Tuesday, December 31, 2019

Sex Offenders Outline Term-Paper

Sex Offenders Outline Term-Paper Sex Offenders Committing sex crimes is one of the most wide-spread types of offense, and it is one of the scariest ones, as often it is targeted at children. In different countries there are various jurisdictions applicable for sex offenders and various definitions of sex crimes. They can be minor, such as receiving or sending obscene content in SMS messages, and can be such that involve a victim or several victims. And the latter kind of cases is the one, towards which the government prevention efforts are directed. Despite the efforts and different programs, recidivism rate among sexual offenders reaches 5.3%. It is not a positive tendency, as it means that every 19th offender released from prison commits new sex crime within 3 years after release. While according to statistics, sex offenders are less likely to get arrested for any crime (43% against 68%), they are more likely to commit the same kind of crime – 5.3% versus 1.3%. An average age of sex offenders’ victims is less than 13, and for rape victims – around 22. The above presented statistics may seem really scary, and rightly so. In order to change the situation, some urgent measures have to be taken and effective programs to decrease recidivism cases should be implemented. Today one of the effective ways of keeping sex offenders under some kind of control is regular updating of sex offender registry. In the US such databases are open to the public through special websites or other sources. The offenders are classified into levels and people can freely see whether there are such people in the surrounding territory. There are also restrictions as to the place of residence for the offenders – they usually cannot reside near schools, gyms and other places of children’s conglomeration. Still, as statistics shows, it is necessary to work on new ways of sex offenders’ control so as to be sure in the safety of our kids.

Monday, December 23, 2019

Recycling For Sustainability And Commerce Essay - 1287 Words

America is one of the largest countries along with being one of the largest waste producers in the world. In 2013 Americans generated about 254 million tons of (Advancing Sustainable Materials Management: 2013 Fact Sheet). So where does all of this trash go? Approximately 55% of 220 million tons of waste generated each year in the United States ends up in one of the over 3500 landfills (Center for Sustainability Commerce). This trash that ends up in the landfill consist of metals, steel and aluminum can, plastic bottles, and paper along with other miscellaneous items. The issue with this is that the majority of these items will never decompose and just sit in the ground forever. While other items like paper will eventually decompose there is still a better alternative than putting it into a landfill. This alternative is known as recycling. What can we recycle? What can the average family do to recycle more? Where does trash end up if it is not properly thrown away or recycled? What is the impact of the improperly disposed trash on our environment? What can the government do to help? What is recycling and why should we recycle? True recycling is a series of activities by which materials ready to be discarded are instead separated from the waste stream, collected, sorted, processed, and converted into new materials and then used in the production of new products. Recycling is something that needs to be done in every American home to prevent our trash not only fromShow MoreRelatedIs Recycling A Glass Bottle? Essay1671 Words   |  7 Pagesperson home in Chicago, Illinois. Besides occasionally recycling a glass bottle, as per our maintenance provider’s request, we did not recycle our waste. In fact it was not until I moved on campus at Bradley University, that I realized how important recycling was to some. Actually, one of my best friends here at Bradley is responsible for helping me realize the significance of recycling. This is still not to be confused with your average recycling advocate argument. I admittedly walk pass the blue binRead MoreArgumentative Essay : Wasteful Thinking Essay1673 Words   |  7 Pagesperson home in Chicago, Illinois. Besides occasionally recycling a glass bottle, as per our maintenance provider’s request, we did not recycle our waste. In fact it was not until I moved on campus at Bradley University, that I realized how important recycling was to some. Actually, one of my best friends here at Bradley is responsible for helping me realize the significance of recycling. This is still not to be confused with your average recycling advocate argument. I admittedly walk pass the blue binRead MoreManagement Of Information Technology ( Bco6653 )1376 Words   |  6 Pagesor organisation. Green IT is a combination of multiple features such as cost of wastage and recycling, environmental efficiency and sustainable environment. As mentioned by () It is important to know that there are direct and indirect im pacts of Green It. The direct impact decreases the effect of IT on environment and the indirect impact arises when IT is used in the process of initiation foe sustainability. The major objective of Green IT strategy is to save energy and manage the related costs whileRead MoreCorporate Social And Social Responsibility1383 Words   |  6 PagesIt has six international brands within world’s top 15, and its products are available in more than 180 countries (Pim.com). The Philip Morris international company operates not only making cigarettes but also about the style of doing industry and commerce, and the way of having effects on the exterior of its offices, both domestically and internationally. The Philip Morris International aims to maintain both high domestic and international standards of being a socially responsible firm for its reputationRead MoreNotes On The Hospitality Industry Essay1616 Words   |  7 Pages3 2.3 New Zealand Hospitality industry †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. NOVOTEL hotel†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Service†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. E-COMMERCE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Sustainability †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Bibliography 8 NOVOTEL HOTEL (Introduction) The Hotel belongs to AccorRead MoreSustainable Business Practices : Monterey Bay Area Green Business Program1369 Words   |  6 PagesWatch, Sustainable Harvest International, California Sustainability Alliance, US Green Chambers of Commerce, Santa Monica Green Business Certification Program, Monterey Bay Area Green Business Program, USGBC Central California, Bay Area Green Business Program, Keep the Sierra Green, The Center for Nonprofit Sustainability, and The RAND Corporation. Also, The Global Community of Restaurants, or GCR, is going to broader the understanding of sustainability for the food and beverages market. TargetRead MoreAmazon s Customer Centric Company1723 Words   |  7 Pagesan e-commerce giant, but they have langered in being the most green and sustainable company in the world. Our company is in the business that puts customers first. The unique value we provide our customers is you can find anything from A to Z on our website and we can ship it faster with higher quality fulfillment. Our strengths are our supply chain management and we see opportunities of global optimization in the future. However, we’ve recognized some weaknesses such in our sustainability practicesRead MoreThe Ecology Of Commerce By Environmentalist Paul Hawken1508 Words   |  7 PagesPart I: Introduction The Ecology of Commerce, written by Environmentalist