Discussion Question Student Reply

I need a 275 worrd reply to this students post. They answered the question and you must provide them feedback. This is due in 4 hours.

 

6-16 Identity three decisions that were improved by using big data.

The British Library is the largest library in the world by number of items cataloged. “Each year more than six million searches are generated by the British Library online catalog, and nearly 400,000 people visit the British Library reading rooms, looking for information.” Back in 2010, the average life expectancy of a website was just 44-75 days meaning that every six months 10 percent of web pages on the UK domain were lost. IBM BigSheets helped the British Library collect these at-risk of termination web pages before they could be lost for good. IBM BigSheets helps extract, annotate and analyze insane amounts of web information using a web browser. The analytic technology helped the British Library archive and preserve massive amounts of web pages before it they were gone forever.

Law enforcement was able to use big data to predict future crime patterns and become more proactive in efforts to fight crime before it occurs. The Durham (North Carolina) police department used IBM analytics to help reduce the amount of violent crime in a two square-mile region of the city by more than 50 percent during a four year span (2007-2011). “Through its work with IBM, the Charleston Police Department joins an elite group that includes New York, Vancouver, Northern Ireland, Memphis and many others that are using advanced analytics to gain a more accurate understanding of their data, detect patterns, preempt and forecast critical information to prevent incidents, and taking action in real time.

Vestas Wind Systems is a Danish manufacturer of wind turbines. It is also the largest in the world. Precise placement of a wind turbine can affect its performance and usefulness. Vestas uses big data for more accurate turbine placement decisions. “We gather data from 35,000 meteorological stations scattered around the world and from our own turbines…that gives us a picture of the global flow scenario.” This allowed them to establish a “wind library” where they can point to specific location at a specific time of day and tell you what the weather would be like at that location.

Source: http://www-01.ibm.com/software/ebusiness/jstart/portfolio/bl.html

https://www.policeone.com/police-products/software/Data-Information-Sharing-Software/articles/6396540-Rise-of-the-crime-analyst/

http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=IMC14702USEN&appname=wwwsearch

The United States of America is country with many diverse and great tourist destinations

The United States of America is country with many diverse and great tourist destinations Kirk Hinrich Red Jersey , from amazing Ney York city and Chicago sky-scrappers, to the countless wonders of nature in the United States National Parks. There are beautiful sunny beaches in Hawaii, Florida and California that will provide you enjoyable sunbathing and swimming experiences. US Travel is an exciting experience that everyone should enjoy in if such opportunity arises. Here are some United States Travel locations that everyone should see.
1. White house
This is home of the President of the USA, located in Washington DC, capital of the USA. White house is beautiful house built at the end of the 18th century, and has been first home to the president since John Adams. George Washington, the first president of the United States selected the site and it took 8 years to build. This is only presidential residence open for visitors. However, after 911 attack Kirk Hinrich Bulls Jersey , tourist tours in White house are under strict control.
2. Las Vegas
This is the number one gambling destination in the whole world! Las Vegas is located in the middle of Nevada desert. You will find numerous casinos all over the city, but the most spectacular and largest are those located on the Las Vegas Strip- Las Vegas Boulevard. Here are mega-casino hotels, decorated to tiniest details in a way to create magical atmospheres one has to see to get the idea just how majestic these hotels are. Names of the casinos are very creative, with an intention to increase mystery, romantic feel and imagination, and to motivate people to spend more money.
3. Florida Keys
This is group of tropical islands, which are located just below the Florida. This is definitely one of USA Top 100 locations thanks to their tropical beauty and spirit. Many of these islands are connected with net of bridges, most spectacular being Seven Mile bridge Womens Kirk Hinrich Jersey , which is often used as a movie making location. Bridges lead over numerous smaller and larger islands, leading to most famous, most beautiful and most distant one: Key West.
4. Orlando
This Beautiful city in Central Florida is where you will find the largest US Top Theme Parks for family fun. Here is the world famous Disney World, large movie studio of Universal Studios, the magical aquariums of Sea World and numerous other larger or smaller popular touristic attractions.
5. Hawaii
Hawaii is comprised of volcanic islands located in the middle of Pacific Ocean. These islands are tropical paradise with mild and pleasurable climate all through the year. Beautiful sandy US beaches, shade under palm trees and warm crystal-blue sea attract million of visitors every year, making it one of most popular USA Travel destinations. Hawaii is a popular for newlyweds as a perfect location for honeymoon along with being a great destination for most any vacation.

