Archive for November 3rd, 2017

Nucor Corporation

  Internal Analysis 

Current Goals 

o What are the company’s vision, mission, core values and stated goals & objectives (financial and strategic)? 

**note on values/CSR—are there any issues that could impact buyer patronage, reputation, operating efficiency, shareholder value?

Company’s Current Strategy (Current Performance) 

o What is their Current Business Level Strategy?  

o What is their Current Corporate Level Strategy?  

o How well is the company’s strategy working? 

Look at the 7 specific indicators of how well a company’s strategy is working in the text

1. Sales growth and market share

2. Customer acquisition rate

3. Image and reputation

4. Relevant factors guiding customer choice of brands

5. Profit margins (internal and competition) 

6. Trends in net profits and ROI compared to industry 

7. Financial strength, credit rating, ratios and cash flows performance 

o How well has the company’s strategy been implemented and executed?  (Ch. 10-12 have diagnostic tools to pinpoint strategy execution issues) Look for any strategic gaps or issues to assess if the strategy execution has been a success, failure or a bit of both.  Be specific.

o Whether the company is meeting its stated financial and strategic objectives?

o Whether the company is an above average performer?

o Whether the company is gaining customers and outcompeting one or more of its closest rivals?

o Has the company diversified into businesses that have achieved the desired 1+1=3 impact on shareholder value? 

Need a similar essay? Click Order Now and get a special bonus- Up to 15% discounts!!!

Cost-Benefit Analysis

"Cost-Benefit Analysis"  Please respond to the following:

  • In a heavily debated City Council meeting, one year ago, Cobb County learned that by buying larger garbage trucks it could reduce labor cost for garbage removal. Note: All the dollar amounts below are in this year's (present) dollars.labor cost for garbage removal. Note: All the dollar amounts below are in this year’s (present) dollars.
  • The cost of the trucks today (one year later) is $ 400,000.
  • The annual savings in this year's $ 90,000 dollars.
  • The trucks will last for four years and then will be sold for $ 100,000.
  • The city can borrow money at 7% discount rate to purchase the trucks.
  • Inflation for the next four years is expected to average 3%.
  • Assuming the cost and benefits are incurred at the end of the year, should the city buy the trucks?

Need a similar essay? Click Order Now and get a special bonus- Up to 15% discounts!!!

The Role of Fusion Centers in Counterterrorism Strategies

The Role of Fusion Centers in Counterterrorism Strategies 

 

For this assignment, write an essay at least 500 words in length on how the role of fusion centers has changed in the United States from post-9/11 to today. Further, you will be required to discuss a terrorism plot that has been stopped by the efforts put forth by fusion centers. The last paragraph of your paper will summarize your finding about the current state of fusion centers and the public perception of them. 

 

HLS 2301, Introduction to Terrorism 4 

As part of this assignment, you are required to read a short document entitled the National Strategy for Information Sharing, which was originally published by the Bush administration in 2007 (updated in 2012), and outlines the initial role of fusion centers in the United States. This will provide the historical context and background information for your essay. 

 

Click here for the updated National Strategy for Information Sharing, or copy and paste this address into your web browser: https://www.ise.gov/sites/default/files/2012infosharingstrategy.pdf 

 

In 2010 at the National Fusion Center Conference, the fusion center directors, in partnership with the federal government, distilled the baseline capabilities for state and major urban area fusion centers into national network priorities and changed the focus of fusion centers to include four Critical Operational Capabilities (COCs) to include receive, analyze, disseminate, and gather.  

 

After reading the National Strategy for Information Sharing, respond to the following questions in your essay: 

 

What improvements do you recommend take place or be added to the role of fusion centers in the United States?  Do you believe that strengthening the ability to merge centers to execute the COCs is critical to building an integrated National Network of Fusion Centers capable of sharing information with the federal government and other local and state entities? Why, or why not? How did one of the COCs help prevent or stop a terrorism plot?  Lastly, in recent years why has the role of fusion centers been questioned by the public and private industries? centers in the United States?   Do you believe that strengthening the ability of fusion centers to execute the COCs is critical to building an integrated National Network of Fusion Centers capable of sharing information with the federal government and other local and state entities? Why, or why not?   How did one of the COCs help to prevent or stop a terrorism plot?  Lastly, in recent years why has the role of fusion centers been questioned by the public and private industries? 

