foundations:
More frequently than U.S. firms.
Less frequently than U.S. firms.
About as often as U.S. firms.
Only for setting up disaster relief.
Question 7
Which of the following non-profit, locally funded and controlled organizations offer housing rehabilitation and financial services to neighborhood residents?
General Electric.
UPS.
Sony.
Honda Motor Company.
Question 8
Habitat for Humanity is considered a:
Corporation.
Government division.
Nongovernmental organization.
Program for the homeless.
Question 9
According to a Harvard Business Review study, which of the following is not an area in which corporate contributions are most likely to enhance a company’s competitiveness?
Context for strategy and rivalry.
Demand conditions.
Stakeholder management.
Factor conditions.
Question 10
The term civic engagement describes:
The active involvement of businesses and individuals in improving communities.
A competitive, free market environment.
Strong governmental regulation to control businesses at the municipal level.
A close and collaborative business-government relationship.
Question 11
What percentage of AT&T’s procurement spending went to minority, women, and disabled veteran-owned businesses in 2011?
1 percent.
5 percent.
15 percent.
25 percent.
Question 12
The share of all giving made up by in-kind contributions of products and services has been:
Rising steadily over the past decade.
Declining steadily over the past decade.
Remaining relatively constant over the past decade.
Declining sharply over the past decade.
Question 13
Another term for corporate giving is corporate:
Welfare.
Goodwill.
Philanthropy.
Citizenship.
Question 14
Which region received the most U.S. international charitable contributions in 2011?
Europe
Africa
Asia-Pacific.
Latin America-Caribbean.
Question 15
Which company provided one million fre.
Strayer University 2.13 (Discussion #1) Yahoo! CEO Bans Tele.docxjohniemcm5zt
Strayer University : 2.13 (Discussion #1) Yahoo! CEO Bans Telecommuting
https://strayer.mindedgeonline.com/content.php?cid=40776[10/11/2013 9:15:57 AM]
Business Ethics (BUS 309)→Week 2: Normative Theories of Ethics→2.13 (Discussion #1) Yahoo! CEO Bans Telecommuting
Business Ethics (BUS 309)
(Discussion #1) Yahoo! CEO Bans Telecommuting
After reading the case study, answer the questions below.
In 2013, the chief executive officer at Yahoo!, Marissa Mayer, announced a policy banning
employees from telecommuting. Since assuming her role as CEO less than a year before, Mayer had
sought to increase Yahoo!'s productivity and revitalize the company's image.
Mayer's decision to ban telecommuting and demand that employees show up to their desks was seen
as part of her effort to revive Yahoo! Some employees were said to be abusing the telecommuting
option by not being productive when working from home, and some had even begun running start-
ups on the side while still on Yahoo!'s payroll. In general, there was a sense that telecommuting
employees generally did less then employees working in the office. This has become a common
worry for many employers as telecommuting has grown more popular.
In the memo circulated to Yahoo! employees announcing the company's new policy, the company
cited other reasons for the restriction. The memo read:
To become the absolute best place to work, communication and collaboration will be
important, so we need to be working side-by-side. That is why it is critical that we are
all present in our offices. Some of the best decisions and insights come from hallway
and cafeteria discussions, meeting new people, and impromptu team meetings. Speed
and quality are often sacrificed when we work from home. We need to be one Yahoo!,
and that starts with physically being together. - Jackie Reses, Yahoo head of HR.
Those involved in the decision to ban telecommuting chose to highlight the need for in-person
collaboration to spark creativity and productivity. They stressed that in order for Yahoo! to be a
cohesive company, employees should physically share a space and see each other on a daily basis.
Yahoo!'s decision to ban telecommuting bucked industry trends. Telecommuting has become
increasingly popular in recent years. According to the U.S. Census Bureau, 5.82 million Americans
worked from home as of 2010, constituting nearly 4.35 percent of the overall workforce. Many
companies cite telecommuting as a reflection of a more family-friendly work environment.
