Laptop Versus Tablet: Which One to Buy?

Case Study 1: Laptop Versus Tablet: Which One to Buy?

 

Due Week 3 and worth 120 points

 

Read the case study in Chapter 2 titled “Laptop Versus Tablet: Which One to Buy.”

 

Write a two to three (2-3) page paper in which you:

 

  1. Explain the main factors that you should consider before deciding whether to buy a laptop or a tablet.
  2. Identify the key features of a laptop and a tablet. Next, discuss three (3) important characteristics of each that might influence your decision.
  3. Identify three (3) best-selling tablets on the market, and decide on the one that you would like to buy. Justify your response.
  4. Use at least two (2) quality references. Note: Wikipedia and other Websites do not quality as academic resources.

 

Your assignment must follow these formatting requirements:

 

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 

The specific course learning outcomes associated with this assignment are:

 

  • Describe how and why information systems are used today.
  • Demonstrate an understanding of the technology, people, and organizational components of information systems.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about management information systems using proper writing mechanics

 

Click here to view the grading rubric.

 

ITM SLP 1

ITM SLP 1

Data, Information, and Organizational Knowledge

The SLPs for Modules 1-3 will introduce you to Microsoft Excel functions for cell formatting and applying simple formulas and functions, basic pivot tables, and what-if equations. You will also explore how Excel reports are represented in data tables, charts, and graphs. Whether you are a novice or have already an understanding of Excel, these exercises will help you acquire and/or refresh Excel skills.

As most of you know, Excel is a powerful application that is used worldwide, and learning Excel skills are important to your career in Information Technology Management. Among the many tasks, Excel is used to work as a calculator and to perform higher math and statistical functions. Since you will be working on different Excel exercises each week, you will be watching the assigned videos first and then completing the exercises step by step.

For a quick introduction to Excel menus, please review the following Lynda.com video. You do not need to start a free trial, but if you want, Lynda.com offers a 10 day free-trial to review the lessons. You can always rejoin the site after that period is over.

http://www.lynda.com/Excel-tutorials/Using-menu-system/116478/125009-4.html

Excel files are called workbooks and are created each time you start a new worksheet. Multiple workbooks can be created within a single file. If you save Excel files to your local drive, you are the only one that can access them; however, if you save them to the cloud using OneDrive, you can export and share them with others. Excel is designed to enter information in cells. A cell is intersection a column and a row. For instance, column A and row 5 create a cell with an address of A5. Page layout is one of the most important features, and a good document presentation depends on correct page layout. The page orientation and margin size allow you to control your documents. Page orientation options are landscape and portrait.

SLP 1 will begin by introducing you to some Excel basic functions as follows.

·         Home – The home tab provides access to most common used commands for working with data.

·         Insert – The insert tab provides ability to insert charts, tables, Sparkline, filter, and more.

·         Page layout – The page layout tab is to change the print formatting of workbook, including margin width, page orientation,    and themes.

·         Formulas – The formulas tab gives access to useful functions and formulas, and calculate and analyze numerical data, such as average and percentage.

·         Data – The data tab is for sorting and filtering information in the workbook.

·         Review – The review tab is a powerful editing feature like inserting comments and tracking changes.

·         View – The view tab is for switching between different views of the workbook and freezing panes.

·         Contextual – Contextual tabs will appears on Ribbon when you working with tables and pictures.

Next, you will review the following link containing a series of videos to prepare you for the SLP exercises. Refer to tutorials at http://www.gcflearnfree.org/excel2013

1.     Getting Started with Excel

2.     Creating Opening Workbooks

3.     Saving and Sharing Workbooks

4.     Cell Basics

5.     Modifying Columns, Rows, and Cells

6.     Formatting Cells

7.     Worksheet basics

8.     Page Layout

9.     Printing Workbooks

 

In this module, you will be acquainted with an introduction to Excel and some of its basic functions. After watching the recommended videos, perform the following:

 

1.     Open the Excel software, you will see a blank worksheet, click on file, save as, browser to your local C: drive, type “Module1-exercise” in the file name section, and OK to save it to hard drive.