Paul Hawken, is an insightful, although daunting, look into economic and corporate sustainability. â€Å" The first rule of sustainability is to align with natural forces, or at least not try to defy them†. This quote, spoken by Paul Hawken himself, is a perfect demonstration of the major theme he carefully analyzes within the book. Economics and the environment are two words that you often don’t see in the same sentence, despiteRead MoreSustainable Supply Chain986 Words   |  4 PagesSUSTAINABILITY SUSTAINABILITY Role of reverse logistics and closed-loop supply chain in sustainability Implementation Manufacturing Strategy | AbstractIn this interim report, motive for doing this topic has been discussed and further, the methodology which will be used to reach the conclusion is also been mentioned. Finally, expected takeaway are also been highlighted. Kuldeep Jain - 1401083 Term Paper – Interim Report | Role of reverse logistics and closed-loop supply chain in sustainabilityRead MoreNike CSR Analysis1581 Words   |  7 Pagesï » ¿ CSR Analysis and Impact on Operations Nike has a Code of Business Conduct and Ethics that includes its commitment to the environment and is a signatory of the UN Global Compact. Nike has created a team of sustainability managers led by an independent director. Its environmental goals include producing eco-friendly products and minimizing its environmental impact through the reduction of greenhouse gases, organic solvents and PVCs. Nike acknowledges the difficulty of tracking environmental

Sunday, December 15, 2019

Drm Exma Ii Free Essays

Chapter 6 1. Which of the following is a purpose of the SQL standard? A)To specify syntax and semantics of SQL data definition and manipulation B)To specify minimal and complete standards, which permit different degrees of adoption in products C)To define the data structures and basic operations for SQL databases D)All of the above Answer: D Level: ModeratePage Ref: 312 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 2. The benefits of a standardized relational language include: A)application longevity. We will write a custom essay sample on Drm Exma Ii or any similar topic only for you Order Now B)reduced training costs. C)cross-system communication. D)All of the above Answer: D Level: ModeratePage Ref: 313 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 3. The _____ is the structure that contains descriptions of objects such as tables and views created by users. A)SQL B)schema C)catalog D)master view Answer: B Level: EasyPage Ref: 314 Topic: The SQL Environment AACSB Use of Information Technology, Analytic Skills 4. _____ is a set of commands used to control a database, which includes security. A)DML B)DDL C)DCL D)DPL Answer: C Level: EasyPage Ref:315 Topic: The SQL Environment AACSB Use of Information Technology . _____ is a set of commands used to update and query a database. A)DML B)DDL C)DCL D)DPL Answer: A Level: EasyPage Ref: 315 Topic: The SQL Environment AACSB Use of Information Technology 6. DDL is typically used during which phases of the development process? A)Implementation B)Physical design C)Analysis D)All of the above Answer: B Level: DifficultPage Ref: 314, 315 Topic: The SQL Environment AACSB Use of Information Technology, Analytic Skills 7. The SQL command _____ defines a logical table from one or more tables or views. A)create table B)alter table C)create view D)create relationship Answer: C Level: EasyPage Ref:319 Topic: Defining A Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology 8. Any create command may be reversed by using a ________ command. A)truncate B)drop C)delete D)unpack Answer: B Level: EasyPage Ref: 319 Topic: Defining a Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology, Analytic Skills 9. The first in a series of steps to follow when creating a table is to: A)identify columns that must be unique. B)identify each attribute and its characteristics. C)create an index. D)identify columns that must be null. Answer: B Level: ModeratePage Ref: 319 Topic: Defining a Database in SQL Subtopic: Creating Tables AACSB Use of Information Technology, Analytic Skills 10. The SQL command _____ adds one or more new columns to a table. A)create table B)alter table C)create view D)create relationship Answer: B Level: EasyPage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology, Analytic Skills 11. What does the following SQL statement do? Alter Table Customer_T Add (Type Varchar (2)); A)Alters the Customer_T table to accept Type 2 Varchars B)Alters the Customer_T table to be a Type 2 Varchar C)Alters the Customer_T table, and adds a field called â€Å"Type† D)Alters the Customer_T table by adding a 2-byte field called â€Å"Varchar† Answer: C Level: ModeratePage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology 12. What does the following SQL statement do? Delete from Customer_T where state = ‘HI’; A)Deletes all records from customer_t where the state is equal to HI B)Removes the customer_t table from the database C)Deletes all records from the customer_t table D)None of the above Answer: A Level: ModeratePage Ref: 326 Topic: Inserting, Updating, and Deleting Data Subtopic: Deleting Database Contents AACSB Use of Information Technology, Analytic Skills 13. What does the following SQL statement do? Update Product_T Set Unit_Price = 775 Where Product_ID = 7 A)Changes the price of a unit called Product_T to 7 B)Changes the unit price of Product 7 to 775 C)Changes the length of the Unit_Price field to 775 D)Updates the Product_T table to have a unit price of 775 Answer: B Level: ModeratePage Ref: 327 Topic: Inserting, Updating, and Deleting Data Subtopic: Updating Database Contents AACSB Use of Information Technology, Analytic Skills 14. Which of the following is a technique for optimizing the internal performance of the relational data model? A)Avoiding indexes on secondary keys B)Clustering data C)Not reporting statistics to save machine resources D)Using random index organizations Answer: B Level: ModeratePage Ref: 327 Topic: Internal Schema Definitions in RDBMSs AACSB Use of Information Technology 15. Indexes are created in most RDBMSs to: A)provide a quicker way to store data. B)decrease the amount of disk space utilized. C)provide rapid random and sequential access to base-table data. D)increase the cost of implementation. Answer: C Level: ModeratePage Ref: 328 Topic: Internal Schema Definition in RDBMSs Subtopic: Creating Indexes AACSB Use of Information Technology 16. In an SQL statement, which of the following parts states the conditions for row selection? A)Select B)From C)Where D)Group By Answer: C Level: EasyPage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 17. What does the following SQL statement do? Select * From Customer Where Cust_Type = â€Å"Best† A)Selects all the fields from the Customer table for each row with a customer labeled â€Å"best† B)Selects the â€Å"*† field from the Customer table for each row with a customer labeled â€Å"best† C)Selects fields with a â€Å"*† in them from the Customer table D)Selects all the fields from the Customer table for each row with a customer labeled â€Å"*† Answer: A Level: ModeratePage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 18. What result will the following SQL statement produce? Select Avg(standard_price) as average from product_v; A)The average of all products in product_v B)The average standard_price of all products in product_v C)The average price of all products D)None of the above Answer: B Level: ModeratePage Ref: 331 Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 19. Which of the following questions is answered by the SQL statement? Select Count (Product_Description) from Product_T; A)How many products are in the Product Table? B)How many products have product descriptions in the Product Table? C)How many characters are in the field name â€Å"Product_Description†? D)How many different columns named â€Å"product Description† are there in table Product_T? Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 20. What results will be produced by the following SQL query? Select sum(standard_price) as total_price from product_v where product_type = ‘WOOD’; A)The total price of all products that are of type wood B)The total price of all products C)The standard_price of the first wood product in the table D)The standard_price of any wood product in the table Answer: A Level: DifficultPage Ref: 331 Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 21. Which of the following counts ONLY rows that contain a value? A)Count B)Count(*) C)Tally(*) D)Checknum Answer: A Level: ModeratePage Ref: 331,332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 22. Which of the following will produce the minimum of all standard prices? A)Select standard_price from product_v where standard_price = min; B)Select min(standard_price) from product_v; C)Select standard_price from min(product_v); D)Select min(standard_price) from product_v where standard_price = min(standard_price); Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 23. What will result from the following SQL Select statement? Select min(product_description) from product_v; A)The minimum value of product_description will be displayed. B)An error message will be generated. C)The first product description alphabetically in product_v will be shown. D)None of the above. Answer: C Level: DifficultPage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 24. Which of the following is the wildcard operator in SQL statements? A) B) * C) = D) Answer: B Level: EasyPage Ref: 332, 333 Topic: Processing Single Tables Subtopic: Using Wildcards AACSB Use of Information Technology, Analytic Skills 25. What result set will the following query return? Select item_no from order_v where quantity 10; A)The item_no of all orders that had more than 10 items B)The order_id of all orders that had more than one item C)The order_id of all orders that had more than 10 items D)The item_no of all orders that had 10 or more items Answer: A Level: ModeratePage Ref: 333 Topic: Processing Single Tables Subtopic: Using Comparison Operators AACSB Use of Information Technology, Analytic Skills 26. Which of the following is true about the SQL statement? Select * From Product Where Quantity = 1 Or Quantity = 2; A)All fields will be selected from the Product table for products that have a quantity of 1. B)All fields will be selected from the Product table for products that have a quantity of only 2. C)All fields will be selected from the Product table for products that have a quantity of 1 or 2. D)None of the above. Answer: C Level: ModeratePage Ref: 333-336 Topic: Processing Single Tables Subtopic: Using Boolean Operators AACSB Use of Information Technology, Analytic Skills 27. What result set will the following query return? Select item_no, description from item where weight 100 and weight 200; A)The item_no and description for all items weighing less than 100 B)The item_no for all items weighing between 101 and 199 C)The item_no and description for all items weighing between 101 and 199 D)The item_no for all items weighing more than 200 Answer: C Level: ModeratePage Ref: 336, 337 Topic: Processing Single Tables Subtopic: Using Ranges for Qualification AACSB Use of Information Technology, Analytic Skills 28. To eliminate duplicate rows in a query, the _____ qualifier is used in the SQL Select command. A)alter B)distinct C)check D)specific Answer: B Level: EasyPage Ref: 337, 338 Topic: Processing Single Tables Subtopic: Using Distinct Values AACSB Use of Information Technology 29. What result set is returned from the following query? Select customer_name, telephone from customers where city in (‘Boston’,’New York’,’Denver’); A)The customer_name and telephone of all customers B)The customer_name and telephone of all customers living in either Boston, New York or Denver C)The customer_name and telephone of all customers living in Boston and New York and Denver D)The customer_name of all customers living in Boston, New York or Denver Answer: B Level: ModeratePage Ref: 339 Topic: Processing Single Tables Subtopic: IN and NOT IN with Lists AACSB Use of Information Technology, Analytic Skills 30. To get all the customers from Hawaii sorted together, which of the following would be used? A)Order By B)Group By C)Having D)Sort Answer: A Level: EasyPage Ref: 339, 340 Topic: Processing Single Tables Subtopic: Sorting Results: The ORDER BY Clause AACSB Use of Information Technology, Analytic Skills 31. A single value returned from an SQL query that includes an aggregate function is called a(n): A)agate. B)scalar aggregate. C)vector aggregate. D)summation. Answer: B Level: EasyPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 32. Multiple values returned from an SQL query that includes an aggregate function are called: A)vector aggregates. B)scalar aggregates. C)agates. D)summations. Answer: A Level: EasyPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 33. Which of the following can produce scalar and vector aggregates? A)Order By B)Group By C)Having D)Sort Answer: B Level: ModeratePage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 34. What will be returned when the following SQL statement is executed? Select driver_no,count(*) as num_deliveries from deliveries group by driver_no; A)A listing of all drivers, sorted by driver number B)A listing of each driver as well as the number of deliveries that he or she has made C)A count of all of the deliveries made by all drivers D)None of the above Answer: B Difficulty: DifficultPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 35. What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = ‘MA’ group by driver_no; A)A listing of all drivers who made deliveries to state = ‘MA’, sorted by driver number. B)A listing of each driver who made deliveries to state = ‘MA as well as the number of deliveries that each driver has made to that state. C)A count of all of the deliveries made to state = ‘MA’ by all drivers. D)None of the above. Answer: B Difficulty: DifficultPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 36. Which of the following finds all groups meeting stated conditions? A)Select B)Where C)Having D)Find Answer: C Level: EasyPage Ref: 341, 342 Topic: Processing Single Tables Subtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 37. What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) 2; A)A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries B)A listing of all drivers C)A listing of the number of deliveries greater than 2 D)A listing of all drivers who made more than 2 deliveries Answer: A Level: DifficultPage Ref: 341, 342 Topic: Processing Single Tables Subtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 38. Which of the following is true of the order in which SQL statements are evaluated? A)The select clause is always processed first. B)The select clause is always processed last. C)The select clause is processed before the order by clause. D)The group by clause is processed before the where clause. Answer: C Level: DifficultPage Ref: 329 Topic: Processing Single Tables AACSB Use of Information Technology 39. A _______________ view is materialized when referenced. A)virtual B)dynamic C)materialized D)base Answer: B Level: ModeratePage Ref: 342 Topic: Using and Defining Views AACSB Use of Information Technology 40. A view may not be updated directly iF it contains: A)the distinct