Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

I have attached the file and please go through every requirements as mentioned in the file. Thank You.

1 answer below »
Module: Database Essential II
Final Exam
Total marks: 100
Exam Duration: 3 hours
Special Instructions:
• Take a screen shot of the answers that are completed using MS Access and add the screen
shots of the answer under the respective question.
• Two databases (Li
ary and Sales) are provided. Download them to answer the respective
questions.
• Write down your name at the top of the answer sheet.
• Missing Name and Late submissions will have penalty of 5 marks each.
• Any sort of copying is strictly prohibited. If copying is detected, then your exam will
e cancelled, and you will get 0 for this exam.
Question 1 (12 marks): Create a new MS Access database called “Books”. Create three tables
Book, Author and Loan using the DDL command “CREATE” in MS Access one by one. The tables
will have following attributes and information:
Table Name Attribute Name Attribute
Type
Size
Book bookId (set as Primary key)
title
Text
Text
50
100
Author authorId (set as Primary key)
lastName
firstName
gender
Counter
Text
Text
Text
50
50
6
Loan authorId
ookId
dateDue
eturned
Note:
Primary Key: (authorId, bookId, dateDue)
Foreign Key: authorId
Foreign Key: bookId
Integer
Text
DateTime
YesNo
50
Now answer the following questions:
1.a) Write down the DDL commands you used to create the above three tables.
1.b) Give screen shot of the relationship diagram from the relationships tool of MS Access after
unning the DDL commands for the above table creation.
1.c) Write down the DDL command to remove all the tables from the “Books” database.
Question 2 (9 marks): Use the Li
ary Database to answer the following. Show your works
using the screen shot from MS Access.
2.a) List the titles of books where the author name ends with “Celko” and the text “data” appears
in the title.
2.b) List titles of books where the title contains the word “medieval”
2.c) List the titles of books where the title contains the words “medicine” and “medieval”.
Question 3 (12 marks): Use the Tables (Book, Loan and Member) from the Li
ary Database
to write down the SQL queries for the following:
3.a) For each loan show the title of the book and the date it was bo
owed.
3.b) Produce a list that shows for each loan the book title, the name of the member who
o
owed the book, and the dates the book was bo
owed and then returned.
3.c) For member id 2, list the person`s name and the titles bo
owed.
3.d) Produce a list of book titles and member names for those books that have not been
eturned. (Hint: In this case you must give the criteria for dateReturned as null.)
Question 4 (20 marks): For this question, create a database called “University”. Then create the
following two tables Course and Department. The first few rows of Course and Department are:

Note that these two tables have the deptCode field in common.
- In Department table, deptCode is the primary key and is used to identify a specific department.
- In Course table, the deptCode field is a part of the primary key and indicates the department to
which the course belongs.
Now, write queries to the following question and show your screen shots from MS Access:
4.a) List all courses in Mathematics and English where the credit hours are greater than 1.
4.b) List all 3 and 6 credit hour courses that are not ACS courses.
4.c) List courses where the course description contains the word computer but where the course is
not offered by the Applied Computer Science department.
4.d) Create a query to list the department codes (with no duplicates) of departments that offer 6
credit hour courses.
4.e) For each department list the department code, the largest value for credit hours, and the
number of courses.
Question 5 (6 marks): Consider the two tables A and B below.
Table A Table B


5.a) How many rows are in the result if A and B are joined based on the attribute X?
5.b) How many rows are in the result if A and B are joined based on both attributes X and Y?
Question 6 (8 marks): Consider the following SQL statements for the Sales database, and show
how each statement would appear in Design View. You can confirm your result if you create a
query, switch to SQL View, type the query statement and then switch to Design View. Add your
screen shot as the answer for each question.
6.a)


6.b)

Question 7 (9 marks):
7.a) Define the following three terms: Weak Entities, Relationships and Composite Attributes
7.b) Consider your place of work. The Human Resources department in your company needs to
manage information about its employees.
- How many employee entities are there?
- What attributes describe these entities?
7.c) Consider your educational institution.
- What are some of the entity types that would be useful?
- What relationships exist that relate entity types to one another?
- What attributes would be useful to describe entities and relationships?
Question 8 (9 marks):
8.a) A college or university will keep track of several addresses for a student, but each of these
can be named differently: for example, consider that a student has a mailing address and a home
address. Create an ERD for a student entity type with two composite attributes for student
addresses where each comprises several single-valued attributes.
8.b) Consider a li
ary application that needs to keep track of books that have been bo
owed.
Suppose there is an entity type Loan that has attributes bookID, memberID, dateBo
owed and
dateDue. Suppose the due date is always 2 weeks after the bo
owed date. Show date due as a
derived attribute (computed from date bo
owed).
8.c) Map the following ERD to relations.