2.     Close the worksheet.

3.     Click to locate and the assignment file “Module1-excericse” and open it.

4.     Enter the following data into the worksheet, starting from A2 on the left side, and perform the functions below. Save the file again on your local drive.

 

Add these numbers in row:

 

 

A

B

C

D

E

5

9

75

51

 

 

 

 

 

 

421

700

985

854

 

 

 

 

 

 

3352

6578

99655

9876

 

13

15

17

21

 

 

Add these numbers in column:

A

  B

  C

2

1

254

23

3

7523

2

3

234

7

48

105

23

68

22

 

 

 

 

5.     Locate your file on the local drive.

6.     Use Save As to make a copy  as “Module 1- Exercise 2.” 

7.     Enter the following data and use Calibri font size 11″ and AutoFit text to column width.  

8.     Change the fonts and size to Georgia and 14″, then AutoFit to column width again. 

·         Jack Johnson

·         Rayon Robinson

·         Alex Hollywood

Change page orientation and change margin to “narrow.” Save the file. 

 

Desire margin:  Narrow.

Save your file.

 

After completing the Excel exercises, please upload the Excel file with your results to SLP 1 Dropbox.

SLP Assignment Expectations

Your assignments will be graded following these expectations:

·         The assignment file must be developed in Excel and saved as .xls file.

·         Precision: the questions asked are answered.

·         Clarity: Your answers are clear and show your good understanding of the topic.

·         Breadth and depth: The scope covered in your paper is directly related to the questions of the assignment and the learning objectives of the module.

·         Critical Thinking: It is important to read the “required readings” posted in the background material plus others you find relevant. Your paper should include important concepts from these readings and incorporate your reactions and examples that illustrate your reflective judgment and good understanding of the concepts.

 

 

Week 6 Assignment 2 SKIP TO COURSE MENU SKIP TO TOP FRAME TABS Content Week 6 Assignment 2 Submission Click the link above to submit your assignment. Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center. Instructors, t

Content

  •  

    Click the link above to submit your assignment.

    Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center.

    Instructors, training on how to grade is within the Instructor Center.

    Assignment 2: Normalization

    Due Week 6 and worth 100 points

    Suppose that you are the database developer for a local college. The Chief Information Officer (CIO) has asked you to provide a summary of normalizing database tables that the IT staff will use in the upcoming training session. 

    Write a two to three (2-3) page paper in which you:

    1. Describe the steps that you would use in order to convert database tables to the First Normal Form, the Second Normal Form, and the Third Normal Form.
    2. Provide one (1) example that is relevant to a college environment that illustrates reasons for converting database tables to the First, Second, and Third Normal Forms.
    3. Explain typical situations when denormalizing a table is acceptable. Provide one (1) example of denormalizing a database table to justify your response.
    4. Explain the significant manner in which business rules impact both database normalization and the decision to denormalize database tables.
    5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

    Your assignment must follow these formatting requirements:

    • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
    • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 

    The specific course learning outcomes associated with this assignment are:

    • Recognize the purpose and principles of normalizing a relational database structure.
    • Design a relational database so that it is at least in 3NF.
    • Use technology and information resources to research issues in database systems.
    • Write clearly and concisely about relational database management systems using proper writing mechanics and technical style conventions.

Professional Communications Assignment 7: Annotated Bibliography

This assignment allows you to explore more scholarly research; in addition, it provides the opportunity to practice writing summaries and documenting IEEE references.

 

For this assignment, locate and read seven scholarly articles on a topic of interest in Information Systems. Next, create an annotated bibliography with all of your articles. Annotated bibliographies contain an alphabetical list of your references (by author’s last name), with a summary of each article following each reference. Summaries typically include the following items:

 

1.       Explanation of main points, purpose, and methodology of the work, which demonstrates that you have read and understand the source.