keyword. B)derived columns and expressions in the select clause. C)uses the group by or having clause. D)all of the above. Answer: D Level: EasyPage Ref: 345 Topic: Using and Defining Views AACSB Use of Information Technology Chapter 7 1. A join operation: A) brings together data from two different fields. B) causes two tables with a common domain to be combined into a single table or view. C) causes two disparate tables to be combined into a single table or view. D) is used to combine indexing operations. Answer: B Level: EasyPage Ref: 358 Topic: Processing Multiple Tables AACSB Use of Information Technology 2. A join in which the joining condition is based on equality between values in the common columns is called a(n): E) equi-join. F) uni-lateral join. G) natural join. H) both A and C. Answer: D Level: EasyPage Ref: 358 Topic: Processing Multiple Tables Subtopic: Equi-join AACSB Use of Information Technology 3. A join that is based upon equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n): I) equi-join. J) natural join. K) multivariate join. L) inner join. Answer: B Level: EasyPage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 4. The most commonly used form of join operation is the: M) outer join. N) union join. O) equi-join. P) natural join. Answer: D Level: ModeratePage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 5. A join in which rows that do not have matching values in common columns are still included in the result table is called a(n): Q) natural join. R) equi-join. S) outer join. T) union join. Answer: C Level: EasyPage Ref: 361 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 6. In which of the following situations would one have to use an outer join in order to obtain the desired results? U) A report is desired that lists all customers who placed an order. V) A report is desired that lists all customers and the total of their orders. W) A report is desired that lists all customers, the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero). X) There is never a situation that requires only an outer join. Answer: C Level: DifficultPage Ref: 361,362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology, Analytic Skills 7. One major advantage of the outer join is that: Y) information is easily accessible. Z) information is not lost. [) the query is easier to write. ) All of the above. Answer: B Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 8. A type of join implemented in SQL-1999 and by extension SQL-2003 that returns all of the data from each table that is joined is called a(n): ]) outer join. ^) inner join. ) union join. `) intersect join. Answer: C Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Union Join AACSB Use of Information Technology 9. A type of query that is placed within a WHERE or HAVING clause of another query is called a: a) master query. b) subquery. c) superquery. d) multi-query. Answer: B Level: EasyPage Ref: 340 Topic: Processing M ultiple Tables Subtopic: Subqueries AACSB Use of Information Technology 10. _________ takes a value of true if a subquery returns an intermediate results table which contains one or more rows. e) In f) Having g) Exists h) Extents Answer: C Level: ModeratePage Ref: 367 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 11. In SQL, a _____________ subquery is a type of subquery in which processing the inner query depends on data from the outer query. i) correlated j) paired k) natural l) inner Answer: A Level: ModeratePage Ref: 368 Topic: Processing Multiple Tables Subtopic: Correlated Subqueries AACSB Use of Information Technology 12. A ______________ ____________ is a temporary table used in the FROM clause of an SQL query. m) correlated subquery n) derived table o) view table p) None of the above. Answer: B Level: ModeratePage Ref: 369 Topic: Processing Multiple Tables Subtopic: Using Derived Tables AACSB Use of Information Technology 13. The UNION clause is used to: q) combine the output from multiple queries into a single result table. r) join two tables together to form one table. s) find all rows that do not match in two tables. t) None of the above. Answer: A Level: EasyPage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 14. In order for two queries to be UNION-compatible, they must: u) both have the same number of lines in their SQL statements. ) both output compatible data types for each column and return the same number of rows. w) both return at least one row. x) All of the above. Answer: B Level: ModeratePage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 15. Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by: y) using the if-then-else construct. z) using the immediate if statement. {) using the CASE keyword in a statement. |) using a subquery. Answer: C Level: ModeratePage Ref: 372 Topic: Processing Multiple Tables Subtopic: Conditional Expressions AACSB Use of Information Technology 16. Explicit commands to manage transactions are needed when: }) a transaction consists of just one SQL command. ~) multiple SQL commands must be run as part of a transaction. ) autocommit is set to off. ) None of the above. Answer: B Level: DifficultPage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 17. User-defined transactions can improve system performance because: ) transactions are processed as sets, reducing system overhead. ) transactions are mapped to SQL statements. ) speed is improved due to query optimization. ) All of the above. Answer: A Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 18. An interactive command that can be used to dynamically control a user session for appropriate integrity measures is: ) rollback. ) rollforward. ) set autocommit. ) expunge. Answer: C Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology, Analytic Skills 19. If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle? ) dba_tab_privs ) dba_tab_comments ) dba_table_label ) dba_tables Answer: D Level: ModeratePage Ref: 378 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 20. What results would the following SQL statement produce? select owner, table_name from dba_tables where table_name = ‘CUSTOMER’; ) A listing of all customers in the customer table ) A listing of the owner of the customer table ) A listing of the owner of the customer table as well as customers ) An error message Answer: B Level: ModeratePage Ref: 379 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 21. User-defined data types: ) can be a subclass of a standard type. can behave as an object. ) can have defined functions and methods. ) can have all of the above. Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL AACSB Use of Information Technology 22. A new set of analytical functions added in SQL:200n are referred to as: ) OLAF Functions ) MOLAP Functions ) Average Functions ) O LAP Functions Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology 23. RANK and DENSE-RANK are examples of: ) Ceilings ) Door Functions ) Window Functions ) Moving Functions Answer: C Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology, Analytic Skills 24. All of the following are new data types added in SQL:200n EXCEPT: ) BIGINT ) BIT ) MULTISET ) XML Answer: B Level: ModeratePage Ref: 381 Topic: SQL: 2003 Enhancements and Extensions to SQL Subtopic: New Data Types AACSB Use of Information Technology, Analytic Skills 25. The MERGE command: ) Allows one to combine the INSERT and UPDATE operations ) Allows one to combine the INSERT and DELETE operations ) Joins 2 tables together None of the above. Answer: A Level: ModeratePage Ref: 382 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Other Enhancements AACSB Use of Information Technology, Analytic Skills 26. Extensions defined in SQL-99 that include the capability to create and drop modules of code stored in the database schema across user sessions are called: ) stored procedures. ) Persistent Stor ed Modules. ) flow control modules. ) None of the above. Answer: B Level: ModeratePage Ref: 383 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Programming Extensions AACSB Use of Information Technology 27. A named set of SQL statements that are considered when a data modification occurs are called: ) stored procedures. ) treatments. ) triggers. ) trapdoors. Answer: C Level: EasyPage Ref: 384 Topic: Triggers and Routines AACSB Use of Information Technology 28. While triggers run automatically, ______________ do not and have to be called. ) trapdoors ) routines ) selects ) updates Answer: B Level: ModeratePage Ref: 386 Topic: Triggers and Routines AACSB Use of Information Technology 29. SQL-invoked routines can be: ) procedures. ) functions. ) All of the above. ) None of the above. Answer: C Level: EasyPage Ref: 386 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 30. All of the following are advantages of SQL-invoked routines EXCEPT: ) flexibility. ) efficiency. ) sharability. ) security. Answer: D Level: ModeratePage Ref: 387 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 31. A procedure is: ) stored within the database. ) given a unique name. ) called by name. ) All of the above. Answer: D Level: ModeratePage Ref: 387, 388 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 32. Embedded SQL consists of: hard-coded SQL statements included in a program written in another language. ) SQL encapsulated inside of other SQL statements. ) SQL written into a front-end application. ) SQL translated to a lower-level language. Answer: A and C are both plausible answers. Level: EasyPage Ref: 389 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 33. In order to embed SQL inside of a nother language, the ________ _______ statement must be placed before the SQL in the host language. ) GET SQL ) EXEC SQL ) RUN SQL ) SQL SQL Answer: B Level: ModeratePage Ref: 390 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology, Analytic Skills 34. Dynamic SQL: ) is used to generate appropriate SQL code on the fly, as an application is processing. ) is quite volatile. ) is not used widely on the Internet. ) creates a less flexible application. Answer: A Level: EasyPage Ref: 390 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 35. On-line transaction processing is: ) A system used for reporting only. ) A system used in transaction-oriented applications that involves real-time processing of SQL transactions. ) A set of tools that provides users with a graphical view of data. ) None of the above. Answer: B Level: EasyPage Ref: 391 Topic: OLAP SQL AACSB Use of Information Technology 36. OLAP systems differ from OLTP systems in several ways except: ) Size ) Processing ) Queries ) Physical Storage Answer: B Level: EasyPage Ref: 392 Topic: OLAP SQL AACSB Use of Information Technology Chapter 8 1. Which of the following have affected the way businesses use computing systems to meet the demand of the competitive marketplace? A)GUI evolutions B)Networking advances C)Communication changes D)All of the above. Answer: D Level: ModeratePage Ref: 403 Topic: Introduction AACSB Use of Information Technology 2. Which of the following is a component of processing logic? A)Input B)Output C)Retrieval D)Business rules Answer: D Level: EasyPage Ref: 404 Topic: Client/Server Architectures AACSB Use of Information Technology 3. A device that manages file operations and is shared by each client PC on a LAN is called a: A)file server. B)file processor. C)database server. D)fat client. Answer: A Level: EasyPage Ref: 405 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 4. In a file server architecture, which of the following is performed by a client? A)Provides significant LAN traffic B)File storage C)User interface processing D)All of the above. Answer: C Level: ModeratePage Ref: 404 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 5. Which of the following is true about file servers on a LAN? A)Each client must devote memory to a full version of its DBMS. B)Not much data movement is generated. C)The DBMS copy has little responsibility. D)Application programmers need little knowledge about DBMSs. Answer: A Level: ModeratePage Ref: 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology . Which of the following is NOT a limitation to using file servers on local area networks? A)Considerable data movement is generated across the network. B)Each client workstation must devote memory to a full version of the DBMS. C)Stored procedures can be run on the file server. D)The DBMS copy in each workstation must manage the shared database integrity. Answer: C Leve l: ModeratePage Ref: 405, 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 7. A(n) _____ is a module of code written in SQL or some proprietary language to run business rules on a server. A)SQL program B)select module C)select procedure D)stored procedure Answer: D Level: EasyPage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 8. Which of the following is an advantage of stored procedures? A)Data integrity improves when fewer applications access the procedure. B)The layers get cleaner. C)Stored procedures result in fatter clients. D)Performance improves for compiled SQL statements. Answer: D Level: EasyPage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 9. Which of the following is not a disadvantage of stored procedures? A)Writing stored procedures takes more time than writing an application in Visual Basic or PowerBuilder. B)Decreases in network traffic are realized. C)Stored procedures are proprietary and not easy to move from one RDBMS to another. D)Each client must be loaded with the application to be used at that location. Answer: B Level: ModeratePage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 10. A PC configured to handle user interface with little or no local storage is called a: A)server. B)fat client. C)thin client. D)workstation. Answer: C Level: EasyPage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 11. Which of the following is true about three-tier architectures? A)Less scalable than two-tier B)Increased risk C)More technological flexibility D)All of the above Answer: C Level: ModeratePage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 12. _____ is the process of assigning pieces of application code to clients or servers. A)Application partitioning B)Modularizing programs C)Code distribution D)Program breakup Answer: A Level: EasyPage Ref: 410 Topic: Partitioning an Application AACSB Use of Information Technology 13. Which of the following is not a common distribution logic for two-tiered server environments: A)Fat Client B)Tall Client C)Thin Client D)Distributed Answer: A Level: ModeratePage Ref: 411 Topic: Partitioning an Application AACSB Use of Information Technology 14. Which of the following is true of mainframes in the client/server environment? A)Managers have a difficult time moving between platforms. B)Supporting distributed environments is easier than mainframe support. C)Migrating from mainframes to client/server is a relatively simple process. D)All of the above. Answer: A Level: ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 15. Moving mission critical applications to client/server environments is likely to cause serious problems in the transition from the pilot phase to production unless: A)Developers rewrite all code for the system. B)Brand new hardware is purchased. C)Developers anticipate scalability issues and address them as they develop code D)None of the above. Answer: C Level; ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 