Be sure to cite and reference all quoted and paraphrased material following APA style guidelines. You must use at least two sources in addition to your textbook. At least one of your sources should be from the CSU Online Library. The International Security and Counter Terrorism Reference Center database found in the CSU Online Library is a good place to start. 

Need a similar essay? Click Order Now and get a special bonus- Up to 15% discounts!!!

Assignment 2: LASA 1—Crisis Leadership or Risk Management Report

Assignment 2: LASA 1—Crisis Leadership or Risk Management Report

Organizations are susceptible to an array of crises. There are different types of threats with no “one way” to manage them. This reality presents multiple business challenges to those in leadership positions. Each manager is responsible for managing risks within their own sphere of operations and area of responsibility. To this end, one must understand that crisis leadership is a process. For this assignment, you are required to identify a business crisis issue that interests you and develop a report.

Directions:

Address the following in your report:

  • Identify and describe a business crisis situation and the main leaders involved. It could be one that you have experienced or have read about. Be sure to include a discussion of ethical implications.
  • Assess the strengths, weaknesses, opportunities, threats, and industry trends (SWOTT) the company faced while its leaders were managing the crisis.
  • Assume you are a leader; recommend ways you could ensure that you have a clear view of risks across the organization in regard to the given scenario.
  • Identify a risk management process you would employ to mitigate risks in regard to the given scenario along with a rationale (utilize contemporary and classical leadership theories in support).
  • Recommend what you would do to ensure the risk management process is working the way you expect in regard to the scenario.
  • Describe ways to identify and manage uncertainties in a complex corporate environment (utilize contemporary and classical leadership theories to support your argument).

Utilize at least three scholarly sources (in addition to your textbook) to complete your research, referencing the sources within the text and at the end in a reference list.

Write a 6–8-page report in Word format. Apply APA standards to citation of sources. Use the following file naming convention: LastnameFirstInitial_M3_A2.doc.

Make sure you write in a clear, concise, and organized manner; demonstrate ethical scholarship through accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.

By the due date assigned, deliver your assignment to the Submissions Area.

LASA 1 Grading Criteria

Assignment ComponentsProficientMaximum Points

Describe a business crisis situation and the main leaders involved. Be sure to include discussion of ethical implications.

[CO: 1, 2, 5, 6
PO: 1.1, 1.2, 2.1, 2.3, 3.a, 4.2, 5.1 
ILO: 1, 2, 3, 5]

The business crisis situation identified is appropriate for the assignment. The description of the situation and its main leaders involved is clear and logical. In addition, multiple logical ethical implications are discussed. Reliable resources are utilized.

12

Undertake a SWOTT assessment of the situation that the leadership faced while managing the crisis.

[CO: 1, 2, 5, 6
PO: 1.1, 1.2, 2.1, 2.3, 3.a, 4.2, 5.1 
ILO: 1, 2, 3, 5]

The SWOTT assessment of the situation that the leadership faced is clear, detailed, and accurate. Multiple logical points and examples are included using scholarly resources.

36

Assume you are a leader; recommend ways you could ensure that you have a clear view of the risks across the organization in regard to the given scenario. Utilize classical and contemporary leadership theory in support of your argument.

[CO: 1, 2, 4, 5, 6
PO: 1.1, 1.2, 2.1, 2.3, 3.a, 4.2, 5.1 
ILO: 1, 2, 3, 5]

Multiple logical recommendations are provided to ensure one will have a clear view of the risks across the organization. Examples, utilization of classical or contemporary theory, and other scholarly resources are provided.

24

Identify a risk management process you would employ to mitigate risks in regard to the given scenario along with a rationale.

[CO: 1, 2, 4, 5, 6
PO: 1.1, 1.2, 2.1, 2.3, 3.a, 4.2, 5.1 
ILO: 1, 2, 3, 5]

The risk management process employed to mitigate risks is accurately identified. A logical rationale is provided using scholarly resources.

24

Offer recommendations to ensure that the risk management process works the way you expect in regard to the scenario. Utilize classical and contemporary leadership theory in support.