2.       Verification of the authority or qualifications of the author.

3.       Usefulness of article for researchers, or statement of strengths and weaknesses.

 

Summaries should be no longer than four sentences. One single entry looks like this:

 

I. T. Ozbolat and Y. Yu, “Bioprinting toward organ fabrication: challenges and future trends,” IEEE Trans. Biomed. Eng.,vol. 60, pp. 691-699, Mar. 2013. 

 

In this article, the authors, both of whom have PhDs in Biomedical Engineering, discuss current practices in 3D organ printing and predict future trends. They surveyed 50 biomedical labs and concluded that current practices are unstable due to lack of regulation. In addition, they predict that with better regulation, printed organs could be utilized for transplants in the human body by 2020. This article is useful for recent graduates and regulatory agencies.

 

Upload your Annotated Bibliography in BB by Week 6 class time. Also bring a printed copy to class.

 

 

Component

Grading Criteria

Points Possible

Points Awarded

Research Report

Content (meets purpose of assignment as described above)

 

50

 

Quality of Research (contains credible research, documents research correctly – IEEE style)

20

 

Clarity of Writing (writing is clear and concise)

 

40

 

Quality of Writing (writing contains few mechanical or grammatical errors)

40

 

Total

 

150

 

 

 

 

Annotated Bibliographies:

 

Instructions and Sample: http://www.ee.ryerson.ca/~jasmith/courses/bme100/docs/2010/Tutorial1_annotated_bibliographies.pdf

 

 

Template: https://www.overleaf.com/latex/templates/annotated-bibliography-template/zycfqzgqyzgk#.V4Ti97grKM8

ITNA359 Network Administration – unit 5 IP

In this assignment, you will use the course materials and the Web to research host IP addressing conflicts and preventative network solutions.

Assignment Guidelines

   Research IP addressing with regard to conflicts and DHCP, and use the following questions as a guideline for your paper:

                           If two hosts in a network are assigned the same IP addresses, what will happen? Explain.

                           How can an improperly configured DHCP contribute to this type of problem?

                           In your own words, how would you describe the DHCP configuration parameter that is used to reserve IP addresses for hosts in a network?

   The content of your research paper should be written in a double-spaced Word document of 3–7 pages.

                           This does not include a title page or a list of references.

   You may use section headings and bullets to organize your research paper.

   All in-text citations and references should be in APA format.

Your submitted assignment (125 points) must include the following:

   A double-spaced research paper of 3–7 pages that addresses the 3 questions listed in the assignment guidelines with regard to IP addressing conflicts and DHCP

   A title page that includes your name, course number, and unit number

   A reference list in APA format

Grading                 

You will be graded on the accuracy of your answers, your demonstrated understanding of IP conflicts, and how well your paper adheres to the assignment guidelines listed above.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

 

 

1-3 tess

 

reply to the students’ response and not the question  in 150 words minimum and provide 1 reference. Respond to the students response as though you are talking to them, use name 

question

  Are the three main elements of compensation systems—internal consistency, market competitiveness, and recognizing employee contributions—equally important, or do you believe that they differ in importance? If different, which do you believe is most important? Least important? Give your rationale. 

students response

 

All of the elements of the compensation system are equally important.  You want all of your employees to feel that they are contributing to the organization in the work they are doing.  This value in the job motivates them to work harder for the organization.  When looking at the market for compensation, an organization wants to ensure that they are able to retain those people that they have already invested in  (Martocchio, J. (2017) .  Another piece is to ensure that we are recognizing the employee appropriately for the job they are doing for the organization.  If they feel their contributions to the organization’s success are not valued they will go somewhere else where it is valued.  This will start a cycle of constant turnover and turmoil in an organization.  

After working in organizations that didn’t value the knowledge, skills, and ability that it’s employees bring to the table and only look at a fixed rank structure, this hits close to home.  Some of our enlisted militaries have as much as or more education than our officers and they have years of job experience.  When we don’t value what they have to offer the organization we are selling ourselves short and not capitalizing on our resources.

