Draw An ER Diagram For The Situation Below Including Primary Keys, Attributes, Cardinalities And Necessary Relationships.

Draw an ER diagram for the situation below including primary keys, attributes, cardinalities and necessary relationships.
Be sure to break down any many to many relationships
List any assumptions that you made for your ERD
Thomas Fauci, owner of Fauci Ace Hardware store, has hired you as a contractor to design a database management system for his chain of three stores that sell building equipment and materials. He would like to track sales, clients, and employees. The following list of business rules and specifications must be incorporated in your design:
Clients place orders through a store. Fauci need to track the following about clients: name, address, city, state, zip code, telephone, date of birth, and primary language. A client may place many orders. A client does not always have to order through the same store all the time. Clients may have one or more charge accounts, although they may also have no charge accounts. The following information needs to be recorded about accounts: balance, last payment date, last payment amount, and type. A store may have many clients. The following information about each store needs to be recorded: store number, location (address, city, state, zip code), and square footage. A store may sell all items or may only sell certain items. Orders are composed of one or more items. The following information about each order needs to be recorded: order date and credit authorization status. Items may be sold by one or more stores. We wish to record the following about each item: description, color, size, pattern, and type. An item can be composed of multiple items; for example, a dining room wallcovering set (item 20) may consist of wallpaper (item 22) and borders (item 23). Mr Fauci employs 78 employees. He would like to track the following information about employees: name, address (street, city, state, zip code), telephone, date of hire, title, salary, skill, and age. Each employee works in one and only one store. Each employee may have one or more dependents. We wish to record the name of the dependent as well as the age and relationship. Employees can have one or more skills. Skill efficiencies are important to Mr Fauci.

COSO Framework Paper

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.
Your paper should meet the following requirements:
• Be approximately 2-4 pages in length, not including the required cover page and reference page.
• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

COSO Framework Paper

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.
Your paper should meet the following requirements:
• Be approximately 2-4 pages in length, not including the required cover page and reference page.
• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Data Structures and Algorithm Analysis

Data Structures and Algorithm Analysis 
1. How much memory will the following structures take up? Hint: int takes 4 bytes, float takes 4 bytes, char takes 1 byte. – 9 points
a. struct Structure1 {int a,b,c,d,e[10]; float f;};
b. struct Structure2 {int a[12]; float b[5];};
c. struct Structure3 {char a[10][12][4], b[5][5], c[10];};
2. Show the steps when sorting (smallest to largest) the following arrays of numbers using selection sort i.e. every time a swap occurs, show what the current state of the array looks like, including the final sorted array. – 12 points
a. [10, 2, 5, 8, 9, 1, 4, 7]
b. [7, 1, 3, 2, 5, 4, 8, 12, 9]
c. [8, 7, 6, 5, 4, 3, 2, 1]
d. [5, 3, 8, 1, 9, 4, 2, 6]
3. Big-O: What is meant by f(n) = O(g(n))? Give the definition and then explain what it means in your own terms. – 5 points
4. Big-Omega: What is meant by f(n) = Ω(g(n))? Give the definition and then explain what it means in your own terms. – 5 points
5. Show that , make sure you use the definition and justify the inequalities and constants used. – 4 points
6. Show that , make sure you use the definition and justify the inequalities and constants used. – 4 points
7. Show that , make sure you use the definition and justify the inequalities and constants used. – 4 points
8. Show that , make sure you use the definition and justify the inequalities and constants used. – 4 points
9. Show that , make sure you use the definition and justify the inequalities and constants used. – 4 points
10. What principle governs how you add/remove elements in a stack? Spell it out and briefly explain. – 4 points
11. Briefly describe an application of a stack. – 4 points
12. What principle governs how you add/remove elements in a queue? Spell it out and briefly explain. – 4 points
13. Briefly describe an application of a queue. – 4 points
Consider the following graph (pseudocode for BFS and DFS given on page 9):

