IS320-3

DUE IN 8 HRS NO PLAGIARISM!!!!!!!!

 

SQL Q&A and Hands-On

Please include the questions with your answers. Answer in complete sentences where applicable.

  1. Does all standard SQL work in Microsoft Access? Explain.
  2. List and describe the four basic SQL data types.
  3. List and describe five SQL built-in functions.The best way to learn SQL is by actually using it. In the following problems, we will use SQL to create, populate, and query a small database. Use SQL in Microsoft Access to complete the problems. Save all queries as instructed in the problem. Submit the database file (save as Pet_Database.accdb and KEEP THIS FILE for use with a later assignment) with all your queries in addition to the Word document containing the questions and answers for numbers 1, 2, and 3.
    Use the following information for problems 4 – 10:
    Tables:
    PET_OWNER (OwnerID, OwnerLastName, OwnerFirstName, OwnerPhone, OwnerEmail)
    PET (PetID, PetName, PetType, PetBreed, PetDOB, OwnerID)
    **Note: OwnerID is italicized to indicate the Foreign Key**
    Data:
    figure 1
  4. Write an SQL CREATE TABLE statement to create the PET_OWNER table, with OwnerID as a surrogate key. Save as CreatePetOwner.
  5. Write a set of SQL INSERT statements to populate the PET_OWNER table with the data given above. Save as PopulatePetOwner.
  6. Write an SQL CREATE TABLE statement to create the PET table, with PetID as a surrogate key. Save as CreatePet.
  7. Write a set of SQL INSERT statements to populate the PET table with the data given above. Save as PopulatePet.
  8. Write an SQL statement to display the breed and type of all pets. Save as AllBreeds.
  9. Write an SQL statement to display the breed, and DOB of all pets having the type Cat. Save as Cats.
  10. Write an SQL statement to display the first name, last name, and email of all owners, sorted in alphabetical order by last name. Save as AlphaOwners.
  11. Write an SQL statement to display all the owners’ names, with the first name in all lower case and the last name in all upper case. Save as UpperLower.
  12. Write an SQL statement to display the total number of pets. Save as TotalPets.
  13. Write an SQL statement to display the last name, first name and email of any owner who has a NULL value for OwnerPhone. (Note: there should be one owner who has a NULL value for OwnerPhone.) Save as PhoneNull.
  14. Write an SQL statement to count the number of distinct breeds. Save as NumberOfBreeds.
  15. Write an SQL statement to display the names of all the dogs. Save as Dogs.

Responce 4(2)

I need at least 50 words responding to the following post.

 

 

In 1990, a guy by the name of David Koresh formed a group of followers who believed in the book of revelation as an apocalyptic in the New Testament of the bible who called themselves Branch Davidians.  Koresh was a high school drop out that possessed a young charismatic religious belief.  Koresh’s followers called him, “The Lamb of God.”  The group formed outside Waco, Texas in a well-built compound built to survive judgment day. 

A mailman, in 1992, noticed a partially opened package that contained grenades.  The mailman reported this to the Alcohol, Tobacco and Firearms (ATF).  An investigation was opened on the group and Koresh.  As a result, a search warrant was granted to search the compound of weapons and explosives. 

February 23, 1993, a 75 man tactical team formed outside the compound for a raid, which was met with force.  Four agents, and six of Koresh’s followers were killed.  This incident lasted for 5 days.  The Federal Bureau of Investigations (FBI) assumed control over the raid once it commenced.  The FBI started a raid them selves containing tear gas and armored vehicles.  All equipment being used in the raid was fire retardant and would not cause bodily harm to individuals inside. 

Time passed by and negotiations were initiated.  Attorney Janet Reno gave the order to commence with a full-scale attack at six o clock in the morning on April 19, 1993.  At five fifty five on the morning on April 19, 1993, FBI agents contacted the group to inform them a raid was in progress.  A member threw out a phone to negotiate but nearly six hours later everyone was dead.  Minutes passed by six o clock and the raid began in full force with tear gas plus armored vehicles crashing into walls as they crumbled to the ground.  At eleven forty five, a white sheet was hung outside a compound window that read in orange lettering, “We want our phones fixed.”  Noon approached and the compound walls from the outside were down and the interior roof had collapsed.  Shortly after the hour, smoke was reported as being seen by the FBI.  Flames began to spread throughout the compound but fire trucks arrived after thirty minutes passed and the building by then had entire collapsed in flames.  Twelve forty five arrived and the entire three-story compound was full of melted ammunition and grenades.  Helicopters began to carry out the victims burned in the fire and transported them to a nearby Hospital located in Dallas. 

