Have a Question ?

Expert Answers

Search solutions for your assignments from our database.
We have 20+ millions solutions for question that will help you improve your grades

1

(Solved): CIS 355 Data Warehousing and Dimensional Modeling Spring 202...


CIS 355
Data Warehousing and Dimensional Modeling
Spring 2022
Assignment #1 – 25 Points


See Canvas and/or course schedule for due date/time
Situation:
You work for a retail company that has stores and operations across Arizona and California. Currently your company has no data warehouses, data marts, operational data stores, or any other integrated stores of data used for reporting, BI, and analytics. Your company also has an Internet presence with a website from which customers can purchase products.

For purposes of this assignment, you are interested in the following seven applications:

1. Supply Chain Operations, Arizona Region – this application manages all supply chain functions for the company’s Arizona Region. The functions
managed by this application include materials and inventory management; vendor management; materials ordering and defective material return; shipping and logistics; warehouse management; etc.

2. Supply Chain Operations, California Region – this application is identical to the Supply Chain/Arizona Region application described above, except that
it performs the supply chain functions for all of California. 

3. Customer Relationship Master System, California Region – this application contains a master list of all of the company’s customers who live in the California Region. For each customer we also a complete sales history, the names of their top officers and key employees, and other important information that gives us a complete picture of “everything we need to know” about that customer.

4. Customer Relationship Master System, Arizona Region – this application is identical to the one described above, except that it contains the
aforementioned information about all of the company’s customers who live in provinces and territories that are included in the Arizona Region.

5. In-Store Sales System, California Region – Each of the company’s stores has a point-of-sale (POS) system that handles all product purchases, payments, returns, and refunds. All of the stores in the company’s California Region feed data daily from each POS system to a centralized In-Store Sales System for the entire California Region, which summarizes all sales within the California Region and also maintains a history of past sales as well.


6. In-Store Sales System, Arizona Region – This application is identical to the one described above, except that it consolidates and organizes sales data
from all of our stores in the Arizona Region.

7. Online Sales System, Arizona and California (combined) – This application handles all Internet sales for all customers regardless of where they live in Arizona or California, and is a separate sales system than either of the in-store sales systems described above. (For purposes of this assignment, assume that only California and Arizona residents can purchase products online.)

_____________________________


Question #1 (15 Points)
For the scenario described above, draw the high-level architecture from the listed source systems through data marts for an enterprise data warehousing
environment that follows the Corporate Information Factory (CIF) architecture approach. Make sure you clearly show your ETL and data delivery data flows from each source to each target. You will decide which specific data marts your environment will include.

After you draw your diagram, you will then:

• List and describe at least two (2) very specific advantages of the CIF approach for enterprise-scale data warehousing for this company, versus the federated approach (not generalities about data warehousing benefits, etc.)

• List and describe at least two (2) very specific challenges/disadvantages of the CIF approach for enterprise-scale data warehousing for this company versus the federated approach (not generalities about data warehousing challenges, etc.)

 



Question #2 (15 points)
Now presume that your company’s Chief Information Officer (CIO) is a strong believer in smaller-scale efforts rather than large, enterprise-intensive ones such as CIF or the Dimensional Data Warehouse Bus Architecture. The CIO directs you to define the architecture for a Federated Enterprise Data Warehouse comprised of multiple independent data marts.

Draw the high-level architecture from the source systems listed at the beginning of this assignment through the data marts for a Federated EDW. Make sure you clearly  show your ETL data flows from each source to each target. You will decide which specific data marts your environment will include. (Hint: for this question and also for Question #1, defining the data marts might be trickier than you think!)

After you draw your diagram, you will then:

• List and describe at least two (2) very specific advantages of the Federated EDW approach for enterprise-scale data warehousing for this company versus the CIF approach (not generalities about data warehousing challenges, etc.)

• List and describe at least two (2) very specific challenges/disadvantages of the Federated EDW approach for enterprise-scale data warehousing for this
company versus the CIF approach (not generalities about data warehousing challenges, etc.)



Submission Format
Your choice: for example, a Microsoft Word document with your diagrams prepared in PowerPoint and then pasted into your Word document. Or you may use any other software as well. If you use anything other than Microsoft Word and/or PowerPoint, save your file as a PDF and upload your PDF.