 

6. Los Angeles California
Los Angeles is second largest city in the USA, and largest one on the West Coast of America. This is city where movie history is made and it is home to many world famous movie stars. The City has distinct regions such as Hollywood and Beverly Hills are on everyone’s must-see destinations in Los Angeles. Long white sandy beaches Kirk Hinrich Authentic Jersey , mild climate and a wavy sea attract numerous surfers from around the world.
7. San Francisco
Dramatic and unusual scenery of a city located on several steep hills is one of reasons why this city is one of tourist must-see locations on a US Map. Old street cars, trolleys, trams still travel over steep streets. Highlight of the San Francisco visit is definitely a visit to Golden Gate Bridge.

 

Find more information relating to US Travel Planning Guide, and US Top Theme Parks here.

 

***Reserved for Ultimate_Writer**

Criteria

  18-20 Points

Proposed solution is appropriate to process and case study, is a SaaS product, and is convincingly justified. Clear and accurate description of proposed technology solution; covers how it meets functional and technical requirements; and an explanation of cost effectiveness is provided.  Uses course vocabulary. 

 

16-17 Points

Proposed solution is appropriate to process and case study, is a SaaS product, and is well justified. Concise description of proposed technology solution effectively covers functional and technical requirements and provides an explanation of cost effectiveness. 

 

14-15 Points

Proposed solution is appropriate to process and case study, is a SaaS product, and is justified. Adequate description of proposed technology solution is provided and includes functional and technical requirements and an explanation of cost effectiveness. 

12-13 points

Proposed technology solution description may be unclear or incomplete. Solution does not meet the business/IT requirements for Kelly’s Salon and/or is not a SaaS product.

0-11 Points

Proposed technology solution is not described or description cannot be understood; or few areas covered.

9-10 Points

This section includes a clear, complete, and accurate discussion of the arrangement to be made with the vendor and the associated costs; is clearly aligned to case study and technology solution; demonstrates thorough understanding of course vocabulary and concepts, analysis and critical thinking. 

8 Points

This section includes a clear discussion the arrangement to be made with the vendor and the associated costs; is aligned to the case study and technology solution; demonstrates understanding of course vocabulary and concepts, analysis and critical thinking. 

7 Points

The vendor agreement and costs are described and are appropriate to the case study and the proposed solution.

6 Points

The vendor agreement and costs are partially covered and/or are somewhat appropriate to the case study project; and may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking.

0-5 Points

Vendor agreement and costs are not included; very few details provided; or are not applicable to the case study or the proposed solution.

9-10 Points

The hardware and telecommunications needed at Kelly’s Salon and how they will be acquired are thoroughly covered and well aligned to the proposed solution and the case study; and clearly demonstrates an understanding of course vocabulary and concepts, analysis, and critical thinking. and critical thinking.

8 Points

The hardware and telecommunications needed at Kelly’s Salon and how they will be acquired are well covered and aligned to the proposed solution and the case study; and demonstrates understanding of course vocabulary and concepts, analysis, and critical thinking.

7 Points

The hardware and telecommunications needed at Kelly’s Salon and how they will be acquired are included and adequately aligned to the proposed solution and the case study.

6 Points

The hardware and telecommunications needed needed at Kelly’s Salon and how they will be acquired are not covered, and/or explanations are not aligned to the proposed solution; may be lacking in demonstration of understanding of course concepts, analysis, and/or critical thinking.