16. ____ is any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A)User interface enhancers B)Middleware C)Interface managers D)MPP Answer: B Level: EasyPage Ref: 413 Topic: Using Middleware AACSB Use of Information Technology 17. Which of the following does not connect applications to databases over networks? A)Asynchronous RPC middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)SMP Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 18. Which of the following could send and receive email, while the client works on other things? A)ORBs middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)MOM Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 19. Microsoft’s Transaction Server and IBM’s CICS are examples of: A)Asynchronous Remote Procedure Call (RPC) B)Synchronous RPC C)MOM D)ORB Answer: B Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 20. ______________ makes it possible for applications to send objects and request services in an object-oriented system. A)MOM B)RPC C)ORB D)API Answer: C Level: EasyPage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 21. A(n) _____ is a set of application routines that programs use to direct the performance of procedures by the computer’s operating system. A)API B)MOM C)RPC D)LAN Answer: A Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 22. Which of the following is true of moving to client/server environments? A)Functionality must be delivered all at once. B)There are no hidden costs. C)Services can be placed appropriately. D)None of the above. Answer: C Level: EasyPage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 23. Which of the following is NOT a benefit of moving to client/server environments? A)Functionality can be delivered in stages to end users. B)Business process reengineering is facilitated. C)Network traffic and response times are increased. D)Users are encouraged to utilize the application’s functionality. Answer: C Level: ModeratePage Ref: 416, 417 Topic: Client/Server Issues AACSB Use of Information Technology 24. The most common bottleneck in a client/server environment is the: A)users B)software C)network D)company politics Answer: C Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 25. In order to establish client/server security: A)Network security must be established B)Biometric authentication must be used C)Server security must be established D)Both A and C Answer: D Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 26. Multi-tier make sense if all of the following environments except: A) More than 100 users B)High-volume transaction processing C)Workgroups D)Real-time processing Answer: C Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 27. Which of the following is not a parameter that must be specified in order to establish an ODBC connection? A)Specific ODBC driver needed B)Back-end server name to connect to C)JDK version D)Database name to connect to Answer: C Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 28. Which of the following is a distinguishing characteristic of Level-2 API capabilities? A)Send and receive partial results B)Call a translation library C)Commit or rollback transactions D)Prepare and execute SQL statements Answer: B Level: ModeratePage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 29. An application programming interface that enables an application program to process RDBMS databases meets the: A)object linking and embedding standard. B)open database connectivity standard. C)multi-platform connectivity standard. D)open source standard. Answer: B Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 30. Which of the following parameters must be defined in order to establish an ODBC connection? A)ODBC driver B)Back-end server name C)Database name to connect to D)All of the above Answer: D Level: ModeratePage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology. Analytic Skills 31. The ability to call a translation library is a distinguishing characteristic of: A)Core-API ODBC conformance. B)Level-1 API ODBC conformance. C)Level-2 API ODBC conformance. D)Level-3 API ODBC conformance. Answer: C Level: DifficultPage Ref: 418 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 32. JDBC is similar to ODBC EXCEPT: A)ODBC is language independent and JDBC is not. B)ODBC can be used to execute SQL queries on a server while JDBC does not have this capability. C)ODBC can run on multiple platforms, while JDBC is platform specific. D)None of the above. Answer: A Level: ModeratePage Ref: 385 Topic: Using JDBC to Link External Tables Stored on a Database Server AACSB Use of Information Technology, Analytic Skills Chapter 9 1. The analysis of summarized data to support decision making is called: A)operational processing. B)informational processing. C)artificial intelligence. D)data scrubbing. Answer: B Level: EasyPage Ref: 461 Topic: Introduction AACSB Use of Information Technology 2. The characteristic that indicates that a data warehouse is organized around key high-level entities of the enterprise is: A)subject-oriented. B)integrated. C)time-variant. D)nonvolatile. Answer: A Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology 3. When we consider data in the data warehouse to be time-variant, we mean: A)that the time of storage varies. B)data in the warehouse contain a time dimension so that they may be used to study trends and changes. C)that there is a time delay between when data are posted and when we report on the data. D)none of the above. Answer: B Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology, Analytic Skills 4. Which of the following advances in information systems contributed to the emergence of data warehousing? A)Improvements in database technology, particularly the relational data model B)Advances in computer hardware, especially affordable mass storage and parallel computer architectures C)Advances in middleware products that enabled enterprise database connectivity across heterogeneous platforms D)All of the above Answer: D Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data Warehousing Subtopic: A Brief History AACSB Use of Information Technology 5. Which of the following factors drive the need for data warehousing? A)Businesses need an integrated view of company information. B)Informational data must be kept together with operational data. C)Data warehouses generally have better security. D)None of the above Answer: A Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data Warehousing Subtopic: The Need for Data Warehousing AACSB Use of Information Technology 6. Which of the following organizational trends does not encourage the need for data warehousing? A)Multiple, nonsynchronized systems B)Focus on customer relationship management C)Downsizing D)Focus on supplier relationship management Answer: C Level: ModeratePage Ref: 463–464 Topic: Basic Concepts of Data Warehousing Subtopic: Need for a Companywide View AACSB Use of Information Technology 7. Informational systems are designed for all of the following EXCEPT: A)running a business in real time. B)supporting decision making. C)complex queries. D)data mining. Answer: A Level: ModeratePage Ref: 466 Topic: Basic Concepts of Data Warehousing Subtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 8. Operational and informational systems are generally separated because of which of the following factors? A)A data warehouse centralizes data that are scattered throughout disparate operational systems and makes them readily available for decision support applications. B)A properly designed data warehouse adds value to data by improving their quality and consistency. C)A separate data warehouse eliminates contention for resources that results when informational