Post interviews prints a very vivid story of the events in Waco, Texas surrounding the April 19, 1993 incident.  Established expert, Carlos Ghigliotti, an expert at thermal imaging and videotape analysis for the FBI believes the acts that day were not as stated to Congress.  Ghigliotti believes and FBI agent fired shots towards the compound during the raid.  After reviewing the footage from multiple angles, Ghigliotti believes without a doubt that shots were fired.  It’s understood that the Davidians fired shots but the FBI reported no shots being fired in their affidavit to Congress.  The rules of engagement were straightforward and its believed FBI agents fired multiple automatic weapons shots behind the compound out of media eyesight.  A notable mention would also be the note Koresh wrote surrendering himself after he completed his writing.  The use of military officials also showed the Posse Comitatus Act was violated in the use of millions of dollars worth of equipment and members. 

The leadership changes would have occurred by following protocol.  It seems as if the FBI wanted this incident over fast due to the rapid perception and media attention this was drawing.  I believe the leaders skipped a few steps in order to achieve the objective of ceasing this incident.  It could have been avoided if leaders would have communicated the correct information in order that the correct decisions and solutions would have been properly initiated.  The leadership changes should have occurred once the incident progressed over the course of the days.  The ATF jumped the gun with this one and the FBI covered up the dirty laundry so the perception is that all is well and the individuals in the compound caused the reckless acts of violence. 

 

References:

Leiby, R. and Vise, D.A. (October 6, 1999).  Expert Reaches Different Conclusion on Waco Events, Page A2.  The Washington Post Company.  Retrieved on July 22, 2014 from http://www.washingtonpost.com/wp-srv/national/daily/oct99/waco6.htm
Swanson, C. R., Territo, L., and Taylor, R. W. (2012). Police administration: structures, processes and behaviors (8th ed.). Upper Saddle River, NJ: Pearson

3-1 pet

  

Question 

· What is your company’s Inventory Carrying Cost rate? (Ask your Director of Logistics or the CFO.  If that’s not possible, provide an estimation using all 4 categories presented in class.)  Do you think it’s an accurate computation, a good estimate or a not-even-close estimate?  Recommend one action that should be taken to improve the accuracy of this number.

Reply to the students response in 150 words and provide 1 reference

Students response

Information received from my company is that our Inventory carrying cost is about 22%. In discussion with the VP, he indicated great confidence with the number as we utilize a global ERP system that integrates all information to determine that figure. 

A company’s inventory carrying cost can be described as the computation consisting of all the monetary resources in a company divided by the average annual proceeds. The monetary resources must include taxes and storage space of the inventory. The importance of inventory carrying cost is to determine how low or high the supply value is. This further determines the profitability of a company on an annual basis. Although this computation is not always reliable, a business or organization can ascertain that inventory management is part of company policies to increase sales and profitability.

Last in First Out (LIFO) and First in, First out (FIFO) are two types of inventory management. According to Stickney et al. (2009), companies in the US are always faced with decisions regarding which type of inventory management to use since both have advantages and disadvantages. However, LIFO is better because it computes tax in financial reports. Using either of these methods may provide a company with the required results, but it does not determine whether the inventory-carrying cost is accurate.

A good strategy targeted at mitigating this problem would be to keep the inventory levels as balanced as possible. An article titled, “How to Improve Inventory Carrying Costs and Management in the Supply Chain” states that control systems such as the computation of regular safety stock can also provide precise and reliable results. Another approach would be to have minimal inventory costs to pay off any pending loans and debts. This way, the company’s inventory and profit will increase. In essence, keeping company procedures and processes as simple as possible could also increase the accuracy of inventory cost estimation. As a consequence, this has the potential of also decreasing employee turnover and upsurging work motivation.

In conclusion, the inventory carrying cost provides a wide scope of what goes on in a business or company. For this reason, effective communication among employees and leaders should be paramount. Every worker should identify the needs of the company and deliver quality services. It is important to note that every business must also have a well-developed computer system to calculate the company’s inventory carrying the cost.

ISS DR4

 

Data Communication through Wireless Networks:

In this discussion we are learning about the data communication which has been occurring through the wireless networks or devices along with some of the advantages and disadvantages of those wireless transmission methods. In this article we are also discussing about some of the major applications of these wireless networks in the present society and their wireless application protocol. In present society most of the data transmissions are occurring because of the wireless computer networks between the network nodes. With the help of these wireless transmission methods the cost of organizations are reduced during the installation of business telecommunication networks. Before these wireless networks organizations are using some wired connection networks to transmit data or information from one place to another (Li, 2010).