[CO: 1, 2, 4, 5, 6
PO: 1.1, 1.2, 2.1, 2.3, 3.a, 4.2, 5.1 
ILO: 1, 2, 3, 5]

The recommendations given to ensure the risk management process works as expected are logical, useful, and relate to the given scenario. Examples, utilization of classical or contemporary theory, and other scholarly resources are provided.

36

Describe ways to identify and manage uncertainties in a complex corporate environment.

[CO: 1, 2, 5, 6
PO: 1.1, 1.2, 2.1, 2
ILO: 1, 2, 3, 5]

The description of ways to identify and manage uncertainties in a complex corporate environment is accurate. Multiple logical facts and examples are included using scholarly resources.

24

Organization (12)
Usage and Mechanics (12)
APA Elements (16)
Style (4)

[CO_W
PO: 3.a
ILO: 2]

Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship through appropriate and accurate representation and attribution of sources (i.e. APA); and displayed accurate spelling, grammar, and punctuation. Use of scholarly sources aligned with specified assignment requirements.

44Total:

Need a similar essay? Click Order Now and get a special bonus- Up to 15% discounts!!!

Procurement Type

In 3-4 pages, explain how procurement type indicates whether a material is produced in house (via the production process), obtained externally (via the procurement process), both, or none. Give examples. (Trading goods and raw materials are obtained externally. In contrast, finished goods and semi-finished goods are produced in house.) Be sure to cite your sources.

Be sure to cover that the procurement type can be set to none for discontinued materials and set to both for materials that a company normally produces in house but does not have the resources to produce at the current time.

Save your assignment as a Microsoft Word document.

Need a similar essay? Click Order Now and get a special bonus- Up to 15% discounts!!!

Menu Selection

Despite being a fairly old technology, menu-driven interfaces are very common in user interface design. Menu-driven interfaces consist of a series of screens which are navigated by choosing options from lists. 

Write a four to five (4-5) page paper in which you:

 

  1. Evaluate      the user dialog strategies used by a menu-driven interface. 
  2. Determine      why menu-driven interfaces continue to be popular in the modern computing      age. 
  3. Suggest      at least three (3) strategies for making menu-driven interfaces visually      appealing in the modern computing environment.
  4. Suggest      alternatives for menu-driven interface design and explain how these      alternatives can be designed to eventually replace all menu-driven      interfaces. 
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. at      least three (3) quality resources in this assignment. Note: Wikipedia and      similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

 

  • Be      typed, double spaced, using Times New Roman font (size 12), with one-inch      margins on all sides; citations and references must follow APA or      school-specific format. Check with your professor for any additional      instructions.
  • Include      a cover page containing the title of the assignment, the student’s name,      the professor’s name, the course title, and the date. The cover page and      the reference page are not included in the required assignment page      length. 

Need a similar essay? Click Order Now and get a special bonus- Up to 15% discounts!!!

Class 7 Unit 3 Assignment

Directions

You will do your work on this template for the Unit 3 Assignment:

1. Each member of the group must identify their state legislators' addresses and phone numbers. 2. The group will decide on a policy issue that needs to be addressed. This policy issue will be used in the

unit 3, 6, & 9 Assignments. 3. The group will write a letter to one of their legislators outlining what the issue is and why it is

important. The letter will address: The current policy structure. The need for the change. The suggested change. Cost implications if the change is implemented. The role the nurse as a change agent will take at the policy table.

Submitting your work:

One group member will submit the work with all names on the Assignment. Submit your Assignment to the appropriate Dropbox according to instructions below.

To view the Grading Rubric for this Assignment, please visit the Grading Rubrics section of the Course Resources.

Assignment Requirements

Before finalizing your work, you should:

be sure to read the Assignment description carefully (as displayed above); consult the Grading Rubric (under the Course Resources) to make sure you have included everything necessary; and utilize spelling and grammar check to minimize errors.

Your writing Assignment should:

follow the conventions of Standard American English (correct grammar, punctuation, etc.);

Need a similar essay? Click Order Now and get a special bonus- Up to 15% discounts!!!