Critics argued that Mayer's ban on telecommuting was misguided. They noted that when employees
are not working efficiently, it's likely a problem with management and not with the location of the
employees.
Menu
←Previous Next→
https://strayer.mindedgeonline.com/content.php?cid=40254
https://strayer.mindedgeonline.com/content.php?cid=40254
https://strayer.mindedgeonline.com/content.php?cid=40326
https://strayer.mindedgeonline.com/content.php?cid=40326
https://straye.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Overview on Edible Vaccine: Pros & Cons with Mechanism
Structured Query Language for Data Management 2 Sructu.docx
1. Structured Query Language for Data Management 2
Sructured Query Language for Data Management 6
Table of Contents
Phase 1- Database Design and DDL 3
Business Rules & Entity Tables 3
Entity Tables: 4
SQL CODE: 4
Screenshots: 8
Phase 2 – Security and DML 13
Task 1 14
Task 2 15
Task 3 16
Task 4 17
Task 5 18
Phase 3 - DML (Select) and Procedures 19
Task 1 19
Task 2 20
Task 3 21
Task 4 22
Task 5 23
Phase 4 – Architecture, Indexes 27
Step 1: CREATE TABLE [Degrees] 27
Step 2: Re-create ‘Classes’ TABLE to add ‘DegreeID’ column
and INSERT 6 classes 29
Step 3: ALTER TABLE [Students] 31
Step 5: DML script to INSERT INTO the ‘Students’ table
‘DegreeID’ data 33
Step 6: Display ERD 36
Phase 5 – Views, Transactions, Testing and Performance37
References 38
Phase 1- Database Design and DDL
2. My team was recently contracted to design and develop a
database for CTU that will store personal and confidential
university data. This database is expected to provide the back-
end architecture for a front-end web application with an
intuitive User/Interface (U/I) to be used by the university HR
department. We’ve decided to use Microsoft SQL Server 2012
given the nature of data to be stored because it will be more
secure, and it also provides a suite of server maintenance tools
to be left behind with the IT Department once the database and
web application have been tested and accepted by university
stakeholders.
During our preliminary meetings, CTU’s requirements were
defined and adequately scoped to begin creation of the database.
The following sections contain the business rules and entity
tables developed during the preliminary meetings, as well as
copies of all the SQL code used to build the database and create
the Entity Relationship Diagram (ERD). Business Rules &
Entity Tables
Business Rules:
· A student has a name, a birth date, and gender.
· You must track the date the student started at the university
and his or her current GPA, as well as be able to inactivate him
or her without deleting information.
· For advising purposes, store the student's background/bio
information. This is like a little story.
· An advisor has a name and an e-mail address.
· Students are assigned to one advisor, but one advisor may
service multiple students.
· A class has a class code, name, and description.
· You need to indicate the specific classes a student is
taking/has taken at the university. Track the date the student
started a specific class and the grade earned in that class.