0-5 Points

The hardware and telecommunications needed at Kelly’s Salon and how they will be acquired are not included; are incorrectly addressed; or paper demonstrates little effort.

9-10 Points

 

Configuration options and who will configure the system, and how the system will be tested are fully and clearly explained and well aligned to the proposed solution and appropriate to the case study. 

8 points

Configuration options and who will configure the system, and how the system will be tested are clearly explained and are appropriate to the proposed solution and to the case study.

7 points 

Configuration options and who will configure the system, and how the system will be tested are appropriate to the proposed solution and the case study.

6 points 

Configuration options and who will configure the system, and how the system will be tested are somewhat appropriate to the proposed solution and/or the case study.

0-5 points 

Configuration options and who will configure the system, and how the system will be tested are not addressed correctly or are not appropriate to the proposed solution and/or the case study.

9-10 Points

Employee preparation and data migration are fully and clearly explained; and are well aligned to the proposed solution and to the case study; clearly demonstrates critical thinking.

8 Points

Employee preparation and data migration are explained well; and are clearly appropriate to the proposed solution and to the case study; demonstrates critical thinking.

7 Points

Employee preparation and data migration are explained; are appropriate to the proposed solution and to the case study.

6 Points

Employee preparation and data migration are partially explained; and/or are somewhat appropriate to the proposed solution and/or case study.

0-5 Points

Employee preparation and data migration are not addressed and/or are not appropriate to the proposed solution and/or case study.

9-10 Points

 

Users, their purposes and how they will be supported, and how the system will be maintained are fully explained and clearly aligned to the case study and the proposed solution;demonstrates sophisticated analysis, and critical thinking.

8 points 

Users, their purposes and how they will be supported, and how the system will be maintained are explained well and are aligned to the case study and the proposed solution;demonstrates analysis, and critical thinking.

7 points 

Users, their purposes and how they will be supported, and how the system will be maintained are explained. 

6 points 

Users, their purposes and how they will be supported, and how the system will be maintained are partially covered; and/or are somewhat appropriate for the solution and/or the case study.

0-5 points 

Users, their purposes and how they will be supported, and how the system will be maintained are not included; and/or are not appropriate to the proposed solution and/or the case study.

9-10 Points

Well-written conclusion that provides a compelling call to action for Kelly and includes several benefits to be expected from the project; demonstrates sophisticated analysis and critical thinking.

8 Points

Good conclusion that provides some call to action for Kelly and includes benefits to be expected from the project; demonstrates analysis and critical thinking.

7 Points

Conclusion provides some benefits to be expected without a strong call to action.

6 Points

Conclusion lacks clear action and benefits; conclusion is inadequate or incomplete or irrelevant to the solution and/or the case study.

0-5 Points

Conclusion poorly addressed.

9-10 Points

Two or more

external sources are appropriately incorporated and used effectively and includes vendor site for recommended solution. Sources used are relevant and timely and contribute to the analysis and support conclusions. References are listed and cited using APA style.

8 Points

At least one external resource is appropriately incorporated and used effectively and includes vendor site for recommended solution. Sources used are relevant and timely and contribute to the analysis and support conclusions. References are listed and cited using APA style.

7 Points

At least one external resource is used and properly incorporated. Reference is listed and cited using APA style.  Vendor site for recommended solution is used as a resource. 

6 Points

A source other than the textbook may be used, but is not properly incorporated or used, and/or is not effective or appropriate or vendor site not included; and/or does not follow APA style for references and citations.

0-5 Points

No external research incorporated; or reference listed is not cited within the text.

9-10 Points

Report is very well organized and is easy to read. An appropriate introduction sets the context including competitive strategy and business process being improved and what’s to come. Very few or no errors in sentence structure, grammar, and spelling; double-spaced, written to target audience and presented in a professional format. 

8 points

Report reflects effective organization; has few errors in sentence structure, grammar, and spelling; double-spaced, written to target audience and presented in a professional format. An appropriate introduction sets the context including competitive strategy and business process being improved and what’s to come. 