View Buy Answer $15 Sign In -- OR --

1

(Solved): cis 105 ABCC - Quiz | Chapter 8 Knowledge Check...


ABCC - Quiz | Chapter 8 Knowledge Check

 

Submission Score:

100 / 100 (100.00%)

Top of Form

  1. Yahoo, Google, and Bing are examples of _____________.
    • Search engines
    • Bots
    • Spiders
    • Directories

FEEDBACK

10 / 10  (100.0%)

  1. Social engineering is _________________.
    • Deception used to manipulate individuals into divulging confidential information
    • Spam email that requests information of a personal nature
    • A con scheme to gain personal information
    • Impersonation of another individual

FEEDBACK

10 / 10  (100.0%)

  1. Put the IoT life cycle actions in the correct order.
    • Collect, analyze, communicate, act
    • Analyze, collect, communicate, act
    • Collect, communicate, analyze, act
    • Communicate, collect, analyze, act

FEEDBACK

10 / 10  (100.0%)

  1. What is one reason the internet is moving from IPv4 to IPv6?
    • IPv4 software needs to be upgraded to IPv6.
    • IoT devices have used up all the IPv4 addresses.
    • IPv6 has better security protocols.
    • RISC processors require IPv6.

FEEDBACK

10 / 10  (100.0%)

  1. A separate window that opens within a browser without user interaction is known as a _________________.
    • Ad block
    • Frame
    • Popup
    • Frame area

FEEDBACK

10 / 10  (100.0%)

  1. The ________ is composed of millions of smart devices and sensors connected to the internet.
    • Internet of Things
    • Cloud
    • Cell network
    • Extranet

FEEDBACK

10 / 10  (100.0%)

  1. Which type of malware usually activates at a future date?
    • Worm
    • Trojan horse
    • Spyware
    • Virus

FEEDBACK

10 / 10  (100.0%)

  1. Which type malware has the ability to be self-replicating?
    • Worm
    • Spyware
    • Trojan horse
    • Virus

FEEDBACK

10 / 10  (100.0%)

  1. Trojan horse
    • Software that routinely displays advertising to a computer system after it has been installed
    • A harmless or interesting looking program that, when executed, unleashes harmful viruses into a user’s system
    • A malicious program that spreads quickly and is extremely harmful but it does not need to attach itself to an existing program
    • The practice of redirecting an internet user to a bogus website that mimics the appearance of a legitimate site in order to obtain personal information

FEEDBACK

10 / 10  (100.0%)

  1. Which type of malware gleans personal data and information about the user without his or her knowledge?
    • Trojan horse
    • Virus
    • Spyware
    • Worm

FEEDBACK

10 / 10  (100.0%)

 


View Buy Answer $12 Sign In -- OR --

1

(Solved): CIS 365 – Business Database Systems HW9.2 – Advanced DML...


CIS 365 – Business Database Systems
HW9.2 – Advanced DML (75 points)
This is an individual exercise, NOT a group assignment.


1. Show all the guests stays in 2019 who didn’t reserve any activities. The result will show the guest ID, first name, last name, and reservation ID (should be Null). (15 points)


2. Show all the guide's full name, hired date, their manager’s full name, manager’s hired date, and personnel type. (15 points)


3. Display Condos in building A that have more expensive weekly fee than the average of all condos in FamCation. Display Condo ID, Weekly Fee, and Average Weekly Fee in the query result. Label the average fee as "Average Weekly Fee" and only display 2 significant digits. (15 points)


4. Use the UNION clause to list the highest weekly fee for building A, lowest weekly fee for B, and average weekly fee for C. Display the "Category" (Highest Weekly Fee, Lowest Weekly Fee, Average Weekly Fee), "Building number" and "Weekly fee" as showed below. The result is sorted by building number. (15 points)


5. Recreate a new_Condo_A table by inserting all building A records from the Condo table. Write a CASE statement to change the weeklyfee in New_Condo_A by adding 15% weeklyfee to condos with 3 bedrooms, 10% to condos with 2 bedrooms, and 5% to condos with 1 bedroom. Display the query result BEFORE the change and AFTER the changes. Show all the attributes in New_Condo_A. (15 points)


Due Date: EOD Thursday 11/4
• Take a screenshot of your query statement and result in MS SQL. Paste all queries/results in your Word doc. (SnagIt available in ASU software tool library is a good screenshot tool)
• Convert the entire document into one pdf file for submission.
• Save your file name as HW9.2-Student Name.pdf.
• Submissions must be posted to Canvas to be graded.