· Each class that a student takes has 4 assignments. Each
assignment is worth 100 points.Entity Tables:
3. SQL CODE:
Create Database:
CREATE DATABASE [Cameron_CTU]
CONTAINMENT = NONE
ON PRIMARY
( NAME = N'Cameron_CTU', FILENAME = N'c:Program
FilesMicrosoft SQL
ServerMSSQL11.SCAMERON_CTUMSSQLDATACameron_
CTU.mdf' , SIZE = 3072KB , FILEGROWTH = 1024KB )
LOG ON
( NAME = N'Cameron_CTU_log', FILENAME = N'c:Program
FilesMicrosoft SQL
ServerMSSQL11.SCAMERON_CTUMSSQLDATACameron_
CTU_log.ldf' , SIZE = 1024KB , FILEGROWTH = 01% )
GO
ALTER DATABASE [Cameron_CTU] SET
COMPATIBILITY_LEVEL = 110
GO
ALTER DATABASE [Cameron_CTU] SET
ANSI_NULL_DEFAULT OFF
GO
ALTER DATABASE [Cameron_CTU] SET ANSI_NULLS OFF
GO
ALTER DATABASE [Cameron_CTU] SET ANSI_PADDING
OFF
GO
ALTER DATABASE [Cameron_CTU] SET ANSI_WARNINGS
OFF
GO
ALTER DATABASE [Cameron_CTU] SET ARITHABORT OFF
GO
ALTER DATABASE [Cameron_CTU] SET AUTO_CLOSE OFF
GO
ALTER DATABASE [Cameron_CTU] SET
AUTO_CREATE_STATISTICS ON
GO
4. ALTER DATABASE [Cameron_CTU] SET AUTO_SHRINK
OFF
GO
ALTER DATABASE [Cameron_CTU] SET
AUTO_UPDATE_STATISTICS ON
GO
ALTER DATABASE [Cameron_CTU] SET
CURSOR_CLOSE_ON_COMMIT OFF
GO
ALTER DATABASE [Cameron_CTU] SET
CURSOR_DEFAULT GLOBAL
GO
ALTER DATABASE [Cameron_CTU] SET
CONCAT_NULL_YIELDS_NULL OFF
GO
ALTER DATABASE [Cameron_CTU] SET
NUMERIC_ROUNDABORT OFF
GO
ALTER DATABASE [Cameron_CTU] SET
QUOTED_IDENTIFIER OFF
GO
ALTER DATABASE [Cameron_CTU] SET
RECURSIVE_TRIGGERS OFF
GO
ALTER DATABASE [Cameron_CTU] SET
DISABLE_BROKER
GO
ALTER DATABASE [Cameron_CTU] SET
AUTO_UPDATE_STATISTICS_ASYNC OFF
GO
ALTER DATABASE [Cameron_CTU] SET
DATE_CORRELATION_OPTIMIZATION OFF
GO
ALTER DATABASE [Cameron_CTU] SET
PARAMETERIZATION SIMPLE
GO
5. ALTER DATABASE [Cameron_CTU] SET
READ_COMMITTED_SNAPSHOT OFF
GO
ALTER DATABASE [Cameron_CTU] SET READ_WRITE
GO
ALTER DATABASE [Cameron_CTU] SET RECOVERY
SIMPLE
GO
ALTER DATABASE [Cameron_CTU] SET MULTI_USER
GO
ALTER DATABASE [Cameron_CTU] SET PAGE_VERIFY
CHECKSUM
GO
ALTER DATABASE [Cameron_CTU] SET
TARGET_RECOVERY_TIME = 0 SECONDS
GO
USE [Cameron_CTU]
GO
IF NOT EXISTS (SELECT name FROM sys.filegroups WHERE
is_default=1 AND name = N'PRIMARY') ALTER DATABASE
[Cameron_CTU] MODIFY FILEGROUP [PRIMARY]
DEFAULT
GO
Create Students Table:
CREATE TABLE [dbo].[Students]
(
[StudentID] [int] IDENTITY(1,1) PRIMARY KEY NOT
6. NULL,
[FistName] [varchar](255) NOT NULL,
[LastName] [varchar](255) NOT NULL,
[BirthDate] [date] NOT NULL,
[Gender] [char](1) NOT NULL,
[StartDate] [date] NOT NULL,
[GPA] [numeric](4, 0) NOT NULL,
[IsActive] [varchar](50) NOT NULL,
[Bio] [varchar](255) NOT NULL,
[AdvisorID] [int] NOT NULL,
)
Create Advisors Table:
CREATE TABLE [dbo].[Advisors]
(
[AdvisorID] [int] IDENTITY(1,1) PRIMARY KEY NOT
NULL,
[FirstName] [varchar](50) NOT NULL,
[LastName] [varchar](50) NOT NULL,
[EmailAddr] [varchar](100) NOT NULL,
)
Create Classes Table:
CREATE TABLE [dbo].[Classes]
(
[ClassID] [int] IDENTITY(1,1) PRIMARY KEY NOT
NULL,
[ClassCode] [varchar](50) NOT NULL,
[ClassName] [varchar](100) NOT NULL,
[Description] [varchar](300) NOT NULL,
)
Create Students_Classes Table and make ‘AdvisorID’ and
‘DegreeID’ FOREIGN KEYS, and make ‘StudentID’ a
FOREIGN KEY on the Students_Classes table.