Pros and Cons of Wireless Networking Systems:

Based on the usage of these wireless technologies in the present society there are so many pros and cons are available for the wireless data transmission methods in the business organizations. By using these wireless networks for data transmission we can transmit the information very quickly and accurately when compared to the wired networks. With the help of these wireless technologies we can access the data easily which is available from the various websites and databases. Employees can perform their work away from the office with the help of these wireless data transmission networks which are provided in the business organizations. Most of the security attacks are occurring in these wireless networks because data which is transmitted through these networks are done by using the internet connection. Some of the major problems that are occurring in these wireless transmission networks are speed, privacy and security issues in the present computational society (Paul, 2012).

Wireless Application Protocol:

The information or data which is accessing through the mobile phones by using some Wireless Application Protocols (WAP) which are mainly refers about the technical standard networks. Some of the web browsers like Wireless Application Protocols are used by the mobile devices like mobile phones, personal computers, laptops and tabs are using some protocols during the data transmission process. With the help of these WAP the services and opportunities of mobile devices are increasing rapidly from day by day in the present society (Zia, 2015).

Business Law Quiz

1) Which of the following is NOT true?

a. A minor can still disaffirm a contract for a reasonable time after reaching majority.

b. An adult cannot disaffirm a contract made with a minor.

c. A minor must pay the agreed price on a contract for necessaries.

d. What constitutes a necessary varies over time and can differ from state to state.

2) Usury laws are concerned with:

a. taxes paid

b. interest charged

c. uses of the labor force

d. contract purposes

3) Types of contracts that are commonly invalidated include the following EXCEPT:

a. immoral contracts

b. contracts in restraint of trade

c. contracts that impair family relations

d. contracts to commit a tort

e. contracts which result in competition with a valid preexisting business

4) Which of the following is generally true about exculpatory clauses?

a. They are not valid with respect to intentional acts.

b. The test is if they are reasonable in time, scope, and geographic area.

c. They are usually found to be invalid.

d. They are not valid for ordinary negligence.

5) Which of the following is NOT one of the needed elements of an unconscionable contract?

a. parties possessing severely unequal bargaining power

b. the dominant party’s unreasonable use of that bargaining power to obtain oppressive or manifestly unfair terms

c. an unreasonably short period of time for the oppressed party to perform

d. no reasonable alternative for the oppressed party

6) Mike, who is 16 years old, buys a motorcycle from Cycle Sellers, Inc. Assume that Mike pays $5,000 and that the fair value of the motorcycle at the time of purchase is $4,500. Which of the following is true?

a. This is an illegal contract because Mike is a minor.

b. This contract is void because Mike is a minor.

c. Even if Mike signs a statement as part of the contract that states, “I agree not to disaf firm this contract,” Mike may nonetheless disaffirm when he is 17 years old.

d. There was probably undue influence involved with this contract since Mike is a minor and the price charged was greater than the fair market value.

e. If a court decides that the motorcycle is a necessary, Mike will be obligated to pay the $5,000.

7) At age 16, Phil bought a car from Acme Auto Co. for $2,500. Phil drove the car for about six months, and then he had an accident. The damage to the auto was $1,500. In addition, the value of the auto before the accident was only $2,000. The accident was not Phil’s fault. Phil wishes to disaffirm the contract. Which of the following best describes this situation?

a. Because the car was damaged, Phil cannot disaffirm the contract.

b. Phil can disaffirm the contract, but he can recover only $500 of his money.

c. Phil can disaffirm the contract, but he can recover only $2,000 of his money.

d. Phil can disaffirm the contract and recover the entire $2,500.

e. Phil can disaffirm the contract, but he must first have the car repaired.

8) The courts have very broad powers to enforce or not enforce certain types of contracts. Which of the following statements best describes this power?

a. Contracts that are contrary to public policy are well defined by statutes.

b. The determination of what is unconscionable is very well established and follows very clear standards.

c. Exculpatory clauses and noncompete agreements sometimes violate public policy and sometimes do not.

d. To be contrary to public policy, the contract must violate a statute.

9) On your first spring break, you go in a bar after reading a large sign outside saying, “Beers $1.00 each all night long. If you can drink 30, they’re all freewe’ll pay for a taxi.” You pay for your beers as you drink, and you manage to drink 30 beers. The bar agrees that you drank 30 beers, but refuses to refund your money. You sue the bar. Which is most likely true?

a. This contract is voidable by the bar if you get so intoxicated while drinking the 30 beers that you don’t comprehend the nature of what you are doing.

b. The sign is an offer for a bilateral contract because both you and the bar must do something.

c. A court would ignore this contract on the basis of illegality even if it does not violate a specific statute.

d. There is no consideration on your part if you don’t pay for the beer.

