What does “URL” stand for?
a) Universal Resource Locator
b) Uniform Resource Locator
c) Unified Resource Locator
d) Unilateral Resource Locator
Category: Databases
Injuries in Military Training Purpose of the project: From an existing data set
Injuries in Military Training
Purpose of the project: From an existing data set you will select 1
dichotomous injury outcome and up to 12 risk factor variables. Using your
selected outcome and risk factors, you will perform the analysis, and then
write-up a Methods and Results section of a scientific manuscript.
A successful completed project will include:
A ONE sentence statement of the purpose of your study.
A concise Methods section of how you met your stated purpose.
A concise Results section on your findings. Included in this
section will be 4 tables:
1. Descriptive frequencies of all variables
2. Univariate associations of all variables with your outcome.
3. A general logistic regression model.
4. A final logistic regression model.
The total word count for the entire project (excluding tables) will be
no more 1200 words. Sections 2 and 3 should be written as if they are
part of a final manuscript being submitted to a journal. 1200 words is
not very much, and the toughest part of these sections will be to stay
within the word count limit.
Background: U.S. Marine Corps recruit training was a 12 week training
program required for all personnel enlisting in the Marine Corps. The
Recruit Training Regiment (RTR), in San Diego, CA, takes men who are
arriving directly from their homes, and produces Marines at the end of
training. Recruit training is a very physically arduous training
program with the goal of producing the most physically fit Marine
possible at the end of 12 weeks. During training, a proportion of
recruits suffer a musculoskeletal injury and seek medical attention.
As part of an effort to develop a fitness curriculum which produces the
greatest fitness improvement while keeping injuries to a minimum, a
study was performed to identify risk factors of injury during training.
A literature search was performed to identify established and potential
risk factors for injury during an arduous physical fitness program.
From this search, a list of risk factors was developed for
investigation. Upon arrival at RTR, a 5% random sample of these
apparently injury-free incoming recruits were asked to volunteer, and
those providing consent were assessed for these risk factors using a
questionnaire. 94% of the sample agreed to participate. The
enrollment process continued for 6 months. After filling out the
questionnaire, recruits were observed over their 12 weeks of training.
Throughout the observation period, any injury reported to the medical
clinic by an enrolled recruit was recorded
The questionnaire used tocollect risk factordata is provided.
There are a number of outcomes for you to choose from. They
are labeled:
STRFX – Stress Fracture
Anklefoot – Ankle or foot injury
Knee – knee injury
Overuse – injury in any location from overuse
Acute – injury in any location from an accident
ITBS – ilio-tibial band tendonitis
Injured – any injury for any reason
HPT – injury to hip, pelvis, or thigh
Pick ONE outcome of interest from above and select your
exposure of interest and up to 11 covariates from the
questionnaire
Annual Report FY [Year] [Add a quote here from one of your company executiv
Annual Report
FY [Year]
[Add a quote here from one of your company executives or use this space for a brief summary of the document content.]
Introduction to Database
IT244
Instructions:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Name: ###
CRN: ###
ID: ###
2 Marks
Learning Outcome(s):
Design a database starting from the conceptual design to the implementation of database schemas.
Question One
Explore the concept of domains in SQL databases and their significance in enforcing data integrity constraints. Describe the steps involved in creating and utilizing domain constraints using the CHECK clause. Provide real-world examples where domain constraints are essential for ensuring the validity and consistency of data. Additionally, discuss the benefits and limitations of using domains compared to traditional CHECK constraints.
3 Marks
Learning Outcome(s):
Create Entity-Relationship model, Relational model, and write SQL queries.
Question Two The following is a Student Table from a database. Write your SQL queries to answer the following questions:
Student_ID
Name
Age
Gender
Grade
1
Sarah
18
Female
90
2
Mohamed
19
Male
85
3
Ahmed
17
Male
77
4
Maryam
18
Female
92
5
Saeed
20
Male
87
Retrieve the Name and Age of students with a Grade greater than 89.
Retrieve the count of Male students in the student table.
Retrieve the average Grade of all students.
Update the Grade of the student with Student_ID 3 to 90.