USE Cameron_CTU
CREATE TABLE Students
(StudentID INT IDENTITY PRIMARY KEY NOT NULL,
7. FirstName VARCHAR(35) NOT NULL,
LastName VARCHAR(30) NOT NULL,
BirthDate DATE NOT NULL,
Gender CHAR(1) NOT NULL,
StartDate DATE,
GPA DECIMAL(4,2),
IsActive CHAR(3) NOT NULL,
Bio VARCHAR(3000),
AdvisorID [int],
DegreeID [int] NOT NULL,
)
ALTER TABLE Students
ADD FOREIGN KEY (AdvisorID)
REFERENCES Advisors ([AdvisorID])
GO
ALTER TABLE Students
ADD FOREIGN KEY ([DegreeID])
REFERENCES Degrees ([DegreeID])
GO
ALTER TABLE Students_Classes
ADD FOREIGN KEY (StudentID)
REFERENCES Students(StudentID)
Once the relationships have been established, the ERD can be
created
New DML script to add required constraints for GPA, Gender,
and Assignments1 – Assignments4
USE Cameron_CTU
ALTER TABLE Students
ADD CONSTRAINT chkGPA
CHECK (GPA BETWEEN 0.00 and 4.00);
8. ALTER TABLE Students
ADD CONSTRAINT chkGender
CHECK (Gender IN ('M', 'F'));
ALTER TABLE Students_Classes
ADD CONSTRAINT chkAssignment1
CHECK (Assignment1 BETWEEN
0 AND 100);
ALTER TABLE Students_Classes
ADD CONSTRAINT chkAssignment2
CHECK (Assignment2 BETWEEN
0 AND 100);
ALTER TABLE Students_Classes
ADD CONSTRAINT chkAssignment3
CHECK (Assignment3 BETWEEN
0 AND 100);
ALTER TABLE Students_Classes
ADD CONSTRAINT chkAssignment4
CHECK (Assignment4 BETWEEN
0 AND 100);
(Fehily, 2008)
9. This section contains screenshots of the query windows once the
code was executed successfully.Screenshots:
Create Database:
Create Students Table with FOREIGN KEYS:
Create Advisors Table:
Create Classes Table:
Create Students_Classes Table:
Alter [Students_Classes] & [Students] Tables to assign Foreign
Keys to them, which are PRIMARY KEYS on the referenced
tables. Once the relationships have been established, the ERD
can be created
10. New DML script to add required constraints for GPA, Gender,
and Assignments1 – Assignments4
New Database Diagram: ERD
Phase 2 – Security and DML
Carrying on from Phase 1 tasks of creating our university
database, with the four tables of Students, Advisors, Classes,
and Students_Classes, Phase 2 calls for data to be inserted,
deleted, and updated. The INSERT statement has two ways to
enter. The positional insert inserts ordered values into a new
row in the same order of the table columns. A named-column
insert names the exact column where each value’s inserted into
a new row. Its good practice to use a named-column insert,
which allows your SQL code to work if the table’s columns are
reordered or a new column is added. You would use INSERT
VALUES to specify column values, and INSERT SELECT to
insert rows from another table. Some DBMS don’t make it
mandatory to use the INTO keyword after the INSERT
statement; however, you should use it for its portability
capabilities. (Fehily, 2008)
The UPDATE statement is used to change values in a table’s
existing rows. You need to be very cautious when using the
update statement because if you forget to add the ‘WHERE’
clause, you will update all rows instead of just your target rows.
Remember that each updated value has to have the same data
type or be totally convertible to the same type as its column.
(Fehily, 2008)
The DELETE statement is a little more powerful because its
used to delete an entire row, not jjust a column or columns.