7 Points

Report has some organization; may have some errors in sentence structure, grammar and spelling. Report is double spaced and to target audience.  An introduction is provided.

6 Points

Report is not well organized, and/or contains several grammar and/or spelling errors; is not double-spaced and to target audience; and/or no introduction provided.

0-5 Points

Report is extremely poorly written, has many grammar and/or spelling errors, or does not convey the information.

Overall Score

 
 
 
 
 

week 6 case study

Case Study 2: ING Life 
Due Week 6 and worth 80 points

Read the case study titled “ING Life” found at the end of Chapter 7.

Write a three to four (3-4) page paper in which you:

  1. Assess the probable difficulties and risks associated with using a public infrastructure such as the Internet as part of a business solution.
  2. Analyze ING’s solution for providing security to determine if the solution is adequate or inadequate. Provide a rationale for your answer.
  3. Critique the extranet solution and recommend one (1) change to the solution to provide better connectivity to brokers.
  4. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Compare and contrast among local area and wide area network technologies and architectures.
  • Compare and contrast among data communication technologies that include transmission media, data link control protocols, and multiplexing.
  • Use technology and information resources to research issues in communication networks.
  • Write clearly and concisely about communication networks using proper writing mechanics and technical style conventions.

Click here to view the grading rubric.

 

Department Homeland Security-SBI Program*****Already A++ Rated Tutorial Use as Guide Paper*****

You have been hired as the Chief Security Officer for a local University.  For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised.  Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. 

Write a 8-10 page paper in which you:

Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. 

  1. Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. 
  2. Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats.  Include specifics on pricing and the level of support and maintenance that would be required.

Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. 

  1. Identify the laws that would be effective to convict offenders.  Determine what computer crime fighting government programs exist within your region that can complement your security operations.

Research the internet for computer forensics technology that can be used by the University. 

  1. Identify the types and determine the costs of technology that can be used for gathering electronic evidence, evidence from hardware, evidence from Firewalls, or cell phones.
  2. Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe federal computer-related laws and legislation.
  • Explain the techniques of computer criminals and hackers.
  • Describe organized crime and cyber terrorism crime.
  • Evaluate and explain the various methods of computer forensics and evidentiary gathering techniques.
  • Summarize the various types of computer crimes toward individuals.
  • Use technology and information resources to research issues in the investigation of computer crime.
  • Write clearly and concisely about computer crime investigation topics  using proper writing mechanics and technical style conventions.

week 9 essay plagiarism free with abstract

Assignment 5: Wireless Technology 
Due Week 9 and worth 80 points

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technologies and its role in today’s applications.   

Write a three to four (3-4) page paper in which you:

  1. Compare the pros and cons of 3G and 4G technology to determine the best uses of 3G and 4G technology in today’s applications.
  2. Describe how an enterprise would use 3G, 4G, WWAN, and WIAMX to improve business. Explain why they would use one (1) solution over the remaining three (3).
  3. Analyze the changes in 4G technology since the printing of the textbook in 2009 and identify those of importance for a user of 4G technology.
  4. Take a position on the following statement, “Wireless application protocol is a necessity for wireless communication organizations and their users.” Then, explain your position with supporting evidence.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

  • Compare and contrast among local area and wide area network technologies and architectures.
  • Use technology and information resources to research issues in communication networks.
  • Write clearly and concisely about communication networks using proper writing mechanics and technical style conventions.

Click here to view the grading rubric.

Case ITM 1

 

Data, Information, and Organizational Knowledge

Assignment Overview

Every company has, to a greater or lesser extent, an information subsystem — that is, a means by which it gathers data, interprets it, and makes it available to employees through a distribution system. Whether we are talking about marketing information, cost projections, accounting results, or internal quality reports, every company depends on knowledge to support its planning, decision-making, and control.

So how does knowledge fit into the picture? The emergence of the field called knowledge management has highlighted some key propositions in the last 10 years or so.