Martocchio, J. (2017). Strategic Compensation: A human resource management approach (9th ed.). Upper Saddle River, NJ: Pearson.

Identifying Potential Malicious Attacks, Threats and Vulnerabilities

Assignment 1: Identifying Potential Malicious Attacks, Threats and Vulnerabilities

Due Week 4 and worth 75 points

You have just been hired as an Information Security Engineer for a videogame development company. The organization network structure is identified in the below network diagram and specifically contains:

1) 2 – Firewalls

5) 2 – Windows Server 2012 Active Directory Domain Controllers (DC)

2) 1 – Web / FTP server

6) 3 – File servers

3) 1 – Microsoft Exchange Email server

7) 1 – Wireless access point (WAP)

4) 1 – Network Intrusion Detection System (NIDS)

8) 100 – Desktop / Laptop computers

 

9) VoIP telephone system

Network Diagram

The CIO has seen reports of malicious activity being on the rise and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first tasks with the organization, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. Further, the CIO would like you to briefly explain each item and the potential impact it could have on the organization. 

Write a four to five (4-5) page paper in which you:

  1. Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.
  2. Explain in detail the potential impact of the three (3) selected malicious attacks.
  3. Propose the security controls that you would consider implementing in order to protect against the selected potential malicious attacks.
  4. Analyze three (3) potential concerns for data loss and data theft that may exist in the documented network.
  5. Explicate the potential impact of the three (3) selected concerns for data loss and data theft.
  6. Propose the security controls that you would consider implementing in order to protect against the selected concerns for data loss and data theft.
  7. Use at least three (3) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Explain the concepts of information systems security as applied to an IT infrastructure.
  • Describe the principles of risk management, common response techniques, and issues related to recovery of IT systems.
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions. 

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Click hereto access the rubric for this assignment.

module review 8.5 part 2

Mark Grossman, a Florida attorney who specializes in computer and Internet law, gives answers to some basic questions.

 

Scenario 1

Nobody told you that your Internet use in the office was being monitored. Now you’ve been warned you’ll beyou’ll be fired if you use the Internet for recreational surfing again. What are your rights?

 

Bottom Line: When you’re using your office computer, you have virtually no rights. You’d have a tough time convincing a court that the boss invaded your privacy by monitoring your use of the company PC on company time. You should probably be grateful you gto a warning.

 

Scenario 2

Your employees are abusing their Internet privileges, but you don’t have an Internet usage policy. What do you do?

 

Bottom Line: Although the law ins’t fully developed in this area, courts are taking a straightforward approach: If it’s a company computer, the company can control the way it’s used. You don’t need an Internet usage policy ot prevent inappropriate use of your company computers. To protect yourself in the future, distribute an Internet policy to your employees as soon as possible.

 

Scenario 3

Employee John Doe downloads adult material to his PC at work, and employee Jane Smith sees it. Smith then proceeds to sue the company for secual harassment. As the employer, are you liable?

 

Bottom Line: Whether it comes from the Internet or from a magazine, adult material simply has no place in the office. So Smith could certainly sue the company for allowing a sexually hostile environment. The best defense is for the company to have an Internet usage policy that prohibits visits to adult sites. Of course, ou have to follow through. If someone is looking at adult material in the office, you must at least send the offending employee a written reprimand. If the company lacks a strict Internet policy, though, Smith could prevail in court.