You can delete just one or all rows of a table, so be cautious
with the delete statement also. Without the WHERE clause, all
table rows will be deleted. (Fehily, 2008)
11. Task 1
The first task was to insert data into four rows of the Classes
table. The following SQL code is what I used to accomplish the
task, followed by the screenshot of the query being executed
successfully.
INSERT INTO [Cameron_CTU].[DBO].[Classes]
( [ClassCode], [ClassName], [Description] )
VALUES
( 'ACCT306', 'Accounting 1', 'This course introduces
accounting concepts and explores the accounting environment.
It covers the basic structure of accounting, how to
maintain accounts, use account balances to prepare financial
statements, and complete the accounting cycle. It
also introduces the concept of internal control and how to
account for assets.' ),
( 'CS362', 'Structured Query Language for Data
Management', 'This course gives complete coverage of SQL,
with an emphasis on storage,
retrieval, and manipulation of data.' ),
( 'ENGL115', 'English Composition', 'In this course,
students focus on developing writing skills through practice and
revision.
Students will examine expository, critical, and
persuasive essay techniques.' ),
( 'FIN322', 'Investments', 'This course focuses on
investments and investment strategies. Various investment
vehicles such as stocks,
bonds, and commodities are examined. Students
will explore the principles of security analysis and valuation.' )
(Fehily, 2008)
Task 2
The second task was to insert data into three rows of the
Advisors table. The following SQL code is what I used to
accomplish the task, followed by the screenshot of the query
12. being executed successfully.
INSERT INTO [dbo].[Advisors]
( [FirstName],
[LastName],
[EmailAddr] )
VALUES
( 'Fred', 'Stone', '[email protected]' ),
( 'Bob', 'Gordon', '[email protected]' ),
( 'Jack', 'Simpson', '[email protected]')
(Fehily, 2008)
Task 3
The third task was to insert data into four rows of the Students
table. The following SQL code is what I used to accomplish the
task, followed by the screenshot of the query being executed
successfully.
INSERT INTO [dbo].[Students]
( [FirstName],
[LastName],
[BirthDate],
[Gender],
[StartDate],
[GPA],
[IsActive],
[Bio],
[AdvisorID] )
VALUES
( 'Craig', 'Franklin', '1970-03-15', 'm', '2010-05-30', 3.10, 'Yes',
'', 3 ),
( 'Harriet', 'Smith', '1982-04-15', 'f', '2010-05-30', 3.22, 'Yes',
'', 1 ),
( 'George', 'David', '1984-11-05', 'm', '2010-10-01', 0.00, 'Yes',
'', 3 ),
( 'Ben', 'Jefferson', '1976-09-25', 'm', '2009-02-21', 1.80, 'No',
'The student has gone on temporary leave to pursue other
13. opportunities but plans on returning in 1 year.', 3 )
(Fehily, 2008)Task 4
The fourth task was to delete the course named Investments
from the system, and the following SQL code is what I used to
accomplish the task, followed by the screenshot of the query
being executed successfully.
DELETE FROM Classes
WHERE ClassID = 'FIN322';
(Fehily, 2008)
Task 5
The fifth and final task called for changing 2 columns in a row
on the Students table, and the following SQL code is what I
used to accomplish the task, followed by the screenshot of the
query being executed successfully.
UPDATE Students
SET BirthDate = '1982-04-25',
GPA = 3.25
WHERE StudentID = '2';
(Fehily, 2008)
Phase 3 - DML (Select) and Procedures
Phase 3 has seven tasks that call for retrieving data using
the SELECT and FROM Statements. The SELECT clause calls
for which column or columns to display, and the FROM clause
identifies the table or tables the columns belong to. You can
also use the AS clause in order to create column aliases, which
I’ll go over in the last few tasks. You can also sort rows with
the ORDER BY clause, which I’ll also hit on in the tasks. The
WHERE clause filters unwanted rows. Without it, you results
would be every row on your queried table. Some other
statement clauses include AND, OR, ORDER BY GROUP BY,
14. JOIN. There are two types of JOIN clauses. They are Implicit
and explicit. Implicit is used a lot, and you may not even
realize your using it because there is no actual JOIN clause with
JOIN in it; its implied when you’re querying more than one
table. Lets get started with the tasks now, shall we?