View Buy Answer $25 Sign In -- OR --

1

(Solved): CIS 365 – Business Database Systems HW9.1 – Advanced DML...


CIS 365 – Business Database Systems
HW9.1 – Advanced DML (70 points)


How to put comments in your homework submission -

/ckeditor_aw_38620211023081006.png
1. Display Condo id, building number, booking id, and booking start date in year 2020. (10 points)

/ckeditor_aw_98620211023081039.png
2. Show all building C condos cleaned in August 2019. Display the condo ID, date cleaned, housekeeper’s first and last name. Display and label the first name and last name together in one column as Housekeeper. (10 points)

/ckeditor_aw_66620211023081059.png
3. Display guides who didn't renew their certificates within 2 years. List their ID, first name, last name, certificate date, and renew date. (10 points)
4. Show guides who have led more than 8 reservations. Display guide id, last name, hire date, the number of reservations (label as "Reservations per Guide"). The highest count will be displayed first. (10 points)
5. Display the guest id, guest first name and last name, booking start date, and condo id. Label the 'Guest Name' and order the result by guest ID and then start date. (15 Points)
6. Count the number of girls and boys in each age group. The result will show age group, relationship, and count number. All the girls will be listed first, and then boys. Within each boy and girl group, order the age from the youngest to the oldest. (15 points).
Due Date: EOD Thursday 10/28
• Take a screenshot of your query statement and result in MS SQL. Paste all queries/results in your Word doc. (SnagIt available in ASU software tool library is a good screen shot tool)
• Convert the entire document into one pdf file for submission.
• Save your file name as HW9.1-Student Name.pdf.
• Submissions must be posted to Canvas to be graded.


View Buy Answer $15 Sign In -- OR --

1
1
1

(Solved): SWU 171: Chapter 8 Quiz ...


Chapter 8 Quiz 

Due Oct 27 at 11:59pm

  • Instructions
  • This quiz is worth 10 points. It covers the following topics:

Score for this attempt: 10 out of 10

 

Question 1

1 / 1 pts

Prejudice against people based solely on age is called:Correct!

  •   ageism
  •   gerontologism
  •   elder abuse 
  •   baby boomer phobia

 

Question 2

1 / 1 pts

What role does the ombudsman play within elderly care?

  •   Advocates for active euthanasia
  •   Advocates for passive euthanasiaorrect!
  •   Advocates for residents of nursing homes, board and care comes and assisted living facilities  
  •   Advocates for advanced directives 

Question 3

1 / 1 pts

Which of the following is NOT true of caregivers of people who are older?

  •   The average age of caregivers is 49.
  •   Caregiving can have a negative effect on the caregiver's financial well-being.Correct!
  •   Caregivers do not need to be encouraged to seek resources for themselves, as they do this well. Caregivers can suffer emotionally from caregiving.

Question 4

1 / 1 pts

The oldest-old or frail older people (85 and over) are projected to be the fastest-growing segment of the population in the 21st century.

Correct!

  •   True 
  •   False

Question 5

1 / 1 pts

Medicare is needs-based health insurance for individuals whoes income and assets fall below a set amount 

  •   TrueCorrect!
  •   False

Question 6

1 / 1 pts

What is the basic health insurance program for all people 65 and over??

  •   Medicaid
  •   SSICorrect!
  •   Medicare 
  •   Social Security 

Question 7

1 / 1 pts

Approximately 3.7 million grandparents have primary responsibility for their grandchildren

  •   True orrect!
  •   False

Question 8

1 / 1 pts

Gerontology is the study of

  •   social securityorrect!
  •   the biological, psychological, and social aspects of aging. 
  •   mental health.
  •   medical needs.

Question 9

1 / 1 pts

Diverse communities have strengths that can be an asset to social workers to assist clients.orrect!

  •   True 
  •   False

Question 10

1 / 1 pts

Indigenous older people are the group most likely to utilize existing government services.

  •   True Correct!
  •   False

 

 


View Buy Answer $15 Sign In -- OR --

1

(Solved): CIS 105: Quiz 3 Submission Score:    100 / 100 (100%) S...