 

A. Do you agree with the advice of attorney Mark Grossman in each of the scenarios? Why or Why not.

 

B. What would your advice be? Explanin your positions.

 

C. Identify any ethical principles you may be using in exxplaining your position in each of the scenarios.

 

Assignment 3: Mobile Computing and Social Networking

Assignment 3: Mobile Computing and Social Networking 
Due Week 7 and worth 75 points 
Mobile computing has dramatically changed how information is accessed and shared. Wireless networking has been an enabler of mobile computing. One profession that mobile computing has had a big impact on is health care management. Patients are now able to monitor their vital signs such as blood pressure, glucose levels, etc. without having to periodically visit a doctor’s office or hospital. There are devices such as the Withings Blood Pressure Monitor that works with an iPhone, iPod Touch, or iPad to record, track, and graph a patient’s blood pressure. There are other devices that can measure blood glucose levels, oxygen levels, heart rate, etc. and use an iPhone to send the results to a clinical server. Doctors and caregivers are then able to access the data on the clinical server. According to the American College of Gastroenterology, social networking sites like Facebook, Twitter, and YouTube are used as powerful platforms to deliver and receive health care information. Patients and caregivers are increasingly going online to connect and share experiences with others with similar medical issues or concerns Patients are able to take advantage of social networks to do more than just share pictures and tweets. Write a four to five (4-5) page paper in which you:

  1. Compare and contrast monitoring of patient vital signs using mobile computing technology to in-patient visits to the doctor’s office or hospital.
  2. Analyze the advantages and disadvantages of using mobile computing technology to monitor patients.
  3. Assess the security concerns with regard to the transmission of personal medical information over wireless networks.
  4. Assess the use of social networking for group support for patients with similar medical concerns.  
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

 

  • Describe the use of network management, Web, wireless, and mobility technologies.
  • Outline the strategic implications of information assurance and security in an information technology environment.
  • Use technology and information resources to research issues in information systems and technology.
  • Write clearly and concisely about topics related to information systems for decision making using proper writing mechanics and technical style conventions.

Can you help please.

I am working on the assignment using MYSQL. 

Here the scripts and attached is the questions. THIS SHOULD BE DONE USING MYSQL.

 

/*SQL script to create the PREMIERE database and associated tables and then load the data*/

/*Create the database and switch to it*/
CREATE DATABASE PREMIERE;

USE PREMIERE;

/*Create REP table*/
CREATE TABLE rep (
  rep_num    CHAR(2)  PRIMARY KEY,
  last_name  VARCHAR(15) NOT NULL,
  first_name VARCHAR(15),
  street     VARCHAR(15),
  city       VARCHAR(15),
  state      CHAR(2),
  zip        CHAR(5),
  commission DECIMAL(7,2),
  rate       DECIMAL(3,2) 
);


/*Create CUSTOMER table*/
CREATE TABLE customer (
  customer_num  CHAR(3)  PRIMARY KEY,
  customer_name VARCHAR(35) NOT NULL,
  street        VARCHAR(15),
  city          VARCHAR(15),
  state         CHAR(2),
  zip           CHAR(5),
  balance       DECIMAL(8,2),
  credit_limit  DECIMAL(8,2),
  rep_num       CHAR(2),
  FOREIGN KEY (rep_num) REFERENCES rep(rep_num)
);


/*Create ORDERS table*/
CREATE TABLE orders (
  order_num    CHAR(5) PRIMARY KEY,
  order_date   DATE,
  customer_num CHAR(3),
  FOREIGN KEY (customer_num) REFERENCES customer(customer_num)
);


/*Create PART table*/
CREATE TABLE part (
  part_num    CHAR(4) PRIMARY KEY,
  description VARCHAR(15),
  on_hand     DECIMAL(4,0),
  class       CHAR(2),
  warehouse   CHAR(1),
  price       DECIMAL(6,2)
);


/*Create ORDER_LINE table*/
CREATE TABLE order_line (
  order_num    CHAR(5),
  part_num     CHAR(4),
  num_ordered  DECIMAL(3,0),
  quoted_price DECIMAL(6,2),
  PRIMARY KEY (order_num, part_num),
  FOREIGN KEY (order_num) REFERENCES orders(order_num),
  FOREIGN KEY (part_num)  REFERENCES part(part_num)
);