(Fehily, 2008) The first thing I’m going to do is fix my SQL
statement in the Phase 2 section, Task 5. I fixed it by using
StudentID in the SELECT clause.
Task 1
The first task calls for a list of all active male students
assigned to Advisors 1 or 3.
So, we want to query the Advisor. Advisor ID, FirstName and
LastName columns along with theStudents.AdvisorID,
FirstName, LastName, Birthdate, Gender, and GPA columns of
the Students and Advisors tables. We use an implicit JOIN with
the WHERE clause to JOIN the two tables of Student.AdvisorID
and Advisor.AdvisorId together. Below, you’ll find the SQL
Statement I used to retrieve the required data, and screenshot
that shows a successful query.
SELECT Gender, IsActive, AdvisorID
FROM Cameron_CTU.dbo.Students
WHERE Gender = 'm'
AND IsActive = 'yes'
AND AdvisorID IN (1,3)
Task 2
The second task asks for a list of students without a
biography. Here’s the SQL Statement I used, and screenshot
that shows a successful query.
15. Task 3
Task 3 is a very simple statement asking what classes are in the
English Department. This SQL statement involves a wild card
just after the L in the word “English”. The SQL statement and
its associated screenshot are below.
SELECT ClassCode, ClassName
FROM Cameron_CTU.dbo.Classes
WHERE ClassName LIKE 'ENGL%'
Task 4
Task 4 calls for a list of all students and their advisors, and
sorted by Advisors, and a few columns from the Students table
SELECT A.AdvisorID, A.FirstName, A.LastName,
S.AdvisorID, S.FirstName, S.LastName,BirthDate, Gender,
GPA
FROM Cameron_CTU.dbo.Students S,
Cameron_CTU.dbo.Advisors A
WHERE S.AdvisorID = A.AdvisorID
ORDER BY A.LastName, S.LastName ASC;
SELECT A.CustomerID, A.FirstName, A.LastName,
S.AdvisorID, S.FirstName, S.LastName,BirthDate, Gender,
GPA
FROM Cameron_CTU.dbo.Students S,
Cameron_CTU.dbo.Advisors A
WHERE S.AdvisorID = A.AdvisorID
ORDER BY A.LastName, S.LastName ASC;
Task 5
The fifth task calls for the number of students born in the 80s.
16. Below, you’ll find the SQL Statement I used to retrieve the
required data, and screenshot that shows a successful query.
SELECT COUNT (StudentID) as Students_born_in_the_80s
FROM Cameron_CTU.dbo.Students
WHERE BirthDate between '1980-01-1' AND '1989-12-31';
Task 6
Task 6 wanted to know the average GPA score sorted by
men and women. Here is the SQL code and screenshot.
Task 7
Task 7 is looking for all of the advisors with only 1
student. Here’s the SQL code and screenshot.
SELECT A.firstname, A.LastName,
COUNT (A.AdvisorID) AS Total_Active_Students
FROM Cameron_CTU.dbo.Students S,
Cameron_CTU.dbo.Advisors A
WHERE A.AdvisorID = S.AdvisorID AND S.IsActive = 'yes'
GROUP BY A.FirstName, A.LastName
HAVING COUNT (S.StudentID) = '1';
Phase 4 – Architecture, Indexes
Phase 4 calls for a way to track classes required for degrees,
and which degree students are pursuing. We were given the
task of creating a table for tracking degrees with Degree Name
and Degree Description. However, the best way to track the
classes required for degrees is to create a table labeled
‘Degrees’ with columns labeled ‘DegreeID’, ‘DegreeName’ and
‘DegreeDescription’, and ‘DegreeCode’. Also adding a column
to the ‘Classes’ table, labeled DegreeID will help link the
‘Degrees’ and ‘Classes’ tables. After the tables have been
created, I’ll need to test the architecture to ensure it can render
the results I’m looking for in queries.