All organizations are storehouses of knowledge that operate in information-rich environments made up of people and things both inside and outside the organization itself

Organizations organize, interpret, and evaluate this information to solve organizational problems

Knowledge is the primary mechanism for processing and utilizing information

People’s brains are the key knowledge resource of any organization

Codified knowledge stored in books, audio, videotapes, and computer systems can be an important knowledge resource as well

There are organizational processes and strategies for IT management and management in general. Therefore, processes and strategies in particular can significantly enhance the ability of organizations to use their knowledge resources for problem solving

Several of these themes will come up again in later modules in this course. But by way of introduction to the subject, let’s take a look at some views of how knowledge works. Read and review each of the lectures in Frost’s Knowledge Management site to gain a good understanding of KM and its relation to data, information, and knowledge. 

Frost, A. (2015). Knowledge Management. KMT An Educational KM Site. Retrieved from http://www.knowledge-management-tools.net/

Leonard, D., & Swap, W. (2005). The Knowledge Coach. HBS Working Knowledge. Retrieved from:http://hbswk.hbs.edu/item/4562.html

Case Assignment

The Case assignment for Module 1 consists of two parts. Part I introduces the notion of computer basics. Part II analyzes the Kobuku Food Company which provides an opportunity to appreciate how companies use and differentiate among data, information, and knowledge.

Part 1:

Please review the following tutorials on computer basics and answer the questions below. The tutorials are located athttp://www.gcflearnfree.org/computerbasics

1.     What are computers?

2.     Understanding Operating Systems

3.     Understanding Applications

4.     Understanding the Cloud

After watching the videos, please answer the following questions in 2-3 pages.

1.     What operating system does your computer use?

2.     What are some examples of applications residing in your personal computer?

3.     Do you use any apps or websites now that you think are cloud-based?

4.     How is a web app different from a desktop application?

Part 2:

For part II of the assignment, read the required articles and then write a 3-5 page paper answering the Kokubu case study questions. Be sure your discussion demonstrates that you understand the meanings and differences between data, information, and knowledge. In your discussion, give a real-world example of data, knowledge, and information in the context of the Kokubu Food Company.

Kokubu management has asked you to be the company consultant and prepare a management analysis of the business to help assess the firm’s current situation and future plans. To familiarize yourself with Kokubu’s background, you should review the corporate information, functions and business, and social and environmental conservation activities in the website. Particular attention must be given to the functions and business link to appreciate how IT supports Kokubu operations and knowledge management activities within the company.

Review the Kokubu website at http://www.kokubu.co.jp/english/business/ and after finding the answers to the Case questions, prepare a summary in 3-5 pages analyzing the following questions.

·         What kind of organizational trends are evident in the Kokubu case when we consider the business environment, management, and technology?

·         Discuss the IT applications to the company operations as discussed in the website.

·         Why is the company considered to be customer focused?

·         The CEO said his company “created a culture where people are addicted to data, information, and knowledge.” What does he mean by that, and what are the benefits and drawbacks of such a culture?

As a reminder, you must have at least two outside scholarly references when you write cases.

Assignment Expectations

1.     Include Part I and Part II of the Case in one document, properly labeling each section.

2.     The Case assignment should be 5-8 pages in total excluding cover page and reference list.

Your assignments will be graded following these expectations:

·         Precision: the questions asked are answered.

·         Clarity: Your answers are clear and show your good understanding of the topic.

·         Breadth and depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.

·         Critical Thinking: It is important to read the “required readings” posted in the background material plus others you find relevant. Your paper should include important concepts from these readings and incorporate your reactions and examples that illustrate your reflective judgment and good understanding of the concepts.

·         Your paper meets the page requirements, excluding the cover page or the references pages.

 

 

Business ntelligence

As you do this assignment, consider the historical data visualization developed by Charles Minard describing Napoleon’s army march toward and eventual retreat from Moscow (Found in this week’s presentation).

Use your imagination to develop your own data visualization that displays several dimensions with a single plot.  (For example, color of data points can be used to categorize one dimension, while the size of the data point can represent a dimension related to magnitude.)