/*Insert data into tables*/
INSERT INTO rep VALUES ('20','Kaiser','Valerie','624 Randall','Grove','FL','33321',20542.50,0.05);
INSERT INTO rep VALUES ('35','Hull','Richard','532 Jackson','Sheldon','FL','33553',39216.00,0.07);
INSERT INTO rep VALUES ('65','Perez','Juan','1626 Taylor','Fillmore','FL','33336',23487.00,0.05);

INSERT INTO customer VALUES ('148','Al''s Appliance and Sport','2837 Greenway','Fillmore','FL','33336',6550.00,7500.00,'20');
INSERT INTO customer VALUES ('282','Brookings Direct','3827 Devon','Grove','FL','33321',431.50,10000.00,'35');
INSERT INTO customer VALUES ('356','Ferguson''s','382 Wildwood','Northfield','FL','33146',5785.00,7500.00,'65');
INSERT INTO customer VALUES ('408','The Everything Shop','1828 Raven','Crystal','FL','33503',5285.25,5000.00,'35');
INSERT INTO customer VALUES ('462','Bargains Galore','3829 Central','Grove','FL','33321',3412.00,10000.00,'65');
INSERT INTO customer VALUES ('524','Kline''s','838 Ridgeland','Fillmore','FL','33336',12762.00,15000.00,'20');
INSERT INTO customer VALUES ('608','Johnson''s Department Store','372 Oxford','Sheldon','FL','33553',2106.00,10000.00,'65');
INSERT INTO customer VALUES ('687','Lee''s Sport and Appliance','282 Evergreen','Altonville','FL','32543',2851.00,5000.00,'35');
INSERT INTO customer VALUES ('725','Deerfield''s Four Seasons','282 Columbia','Sheldon','FL','33553',248.00,7500.00,'35');
INSERT INTO customer VALUES ('842','All Season','28 Lakeview','Grove','FL','33321',8221.00,7500.00,'20');

INSERT INTO orders VALUES ('21608','2007-10-20','148');
INSERT INTO orders VALUES ('21610','2007-10-20','356');
INSERT INTO orders VALUES ('21613','2007-10-21','408');
INSERT INTO orders VALUES ('21614','2007-10-21','282');
INSERT INTO orders VALUES ('21617','2007-10-23','608');
INSERT INTO orders VALUES ('21619','2007-10-23','148');
INSERT INTO orders VALUES ('21623','2007-10-23','608');

INSERT INTO part VALUES ('AT94','Iron',50,'HW','3',24.95);
INSERT INTO part VALUES ('BV06','Home Gym',45,'SG','2',794.95);
INSERT INTO part VALUES ('CD52','Microwave Oven',32,'AP','1',165.00);
INSERT INTO part VALUES ('DL71','Cordless Drill',21,'HW','3',129.95);
INSERT INTO part VALUES ('DR93','Gas Range',8,'AP','2',495.00);
INSERT INTO part VALUES ('DW11','Washer',12,'AP','3',399.99);
INSERT INTO part VALUES ('FD21','Stand Mixer',22,'HW','3',159.95);
INSERT INTO part VALUES ('KL62','Dryer',12,'AP','1',349.95);
INSERT INTO part VALUES ('KT03','Dishwasher',8,'AP','3',595.00);
INSERT INTO part VALUES ('KV29','Treadmill',9,'SG','2',1390.00);

INSERT INTO order_line VALUES ('21608','AT94',11,21.95);
INSERT INTO order_line VALUES ('21610','DR93',1,495.00);
INSERT INTO order_line VALUES ('21610','DW11',1,399.99);
INSERT INTO order_line VALUES ('21613','KL62',4,329.95);
INSERT INTO order_line VALUES ('21614','KT03',2,595.00);
INSERT INTO order_line VALUES ('21617','BV06',2,794.95);
INSERT INTO order_line VALUES ('21617','CD52',4,150.00);
INSERT INTO order_line VALUES ('21619','DR93',1,495.00);
INSERT INTO order_line VALUES ('21623','KV29',2,1290.00);