SQL challenge

In this assignment, you will design the tables to hold data in the CSVs, import the CSVs into a SQL database, and answer questions about the data. In other words, you will perform:

  1. Data Engineering
  2. Data Analysis

Note: You may hear the term “Data Modeling” in place of “Data Engineering,” but they are the same terms. Data Engineering is the more modern wording instead of Data Modeling.

Data Modeling

Inspect the CSVs and sketch out an ERD of the tables. Feel free to use a tool like http://www.quickdatabasediagrams.com.

Data Engineering

  • Use the information you have to create a table schema for each of the six CSV files. Remember to specify data types, primary keys, foreign keys, and other constraints.
    • For the primary keys check to see if the column is unique, otherwise create a composite key. Which takes to primary keys in order to uniquely identify a row.
    • Be sure to create tables in the correct order to handle foreign keys.
  • Import each CSV file into the corresponding SQL table. Note be sure to import the data in the same order that the tables were created and account for the headers when importing to avoid errors.

Data Analysis

Once you have a complete database, do the following:

  1. List the following details of each employee: employee number, last name, first name, sex, and salary.
  2. List first name, last name, and hire date for employees who were hired in 1986.
  3. List the manager of each department with the following information: department number, department name, the manager’s employee number, last name, first name.
  4. List the department of each employee with the following information: employee number, last name, first name, and department name.
  5. List first name, last name, and sex for employees whose first name is “Hercules” and last names begin with “B.”
  6. List all employees in the Sales department, including their employee number, last name, first name, and department name.
  7. List all employees in the Sales and Development departments, including their employee number, last name, first name, and department name.
  8. In descending order, list the frequency count of employee last names, i.e., how many employees share each last name.

Bonus (Optional)

As you examine the data, you are overcome with a creeping suspicion that the dataset is fake. You surmise that your boss handed you spurious data in order to test the data engineering skills of a new employee. To confirm your hunch, you decide to take the following steps to generate a visualization of the data, with which you will confront your boss:

  1. Import the SQL database into Pandas. (Yes, you could read the CSVs directly in Pandas, but you are, after all, trying to prove your technical mettle.) This step may require some research. Feel free to use the code below to get started. Be sure to make any necessary modifications for your username, password, host, port, and database name:
    from sqlalchemy import create_engine engine = create_engine(‘postgresql://localhost:5432/<your_db_name>’) connection = engine.connect()
  1. Create a histogram to visualize the most common salary ranges for employees.
  2. Create a bar chart of average salary by title.

Epilogue

Evidence in hand, you march into your boss’s office and present the visualization. With a sly grin, your boss thanks you for your work. On your way out of the office, you hear the words, “Search your ID number.” You look down at your badge to see that your employee ID number is 499942.

Submission

  • Create an image file of your ERD.
  • Create a .sql file of your table schemata.
  • Create a .sql file of your queries.
  • (Optional) Create a Jupyter Notebook of the bonus analysis.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Intro to Data Mining

Chapter 2 Exercises:

8. Discuss why a document-term matrix is an example of a data set that has asymmetric discrete or asymmetric continuous features.

9. Many sciences rely on observation instead of (or in addition to) designed experiments.Compare the data quality issues involved in observational science with those of experimental science and data mining.

10. Discuss the difference between the precision of a measurement and the terms single and double precision, as they are used in computer science, typically to represent floating-point numbers that require 32 and 64 bits, respectively.