(Fehily, 2008)
17. However, I just received my grade for my Phase 1 IP with
identified errors. See Phase 1 section for fixed errors. The
errors that need corrected are:
- Considerations regarding my data types and field lengths:
FirstName and LastName too long
- Fix constraints for assignments 1 through 4 to ensure only 0-
100 can be input.
- Fix GPA Constraint to ensure input of only 0.00 – 4.00, and
permit only 3 total digits after decimal.
- Constrain ‘Gender’ to either M or F, and IsActive to either
Yes or No.
Step 1: CREATE TABLE [Degrees]
I’ll start by creating the table, ‘Degrees’ with the following
DDL script, followed by a screenshot of the query being
completed successfully, and the table structure that displays the
table columns to include the PRIMARY KEY, ‘DergeeID’.
USE [Cameron_CTU]
GO
SET QUOTED_IDENTIFIER ON
GO
CREATE TABLE [dbo].[Degrees]
(
[DegreeID] [int] IDENTITY(1,1) PRIMARY KEY NOT
NULL,
[DegreeName] [varchar](50) NOT NULL,
[DegreeDescription] [varchar](1000) NOT NULL,
[DegreeCode] [varchar](50) NOT NULL,
)
18. Step 2: Re-create ‘Classes’ TABLE to add ‘DegreeID’ column
and INSERT 6 classes
The next step is to delete and re-create the ‘Classes’ table,
and ensure that the ‘DegreeID’ column is included in the
creation, and made a FOREIGN KEY. Also, ensure you re-
insert the original 3 classes, and add 3 new classes into the
‘Classes’ table required by different degrees. And since you’ve
re-created the ‘Classes’ table with ‘DegreeID’ as a FOREIGN
KEY, make sure you add it to the INSERT INTO DDL script or
you’ll receive an error regarding the ‘DegreeID’ column.
Below are the following DDL scripts, followed by a screenshot
of the queries being completed successfully, and the table
structure that displays the table columns with ‘DegreeID’ as a
FOREIGN KEY, and the query results of the SELECT * FROM
Classes query.
USE [Cameron_CTU]
GO
SET QUOTED_IDENTIFIER ON
GO
SET ANSI_PADDING ON
GO
CREATE TABLE [dbo].[Classes]
19. (
[ClassID] [int] IDENTITY(1,1) PRIMARY KEY NOT
NULL,
[DegreeID] [int] NOT NULL,
[ClassCode] [varchar](50) NOT NULL,
[ClassName] [varchar](100) NOT NULL,
[Description] [varchar](1000) NOT NULL,
)
ALTER TABLE [dbo].[Classes]
ADD FOREIGN KEY([DegreeID])
REFERENCES [dbo].[Degrees]([DegreeID])
GO
INSERT INTO [Cameron_CTU].[DBO].[Classes]
( [DegreeID], [ClassCode], [ClassName], [Description] )
VALUES
( '4', 'ACCT306', 'Accounting 1', 'This course
introduces accounting concepts and explores the accounting
environment. It covers the basic structure of accounting, how to
maintain
accounts, use account balances to prepare financial
statements, and complete the accounting cycle. It also
introduces the concept of internal control and how to account
for assets.' ),
( '5', 'CS362', 'Structured Query Language for Data
Management', 'This course gives complete coverage of SQL,
with an emphasis on storage, retrieval, and manipulation of
data.' ),
( '3', 'ENGL115', 'English Composition', 'In this
course, students focus on developing writing skills through
practice and revision. Students will examine expository,
20. critical, and persuasive
essay techniques.' ),
( '3', 'BHVS205', 'Managerial Psychology', 'This
course introduces Psyhology concepts that will serve as the
foundation to other concepts, such as Motivation and Emotion
and Interpersonal
Communications and Dynamics.' ),
( '4', 'CSS150', 'Introduction to Computer Security',
'This course covers Computer Security Principles, such as
Policy letters, Remote Logins, and Network Security.' ),
( '5', 'CS126', 'UNIX Fundamentals', 'This course
teaches you thed origins of the UNIX Operating System, and
teaches you how to build directories.' )
Step 3: ALTER TABLE [Students]
As the paragraph title implies, the next step is to add the
‘DegreeID’ column to the ‘Students’ table, and make it a
FOREIGN KEY. Below is the following DDL script used to add
the column, and make it a FOREIGN KEY, and the screenshot
of the successful command.