Question 9 (15 marks):
9.a) Consider a company that owns and operates parking lots. Draw an ER Diagram with two
entity types Parking Lot and Space and where:
- The address of a parking lot serves to identify the lot.
- Each space within a lot is rented at the same monthly rental charge.
- Each parking space is known by its number within the lot (within a lot these always start at 1).
- Each parking space is rented out to at most one vehicle. The vehicle’s identifier must be
ecorded. The identifier comprises a province code and license plate number.
9.b) Develop an ERD to keep track of information for an educational institution. Assume each
course is taught by one instructor, and an instructor could teach several courses. For each instructor
suppose we have a unique identifier, a first name, a last name, and a gender. Each course belongs
to exactly one department. Within a department courses are identified by a course number.
Departments are identified by a department code.
9.c) Develop an ERD to support the management of credit cards. Each credit card has a unique
number and has a customer associated with it. A customer may have several credit cards. The
customer has a first name, last name, and an address. Each time a customer uses a credit card we
must record the time, the date, the vendor, and the amount of money involved.
Answered 2 days After Aug 27, 2024

Solution

Anjali answered on Aug 30 2024
3 Votes
Analyze the role of AI, block chain in enhancing IT GRC frameworks
Abstract
IT Governance, Risk & Compliance is thus witnessing AI and blockchain technology as vital parts, which facilitate organisations in managing cybersecurity and avoiding incidents to frustrate customer satisfaction. Despite the fact that AI and blockchain will challenge with customer satisfaction strategies and create completely new how businesses interact, deliver personalization & remain trusted. In this research a literature analysis is performed to analyse the cu
ent scenario related to use of AI in enhancing IT GRC frameworks in different areas in cyber security, customer satisfaction and incident management. For this purpose a subjective approach in which the number of secondary resources which are available at different digital repositories have been followed. The literature continues to demonstrate evidence that both AI and blockchain serve to increase customer satisfaction by increasing personalization, relative to the ability to make the process more transparent and secure. AI
ings out distinct means of individualization and self-serve assist, which blockchain guarantees safe and utterational transactions and data dealing out.
Keyword
AI and blockchain, IT GRC frameworks, cyber security, customer satisfaction and incident management
Contents
Abstract    1
Keyword    1
Introduction    1
Literature review    1
AI in Cybersecurity    1
Blockchain in Cybersecurity    2
Predictive Analytics    2
Customer Satisfaction With Blockchain    2
Transparency and Trust:    2
Data Privacy and Control:    2
Loyalty Programs:    2
Enhanced Personalization and Transparency:    3
Efficient and Secure Interactions:    3
Proactive Customer Management:    3
AI in Customer Satisfaction    3
Blockchain in Customer Satisfaction    3
Proactive Customer Management    4
3. Incident Management    4
AI in Incident Management    4
Block-chain in Incident Management    4
Discussion    4
Conclusion    5
Introduction
AI and blockchain technology are becoming crucial components of IT Governance, Risk & Compliance frameworks that shape how organisations manage cybersecurity while ensuring customer satisfaction through keeping incidents at bay (Adedamola Oluokun et al., 2024). While AI and blockchain will play with customer satisfaction strategies to transform the way how businesses interact, deliver personalized experiences & stay trusted. Below are their effects based on cu
ent literature
esearch:
Literature review
AI in Cybersecurity
1. Data
each: companies use machine learning, as well as AI algorithms to analyze huge amounts of information and increasingly detect patterns that can signal a data or cyberlogging. On a positive note, they improve threat detection as detecting anomalies and potential threats in real time shrinks the window for possible security incidents.
2. Predictive Analytics: AI can predict potential vulnerabilities and attacks by analyzing trends and historical data. This predictive capability allows organizations to proactively strengthen their defenses.
3. Automated Incident Response: AI-powered systems can automate responses to certain types of threats, such as isolating infected systems or blocking malicious IP addresses, thereby reducing the burden on human security teams and speeding up incident resolution.
Blockchain in Cybersecurity
1. Immutable Logs — Blockchain can be leveraged to create an immutable and tamper-evidence logs of all transactions performed as well any security event occu
ence. It can provide a solid audit trail for compliance and forensic investigations.
2. Secure and Transparent Transactions: Blockchain with heterogeneous networks can provide a decentralized security models where there are multiple parties verifying or validating transactions. Doing this lowers the risk of both single points of failure and general security posture (Apeh Jonathan Apeh et al., 2023).
3. Smart Contracts– Blockchain smart contracts can execute security policies and compliance audits automatically, ensuring that the enforcement of policy around Security is being enforced without manual processes.
Predictive Analytics
1. AI models can project which customers are more likely to churn based on their behaviour and interactions (Predictive Maintenance) (Cangemi, 2021) studied that by using AI in retention strategies businesses tries to go a step further towards stoping customers from churning with help of predictive analytics.
2. Demand Forecast: The AI can forecast customer demand and preferences, enabling businesses to prepare their inventory and marketing strategies accordingly. Right prediction is key to generating the leads and Studies in Operations Research; effective demand forecasting increases customer satisfaction because they receive offers for new products or services that meet their needs (Cangemi & Brennan, 2019).
Customer Satisfaction With Blockchain
Transparency and Trust:
1. Product Provenance: Blockchain offers a clear and non-tamperable chain of events through which the product has gone from production to delivery. In addition to the changing times, (CHERGUI et al., 2019) proved that Blockchain removes trust issue from its core by being transparent and enabling each customer to identify where product comes from in track able way. Instead earlier it was a hypotetically speculated market that is too much oversupplied for global food demands due antibiotic/Microbiological resistance issues.
2. Transparent, secured Transactions: –...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Looking For Homework Help? Get Help From Best Experts!

Copy and Paste Your Assignment Here