Critical Discussion Responses

Part 1: 100-150 words with references

Topic Question:

Database normalization is a very important process in designing and organizing tables (relations) and their columns (attributes or fields) in a relational database. Therefore, what are the consequences (problems) if a database was designed without it? Would the database still work?

Discussion Post:

Database normalization is a must for any database administrator in order to deliver data quickly and accurately to the users and clients.  "Normalization is part of successful database design; without normalization, database systems can be inaccurate, slow, and inefficient, and they might not produce the data you expect."  Normalization is geared to arrange data into the most logical groups, reduce the amount of duplicated data, ensure that data being changed only has to be changed in one location, and produce a response database.  Without normalization databases would continue to exist, however, they would be slow and inaccurate.  There are different levels of normalization and the database administrators need to determine the most effective normalization level for the system.  Also in instances were there is not a lot of database writes but instead database reads and specifically table joins normalization can require additional queries which slows response time.

Citations:

Poolet, M. (2017, January 09). SQL by Design: Why You Need Database Normalization. Retrieved November 02, 2017, from http://www.itprotoday.com/database-performance-tuning/sql-design-why-you-need-database-normalization

Critical Reply with reference:

Part 2: 100-150 words with references

Topic Question:

Pretend that you are building a Web-based system for the admissions office at your university. The system will be used to accept electronic applications from students. All the data for the system will be stored in a variety of files.

Question: Give an example using the preceding system for each of the following file types: master, look-up, transaction, audit, and history. What kind of information would each file contain and how would the file be used?

[Sources: "CHAPTER 11: DATA STORAGE DESIGN" – Alan Dennis, Barbara Haley Wixom, and Roberta M. Roth (2012). System Analysis and Design, Fifth Edition, John Wiley & Sons.]

Discussion Post:

· Master file Is a collection of records pertaining to one of the main subjects of an information system (PCMag, 2017). This type of file contains descriptive data of the element involve. In this scenario of the admission office for the university, the master file contains specific information of the students. Information like first and last name (can be used as primary key), social security or student number (can be used as primary key), address, date of birth, degree on course, on-line or on campus student. This file contains the primary and necessary information of the students to process everything else like payments, enrollments and transcripts.

Lookup file This type of data file hold static data for use in the system, acting as the relational replacement for computations. Is a table that holds static data, and is used to lookup values. Most of the time, they are used for display purposes rather than computations (Celk0, 2011). For example, the system user can do a lookup for a specific student using his student number as a value to retrieve information from the table that has that value.

Transaction file The data in transaction files is used to update the master files, which contain the data about the subjects of the organization. In the university scenario a transaction file is used when the student changes from one degree to another, changes of address, payment methods, among others. Sometimes this type of file is used for audits and analysis of the business.

Audit file Contains recorded data of transactions within the database tables that is later used for security audits and analysis of changes in the data. The university can use this type of files to audit payments made by students for courses taken and other fees.

History file This file has data stored or archived for later uses like audits, analysis, statistics, projections or backups.  Recovery log files and the recovery history file are created automatically when a database is created (Visser, Wong, 2004).

References        S. Visser & B. Wong. (2004) DB2 universal database, second edition. Sams.

       J. Celko. (2011). Look-up tables in SQL. RedGate Hub. Retrieved from https://www.red-gate.com/simple-talk/sql/t-sql-programming/look-up-tables-in-sql/

       PC Mag. (2017). Retrieved from https://www.pcmag.com/encyclopedia/term/46618/master-file

Critical Reply with reference:

Part 3: 100-150 words with references

Topic Question:

A major public university graduates approximately 10,000 students per year, and its development office has decided to build a Web-based system that solicits and tracks donations from the university's large alumni body. Ultimately, the development officers hope to use the information in the system to better understand the alumni giving patterns so that they can improve giving rates. Question: 1. What kind of system is this? 2. What different kinds of data will this system use? 3. On the basis of your answers, what kind of data storage format(s) do you recommend for this system? [Sources: "CHAPTER 11: DATA STORAGE DESIGN" – Alan Dennis, Barbara Haley Wixom, and Roberta M. Roth (2012). System Analysis and Design, Fifth Edition, John Wiley & Sons.]