The assignment scoring is based on the originality of the display, the number of dimensions displayed, and readability.  The rubric for this assignment can be viewed when clicking on the assignment link.

Examples of this type of multidimensional visualization can be found at these website; however, for this assignment you are not creating a dashboard, but rather a single widget that will provide a minimum of 5 dimensions from a single data point. 

Website:

Video: Ted Talks –

  • http://www.ted.com/talks/david_mccandless_the_beauty_of_data_visualization

MYSQL

I am working on this homework using MYSQL database. Can you help. Attached is the homework question. 

 

Here is the scripts am using for the question. 

/* Database Systems, 9th Ed., Coronel/MOrris/Rob */
/* Type of SQL : MySQL */

CREATE SCHEMA TINY_VIDEO;

USE TINY_VIDEO;

/*Create table price*/
CREATE TABLE price
(price_id        INTEGER     PRIMARY KEY AUTO_INCREMENT,
 description     VARCHAR(20) NOT NULL,
 rental_fee      DECIMAL(5,2),
 daily_late_fee  DECIMAL(5,2));


/*Insert data into price*/
INSERT INTO price VALUES(1,'Standard',2.5,1);
INSERT INTO price VALUES(2,'New Release',4.0,3);
INSERT INTO price VALUES(3,'Discount',2.0,1);
INSERT INTO price VALUES(4,'Weekly Special',1.5,.5);


/*Create table movie*/
CREATE TABLE movie
(movie_id       INTEGER     PRIMARY KEY AUTO_INCREMENT,
 title          VARCHAR(75) NOT NULL,
 year_released  INTEGER,
 cost           DECIMAL(5,2),
 genre          VARCHAR(50),
 price_id       INTEGER,
 FOREIGN KEY(price_id) REFERENCES price(price_id));

/*Insert data into movie*/
INSERT INTO movie VALUES(1234,'The Cesar Family Christmas',2007,39.95,'FAMILY',2);
INSERT INTO movie VALUES(1235,'Smokey Mountain Wildlife',2004,59.95,'ACTION',3);
INSERT INTO movie VALUES(1236,'Richard Goodhope',2008,59.95,'DRAMA',2);
INSERT INTO movie VALUES(1237,'Beatnik Fever',2007,29.95,'COMEDY',2);
INSERT INTO movie VALUES(1238,'Constant Companion',2008,89.95,'DRAMA',NULL);
INSERT INTO movie VALUES(1239,'Where Hope Dies',1998,25.49,'DRAMA',3);
INSERT INTO movie VALUES(1245,'Time to Burn',2006,45.49,'ACTION',3);
INSERT INTO movie VALUES(1246,'What He Doesn''t Know',2006,58.29,'COMEDY',1);


/*Create table video*/
CREATE TABLE video
(video_id       INTEGER PRIMARY KEY AUTO_INCREMENT,
 purchase_date  DATE,
 movie_id       INTEGER,
 FOREIGN KEY(movie_id) REFERENCES movie(movie_id));

/*Insert data into video*/
INSERT INTO video VALUES(54321,'2008-06-18',1234);
INSERT INTO video VALUES(54324,'2008-06-18',1234);
INSERT INTO video VALUES(54325,'2008-06-18',1234);
INSERT INTO video VALUES(34341,'2007-01-22',1235);
INSERT INTO video VALUES(34342,'2007-01-22',1235);
INSERT INTO video VALUES(34366,'2009-03-02',1236);
INSERT INTO video VALUES(34367,'2009-03-02',1236);
INSERT INTO video VALUES(34368,'2009-03-02',1236);
INSERT INTO video VALUES(34369,'2009-03-02',1236);
INSERT INTO video VALUES(44392,'2008-10-21',1237);
INSERT INTO video VALUES(44397,'2008-10-21',1237);
INSERT INTO video VALUES(59237,'2009-02-14',1237);
INSERT INTO video VALUES(61388,'2007-01-25',1239);
INSERT INTO video VALUES(61353,'2006-01-28',1245);
INSERT INTO video VALUES(61354,'2006-01-28',1245);
INSERT INTO video VALUES(61367,'2008-07-30',1246);
INSERT INTO video VALUES(61369,'2008-07-30',1246);


