Lab 6 CIS 275

USE IMDB    — ensures correct database is active

GO

PRINT ‘|—‘ + REPLICATE(‘+—-‘,15) + ‘|’

PRINT ‘Read the questions below and insert your queries where prompted.  When  you are finished,

you should be able to run the file as a script to execute all answers sequentially (without errors!)’ + CHAR(10)

PRINT ‘Queries should be well-formatted.  SQL is not case-sensitive, but it is good form to

capitalize keywords and table names; you should also put each projected column on its own line

and use indentation for neatness.  Example:

   SELECT Name,

          CustomerID

   FROM   CUSTOMER

   WHERE  CustomerID < 106;

All SQL statements should end in a semicolon.  Whatever format you choose for your queries, make

sure that it is readable and consistent.’ + CHAR(10)

PRINT ‘Be sure to remove the double-dash comment indicator when you insert your code!’;

PRINT ‘|—‘ + REPLICATE(‘+—-‘,15) + ‘|’ + CHAR(10) + CHAR(10)

GO

GO

PRINT ‘CIS2275, Lab Week 6, Question 1  [3pts possible]:

Write the query to display the name and year of birth for all people born after 1980, who have

directed at least one show (i.e. those who appear at least once in the title_directors table).

Limit results to those who have died (who have a value in the deathYear column).

———————————————————————————————-

Columns to display:    name_basics.primaryName, name_basics.birthYear

Sort in descending order by birth year.’ + CHAR(10)

— [Insert your code here]

GO

PRINT ‘CIS2275, Lab Week 6, Question 2  [3pts possible]:

Show every genre of television show which has had at least one title with 500 episodes.

i.e. limit results to the titleType ”tvEpisode” in the title_basics table, and to titles

containing a row in the title_episode table with episodeNumber 500.

———————————————————————————————-

Columns to display:    title_genre.genre

Display genre name only, and eliminate duplicate values.’ + CHAR(10)

GO

— [Insert your code here]

GO

PRINT ‘CIS2275, Lab Week 6, Question 3  [3pts possible]:

Write a common table expression to identify the WORST shows: join title_basics against title_ratings

and limit your results to those with an averageRating value equal to 1.  Project the title,

type, and startYear from title_basics; and label your CTE as BADSHOWS.

In the main query, show a breakdown of BADSHOWS grouped by type, along with the total number of

rows for each (i.e. GROUP BY titleType)

———————————————————————————————-

Columns to display:    titleType, COUNT(*)

Sort results in descending order by COUNT(*).’ + CHAR(10)

GO

— [Insert your code here]

GO

PRINT ‘CIS2275, Lab Week 6, Question 4  [3pts possible]:

Identify the least popular professions.  Show each profession value from the name_profession table,

along with the total number of matching rows (GROUP BY profession).  Use the HAVING clause to limit

your results to professions with less than 1,000 rows.

———————————————————————————————-

Columns to display:    name_profession.profession, COUNT(*)’ + CHAR(10)

— [Insert your code here]

GO

GO

PRINT ‘CIS2275, Lab Week 6, Question 5  [3pts possible]:

Use the query from #4 above to display the names of all people belonging to these professions.

Use the previous query as a subquery in the FROM clause here to limit the results.

———————————————————————————————-

Columns to display:    name_basics.primaryName, name_profession.profession

Sort results in ascending order by primaryName.’ + CHAR(10)

— [Insert your code here]

GO

GO

PRINT ‘CIS2275, Lab Week 6, Question 6  [3pts possible]:

Show the name of every writer, along with the total number of titles they”ve written (i.e. rows in the 

title_writers table).  Limit results to those who have written between 5,000 and 10,000 titles (inclusive).

