Describe      the conditions under which ROI, payback period, NPV, and EVA are most      appropriately applied to information systems investments.

6 discussions 200 words each minimum

1

“IT Infrastructure and Architecture” Please respond to the following:

  • Think      about a company you know well. What would be an example of IT architecture      at that company? An example of the IT infrastructure?
  • What,      in your opinion, is the difference between a decentralized architecture      and a centralized architecture? What is an example of a business decision      that would be affected by the choice of the architecture?

2

” Bring Your Own Device (BYOD) or Bring Your Own Technology (BYOT)” Please respond to the following:

  • With      the proliferation of smart phones and intelligent computing tablets such      as the iPad, enterprises are increasingly faced with employees who want to      bring their own devices and connect to enterprise systems. Determine      whether or not employers should allow this type of connectivity to      enterprise systems. Support your reasoning with three examples.

3

” Case Study Part 1: Sony Pictures” Please respond to the following:

  • Setting      aside the political issues between North Korea and the United States, is      there a reasonable way to respond to an anonymous threat found on the      Internet somewhere? What elements would you require before canceling the      film if you were CEO of Sony? If you were CEO of a chain of theaters?
  • What      access and data protection controls would you recommend Sony use to      provide better security for unreleased digital films and e-mails?

4

” Case Study Part 2: Sony Pictures” Please respond to the following:

  • If you      were a hacker, what approach would you have used to break into Sony’s      system?
  • What      do you think the most important SETA elements would be to prevent future      hacker attacks against Sony or other media firms?

5

“Total Cost of Ownership (TCO)” Please respond to the following:

  • TCO is      one way to account for costs associated with a specific infrastructure.      This method does not include additional costs such as disposal costs — the      costs to dispose of the system when it is no longer of use. What other      additional costs might be of importance in making total cost calculations?

6

“Information System Investments” Please respond to the following:

  • Describe      the conditions under which ROI, payback period, NPV, and EVA are most      appropriately applied to information systems investments.

Define networking, tell how it works, and explain how it can help Pentium, Inc.  (Chapter 1)

Use information from chapters 1 – 4 for this paper.

 

Suppose that the CEO of Pentium Inc. approaches you seeking advice on improving their computer network at their company.  At the moment, their organization has numerous computers (all networked) which are shared by a staff of 100.  The staff are based out of the Pittsburgh headquarter location along with a facility located in Los Angeles and New York City.  Unfortunately the organization is having problems with the network since it was not installed properly and due to its old age (it was installed in 1995).

 

The current network environments consists of the following:

·      Various Stand Alone systems along with numerous Peer to Peer networks

·      Modem connections to remote offices

·      Network equipment that doesn’t meet generally accepted networking standards (i.e. OSI / TCP/IP or DoD)

·      Few systems connected to the Internet

 

The employees of Pentium Inc. are requesting that the new network be fast, flexible and able to meet the needs of their fast growing company.  Write a paper to the CEO on the following elements:

(a)   Define networking, tell how it works, and explain how it can help Pentium, Inc.  (Chapter 1)

(b)  Identify what type of network would be best for this organization (especially to connect the different locations to each other) (Chapter 1)

(c)   Explain why networking standards are important and why equipment that uses these standards should be purchased (Chapter 2)

(d)  Compare the use of Ethernet and Token Ring and the devices (i.e. hubs, bridges, etc) needed to implement each type of network (Chapter 3)

(e)   Compare and contrast TCP/IP and AppleTalk features and benefits (Chapter 3)

(f)   Compare and contrast peer-to-peer, client/server, and directory services networks (Chapter 4)

(g)   Write a summary describing which technology you recommend installing and why.

Describe the circumstances in which you would choose to use embedded SQL rather than SQL alone or only a general-purpose programming language.

Describe the circumstances in which you would choose to use embedded SQL rather than SQL alone or only a general-purpose programming language.

Answer:

5.2 Write a Java function using JDBC metadata features that takes aResultSet as an input parameter, and prints out the result in tabular form, with appropriate names as column headings.

Answer:

 

5.3 Write a Java function using JDBC metadata features that prints a list of all relations in the database, displaying for each relation the names and types of its attributes.

Answer:

5.4 Show how to enforce the constraint “an instructor cannot teach in two different classrooms in a semester in the same time slot.” using a trigger (remember that the constraint can be violated by changes to the teachesrelation as well as to the section relation).