Discussion Post:

· While it is true that a large relation DB might work, I believe the sheer volume and data, as well as the type of information they wish to extract, would benefit from a structure that could accommodate data mining – i.e. a data warehouse.

Data warehouses have many features to directly assist the university in learning more about their alumni. According to w3computing.com (2017):

· Data in a data warehouse cover a much longer time frame than data in traditional transaction-oriented databases because queries usually concern longer-term decision making rather than daily transaction details.

· Data warehouses are usually optimized for answering complex queries, known as OLAP, from managers and analysts, rather than simple, repeatedly asked queries.

· Data warehouses allow easy access via data mining software (called siftware) that searches for patterns and is able to identify relationships not imagined by human decision makers

· Data warehouses include not just one but multiple databases that have been processed so that the warehouse’s data are defined uniformly.

The data mining capabilities that a data warehouse offers would be very useful for the university for a variety of reasons. For example, data mining can identify patterns that a human is unable to detect; in particular, the types of patterns decision makers try to identify include associations, sequences, clustering, and trends ("Data Warehouses," 2017). Even further, data warehouses often include data from a wide variety of outside sources that would enable them to extract data on the contribution habits of their alumni. Ultimately, this could give the development officers just what they want –  the ability to better understand the alumni giving patterns so that they can improve giving rates.

References:

Data Warehouses. (2017, August 22). Retrieved October 31, 2017, from http://www.w3computing.com/systemsanalysis/data-warehouses/

Data warehouse. (2017, October 24). Retrieved October 31, 2017, from https://en.wikipedia.org/wiki/Data_warehouse

Critical Reply with reference:

Part 4: 100-150 words with references

Topic Question:

Identify appropriate applications for key-value databases.

Discussion Post:

· A Key-Value Database is a really basic type of database that is only composed of two things, a key and values; hence the name Key-Value database. These databases are unsophisticated, but the advantages are great. Key-value databases are much faster than relational databases. A second advantage is they can grow in size without having to completely redesign the database. Thirdly, Key-Value databases are more cost-efficient to grow in comparison to relational databases.

When are Key-Value databases appropriate to use? First, it is commonly used to manage session information in web applications. Secondly, Key-Value (NoSQL) databases can tremendously scale records in high capacity while there are rapid changes with numerous users through with millions of real-time users through dispersed processing and storage. Thirdly, Key-Value databases have built in redundancy, which won’t lose the entire application when some storage nodes are lost.

Reference:

Reeve, A. (2013, November 25). Big Data Architectures – NoSQL Use Cases for Key Value Databases |           EMC. Retrieved October 31, 2017, from https://infocus.emc.com/april_reeve/big-data-           architectures-nosql-use-cases-for-key-value-databases

Critical Reply with reference:

Part 5: 100-150 words with references

Topic Question:

Identify appropriate applications for key-value databases.

Discussion Post:

· Key–value databases are part of the NOSQL database group. It is distinct with other NOSQL databases in that it has two major components: a Key and data.  The Key is used to point to the rest of the data. The biggest advantage of Key-value databases as compared to other form of databases is the fact that they are very fast.

Handling Sessions in a web application is where key-value database become very useful. When there are many users of a given applications key-value database can be used to control each session. In addition, a key-based database can also be useful in system that have a significant fluctuation in usage during a given time period. There are many situations where there is a very high usage of an application during certain period of time and very low usage at a different time. Key-value database can be used for such applications because they can scale up and down easily as compared to other solutions.

Some examples of Key-value database include Amazon Dynamo and Berkeley DB.

Reference

Reeve, A. (2013, November 25). Big Data Architectures – NoSQL Use Cases for Key Value Databases.  Retrieved from https://infocus.emc.com/april_reeve/big-data-architectures-nosql-use-cases-for-key-value-databases/

Yegulalp, S. (2017, October 27).  NoSQL standouts: The best key-value databases compared. Retrieved from https://www.infoworld.com/article/3223728/nosql/nosql-standouts-the-best-key-value-databases-compared.html

Critical Reply with reference:

Part 6: 100-150 words with references

Topic Question:

Discuss the role of consistency in key-value modeling

Discussion Post:

· A key value database or a key value database is a database designed to store, retrieve, and manage associative sets of arrays. These records are stored and retrieved using a key that uniquely identify the record and quickly refines the data in the file. The key value works differently than the RDBMS. RDBMS predefines the data structure in the database as a series of tables containing fields with well-defined data types. On the other hand, key value modelling is a set of two linked data elements: a key, which is a unique identifier for a data element, and the value, which is either the identified data, or a pointer to the data element location.