———————————————————————————————-

Columns to display:    name_basics.primaryName, COUNT(*)

Sort results in descending order by primaryName.’ + CHAR(10)

— [Insert your code here]

GO

GO

PRINT ‘CIS2275, Lab Week 6, Question 7  [3pts possible]:

Show the actor and character names for everyone who has performed the same role in more than one

show with the title ”Battlestar Galactica”.  i.e. identify the combination of (primaryName, characters)

which occurs in the title_principals table more than once for matching titles.

———————————————————————————————-

Columns to display:    name_basics.primaryName, title_principals.characters, COUNT(*)

Sort results in ascending order by primaryName.’ + CHAR(10)

— [Insert your code here]

GO

GO

PRINT ‘CIS2275, Lab Week 6, Question 8  [3pts possible]:

Identify the names of people who have directed more than five highest-rated shows (i.e. title_ratings.averageRating = 10).

For each of these people, display their names and the total number of shows they have written.

———————————————————————————————-

Columns to display:    name_basics.primaryName, COUNT(*)

Sort results in ascending order by primaryName.’ + CHAR(10)

— [Insert your code here]

GO

GO

PRINT ‘CIS2275, Lab Week 6, Question 9  [3pts possible]:

Display the title and running time for all TV specials ( titleType = ”tvSpecial” ) from 1982; if the run time is

NULL, substitute zero.

———————————————————————————————-

Columns to display:    title_basics.primaryTitle, title_basics.runtimeMinutes

Sort in descending numerical order by the resulting calculated run time value.’ + CHAR(10)

— [Insert your code here]

GO

GO

PRINT ‘CIS2275, Lab Week 6, Question 10  [3pts possible]:

Identify every movie from 1913 (startYear = 1913, titleType = ”movie”); limit your results to those with a non-NULL value

in the runtimeMinutescolumn.  For each movie, display the primaryTitle and the averageRating value from the title_ratings table.

Use DENSE_RANK() to display the rank based on averageRating (label this RATINGRANK), and also the rank based on runtimeMinutes

(label this LENGTHRANK).  Both of these should be based on an asecending sort order.

———————————————————————————————-

Columns to display:    title_basics.primaryTitle, title_ratings.averageRating,

                       RATINGRANK, LENGTHRANK

Sort results in ascending order by primaryTitle.’ + CHAR(10)

— [Insert your code here]

GO

GO

————————————————————————————-

— This is an anonymous program block. DO NOT CHANGE OR DELETE.

————————————————————————————-

BEGIN

    PRINT ‘|—‘ + REPLICATE(‘+—-‘,15) + ‘|’;

    PRINT ‘ End of CIS275 Lab Week 6’ + REPLICATE(‘ ‘,50) + CONVERT(CHAR(12),GETDATE(),101);

    PRINT ‘|—‘ + REPLICATE(‘+—-‘,15) + ‘|’;

END;

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion: Smart Card versus Authenticator App

 The Personal Identity Verification (PIV) card is used in non-military government agencies for authentication and identification to gain access to systems, networks, and online resources. These cards, in combination with a personal identification number, meet two-factor requirements. PIV credentials also are designed to help reduce counterfeiting and are tamper-resistant.An authenticator app, such as Google Authenticator, is another method to achieve two-factor authentication. It is a free app available for installation on mobile devices.The U.S. federal government authorizes the use of PIVs as well as authenticator apps, depending on the circumstances.Answer the following question(s):

  1. In what type of situation would an authenticator app provide adequate two-factor authentication for federal government use? Provide rationale or a citation for your answer.
  2. In what type of situation would a PIV be required for federal government use? Provide rationale or a citation for your answer.

Fully address the questions in this discussion; provide valid rationale or a citation for your choices; Post should be at least 700 words in length.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Part 4: Final Network Design Report

 Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff. You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the Course Syllabus for submission dates.

  • Project Part 1: Network Design
  • Project Part 2: Firewall Selection and Placement
  • Project Part 3: Remote Access and VPNs
  • Project Part 4: Final Network Design Report

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IP Addressing Schema, I need MS Visio Expert, NETWORKING NTC/320

 

To support the growth expansion plan and proposal of West Consulting, this week you will create the IP Addressing Schema.