Answer:

5.5 Write triggers to enforce the referential integrity constraint from sectiontotimeslot, on updates to section, and time
in Figure 5.8 do not cover the update operation.slot. Note that the ones we wrote 5.6 To maintain the tot cred attribute of the studentrelation, carry out the fol-lowing:
a. Modify the trigger on updates of takes, to handle all updates that canaffect the value of tot
b. Write a trigger to handle inserts to the takes relation.cred.
c. Under what assumptions is it reasonable not to create triggers on thecourse relation?

Answer:

5.7 Consider the bank database of Figure 5.25. Let us define a view branch custas follows:

     create view branch cust as
select 
branch name, customer name
     from depositor, account
     where depositor.account number account.account number

Answer:

5.8 Consider the bank database of Figure 5.25. Write an SQL trigger to carry out the following action: On delete of an account, for each owner of the account, check if the owner has any remaining accounts, and if she does not, delete her from the depositor relation.

Answer:

 

5.9 Show how to express group by cube(a, b, c, d) using rollup; your answer should have only one group by clause.

Answer:

 

5.10 Given a relation S(student, subject, marks), write a query to find the top n students by total marks, by using ranking.

Answer:

 

5.11 Consider the sales relation from Section 5.6.Write an SQL query to compute the cube operation on the relation, giving the relation in Figure 5.21. Do not use the cube construct.

Answer:

 

5.12 Consider the following relations for a company database:

emp (ename, dname, salary)

mgr (ename, mname) and the Java code in Figure 5.26, which uses the JDBC API. Assume that the userid, password, machine name, etc. are all okay. Describe in concise

English what the Java program does. (That is, produce an English sentence like “It finds the manager of the toy department,” not a line-by-line description of what each Java statement does.)

Answer:

 

5.13 Suppose you were asked to define a class MetaDisplay in Java, containing a method static void printTable(String r); the method takes a relation name r as input, executes the query “select * from r”, and prints the result out in nice tabular format, with the attribute names displayed in the header of the table.

 

import java.sql.*;

public class Mystery {

public static void main(String[] args) {

try {

Connection con=null;

Class.forName(“oracle.jdbc.driver.OracleDriver”);

con=DriverManager.getConnection(

“jdbc:oracle:thin:star/X@//edgar.cse.lehigh.edu:1521/XE”);

Statement s=con.createStatement();

String q;

String empName = “dog”;

boolean more;

ResultSet result;

do {

q = “select mname from mgr where ename = ’” + empName + “’”;

result = s.executeQuery(q);

more = result.next();

if (more) {

empName = result.getString(“mname”);

System.out.println (empName);

}

} while (more);

s.close();

con.close();

} catch(Exception e){e.printStackTrace();} }}

 

a. What do you need to know about relation r to be able to print the result in the specified tabular format.

b. What JDBC methods(s) can get you the required information?

c. Write the method printTable(String r) using the JDBC API.

Answer:

 

5.14 Repeat Exercise 5.13 using ODBC, defining void printTable(char *r) as a function instead of a method.

Answer:

 

5.15 Consider an employee database with two relations

     employee (employee name, street, city)

     works (employee name, company name, salary)

where the primary keys are underlined. Write a query to find companies

whose employees earn a higher salary, on average, than the average salary at “First Bank Corporation”.

a. Using SQL functions as appropriate.

b. Without using SQL functions.

Answer:

 

5.16 Rewrite the query in Section 5.2.1 that returns the name and budget of all

departments with more than 12 instructors, using the with clause instead of using a function call.

Answer:

 

5.17 Compare the use of embedded SQL with the use in SQL of functions defined in a general-purpose programming language. Under what circumstances would you use each of these features?

Answer:

 

5.18 Modify the recursive query in Figure 5.15 to define a relation

     prereq depth(course id, prereq id, depth)

where the attribute depth indicates how many levels of intermediate prerequisites are there between the course and the prerequisite. Direct prerequisites have a depth of 0.

Answer:

 

5.19 Consider the relational schema

     part(part id, name, cost)

     subpart(part id, subpart id, count)

A tuple (p1, p2, 3) in the subpart relation denotes that the part with part-id p2 is a direct subpart of the part with part-id p1, and p1 has 3 copies of p2.

Note that p2 may itself have further subparts. Write a recursive SQL query that outputs the names of all subparts of the part with part-id “P-100”.

Answer:

 

5.20 Consider again the relational schema from Exercise 5.19. Write a JDBC function using non-recursive SQL to find the total cost of part “P-100”,including the costs of all its subparts. Be sure to take into account thefact that a part may have multiple occurrences of a subpart. You may userecursion in Java if you wish.