CIS 105: Quiz 3

Submission Score:    100 / 100 (100%)
Grade Time:    Oct 24 
Submitted On:    Oct 24 

· Which type of memory helps decrease the time it takes to access memory?

  • CPU cache
  • Virtual memory
  • RAM
  • Registers

FEEDBACK

10 / 10  (100.0%)

·  What is the dominant OS in the operating system market?

  • Mac OS
  • Windows
  • UNIX
  • Linux

FEEDBACK

10 / 10  (100.0%)

·  Who developed the earliest Mac OS?

  • Tim Berners-Lee
  • Bill Gates
  • Bill Gates and Paul Allen
  • Steve Jobs and Steve Wozniak

FEEDBACK

10 / 10  (100.0%)

·  Transmission Control Protocol/Internet Protocol (TCP/IP)

  • Allows the OS to communicate with a particular piece of peripheral hardware
  • A job or task a computer performs
  • A collection of computer programs that work together to manage hardware and software to ensure that they are working properly
  • Directs the read/write arm of the hard drive to where data exists and accesses it upon the user’s request
  • A set of rules for transferring information from one computer to another

FEEDBACK

10 / 10  (100.0%)

·  Who is authorized to modify Linux?

  • Anyone
  • Programmers
  • Only the original coders
  • No one

FEEDBACK

10 / 10  (100.0%)

·  Which operating system is open source?

  • Linux
  • UNIX
  • Mac OS
  • Windows

FEEDBACK

10 / 10  (100.0%)

·  Defragmentation

  • A set of rules for transferring information from one computer to another
  • A program that reorganizes the hard disk
  • Directs the read/write arm of the hard drive to where data exists and accesses it upon the user’s request
  • A presentation on a computer monitor that allows the user to interact with a computer and the devices connected to it
  • A collection of computer programs that work together to manage hardware and software to ensure that they are working properly

FEEDBACK

10 / 10  (100.0%)

·  What is the set of rules to move data from one computer to another over a network?

  • RAM array
  • TCP/IP
  • RAM
  • UDS

FEEDBACK

10 / 10  (100.0%)

·  Which operating system is free of cost?

  • Mac OS
  • UNIX
  • Windows
  • Linux

FEEDBACK

10 / 10  (100.0%)

·  Process

  • A job or task a computer performs
  • A set of rules for transferring information from one computer to another
  • Allows the OS to communicate with a particular piece of peripheral hardware
  • A presentation on a computer monitor that allows the user to interact with a computer and the devices connected to it
  • A collection of computer programs that work together to manage hardware and software to ensure that they are working properly

FEEDBACK

10 / 10  (100.0%)


View Buy Answer $10 Sign In -- OR --

1

(Solved): CIS 105: Quiz 2 : Submitted On: Oct 24 : Submission Score: 1...


CIS 105: Quiz 2

Submission Score:    100 / 100 (100%)
Grade Time:    Oct 24 
Submitted On:    Oct 24 

 

  1. System unit

 

    • Less powerful and smaller in physical size than mainframe computers but perform many of the same processes, simply on a smaller scale
    • The least powerful computers in terms of processing and typically come in four configurations: desktop, laptop, tablet, and handheld
    • Main body of a computer that contains a motherboard
    • Pathways that transfer data and power

FEEDBACK

10 / 10  (100.0%)

  1. Which type of memory is primary storage?
    • Hard drive
    • Soft drive
    • RAM
    • Cloud drive

FEEDBACK

10 / 10  (100.0%)

  1. Which coding scheme do most microcomputers use?
    • EBCDIC
    • UML
    • ASCII
    • Unicode

FEEDBACK

10 / 10  (100.0%)

  1. Microprocessor
    • Serves as the brains for the microcomputer
    • Less powerful and smaller in physical size than mainframe computers but perform many of the same processes, simply on a smaller scale
    • Main body of a computer that contains a motherboard
    • The least powerful computers in terms of processing and typically come in four configurations: desktop, laptop, tablet, and handheld

FEEDBACK

10 / 10  (100.0%)

  1. Microcomputers
    • Less powerful and smaller in physical size than mainframe computers but perform many of the same processes, simply on a smaller scale
    • Main body of a computer that contains a motherboard
    • The least powerful computers in terms of processing and typically come in four configurations: desktop, laptop, tablet, and handheld
    • Pathways that transfer data and power

