Category Archives: Computer Science

Data Models A major retail company has hired your team as database specialists to determine the data model — relational, object-oriented, or multidimensional — best suited for its applications.

Data Models A major retail company has hired your team as database specialists to determine the data model — relational, object-oriented, or multidimensional — best suited for its applications. The retail company wants to allow different access to information for customers and employees. Form a three-member team and have each team member choose a different data model to research using the web.

What are typical uses for the data model?

What are the advantages and disadvantages of the data model? How does the database store data?

What type of software is used to create the data model?

Does the data model allow for query by example?

How does the data model allow users to manage, update, and retrieve data?

Can you use the data model to create a data….

To create an online form that will record Covid tests for employees for HR to be able to manage the health and safety of staff during the pandemic.

To create an online form that will record Covid tests for employees for HR to be able to manage the health and safety of staff during the pandemic. The employees will simply log on to this online form, fill in the details of the test (date, test type, results, symptoms, etc), upload a screenshot of the test results, identify which department they belong to and the departmental head and click submit. An employee with positive test result with no underlying symptoms as well as a negative test result will be allowed to work. A positive test result with underlying symptoms will generate a “Stay-At-Home for 14 days” email message sent to the employee, the respective department head, and HR. After 14 days, the sick employee will be sent….

You need to implement the Phonebook class, which is a phonebook. Each directory has an attribute name.

You need to implement the Phonebook class, which is a phonebook. Each directory has an attribute name. Implement the class as doubly connected list, where the nodes of the list in addition to the pointer contain an attribute of type Contact (struct), and that is the structure that consists of a person / company name (string type), a mobile phone (string type, in the form “062123456”) and a landline telephone (also of the string type, in the form “033222555”). It is possible that the contact has a mobile phone, and fixed is not (ie fixed is an empty string), or vice versa, but it is necessary that at least one of them is entered, as and name. Mobile and landline phones can only contain numbers (otherwise an exception….

Integrated Waveguide Technologies (IWT) is a 6-year-old company founded by Hunt Jackson and David Smithfield to exploit metamaterial plasmonic technology to develop and manufacture miniature microwave frequency directional transmitters and receivers for use in mobile Internet and communications applications.

Integrated Waveguide Technologies (IWT) is a 6-year-old company founded by Hunt Jackson and David Smithfield to exploit metamaterial plasmonic technology to develop and manufacture miniature microwave frequency directional transmitters and receivers for use in mobile Internet and communications applications. IWT’s technology, although highly advanced, is relatively inexpensive to implement, and its patented manufacturing techniques require little capital as compared to many electronics fabrication ventures. Because of the low capital requirement, Jackson and Smithfield have been able to avoid issuing new stock and thus own all of the shares. Because of the explosion in demand for its mobile Internet applications, IWT must now access outside equity capital to fund its growth, and Jackson and Smithfield have decided to take the company public. Until now, Jackson and Smithfield have paid….

Public-key encryption, also known as asymmetric key encryption, uses a key for encryption and a different key for decryption (therefore the name “asymmetric”).

Public-key encryption, also known as asymmetric key encryption, uses a key for encryption and a different key for decryption (therefore the name “asymmetric”). An individual (person A) using public-key encryption first needs to create a pair of keys, E(for encryption) and D (for decryption), using an algorithm such as the RSA algorithm. The individual (person A) makes the encryption key E public while keeping the decryption key D secret. Anyone wishing to send a message P (“plaintext”) to person A insecret would encrypt the message using A’s public key, resulting in a ciphertext C = E(P), expressed here using the function notation. When person A received the ciphertext C, applying the decryption D would result in D(C) = D(E(P)) = P, the plaintext. Since person A is the….

Using R, construct time series (line) plots for both stock prices and return series. R functions ts.plot or plot can create the plot. Describe the patterns and compare the plots.

In this CT assignment, we will use R software to analyze a dataset GoogleAmazonStock.xlsx

It contains daily closing stock prices for Google and Amazon from 8/22/2017 to 8/22/2018. When we examine stock prices (or other financial assets) we often transform them into a (simple) return series. The return series are computed by the formula: (present price/past price) – 1. The dataset contains both stock prices and return series.

1. Using R, construct time series (line) plots for both stock prices and return series. R functions ts.plot or plot can create the plot. Describe the patterns and compare the plots. 2. Based on the return series, can we claim that the mean Amazon return series is higher than that of Google?

a. What would be an appropriate test of….

Data Mining, Machine Learning and Text Analytics (50%)If a solution is too difficult to describe, provide screenshot(s) to demonstrate your solution

Part 1: Data Mining, Machine Learning and Text Analytics (50%)If a solution is too difficult to describe, provide screenshot(s) to demonstrate your solution.

Exercise 1: Data Mining and Machine Learning (30%)You work with the PVA_PARTITION data set in this Exercise. It contains data that represent charitable donations made to a veterans’ organization. The data represent the results of a mail campaign to solicit donations. Solicitations involve sending a small gift to an individual and include a request for a donation. The data set contains the following information:

• a flag to indicate respondents to the appeal (Target Gift Flag) and the dollar amount of their donations (Target Gift Amount)

• respondents’ PVA promotion and giving history

• demographic data of the respondents Exercise 2: Text Analytics (20%)You work….

Read the following requirements of a database that keeps track of automobile sales in a car dealership.

Read the following requirements of a database that keeps track of automobile sales in a car dealership.

• A car is identified by a unique serial number, and has model, manufacturer and price.

• An Option refers to some optional equipment installed on automobile. A car can have more than one option.

• Option is identified by option_name and price)

• A Sale Person is identified by a unique SalesPersonID, and name and phone.

• A Salesperson sales one or more cars. The database also tracks sale date and sale_price.

i. Please create relations (tables) for the database car dealership (define the primary and foreign key constraints)

ii. Populate the tables that you have created with the appropriate data.

iii. List the model of the cars sold last….

Implement a find and replacement algorithm for sequence of characters found within a linked data structure; replace the last occurrence of the sequence with that owned by another linked data structure.

The bulk of this assignment is for you to implement theDNAstrandtype that maintains a singly linked list of nucleotides. EachDNAstrandobject will represent a single strand of DNA, rather than the double-helix/double-strand found in nature. The primary behavior of aDNAstrandobject will be to cleave and join a newDNAstrandinto the existing strand. These processes simulate the creation of recombinant DNA, where a restriction enzyme cuts a strand of DNA matching a specific pattern and new DNA is spliced-in place. You will define aSpliceInbehavior for yourDNAstrandtype that will recognize thelast occurrenceof a particular pattern of DNA in a given sequence, “cleave” those nodes from the sequence, and add the nodes taken from another DNAstrand object in-place of the cleaved nodes. The last step of the process can be thought of as….

A sequential access file named vacations.txt contains records whose three fields are delimited by a comma. The application that uses the file defines a structure named TravelInfo.

A sequential access file named vacations.txt contains records whose three fields are delimited by a comma. The application that uses the file defines a structure named TravelInfo. The TravelInfo structure contains three members: a String member named location, an Integer member named lengthOfStay, and a Double member named cost. (4, 13, 14) a. Write a Private statement to declare a one-dimensional TravelInfo array named myVacations. The array should contain 10 elements. b. Write a Dim statement to declare a one-dimensional String array named fields. c. Write a statement that reads a line of text from the vacations.txt file and assigns the fields to the fields array. The file is associated with a StreamReader variable named inFile. d. Write the statements to assign the fields contained in the first….