USE [Cameron_CTU]
GO
ALTER TABLE Students
ADD DegreeID [int] NOT NULL
GO
ALTER TABLE Students
ADD FOREIGN KEY (DegreeID)
REFERENCES Degrees(DegreeID)
21. Step 4: DML script to insert 3 test records in [Degrees]
The next step is to insert degree data into the ‘Degrees’
table. Below is the DML script used, and a screenshot of the
successful command along with an inset of the results for a
SELECT * FROM Degrees statement.
INSERT INTO [Cameron_CTU].[DBO].[Degrees]
( [DegreeCode], [DegreeName], [DegreeDescription] )
VALUES
( 'BSIP', 'Bachelor of Science in Psychology', 'The Bachelor’s
degree in General Psychology is designed to prepare students to
successfully navigate in the 21st century workplace, in a variety
of careers that focus on the business of people, including but
not limited to work in management, administration, research,
and sales. It is positioned to provide an overview of the major
psychological concepts, perspectives, and skills that explain
human behavior. ' ),
( 'BSIS', 'Bachelor of Science in Information Security', 'The
Bachelors of Science in Information Assurance and Security
degree allows undergraduate learners to acquire and apply
various processes, tools, technologies, and methods of securing
an enterprise; including security policies, social engineering,
access control, authentication, perimeter security, disaster
recovery and business continuity, risk management, incident
response, viruses, malware, spam, encryption, and other
infrastructure security techniques that include governance and
strategic alignment of IT and business. ' ),
( 'BSIT', 'Bachelor of Science in Information Technology', 'The
Bachelor of Science in Information Technology (BSIT)
curriculum includes both a common core, as well as
specialization-specific courses. The BSIT core provides a strong
foundation in the key information technology areas of
programming, systems administration, security, architecture,
databases, and ethics.' )
Step 5: DML script to INSERT INTO the ‘Students’ table
22. ‘DegreeID’ data
The next step is to add the ‘DegreeID’ to 4 records
applicable to each of the 4 students. Below is the DML script
used to execute the command and a screenshot showing it was
successful.
INSERT INTO [Cameron_CTU].[dbo].[Students]
( [FirstName],
[LastName],
[BirthDate],
[Gender],
[StartDate],
[GPA],
[IsActive],
[Bio],
[AdvisorID],
[DegreeID] )
VALUES
( 'Craig', 'Franklin', '1970-03-15', 'm', '2010-05-30', 3.10, 'Yes',
NULL, 3, 3 ),
( 'Harriet', 'Smith', '1982-04-15', 'f', '2010-05-30', 3.22, 'Yes',
NULL, 1, 4 ),
( 'George', 'David', '1984-11-05', 'm', '2010-10-01', 0.00, 'Yes',
NULL, 3, 5 ),
( 'Ben', 'Jefferson', '1976-09-25', 'm', '2009-02-21', 1.80, 'No',
'The student has
gone on temporary leave to pursue other opportunities but
plans on returning in 1 year.', 3, 3 )
The last step is to execute a SELECT statement with an
implicit JOIN clause to show what degree each student is
pursuing.
USE Cameron_CTU
23. SELECT FirstName, LastName, Students.DegreeID,
Degrees.DegreeName
FROM Cameron_CTU.dbo.Students,
Cameron_CTU.dbo.Degrees
WHERE Students.DegreeID = Degrees.DegreeID;
Step 6: Display ERD
Phase 5 – Views, Transactions, Testing and Performance
References
Fehily, C. (2008) Visual QuickStart Guide SQL, Third Edition,
[CourseSmart e-Book reader version] Retrieved from
http://wow.coursesmart.com/9781256745129/firstsection