In distributed computing modeling, the key value can use consistency ranging from eventual consistency to serializability:

Eventual consistency: Occurs when, if no new updates are made to a given data item, all accesses to that item will eventually return the last update value.

Sequential consistency: Occurs when we allow processes to skew in time, so that their operations can take effect before the invocation, or after completion.

Causal consistency: occurs when We do not have to impose the order of each operation of a process. Only the causally related operations must occur in order.

Serializable consistency: Occurs when the history of operations is equivalent to that which occurred in a single atomic order but say nothing about the invocation and completion times.

Consistency comes with costs, stronger consistency models also tend to require more coordination, more messages forward and backward to ensure that their operations run in the right order. So, in practice, it is better to use the hybrid model i.e.: "weaker" consistency models as far as possible, for availability and performance and "Stronger" consistency models if needed, because the running algorithm requires stricter ordering of operations.

Sources:

Strong consistency models, retrieved from https://aphyr.com/posts/313-strong-consistency-models

  http://cambridge-intelligence.com/keylines/nosql-key-value-column-stores/

–  https://www.researchgate.net/publication/256103742_A_Comparative_Analysis_of_Different_NoSQL_Databases_on_Data_Model

Critical Reply with reference:

Need a similar essay? Click Order Now and get a special bonus- Up to 15% discounts!!!

Critical Discussion Responses

Part 1: 100-150 words with references

Topic Question:

Database normalization is a very important process in designing and organizing tables (relations) and their columns (attributes or fields) in a relational database. Therefore, what are the consequences (problems) if a database was designed without it? Would the database still work?

Discussion Post:

Database normalization is a must for any database administrator in order to deliver data quickly and accurately to the users and clients.  "Normalization is part of successful database design; without normalization, database systems can be inaccurate, slow, and inefficient, and they might not produce the data you expect."  Normalization is geared to arrange data into the most logical groups, reduce the amount of duplicated data, ensure that data being changed only has to be changed in one location, and produce a response database.  Without normalization databases would continue to exist, however, they would be slow and inaccurate.  There are different levels of normalization and the database administrators need to determine the most effective normalization level for the system.  Also in instances were there is not a lot of database writes but instead database reads and specifically table joins normalization can require additional queries which slows response time.

Citations:

Poolet, M. (2017, January 09). SQL by Design: Why You Need Database Normalization. Retrieved November 02, 2017, from http://www.itprotoday.com/database-performance-tuning/sql-design-why-you-need-database-normalization

Critical Reply with reference:

Part 2: 100-150 words with references

Topic Question:

Pretend that you are building a Web-based system for the admissions office at your university. The system will be used to accept electronic applications from students. All the data for the system will be stored in a variety of files.

Question: Give an example using the preceding system for each of the following file types: master, look-up, transaction, audit, and history. What kind of information would each file contain and how would the file be used?

[Sources: "CHAPTER 11: DATA STORAGE DESIGN" – Alan Dennis, Barbara Haley Wixom, and Roberta M. Roth (2012). System Analysis and Design, Fifth Edition, John Wiley & Sons.]

Discussion Post:

· Master file Is a collection of records pertaining to one of the main subjects of an information system (PCMag, 2017). This type of file contains descriptive data of the element involve. In this scenario of the admission office for the university, the master file contains specific information of the students. Information like first and last name (can be used as primary key), social security or student number (can be used as primary key), address, date of birth, degree on course, on-line or on campus student. This file contains the primary and necessary information of the students to process everything else like payments, enrollments and transcripts.

Lookup file This type of data file hold static data for use in the system, acting as the relational replacement for computations. Is a table that holds static data, and is used to lookup values. Most of the time, they are used for display purposes rather than computations (Celk0, 2011). For example, the system user can do a lookup for a specific student using his student number as a value to retrieve information from the table that has that value.