Create recommendations for both IPv4 and IPv6 schemas at the China location.

Include the following:

  • An IPv4 table that includes the Classless Inter-Domain Routing (CIDR) notation, subnets, and number of hosts used at each site/subnet
  • An IPv6 scheme to integrate the two sites
  • Selected IP routing protocol(s) and your rationale for either maintaining or changing West Consulting’s current protocol
  • Summary of how your routing protocol recommendations address network convergence and maximize performance

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Respond to the questions below in a 3 pages Word document.

 Complete the assigned weekly reading and review the case study see attached files.

 

Answer the following questions in a substantive manner:  

  1. Why did DTGOV add dynamic scaling to the infrastructure?   
  2. What functions do the SSO and IAM perform?
  3. Why did DTGOV choose dynamic scaling?

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Questions

  Complete Self-Check #4 within the “Exercises for Section 5.3” subsection in Section 5.3, “Recursive Array Search” of Ch. 5, “Recursion” in Data Structures: Abstraction and Design Using Java

#4.  Write a recursive algorithm to find the largest value in an array of integers.

 

  • Ch. 5, Data Structures: Abstraction and Design Using Java

 

Complete the following Review Questions within the “Exercises for Sections 5.6” subsection in Section 5.6, “Backtracking” of Ch. 5, “Recursion” in Data Structures: Abstraction and Design Using Java

Review Question #5

Review Question #7

 

5. For Towers of Hanoi, show the output string that would be created by the method call showMoves(3, 'R', 'M', 'L'). Also, show the sequence of method calls.

7. For the maze path found in Figure 5.19, explain why cells (3, 4), (2, 5), (3, 5), and (4, 5) were never visited and why cells (5, 1) and (3, 0) through (9, 0) were visited and rejected. Show the activation frames for the first 10 recursive calls in solving the maze.

 

  • Ch. 5, Data Structures: Abstraction and Design Using Java

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 5 Graded Exercise 1: Research Function Return Values

The code here tests a user-entered character and returns values depending on whether the character is numeric, upper case, etc.  

Enter the code, note the output, and answer the questions below.

Here is what the output looks like.

When the user enters the value of “a,”

1. Why does isalum() return the value 2?

2. Why does isxdigit() return the value 128?

3. Why does islower() return the value 2?

4. Why does isupper() return the value 0?

5. Why does tolower() return the value 97?

6. Why does toupper() return the value 65?

7. Why does isspace() return the value 0?

8.Why does iscntrl() return the value 0?

9.Why does ispunct() return the value 0?

10. Why does isprint() return the value 2?

11. Why does isgraph() return the value 2?

File Submission

Put your answers into a Word document,

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

java book store application

 implements 3 classes with instruction provided and write a junit test,other classes was provided.  need to be finished as soon as possible 

• Item • LineItem • Cart 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

lab 1 access control

1. Why would an administrator want to use the MAP Toolkit? 

2. Based on the results of the MAP inventory you performed in the lab, which operating system was installed on the TargetWindows02b server?

3. Based on the results of the MAP inventory you performed in the lab, which desktop and server software was installed on the TargetWindows02b server? 

4. Which tasks, other than the ones performed in this exercise, can administrators use the MAP Toolkit to perform? 

5. Which utility is used to transform a standalone Windows Server 2012 R2 system into an Active Directory domain controller? 

6. What is the importance of SafeModeAdministratorPassword when using PowerShell to install and configure Active Directory? 

7. What considerations should you take into account when choosing a domain name? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discuss how Risk Management is a critical element to the Security Systems engineering. Provide elaboration and detail in your answer.

 Discuss how Risk Management is a critical element to the Security Systems engineering.  Provide elaboration and detail in your answer. 

 

Synthesis of Concepts – Initial Post– 50 points

Clear Citations using APA format–20

Writing Standards–30

No Plagiarism.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now