/*Create table membership*/
CREATE TABLE membership
(membership_id INTEGER     PRIMARY KEY AUTO_INCREMENT,
 first_name    VARCHAR(30) NOT NULL,
 last_name     VARCHAR(30) NOT NULL,
 street        VARCHAR(120),
 city          VARCHAR(50),
 state         VARCHAR(2),
 zip           VARCHAR(5),
 balance       DECIMAL(10,2));

/*Insert data into membership*/
INSERT INTO membership VALUES(102,'Tami','Dawson','2632 Takli Circle','Norene','TN','37136',11);
INSERT INTO membership VALUES(103,'Curt','Knight','4025 Cornell Court','Flatgap','KY','41219',6);
INSERT INTO membership VALUES(104,'Jamal','Melendez','788 East 145th Avenue','Quebeck','TN','38579',0);
INSERT INTO membership VALUES(105,'Iva','Mcclain','6045 Musket Ball Circle','Summit','KY','42783',15);
INSERT INTO membership VALUES(106,'Miranda','Parks','4469 Maxwell Place','Germantown','TN','38183',0);
INSERT INTO membership VALUES(107,'Rosario','Elliott','7578 Danner Avenue','Columbia','TN','38402',5);
INSERT INTO membership VALUES(108,'Mattie','Guy','4390 Evergreen Street','Lily','KY','40740',0);
INSERT INTO membership VALUES(109,'Clint','Ochoa','1711 Elm Street','Greenville','TN','37745',10);
INSERT INTO membership VALUES(110,'Lewis','Rosales','4524 Southwind Circle','Counce','TN','38326',0);
INSERT INTO membership VALUES(111,'Stacy','Mann','2789 East Cook Avenue','Murfreesboro','TN','37132',8);
INSERT INTO membership VALUES(112,'Luis','Trujillo','7267 Melvin Avenue','Heiskell','TN','37754',3);
INSERT INTO membership VALUES(113,'Minnie','Gonzales','124 6th Street West','Williston','ND','58801',0);


/*Create table rental*/
CREATE TABLE rental
(rental_id     INTEGER PRIMARY KEY AUTO_INCREMENT,
 rental_date   DATE,
 membership_id INTEGER,
 FOREIGN KEY(membership_id) REFERENCES membership(membership_id));

/*Insert data into rental*/
INSERT INTO rental VALUES(1001,'2009-03-01',103);
INSERT INTO rental VALUES(1002,'2009-03-01',105);
INSERT INTO rental VALUES(1003,'2009-03-02',102);
INSERT INTO rental VALUES(1004,'2009-03-02',110);
INSERT INTO rental VALUES(1005,'2009-03-02',111);
INSERT INTO rental VALUES(1006,'2009-03-02',107);
INSERT INTO rental VALUES(1007,'2009-03-02',104);
INSERT INTO rental VALUES(1008,'2009-03-03',105);
INSERT INTO rental VALUES(1009,'2009-03-03',111);


/*Create table detailrental*/
CREATE TABLE detail_rental
(rental_id      INTEGER,
 video_id       INTEGER,
 fee            DECIMAL(5,2),
 due_date       DATE,
 return_date    DATE,
 daily_late_fee DECIMAL(5,2),
 PRIMARY KEY(rental_id, video_id),
 FOREIGN KEY(rental_id) REFERENCES rental(rental_id),
 FOREIGN KEY(video_id)  REFERENCES video(video_id));