14. Write the order in which the nodes would be visited in when doing a breadth first search (BFS) traversal starting at node 4. Also, write the distances from 4 to every other node. – 6 points
15. Write the order in which the nodes would be visited in when doing a breadth first search (BFS) traversal starting at node 5. Also, write the distances from 5 to every other node. – 6 points
Same graph (for your convenience):

16. Write the order in which the nodes would be visited in when doing a depth first search (DFS) traversal starting at node 4 (order discovered or order off the stack). – 6 points
17. Write the order in which the nodes would be visited in when doing a depth first search (DFS) traversal starting at node 5 (order discovered or order off the stack). – 6 points
18. Give the definition of a graph. – 5 points
19. Give the definition of a tree (from graph theory). – 4 points
 
BFS Pseudocode (for     graph with n vertices):
Input: grapharray[n][n], source
queue<int> Q
int distance[n] (array to keep     track of nodes distances (from source), all values set to -1 except source     which is set to 0 i.e. -1 = not visited)
Q.push(source)
while(Q is     not empty)
v = Q.front
Q.pop()
for each neighbor w of v
if distance[w] = -1
print w
distance[w] = distance[v]+1
Q.push(w)
end if
end for
end while
 
DFS Pseudocode (for     graph with n vertices):
Input: grapharray[n][n], source
stack<int> S
int visited[n] (array to keep     track of nodes visited, all values set to 0 except source which is set to 1     i.e. 0 = not visited, 1 = visited)
S.push(source)
while(S is     not empty)
v = S.top
S.pop()
for each neighbor w of v
if visited[w] = 0
print w
visited[w] = 1
S.push(w)
end if
end for
end while
Bonus (4 points): Show all of the steps (splitting and merging) when using mergesort to sort (smallest to largest) the following array (they are the numbers 1 through 16):
[16, 1, 15, 2, 14, 3, 13, 4, 12, 5, 11, 6, 10, 7, 9, 8]
Bonus (2 points): describe how you could implement a queue using 2 stacks.
Bonus (4 points) Draw the binary search tree that would be constructed by inserting the following values in the exact order given (starting with an empty tree i.e. first value will be the first node in the tree): –
a. Binary Search Tree A: 8, 9, 2, 7, 1, 10, 3, 5, 6, 4
b. Binary Search Tree B: 10, 7, 9, 12, 4, 2, 5, 3, 1, 14, 11, 19, 13, 18, 20

Database design

Assignment 1
For this assignment, you need to submit your code (SQL script), including structure from the Data Definition Language (DDL) and the Data Manipulation Language (DML).
Use these SQL Statements
As a starting point for your script. The data manipulation language (DML) is used to create, read, update, and delete data from a table. The data definition language (DDL) is used to create and alter the structure of the database itself, like creating a table, it’s columns, define and modify the primary and foreign keys, stored procedures, delete columns, tables, and even the entire database.

  • Your SQL statements should require a variety of SQL capabilities, such as various kinds of join, aggregate functions, etc.
  • Your document must include comments (SQL comments in a text file) that indicate what each test is testing – i.e. a specific requirement (if “good” data) or a specific problem you were catching (if testing a constraint on “bad” data).

 
Follow these steps to complete your assignment:

  • Populate your database with sample data to allow testing of the schema and the various transactions. Each table should have a minimum of ten rows.
  • After you’ve entered data, create some sample queries to see if the output is what you expected.
  • Create some sample reports to make sure these also produce similar results.
  • Make any necessary corrections to the database design during this stage and before you enter all your personal records. If you find any problems, correct the design.
  • Enter all your personal records.
  • Write your SQL Script.

 
The deliverables for this assignment are

  • Cover sheet
  • Updated database creation DDL and table loading DML, and
  • The new DML queries as requested

Assignment 2

  1. What did you accomplish this week? How has what you are learning in your current course assisted with this?
  2. What did you apply and how did you apply it?
  3. Were there problems encountered with job assignments or your work environment? What were your efforts towards resolution?
  4. Directly connect course related content to this week’s experiences at work.