Answer:

 

5.21 Suppose there are two relations r and s, such that the foreign key B of r references the primary key Aof s. Describe how the trigger mechanism canbe used to implement the on delete cascade option,when a tuple is deleted from s.

Answer:

 

5.22 The execution of a trigger can cause another action to be triggered. Most database systems place a limit on how deep the nesting can be. Explain why they might place such a limit.

Answer:

 

5.23 Consider the relation, r , shown in Figure 5.27. Give the result of the following query:

 

uilding room

number

time

slot

id

course

id

sec

id

Garfield Garfield Saucon Saucon Painter Painter 359

359

651

550

705

403

A B A C D D BIO-101 BIO-101 CS-101 CS-319 MU-199 FIN-201 1 2 2 1 1 1

 

     select building, room number, time slot id, count(*)

     from r

     group by rollup (building, room number, time slot id)

Answer:

 

5.24 For each of the SQL aggregate functions sum, count, min, and max, show how to compute the aggregate value on a multiset S1 ∪S2, given the aggregate values on multisets S1 and S2.

On the basis of the above, give expressions to compute aggregate values with grouping on a subset S of the attributes of a relation r (A, B,C, D, E), given aggregate values for grouping on attributes T S, for the following aggregate functions:

a. sum, count, min, and max

b. avg

c. Standard deviation

Answer:

 

5.25 In Section 5.5.1, we used the student grades view of Exercise 4.5 to write a query to find the rank of each student based on grade-point average.

Modify that query to show only the top 10 students (that is, those students whose rank is 1 through 10).

Answer:

 

5.26 Give an example of a pair of groupings that cannot be expressed by using a single group by clause with cube and rollup.

5.27 Given relation s(a, b, c), show how to use the extended SQL features to generate a histogram of c versus a, dividing a into 20 equal-sized partitions

(that is, where each partition contains 5 percent of the tuples in s, sorted by

a).

Answer:

 

5.28 Consider the bank database of Figure 5.25 and the balance attribute of the account relation. Write an SQL query to compute a histogram of balance values, dividing the range 0 to the maximum account balance present, into three equal ranges.

 

Answer:

Describe the Christian worldview’s proposal for resolving the ethical dilemma. How should the person in the scenario act according to the Christian worldview

In this assignment, you will analyze the implications of an ethical issue according to the Christian worldview. You will be challenged to think about Christian worldview core beliefs and apply what you have learned over this course. This will be a thorough analysis of a case study you will choose from the options provided.

Write a 1,000-1,500-word essay in which you analyze ethical thinking and use values-based decision-making to address a case study from the perspective of the Christian worldview. Choose one case study from the five options listed in the attached “Ethical Dilemmas” document.

After an appropriate introductory paragraph with a thesis statement in which you name the scenario you are choosing, address each of the following six sections with at least one paragraph each. Write at least one paragraph for each component using the underlined titles for a subheading.

  1. Ethical Dilemma: Briefly describe the ethical dilemma in your own words, including (a) what in the scenario makes it difficult to make an ethical decision and (b) at least two options for resolving the scenario, providing a brief overview of what sort of ethical decisions each option might make.
  2. Core Beliefs: What beliefs about God and humanity from the Christian worldview are relevant to the scenario? How might these core worldview commitments of Christians influence one’s decision-making with regard to this scenario?
  3. Resolution: Describe the Christian worldview’s proposal for resolving the ethical dilemma. How should the person in the scenario act according to the Christian worldview? What is the best course of action for a Christian? (Note: The resolution should be consistent with Christian worldview commitments.)
  4. Evaluation: What might be the unintended consequences and perceived benefits of the resolution proposed by the Christian worldview?
  5. Comparison: How does the Christian worldview resolution compare to how another worldview might resolve the dilemma? Choose a specific contrasting worldview, such as atheism, pantheism, or scientism.
  6. Conclusion: Synthesize the main points, pulling the ideas of the paper together.
  7. References

Use and cite two course resources (textbook, lectures, and the Bible), and at least two scholarly sources from the GCU Library that address the issue from opposing sides. Refer to the directions on “Navigating the GCU Library for CWV Benchmark Research” and the “Example Ethical Dilemma Essay.”

Prepare this assignment according to the guidelines found in the GCU Style Guide, located in the Student Success Center. Review the GCU Template for formatting and utilize the attached “Ethical Dilemmas Essay Template” to complete the benchmark assignment.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to Turnitin. Please refer to the directions in the Student Success Center.

This benchmark assignment assesses the following competencies:

MC1: Critical Thinking

MC2: Effective Communication

MC3: Christian Worldview Knowledge