Delete the record of the student named “Ahmed”.
Insert a new student into the table.
3 Marks
Learning Outcome(s):
Design a database starting from the conceptual design to the implementation of database schemas
Question Three Consider a database schema with the following tables:
CREATE TABLE Students (
StudentID INT PRIMARY KEY,
Name VARCHAR(50),
Age INT,
GPA FLOAT );
CREATE TABLE Courses (
CourseID INT PRIMARY KEY,
CourseName VARCHAR(50) );
CREATE TABLE Enrollments (
EnrollmentID INT PRIMARY KEY,
StudentID INT,
CourseID INT,
Grade FLOAT,
FOREIGN KEY (StudentID) REFERENCES Students(StudentID),
FOREIGN KEY (CourseID) REFERENCES Courses(CourseID));
Solve the following SQL problems by nesting queries.
Write an SQL query to find the names of students who are enrolled in the course ‘Mathematics’ and have a GPA greater than 3.5.
Assuming the same database schema, write an SQL query to find the average GPA of students who have enrolled in the course ‘Physics’.
Extend the previous query to find the average GPA of students who have enrolled in the course ‘Physics’ and whose age is less than 25.
Learning Outcome(s):
Annual Report FY [Year] [Add a quote here from one of your company executiv
Annual Report
FY [Year]
[Add a quote here from one of your company executives or use this space for a brief summary of the document content.]
Data structure
IT245
Instructions:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Name: ###
CRN: ###
ID: ###
3 Marks
Learning Outcome(s):
Demonstrate implemented solution with appropriate data structure and algorithm for the assigned problem
Question One
Given below is a Java method to remove a node from a binary tree. Your task is to:
Write a detailed explanation for each block or segment of the provided code. A block or segment is a logical grouping of lines that perform a specific task or operation together.
Ensure your explanations are clear, concise, and demonstrate your understanding of the code’s functionality.
private BinaryNode
if (t == null)
return t;
int compareResult = x.compareTo(t.element);
if (compareResult < 0)
t.left = remove(x, t.left);
if (compareResult > 0)
t.right = remove(x, t.right);
else if (t.left != null && t.right != null) {
t.element = findMin(t.right).element;
t.right = remove(t.element, t.right);
}
else
t = (t.left != null) ? t.left : t.right;
return t;
}
1 Marks
Learning Outcome(s):
Demonstrate implemented solution with appropriate data structure and algorithm for the assigned problem.
Question Two Write Java code to use a priority queue to sort numbers in ascending order.
4 Marks
Learning Outcome(s):
Outline the differences between different data structures as well as searching and sorting algorithms.
Question Three Compare and contrast any four (4) sorting algorithms based on the following factors:
Time Complexity
Space Complexity
Ease of Implementation
Applications of Algorithm
In this assessment, you will be writing an individual report that encourages you
In this assessment, you will be writing an individual report that encourages you to be creative with business analytics, whilst also developing a response to brief containing a “wicked problem”, to be addressed using Complexity Science principles and Artificial Intelligence. The wicked problem is how to provide greater employment opportunities for people with disabilities in India.
Write a 2,000-word report using on Complexity Science principles and AI in business.
There is a need to research, analyse and graphically display data sets, in addition to the file provided above, to support your findings in your research report.
https://www.kaggle.com/datasets/anushkajn/disabled…
Your recommended initiatives applying complexity science, should also leverage third party reports, of which 2 such reports are provided, labeled:
Article 1- No budget for persons with disabilities in India
https://idronline.org/article/advocacy-government/…
Article 2 – Socio-economic status
https://www.frontiersin.org/journals/public-health…
There is a need to access additional third party reports to support your findings in your research report. You have been asked to write a report on how to achieve improved employment outcomes for people with disabilities in India. In particular:
– How this issue can be viewed in terms of complexity science?
– How can the application of Artificial Intelligence assist?
– Demonstrate how the analytics application of specific data sets can assist with the development of your initiatives?