FEEDBACK

0 / 10  (0.0%)

  1. How are bus lines measured?
    • Width
    • Height
    • Gigahertz
    • Megahertz

FEEDBACK

10 / 10  (100.0%)

  1. Many chips encased in one chip working together is called a ________.
    • Multicore
    • Metaprocessor
    • RAM
    • Multichip

FEEDBACK

10 / 10  (100.0%)

  1. What determines a monitor’s resolution?
    • Brightness
    • Pixel mass
    • Acuity measure
    • DPI

FEEDBACK

10 / 10  (100.0%)

  1. Bus lines
    • Binary system of ones and zeros
    • Specialized circuit board that can be plugged into a motherboard
    • Main body of a computer that contains a motherboard
    • Pathways that transfer data and power

FEEDBACK

10 / 10  (100.0%)

  1. Where does the microprocessor reside?
    • On the local hard drive
    • On the motherboard
    • In virtual memory
    • In RAM

FEEDBACK

10 / 10  (100.0%)

 


View Buy Answer $10 Sign In -- OR --

1

(Solved): CIS 105 : Quiz 1 : Submitted Oct 24 : Submission Score: 100 ...


CIS 105: Quiz 1

Submitted Oct 24 

Submission Score: 100 / 100 (100%) 

· People that use computers are called ________.

  • Users
  • End-users
  • Smartpeople
  • IT personnel

FEEDBACK

10 / 10  (100.0%)

·  Gordon Moore made which of the following observations?

  • PCs bought today will be obsolete in three years.
  • Microcomputers will replace mainframe computers.
  • Computer networks require diligent security.
  • Computing power doubles every 18 months.

FEEDBACK

10 / 10  (100.0%)

·  Which of the following is a major difference between application software and system software?

  • Application software is chosen by the business, whereas system software is chosen by the hardware manufacturer.
  • Application software is a business asset purchased by the business, whereas system software is not.
  • Application software does end-user work, whereas system software monitors the hardware.
  • Application software is used by the end-user, whereas system software controls peripherals.

FEEDBACK

10 / 10  (100.0%)

·  Which of the following is NOT an example of a paradigm shift?

  • Email
  • Internet
  • Google Live
  • Cell phones

FEEDBACK

10 / 10  (100.0%)

·  Which of the following is a component of IT?

  • Laptops
  • Smartphones
  • Macs
  • All of the above

FEEDBACK

10 / 10  (100.0%)

·  Attitude

  • Computing power doubles every eighteen months
  • Plays a pivotal role in gaining computer competency
  • Knowledge that enables a person to understand something
  • A fundamental change in approach or underlying assumptions about a process or way of thinking about or doing something
  • A management process, technique, or method that is most effective at arriving at a desired or better outcome than any other process, technique, or method

FEEDBACK

10 / 10  (100.0%)

·  Competency

  • Computing power doubles every eighteen months
  • Plays a pivotal role in gaining computer competency
  • A management process, technique, or method that is most effective at arriving at a desired or better outcome than any other process, technique, or method
  • A fundamental change in approach or underlying assumptions about a process or way of thinking about or doing something
  • Knowledge that enables a person to understand something

FEEDBACK

10 / 10  (100.0%)

·  Best practice

  • A fundamental change in approach or underlying assumptions about a process or way of thinking about or doing something
  • Computing power doubles every eighteen months
  • Knowledge that enables a person to understand something
  • A management process, technique, or method that is most effective at arriving at a desired or better outcome than any other process, technique, or method
  • Plays a pivotal role in gaining computer competency

FEEDBACK

10 / 10  (100.0%)

·  What is the function of the Sarbanes-Oxley Act of 2002?

  • It helps IT keep pace with accounting processes.
  • It protects investors from fraud.
  • It identifies new accounting software programs.
  • It creates additional accounting degree programs.

FEEDBACK

10 / 10  (100.0%)

·  A computer network consists of which of the following?

  • Routers
  • Switches
  • Communication links
  • All of the above

FEEDBACK

10 / 10  (100.0%)

 


View Buy Answer $15 Sign In -- OR --

Showing Page 3 of 154 Pages