10) Gertrude wants to buy a new car, but is short of money. She promises the salesperson that she will grant him sexual favors for the next year if he will give her an automobile. He agrees. She later changes her mind, and he seeks to enforce the contract. How will a court most likely rule on the matter?

a. It is a valid contract.

b. It is an illegal contract in violation of public law.

c. It is a void contract in violation of public policy.

d. It is a contract that may be voidable by Gertrude.

Criminal Justice discussion 200 word min. BD Deadline is 27 Oct 2013

Please use peer reviewed material and cite the source.  This is a response to this post listed below.

Will pay the 3.00 up fron to avoid your fees from PAYPAL

 

A)   The labeling theory is most important when it comes to children.  This theory has been around as early as the 1950’s with the work of Becker and Lemert.  Edwin Lemert made the distinction between primary deviance, and secondary deviance.  When children are in school around teachers and peers, they seem to transform or take on the role of the students they are around.  Most talkative students group together so they can talk.  A lot of children who misbehave seem to group together as well.  You can also add a child who is not so talkative to the same group who has been labeled as the “talkative group”, and eventually they will also assume that role along with the rest of the group.  Although there was no desire to change in the first place it still happened.  I have noticed as a parent that even my children change depending on whom they are “hanging” around at that time.  The activities they are interested in doing even change. For example I have a 12 year old and at home my other children have joked around and said she is going to be a bully.  She is a lot taller than the average 12 year old in 6th grade at the middle school she attends.  I have never had any sort of problems with her being anything but sweet, kind, and very friendly, she was the complete opposite of a bully.  The first year of middle school I got two parents knocking on my door (her former friends) saying she had been making fun of their children and also threatening to beat them up.  I take bullying very serious, but honestly before the second parent came I was on complete denial about it until the second parent came.  I asked my other children and they told me yes, they think she is because she is so tall and she had started hanging with a new crowd of girls and boys labeled as trouble makers, therefore she was also labeled as a troublemaker and actually became one (secondary deviance).  Needless to say I nipped that in the bud, and got to the root of the problem.  I never knew how much being called something could actually transform you into something that you are not.  Also add the fuel of a “bad” crowd can have major influence on individuals.    

 

5 pages Data must be used from the given attachments

Attached Files:

Using the IS alignment work and the financial analysis from week 6, submit a complete IS strategic plan. Your paper should include at least 5 references from peer-reviewed journals associated with how other companies are using the technologies you are recommending. The strategy should include the technologies you plan to implement, your plan for sourcing the IS work, and the governance model you plan to use to sustain the IS operation over the long term. You should include specific projects with a timeline for implementation in your strategy. Make sure you also include the financial analysis.Your IT strategy should also specify some key performance indicators (KPIs) to measure the effectiveness of IT. The website below can help you identify the KPIs for your strategy.

  • Website: ITIL Key Performance Indicators explains some of the key performance indicators used for IT service management in the ITIL governance framework.

Your total paper should be 5 pages of text in APA format, not counting the title and reference pages, and not counting any tables or figures. Make sure you include in-text citations. Please use the template attached above. In developing your IT strategy, please refer to the resources from previous weeks. A list of all the videos and other resources can be found under the Strategy Resources link on the main menu in this Blackboard course. You can reference these resources in your paper, but you must also reference at least 5 peer-reviewed articles.  Make sure on your references page you include a reference with the URL (weblink) to the case study you chose, in addition to at least 5 references from peer-reviewed journals.

The rubric for this assignment can be viewed when clicking on the assignment link

Negotiation and Conflict Resolution Gambling Allowance(Reply)

 

Casino Gambling isn’t legitimate for the greater part of the history. This didn’t prevent gambling clubs from developing. It offers an assortment of diversions which will offer huge pay-outs. There are numerous advantages and disadvantages in casino gambling. As indicated by the discussion, I am requested to cause elevate a bill to permit gambling in my state by utilizing distributive gambling. Distributive bargaining is otherwise called win-lose bargaining. It is an negotiation dealing that is utilized to choose how a settled source can be dispersed. In this segment, let us talk about a few advantages and disadvantages utilizing the distributive bargaining.