Your report should have:
1. An introduction (200 words)
2. A section discussing limited employment opportunities for people with disabilities living in India, based on application of data sets and third-party reports (600 words)
3. A section on the role of complexity science in helping to improve these employment opportunities (200 words)
4. A section recommending how artificial intelligence can be used in conjunction with complexity science in the future for improving employment opportunities for people living with disabilities in India (800 words)
5. A summary (200 words)
6. At least 15 references in Harvard or another recognised academic format.
IT403 Fundamentals of Databases Please use your keyboard (Don’t use handwriting
IT403
Fundamentals of Databases
Please use your keyboard (Don’t use handwriting) also, (Use your own words, don’t copy and paste and avoid plagiarism)
All answered must be typed using Times New Roman (size 12, double-spaced) font.
WORD format only
– You will find a Word file attached.
The questions are in the attached file. There are 3 questions. The answers must
The questions are in the attached file. There are 3 questions. The answers must be plagiarism free.
Improvement of the timeline by : 1- Showing the Progress for each project 2- Sho
Improvement of the timeline by :
1- Showing the Progress for each project
2- Showing if there is a delay in each stage. Please work accordingly. I want this timeline to operate dynamically once I update the status
Our Stages for the Projects are:
Concept > FEED > Procurement > Construction
Please consider these stages
Describe software packages which offer data Manipulation in a computer. Describe
Describe software packages which offer data Manipulation in a computer. Describe the process of data Manipulation. State the advantages of data Manipulation
This project is worth 14 marks and will be distributed as the following: oDesign
This project is worth 14 marks and will be distributed as the following:
oDesign a Conceptual Schema using ER modeling concepts, including (Entities, Relationships, Attributes, Participation (Total or Partial), and Cardinality). (3 marks)
oTables before Normalization. (2 marks)
oTables after Normalization Using mapping Algorithm. (3 marks)
oUse MySQL or any other DBMS to create the normalized tables and
populate your tables with at least 10 rows. (3.5 marks)
oExecute the requested sample queries. (2.5 marks)
Each student must submit one report about their chosen Project via the Blackboard (Email submission will not be accepted and will be awarded ZERO marks) containing the following:
a)ER Diagram.
b)All schemas before normalization.
c)All schemas after normalization.
d)All SQL statements of:
§Creating tables.
§Inserting data in tables.
e)All requested queries/results.
Screenshots from MySQL (or any other software you use) of all the tables after population and query results.
You are advised to make your work clear and well presented; marks may be reduced for poor presentation. This includes filling in your information on the cover page.
You MUST show all your work, and text must not be converted into an image unless specified otherwise by the question.
Late submission will result in ZERO marks being awarded.
The work should be your own. Copying from students or other resources will result in ZERO marks.
Project I
Database System for a car rental company
Consider the company requirements as follows:
A car rental company needs a comprehensive database system to streamline its operations. The system should enable customers to rent cars from multiple locations (Riyadh, Jeddah, Makkah, Dammam, Al-Khobar, Qasim, Tabuk, AL-Baha, Al-Jawf, Ha’il, Aseer, Jazan, Najran). Customers will be required to register by providing their full name, email, phone number, and date of birth. The company owns a fleet of cars, which contains important details such as the manufacturer, model, manufacturing year, license plate, and daily rental rate. Every rental transaction will involve the customer, the rented car, and the rental period (start and end dates). As the company operates in multiple cities and states, multiple rental locations are available, each with its name, street address, city, state, and postal code.
Customers can rent multiple cars, and each car can be rented by multiple customers. A specific rental location will be associated with each car. Moreover, each rental transaction will be linked to a specific rental location. To maintain data integrity, constraints such as unique customer and car IDs will be enforced. Rental transactions must be associated with both a customer and a car.
On the other hand, each car should be linked to a rental location. Reports on rental transactions will be generated, including customer information, location, and period. User roles will be implemented for customers and system administrators. Customers will be able to view available cars, rent cars, and access their rental history. Meanwhile, administrators will be able to manage car inventory, rental locations, and customer accounts.
The system will ensure that cars are available for rent at specific locations and track car availability to prevent overbooking. Rental costs will be calculated based on the rental rate per day. User authentication and authorization will be implemented to protect customer data and system operations.