applications are confounded with operational processing. D)All of the above Answer: D Level: EasyPage Ref: 466 Topic: Basic Concepts of Data Warehousing Subtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 9. A data mart is a(n): A)enterprisewide data warehouse. B)smaller system built upon file processing technology. C)data warehouse that is limited in scope. D)generic on-line shopping site. Answer: C Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 10. One characteristic of independent data marts is complexity for end users when they need to access data in separate data marts. This complexity is caused by not only having to access data from separate databases, but also from: A)the possibility of a new generation of inconsistent data systems, the data marts themselves. B)lack of user training. C)denormalized data. D)incongruent data formats. Answer: A Level: DifficultPage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 11. All of the following are limitations of the independent data mart EXCEPT: A)separate extraction, transformation, and loading processes are developed for each data mart. B)data marts may not be consistent with one another. C)there is no capability to drill down into greater detail in other data marts. D)it is often more expedient to build a data mart than a data warehouse. Answer: D Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology, Reflective Thinking 12. A dependent data mart: A)is filled with data extracted directly from the operational system. B)is filled exclusively from the enterprise data warehouse with reconciled data. C)is dependent upon an operational system. D)participates in a relationship with an entity. Answer: B Level: ModeratePage Ref: 470 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 13. An operational data store (ODS) is a(n): A)place to store all unreconciled data. B)representation of the operational data. C)integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users. D)small-scale data mart. Answer: C Level: EasyPage Ref: 471 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 14. A logical data mart is a(n): A)data mart consisting of only logical data. B)data mart created by a relational view of a slightly denormalized data warehouse. C)integrated, subject-oriented, detailed database designed to serve operational users. D)centralized, integrated data warehouse. Answer: B Level: ModeratePage Ref: 472 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 15. All of the following are unique characteristics of a logical data mart EXCEPT: A)logical data marts are not physically separate databases, but rather a relational view of a data warehouse. B)the data mart is always up-to-date since data in a view is created when the view is referenced. C)the process of creating a logical data mart is lengthy. D)data are moved into the data warehouse rather than a separate staging area. Answer: C Level: EasyPage Ref: 472 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 16. The real-time data warehouse is characterized by which of the following? A)It accepts near-real time feeds of transaction data. B)Data are immediately transformed and loaded into the warehouse. C)It provides near-real-time access for the transaction processing systems to an enterprise data warehouse. D)All of the above Answer: D Level: EasyPage Ref: 473-474 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 7. Data that are detailed, current, and intended to be the single, authoritative source of all decision support applications are called _____ data. A)reconciled B)subject C)derived D)detailed Answer: A Level: EasyPage Ref: 475 Topic: Data Warehouse Architectures Subtopic: Three-Layer Data Architectures AACSB Use of Information Technology 18. A database action that results from a tran saction is called a(n): A)transition. B)event. C)log entry. D)journal happening. Answer: B Level: EasyPage Ref: 476 Topic: Some Characteristics of Data Warehouse Data Subtopic: Status Versus Event Data AACSB Use of Information Technology, Analytic Skills 19. Data that are never physically altered once they are added to the store are called _____ data. A)transient B)override C)periodic D)complete Answer: C Level: EasyPage Ref: 477 Topic: Some Characteristics of Data Warehouse Data Subtopic: Transient Versus Periodic Data AACSB Use of Information Technology 20. Which of the following is an objective of derived data? A)Ease of use for decision support systems B)Faster response time for user queries C)Support data mining applications D)All of the above Answer: D Level: EasyPage Ref: 481 Topic: The Derived Data Layer Subtopic: Characteristics of Derived Data AACSB Use of Information Technology 21. .A star schema contains both fact and _______ tables. A)narrative B)cross functional C)dimension D)starter Answer: C Level: ModeratePage Ref: 481 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 22. The level of detail in a fact table determined by the intersection of all the components of the primary key, including all foreign keys and any other primary key elements, is called the: A)span. B)grain. C)selection. D)aggregation. Answer: B Level: EasyPage Ref: 485 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 23. Conformed dimensions allow users to do the following: A)share nonkey dimension data. B)query across fact tables with consistency. C)work on facts and business subjects for which all users have the same meaning. D)all of the above. Answer: D Level: ModeratePage Ref: 488-489 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 24. An expanded version of a star schema in which all of the tables are fully normalized is called a(n): A)snowflake schema. B)operational schema. C)DSS schema. D)complete schema. Answer: A Level: EasyPage Ref: 492 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 25. All of the following are ways to handle changing dimensions EXCEPT: A)overwrite the current value with the new value. B)for each dimension attribute that changes, create a current value field and as many old value fields as we wish. C)create a new dimension table row each time the dimension object changes. D)create a snowflake schema. Answer: D Level: ModeratePage Ref: 494 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 26. The use of a set of graphical tools that provides users with multidimensional views of their data is called: A)on-line geometrical processing (OGP). B)drill-down analysis. C)on-line analytical processing (OLAP). D)on-line datacube processing (ODP). Answer: C Level: EasyPage Ref: 500 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 27. OLAP tools that use the database as a traditional relational database are called: A)ROLAP tools. B)MOLAP tools. C)slice and dice. D)none of the above. Answer: A Level: ModeratePage Ref: 500-501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 28. Rotating the view of a multidimensional database for a particular data point is called data: A)cubing. B)drill-down. C)dicing. D)pivoting. Answer: D Level: ModeratePage Ref: 501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 29. Going from a summary view to progressively lower levels of detail is called data: A)cubing. B)drill-down. C)dicing. D)pivoting. Answer: B Level: ModeratePage Ref: 502 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 30. Which of the following data mining techniques identifies clusters of observations with similar characteristics? A)Case reasoning B)Rule discovery C)Clustering and signal processing D)Neural nets Answer: C Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 31. Which of the following data-mining techniques searches for patterns and correlations in large data sets? A)Case reasoning B)Rule discovery C)Signal processing D)Neural nets Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 32. Which of the following data mining applications identifies customers for promotional activity? A)Population profiling B)Target marketing C)Usage analysis D)Product affinity Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 33. Which of the following is true of data visualization? A)It is easier to observe trends and patterns in data. B)Correlations and clusters in data can be easily identified. C)It is often used in conjunction with data mining. D)All of the above. Answer: D Level: ModeratePage Ref: 503 Topic: The User Interface Subtopic: Data Visualization AACSB Use of Information Technology, Analytic Skills Chapter 10 1. High quality data are data that are A) Accurate B)Consistent C)Available in a timely fashion D)All of the above Answer: D Level: EasyPage Ref: 524 Topic: Managing Quality Data AACSB Use of Information Technology, Analytic Skills How to cite Drm Exma Ii, Essay examples