/*Insert data into dailyrental*/
INSERT INTO detail_rental VALUES(1001,34342,2,'2009-03-04','2009-03-02',1);
INSERT INTO detail_rental VALUES(1001,61353,2,'2009-03-04','2009-03-03',1);
INSERT INTO detail_rental VALUES(1002,59237,3.5,'2009-03-04','2009-03-04',3);
INSERT INTO detail_rental VALUES(1003,54325,3.5,'2009-03-04','2009-03-09',3);
INSERT INTO detail_rental VALUES(1003,61369,2,'2009-03-06','2009-03-09',1);
INSERT INTO detail_rental VALUES(1003,61388,0,'2009-03-06','2009-03-09',1);
INSERT INTO detail_rental VALUES(1004,44392,3.5,'2009-03-05','2009-03-07',3);
INSERT INTO detail_rental VALUES(1004,34367,3.5,'2009-03-05','2009-03-07',3);
INSERT INTO detail_rental VALUES(1004,34341,2,'2009-03-07','2009-03-07',1);
INSERT INTO detail_rental VALUES(1005,34342,2,'2009-03-07','2009-03-05',1);
INSERT INTO detail_rental VALUES(1005,44397,3.5,'2009-03-05','2009-03-05',3);
INSERT INTO detail_rental VALUES(1006,34366,3.5,'2009-03-05','2009-03-04',3);
INSERT INTO detail_rental VALUES(1006,61367,2,'2009-03-07',NULL,1);
INSERT INTO detail_rental VALUES(1007,34368,3.5,'2009-03-05',NULL,3);
INSERT INTO detail_rental VALUES(1008,34369,3.5,'2009-03-05','2009-03-05',3);
INSERT INTO detail_rental VALUES(1009,54324,3.5,'2009-03-05',NULL,3);
INSERT INTO detail_rental VALUES(1001,34366,3.5,'2009-03-04','2009-03-02',3);

 

plagiarism free week 7 and prove read..also require an abstract page

A large, fast-food chain unveiled a new touch screen register for its franchises. Each cashier was assigned a user id and password combination to log in to the register. The system allowed the incorrect password to be entered four (4) times before the register would lock and require a manager to unlock it with a key card. To prevent unauthorized access, the registers would lock after three (3) minutes if the screen was not touched. When the register locked, only the cashier who was logged in prior to it locking could unlock it without a system restart. 
After a few days in operation, restaurant managers started complaining about the amount of time they were spending unlocking the registers. Some cashiers were forgetting their user Id and password, so other cashiers would log in for them. It also seemed that the button layout made it easy for the cashiers to key in the incorrect password. The managers also complained that cashiers would leave for a break or end their shift and forget to log out of the locked register. The managers would have to reboot the system, a three to five (3-5) minute process in order for the next cashier to log in. Additionally, managers noticed that grease was building up on the touch screens, making them less responsive.
 
Write a five to eight (5-8) page paper in which you:  
  1. Analyze the new system and determine the design issues with this new system.
  2. Describe how you would correct the design issues with the system to make the restaurant managers happy.
  3. Create a design plan that:  
    1. Lists and explains the tasks associated with improving this interface. 
    2. Contains at least six (6) tasks.
    3. Includes realistic time estimates for each task to be completed.
    4. Analyzes the development of the system in your plan.
    5. Analyzes the testing of the system in your plan.
    6. Analyzes the implementation of the system in your plan.  
  4. Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.
  5. Suggest changes that could be made to the security of this system to still meet security objectives but make the system more usable.
  6. Use Microsoft Visio or an open source alternative, Dia, to create a graphical representation of your proposed interface. Note: The graphically depicted solution is not included in the required page length.
  7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 
Your assignment must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Excel, Visio, MS Project, or one of their equivalents such as Open Project, Dia, and OpenOffice. The completed diagrams/charts must be imported into the Word document before the paper is submitted. 
The specific course learning outcomes associated with this assignment are:
  • Describe the usability properties of interactive systems.
  • Describe the inherent design issues across HCI environments
  • Develop an interface `
  • Use technology and information resources to research issues in human-computer interaction.
  • Write clearly and concisely about HCI topics using proper writing mechanics and technical style conventions.