Infotech in global economy

Week 6 Individual Project:  infotech in global economy
Models are only useful if they help us identify key aspects of policy, mimic reality, communicate concepts in a meaningful way, give means by which they can be tested, and hypothesize about the causes and consequences of public policy.
A. Order and Simplify Reality
Models need to strike a balance between simplifying reality in order to analyze political life and the danger of oversimplifying.
B. Identify What Is Significant
A difficult task in applying any model is determining what aspects of public policy must be included.
C. Be Congruent with Reality
While models are only concepts, they must have a relationship with reality.
D. Provide Meaningful Communication
A model is only meaningful if it is based on ideas for which some consensus exists.
E. Direct Inquiry and Research
Any model must be testable and capable of being validated.
Suggest Explanations Models must go beyond description of public policy to explication
Using at least 2 pages, write a paper describing (1) Do all policy models share certain limitations? (2) What are these limitations? (list limitations for at least 3 models we discussed from chapters 1-6)
Your document should be a Word document. To receive full credit for this individual project, you must include at least two references (APA) from academic resources (i.e. the ebook, U of Cumberlands Library resources, etc.). The research paper must be free of spelling and grammatical errors. References must be cited correctly using APA style. Your Safe

Infotech in global economy

Week 6 Individual Project:  infotech in global economy
Models are only useful if they help us identify key aspects of policy, mimic reality, communicate concepts in a meaningful way, give means by which they can be tested, and hypothesize about the causes and consequences of public policy.
A. Order and Simplify Reality
Models need to strike a balance between simplifying reality in order to analyze political life and the danger of oversimplifying.
B. Identify What Is Significant
A difficult task in applying any model is determining what aspects of public policy must be included.
C. Be Congruent with Reality
While models are only concepts, they must have a relationship with reality.
D. Provide Meaningful Communication
A model is only meaningful if it is based on ideas for which some consensus exists.
E. Direct Inquiry and Research
Any model must be testable and capable of being validated.
Suggest Explanations Models must go beyond description of public policy to explication
Using at least 2 pages, write a paper describing (1) Do all policy models share certain limitations? (2) What are these limitations? (list limitations for at least 3 models we discussed from chapters 1-6)
Your document should be a Word document. To receive full credit for this individual project, you must include at least two references (APA) from academic resources (i.e. the ebook, U of Cumberlands Library resources, etc.). The research paper must be free of spelling and grammatical errors. References must be cited correctly using APA style. Your Safe

Mobile Device Policy

What type of mobile device policy would you develop?  What  restrictions would you include to ensure safety of data and safety of  information being shared?

Association for Information Systems (AIS)

This week’s assignment – For each prompt please submit a one-page, single spaced response (you will receive 2 grades for this assignment). Please send your responses in a word document. 
1. In chapter 4 of Custer Died For Your Sins, Deloria notes “…Indians have been cursed above all other people in history. Indians have anthropologists.” What evidence does he provide in chapter 4 that leads him to this conclusion?
In chapter 5 of Custer Died For Your Sins, Deloria notes, “It has been said of missionaries that when they arrived they had only The Book and we had the land; now we have The Book and they have the land.” What evidence does Deloria provide in chapter 5 to support this statement and what did he want Indian people to d

Risk Assessment Strategy

Given the following scenario, discuss in depth the risk assessment strategies and components that you would deploy in order to ensure that secure defenses and compliance attributes are embedded into the core of your network and information security deployment. Marketing company X has a need to keep their propriety methods of marketing strategies safe from other companies who may use their information to gain a competitive advantage. The company is choosing cloud storage as their safe haven for information, and has decided not to store any of their data locally. For speed purposes, the company has also chosen to not use two-factor authentication and has chosen basic password security authentication instead, allowing those with a need to know to access the information using a simple password. This was mandated by the CTO of the company in order to make things easy for the staff, who know very little about computer security, and complain about things taking too many steps to access. Discuss and describe how you would handle this situation, and perhaps make note of any recommended changes you would make as you deploy your risk assessment strategy to help the CTO understand the consequences and/or rewards for the decisions made thus far.