Gambling is a field that will pull in a considerable measure of top of the line clients. The stream of cash is extremely enormous. This will likewise help in making occupations and business openings. Casino is generally prestigious with enormous inns which will expand the chance of different administrations like bars, eateries, spas and so on. It contributes a considerable measure in expanding tourism as they give best administrations. There is a considerable measure of cash engaged with the gambling business sector. Most of the circumstances, the house have a superior edge thus prompting accepting a great deal of cash. This turns into an inconvenience for clients due to as much as there are individuals who win by gambling, the measures of individuals who spend and lose cash are more. This is leeway for has however an impediment for clients. By utilizing distributive bartering, the state has an awesome open door with increment in business and drawing in vacationers. Though hindrance to the clients is exclusively reliant on the client and they can burn through cash in view of their financial plan and ability and the effect of this con is low when contrasted with the positive effect of the expert.

Reference:

Pruitt, D. G., & Lewis, S. A. (2014). Development of integrative solutions in bilateral negotiation. Journal of Personality and Social Psychology, 31, 621-633.

BUSINESS LAW

1. John was driving his car in a careless way, failing to drive as a reasonably prudent person would under the driving conditions. Ramona was crossing the street in a careless way, failing to cross as a reasonably prudent person would. John struck and injured Ramona with the car John was driving. At the trial, it was determined that John was 80 percent at fault and Ramona was 20 percent at fault. The injuries sustained amounted to $100,000. Explain how much, if any, recovery Ramona would receive in a state that applies the contributory negligence rule. Do the same thing for a state that applies the comparative negligence rule.

 

2. An art collector commissioned an artist to create a sculpture for the collector. The artist wanted a substantial amount of money for the sculpture. This caused the collector some worry regarding possible dissatisfaction with the artwork once it was completed. To ensure that payment would be made only if the collector was satisfied with the sculpture, a condition was written into the commission contract. It required that the collector would have to be satisfied with the artwork, relying on the collector’s taste and judgment, before an obligation of payment would be created. The artist imagined that a collector could possibly refuse a creation of his and allowed the condition to be placed within the contract. At the completion of the sculpture, the collector claimed that she did not care for the artwork and therefore refused to pay. Can the artist force payment in this situation? Would it help if the artist could establish that the collector actually approves of the sculpture but has temporarily run short on funds, and that this is the true motivating factor in refusing to accept the sculpture?

 

3. Rundles,Kreiger, and Larson formed a partnership to breed and show horses. Rundles and Kreiger each contributed $25,000 to the partnership. Larson contributed four(4) horses valued at 25,000. The partnership agreement provided that the partners would share profits equally. When the horses failed to perform as expected, Rundles and Kreiger decided to reduce Larson’s share of the profits. Larson claims that this decision mut be unanimous to be binding. How will the case be decided?

 

4. The Miller family, who operates a musical instrument manufacturing concern, has decided to incorporate. The three (3) members of the Miller family, Mary, Mark and Sue, would like to become a corporation and obtain limited liability; however, taxation at the corporate level would be very costl for them. If possible, Mary Miller would rather be taxed as a partnership. Mark Miller is worried about the additional paperwork and meetings that incorporation would surely bring. Sue Miller does not want a large board of directions to be formed. Sue fears tha the board would somehow detract from the family goals and orientation the business has always enjoyed. In light of these concerns, is there a corporate form that would better suit the Miller family?

Unit III Article Review

In this unit, you learned about the doctrine of respondeat superior, which states that an employer may be held liable for the actions of his/her employees. For this assignment, you will choose a peer-reviewed article to review regarding this doctrine as it relates to the healthcare industry. Use the databases within the CSU Online Library, or use another reputable source that contains peer-reviewed articles. The purpose of this assignment is for you to practice reviewing articles that contribute to the industry. The authors of these articles are researchers and professionals who have shared or experimented with ideas that demonstrate potential to improve the industry. As a professional in the industry, it is in your best interest to review the literature and trends. This provides you with the opportunity to read about what was successful and how it was accomplished. Plus, it allows you to analyze what was unsuccessful, how you can improve it or at least how you can avoid repeating the mistakes of others. Use these skills to contribute to research papers and other scholarly writings. If you have not already, hopefully, you will contribute to the industry by publishing an article and sharing with your community of peers.
As you read the article you choose for this assignment, consider the following questions: How could the topic of this article apply to your personal or professional life? How could it apply to an organization you have observed?
The article you choose must meet the following requirements:
· Be peer reviewed
· Relate to the concepts within this course
· Be at least ten pages in length
The writing you submit must meet the following requirements:
· Be at least two full pages in length
· Identify the main topic/question
· Identify the author’s intended audience
· Summarize the article for page one
· Explain how the doctrine of respondent superior was depicted in your article. Was it discussed in a positive or negative light?
· Explain if it is logical to judge an employer for the actions of an employee? Why or Why not?