18. This exercise compares and contrasts some similarity and distance measures.
(a) For binary data, the L1 distance corresponds to the Hamming distance;that is, the number of bits that are different between two binary vectors.The Jaccard similarity is a measure of the similarity between two binary vectors. Compute the Hamming distance and the Jaccard similarity between the following two binary vectors.x = 0101010001y = 0100011000
(b) Which approach, Jaccard or Hamming distance, is more similar to the Simple Matching Coefficient, and which approach is more similar to the cosine measure? Explain. (Note: The Hamming measure is a distance,while the other three measures are similarities, but don’t let this confuse you.)
(c) Suppose that you are comparing how similar two organisms of different species are in terms of the number of genes they share. Describe which measure, Hamming or Jaccard, you think would be more appropriate for comparing the genetic makeup of two organisms. Explain. (Assume that each animal is represented as a binary vector, where each attribute is 1 if a particular gene is present in the organism and 0 otherwise.)
(d) If you wanted to compare the genetic makeup of two organisms of the same species, e.g., two human beings, would you use the Hamming distance,the Jaccard coefficient, or a different measure of similarity or distance?Explain. (Note that two human beings share > 99.9% of the same genes.)

22. Discuss how you might map correlation values from the interval [-1,1] to the interval [0,1]. Note that the type of transformation that you use might depend on the application that you have in mind. Thus, consider two applications:clustering time series and predicting the behavior of one time series given another.

27. Show that the distance measure defined as the angle between two data vectors,x and y, satisfies the metric axioms given on page 70. Specifically, d(x, y) : arccos(cos(x,y)).

Chapter 3 Exercises:

5. Describe how you would create visualizations to display information that describes the following types of systems.
(a) Computer networks. Be sure to include both the static aspects of the network, such as connectivity, and the dynamic aspects, such as traffic.
(b) The distribution of specific plant and animal species around the world for a specific moment in time.
(c) The use of computer resources, such as processor time, main memory, and disk, for a set of benchmark database programs.
(d) The change in occupation of workers in a particular country over the last thirty years. Assume that you have yearly information about each person that also includes gender and level of education.

Be sure to address the following issues:

* Representation. How will you map objects, attributes, and relationships to visual elements?

* Arrangement. Are there any special considerations that need to betaken into account with respect to how visual elements are displayed? Specific examples might be the choice of viewpoint, the use of transparency,or the separation of certain groups of objects.

* Selection. How will you handle a large number of attributes and data objects?

17. Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques such as PCA and SVD.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Development 2

  Using the Microsoft Visio schema and excel files attached. Answer the following questions:

  • Which schools generate the highest amount of debt for the average student who attends?
  • What is the employment rate for the students who graduate from this school?

Revise the Database Schema in the attached Visio File based on the excel files attached and the questions above if any data was missed, add it to the schema.

Test your schema by completing the following tasks:

  • Define the database tables you will need and group the tables by function. Document your tables in an annotated Microsoft® Visio® diagram.
  • Develop the SQL queries needed and populate the tables from the attached excel files.
  • Define an appropriate strategy to optimize and incorporate best practices in to the SQL that you created.
  • Document your SQL and metadata in Microsoft® Visio® 
  • Capture screenshots of each query result.

Document your results as a 1-page Microsoft®Word document that:

  • Describes your SQL, populated tables, and the best practices you used to develop your SQL queries
  • Includes the SQL statements and corresponding screenshots of each query result

 Compress your revised diagram(s), testing results documentation and SQL files into a ZIP file. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

PAPA Assignment Preview

 

Richard Mason’s ethical framework for information technology is well known for the acronym PAPA which stands for PRIVACY, ACCESSIBILITY, PROPERTY, and ACCURACY.  You are going to create a PowerPoint where you will analyze the four areas of ethics (PAPA) in relation to your life as a student and an information technology professional.

Requirements:

  • You must create 12 PowerPoint slides. You can use the attached example PAPA PowerPoint as a template or make one of your own but make sure you include all the requirements.
  • Number your slides
  • The first slide will be your title slide.and this will be where you will introduce to Richard Mason’s PAPA
  • The last will be your reference slide. APA format
  • You need 5 references (other than your text book)in APA format and at least two sources should be from a library resource subscription service from computer professional organizations (ex ACM, IEEE). You want articles that are peer reviewed. (Links to an external site.) When using the Wilmington University library databases be sure to look at  Discovery How to guide (Links to an external site.) for help searching for peer reviewed articles. This page from The Owl  (Links to an external site.)at the Purdue Writing Lab provides useful guidelines for evaluating sources.  The Cornell library  (Links to an external site.)provides literacy guidance in evaluating the credibility of web pages.
  • You must have one quote by Richard Mason from is 1986 original documentation.
  • Four slides defining each of the four areas of PAPA.
  • Five slides that demonstrate how PAPA relates to you as a student and IT professional citing specific examples from cases, laws, class discussions and current events.
  • The 11 th slide will be a conclusion or summary slide.The 12th slide will be your reference slide.
  • For grading expectations, view the PAPA Assignment rubric Preview the document

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DM Wk8 Assignment ch14

 Answer all the following Questions in one MS word document:  

 Robotics, Social Networks, AI and IoT

1. Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view. 

3. What are some of the major privacy concerns in employing intelligent systems on mobile data? 

4. Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.

5. Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork. 

Must add APA formatted references.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Short Answers wanted in 18 hours

  Totally 1-2 pages for these two Questions.

Conduct a security audit of your personal use of computer systems and computer technology

1. Identify points of vulnerability and weakness. (No more than 10).

2. Describe what you will do to address these.

Review the videos associated with the powerpoint lecture 9.  The links are also in the pdf file below. 

Review the case described in the pdf and answer questions 1, 2, 4, 5

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Organ Leader

 

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what performance management is and how it influences effective teams.
  2. Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…).  Please note at least five organizational activities and be specific when responding.
  3. Note at least two organizational capabilities and compare and contrast each.

 

Text Book : 

https://books.google.com/books?id=Pkm3DwAAQBAJ&pg=PT105&source=gbs_selected_pages&cad=2#v=onepage&q&f=true 

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment5

 Topic: When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement? Please submit your report using the attached MS Office Word template, which is in APA 7 format. 

PLEASE USE THE ATTACHED TEMPLATE

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Complete the following assignment in one MS word document: Chapter 8 –discussion question #1-4 & exercise 4 Chapter 9- discussion question #1-5 & exercise 3

 

Complete the following assignment in one MS word document:

Chapter 8 –discussion question #1-4 & exercise 4

Chapter 9- discussion question #1-5 & exercise 3

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source)

  

Chapter 8: Discussion question 1-4

1. How does prescriptive analytics relate to descriptive and predictive analytics?

2. Explain the differences between static and dynamic models. How can one evolve into the other?

3. What is the difference between an optimistic approach and a pessimistic approach to decision making under assumed uncertainty?

4. Explain why solving problems under uncertainty sometimes involves assuming that the problem is to be solved under conditions of risk.

Exercise 4

Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also investigate how other governments or government agencies are using models in their missions.

Chapter 9: Discussion question 1-5

1. What is Big Data? Why is it important? Where does Big Data come from?

2. What do you think the future of Big Data will be? Will it lose its popularity to something else? If so, what will it be?

3. What is Big Data analytics? How does it differ from regular analytics?

4. What are the critical success factors for Big Data analytics?

5. What are the big challenges that one should be mindful of when considering implementation of Big Data analytics?

Exercise 3

At teradatauniversitynetwork.com, go to the Sports Analytics page. Find applications of Big Data in sports. Summarize your findings.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Module #4 Assignment

1. Using a web browser identify at least five sources you would want to use when training a CSIRT.

2. Using a web browser, visit www.mitre.org. what information is provided there, and how would it be useful?

3. Using a web browser, visit www.securityfocus.com. What is Bugtraq, and how would it be useful? What additional information id provided under the vulnerabilities tab?

4. Using a Web browser, visit www.cert.org. what information is provided there, and how would it be useful? What additional information is provided at www.cert.org/csirts/?

Detailed and significant scholarly answers will be allotted full point value. Incomplete, inaccurate, or inadequate answers will receive less than full credit depending on the answers provided.

Course: BA 635 Disaster Recovery

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now