Transaction file The data in transaction files is used to update the master files, which contain the data about the subjects of the organization. In the university scenario a transaction file is used when the student changes from one degree to another, changes of address, payment methods, among others. Sometimes this type of file is used for audits and analysis of the business.

Audit file Contains recorded data of transactions within the database tables that is later used for security audits and analysis of changes in the data. The university can use this type of files to audit payments made by students for courses taken and other fees.

History file This file has data stored or archived for later uses like audits, analysis, statistics, projections or backups.  Recovery log files and the recovery history file are created automatically when a database is created (Visser, Wong, 2004).

References        S. Visser & B. Wong. (2004) DB2 universal database, second edition. Sams.

       J. Celko. (2011). Look-up tables in SQL. RedGate Hub. Retrieved from https://www.red-gate.com/simple-talk/sql/t-sql-programming/look-up-tables-in-sql/

       PC Mag. (2017). Retrieved from https://www.pcmag.com/encyclopedia/term/46618/master-file

Critical Reply with reference:

Part 3: 100-150 words with references

Topic Question:

A major public university graduates approximately 10,000 students per year, and its development office has decided to build a Web-based system that solicits and tracks donations from the university's large alumni body. Ultimately, the development officers hope to use the information in the system to better understand the alumni giving patterns so that they can improve giving rates. Question: 1. What kind of system is this? 2. What different kinds of data will this system use? 3. On the basis of your answers, what kind of data storage format(s) do you recommend for this system? [Sources: "CHAPTER 11: DATA STORAGE DESIGN" – Alan Dennis, Barbara Haley Wixom, and Roberta M. Roth (2012). System Analysis and Design, Fifth Edition, John Wiley & Sons.]

Discussion Post:

· While it is true that a large relation DB might work, I believe the sheer volume and data, as well as the type of information they wish to extract, would benefit from a structure that could accommodate data mining – i.e. a data warehouse.

Data warehouses have many features to directly assist the university in learning more about their alumni. According to w3computing.com (2017):

· Data in a data warehouse cover a much longer time frame than data in traditional transaction-oriented databases because queries usually concern longer-term decision making rather than daily transaction details.

· Data warehouses are usually optimized for answering complex queries, known as OLAP, from managers and analysts, rather than simple, repeatedly asked queries.

· Data warehouses allow easy access via data mining software (called siftware) that searches for patterns and is able to identify relationships not imagined by human decision makers

· Data warehouses include not just one but multiple databases that have been processed so that the warehouse’s data are defined uniformly.

The data mining capabilities that a data warehouse offers would be very useful for the university for a variety of reasons. For example, data mining can identify patterns that a human is unable to detect; in particular, the types of patterns decision makers try to identify include associations, sequences, clustering, and trends ("Data Warehouses," 2017). Even further, data warehouses often include data from a wide variety of outside sources that would enable them to extract data on the contribution habits of their alumni. Ultimately, this could give the development officers just what they want –  the ability to better understand the alumni giving patterns so that they can improve giving rates.

References:

Data Warehouses. (2017, August 22). Retrieved October 31, 2017, from http://www.w3computing.com/systemsanalysis/data-warehouses/

Data warehouse. (2017, October 24). Retrieved October 31, 2017, from https://en.wikipedia.org/wiki/Data_warehouse

Critical Reply with reference:

Part 4: 100-150 words with references

Topic Question:

Identify appropriate applications for key-value databases.

Discussion Post:

· A Key-Value Database is a really basic type of database that is only composed of two things, a key and values; hence the name Key-Value database. These databases are unsophisticated, but the advantages are great. Key-value databases are much faster than relational databases. A second advantage is they can grow in size without having to completely redesign the database. Thirdly, Key-Value databases are more cost-efficient to grow in comparison to relational databases.

When are Key-Value databases appropriate to use? First, it is commonly used to manage session information in web applications. Secondly, Key-Value (NoSQL) databases can tremendously scale records in high capacity while there are rapid changes with numerous users through with millions of real-time users through dispersed processing and storage. Thirdly, Key-Value databases have built in redundancy, which won’t lose the entire application when some storage nodes are lost.

Reference:

Reeve, A. (2013, November 25). Big Data Architectures – NoSQL Use Cases for Key Value Databases |           EMC. Retrieved October 31, 2017, from https://infocus.emc.com/april_reeve/big-data-           architectures-nosql-use-cases-for-key-value-databases

Critical Reply with reference:

Part 5: 100-150 words with references

Topic Question:

Identify appropriate applications for key-value databases.

Discussion Post:

· Key–value databases are part of the NOSQL database group. It is distinct with other NOSQL databases in that it has two major components: a Key and data.  The Key is used to point to the rest of the data. The biggest advantage of Key-value databases as compared to other form of databases is the fact that they are very fast.

Handling Sessions in a web application is where key-value database become very useful. When there are many users of a given applications key-value database can be used to control each session. In addition, a key-based database can also be useful in system that have a significant fluctuation in usage during a given time period. There are many situations where there is a very high usage of an application during certain period of time and very low usage at a different time. Key-value database can be used for such applications because they can scale up and down easily as compared to other solutions.

Some examples of Key-value database include Amazon Dynamo and Berkeley DB.

Reference

Reeve, A. (2013, November 25). Big Data Architectures – NoSQL Use Cases for Key Value Databases.  Retrieved from https://infocus.emc.com/april_reeve/big-data-architectures-nosql-use-cases-for-key-value-databases/

Yegulalp, S. (2017, October 27).  NoSQL standouts: The best key-value databases compared. Retrieved from https://www.infoworld.com/article/3223728/nosql/nosql-standouts-the-best-key-value-databases-compared.html

Critical Reply with reference:

Part 6: 100-150 words with references

Topic Question:

Discuss the role of consistency in key-value modeling

Discussion Post:

· A key value database or a key value database is a database designed to store, retrieve, and manage associative sets of arrays. These records are stored and retrieved using a key that uniquely identify the record and quickly refines the data in the file. The key value works differently than the RDBMS. RDBMS predefines the data structure in the database as a series of tables containing fields with well-defined data types. On the other hand, key value modelling is a set of two linked data elements: a key, which is a unique identifier for a data element, and the value, which is either the identified data, or a pointer to the data element location.

In distributed computing modeling, the key value can use consistency ranging from eventual consistency to serializability:

Eventual consistency: Occurs when, if no new updates are made to a given data item, all accesses to that item will eventually return the last update value.

Sequential consistency: Occurs when we allow processes to skew in time, so that their operations can take effect before the invocation, or after completion.

Causal consistency: occurs when We do not have to impose the order of each operation of a process. Only the causally related operations must occur in order.

Serializable consistency: Occurs when the history of operations is equivalent to that which occurred in a single atomic order but say nothing about the invocation and completion times.

Consistency comes with costs, stronger consistency models also tend to require more coordination, more messages forward and backward to ensure that their operations run in the right order. So, in practice, it is better to use the hybrid model i.e.: "weaker" consistency models as far as possible, for availability and performance and "Stronger" consistency models if needed, because the running algorithm requires stricter ordering of operations.

Sources:

Strong consistency models, retrieved from https://aphyr.com/posts/313-strong-consistency-models

  http://cambridge-intelligence.com/keylines/nosql-key-value-column-stores/

–  https://www.researchgate.net/publication/256103742_A_Comparative_Analysis_of_Different_NoSQL_Databases_on_Data_Model

Critical Reply with reference:

Need a similar essay? Click Order Now and get a special bonus- Up to 15% discounts!!!

PSYC Questions

1. Name some tasks that you have performed today that required the use of your phonological loop, visuospatial sketchpad, central executive, or episodic buffer. Can you think of a task that uses all four of these WM components? Is consciousness one of these? Here’s what Alan Baddeley thinks. 

2. One of the current discussions of memory is about just how active it may be. Would it be more of an advantage for memory to serve as a faithful record that never changed or as a record that could be updated and filled in by later experience, even if later interpretations were sometimes mistaken?

3. What is the difference between amnesia and normal forgetting?

Need similar work done? Click Order Now and Fill your assignment details- Up to 15% Discount offer!!!

error: Content is protected !!