Saturday, December 7, 2019

Project Scheduling Issues for Triple Constrains- myassignmenthelp

Question: Discuss about theProject Scheduling Issues for Triple Constrains. Answer: Connection of the scheduling issues with the triple constrains: Resources: Resource scheduling is the way or the methodology, which is used to assign a set of resources to the particular task in a sequential and logical manner (Leyman and Vanhoucke 2016). The scheduling of the project and the start and end date of the project depends on the availability of the resources (Tavana, Abtahi and Khalili-Damghani 2014). In case, if the scheduling of the resources is not done in a proper way, there is a chance, that the project may get delayed and the wastage of the resources may happen. Time: The time is a an important factor for the project as generally there is a deadline assigned for the project . The proper scheduling of the project can help to complete the project within the assigned time frame. In that case, the tasks of the projects are rescheduled in a certain way that it can meet the deadline (Schwindt and Zimmermann 2015) . In case if the deadline of the project is reduces, the cost and resources of the project are needed to be increased. The project may not meet the deadline if the tasks of the project are not scheduled properly. Money: Money is another important constrains in the project management. The spending of money in the project is dependent on the scheduling of the project. Initially the budget of the project is determined (Kopanos et al. 2014). Proper scheduling of the tasks in the project can help to complete the project within the given budget. On the other hand, without proper scheduling, the sequencing of the tasks may get disrupted , resulting spending of more money for completing the project. Triple constrains: Cost: Each project has the fixed budget and it is desirable to complete the project within the given budget. In order to reduce the cost the scope of the project may have to reduce. Time: Each project has a assigned time which is called project deadline. It is desirable to finish the project within the time. In order to reduce the time the cost of the project may have to increase. Resources: Certain project needs certain resources. The effectiveness and the compilation time of the project depend on the availability of the resources. Three factors that causes the scheduling issues: Unavailability of the resources: The project scheduling can be affected negatively if the resources are unavailable or cannot be accessed easily. Scope creep: Initially, the requirements of the project are made clear by the clients. In certain cases, if the scope creeps, which the change in the requirement happens, the scheduling issues may arise, as the project is needed to be rescheduled as per the new requirements. Change in the human resource: The project has fixed team members, and they have a certain contribution in the project. In case, if some of the team member role off from the project, this may cause the project scheduling issues. References Kopanos, G.M., Kyriakidis, T.S. and Georgiadis, M.C., 2014. New continuous-time and discrete-time mathematical formulations for resource-constrained project scheduling problems.Computers Chemical Engineering,68, pp.96-106. Leyman, P. and Vanhoucke, M., 2016. Payment models and net present value optimization for resource-constrained project scheduling.Computers Industrial Engineering,91, pp.139-153. Schwindt, C. and Zimmermann, J., 2015. Handbook on Project Management and Scheduling Vol. 1.Cham: Springer International Publishing. Tavana, M., Abtahi, A.R. and Khalili-Damghani, K., 2014. A new multi-objective multi-mode model for solving preemptive timecostquality trade-off project scheduling problems.Expert Systems with Applications,41(4), pp.1830-1846.

Friday, November 29, 2019

Women in Latina America During 1950s free essay sample

From their Native American ancestors, they inherited the belief that women are wise and powerful offering their unique and valuable contributions to society. However, at the same time they were expected to follow the Spanish tradition of feminine submission to the strong male. Their strengths were both honored and respected- and denied and unaccepted. Latin American women had to fulfill certain roles. They were supposed to be a caring mother, diligent homemaker and obedient wife. Moreover, women were expected stay at home, bear children, and maintain the house. They were expected to clean and cook to make sure everything was sufficient when their husband came home from work. We can see this in Chronicle of a Death Foretold when Mercedes ,(the narrator’s wife) says that â€Å"the girls had been reared to screen embroidery, sew by machine, weave bone lace, wash and iron, make artificial flowers and fancy candy, and write engagement announcements (Marquez 31). We will write a custom essay sample on Women in Latina America During 1950s or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Women also needed to take responsibilities when it came to their children such as educating them. They were not allowed to participate in the work force as their husbands did. Machismo played significant role in the Latin American society. It was brought to Latin American by Spanish conquerors. It is considered a strong or exaggerated sense of manliness; and assumptive attitude that virility, courage, strength and entitlement to dominate are attributes of masculinity. Machismo was also portrayed in the novel The Chronicle of a Death Foretold such as when â€Å"Pedro Vicario asked to borrow her husband’s shaving implements, and she brought him the brush, the soap, the hanging mirror, and the safety razor with a new blade, but he shaved with his butcher knife. Clotilde Armenta thought that was the height of machismo† (Marquez 63). Clotilde thought that shaving with a razor was manly representing machismo. This ritual is known to be performed by many men throughout history and because it is one of the few activities that is completely and exclusively male. Machismo is also portrayed in the novel when the men take pride in visiting Maria Clotilde’s brothel, where they use women for sex. They are not ashamed of their actions because their society endorses it. Additionally, machismo can be seen when the Vicario brothers kill Santiago because it was an attempt to take back Angela’s honor by killing the man who deflowered her. Marriage was very important in the Latin culture. Women were expected to be virgins when they got married. Virginity was considered very sacred because it was supposed to be saved for the man you truly love (your husband). â€Å"On the other hand, the fact that Angela Vicario dared put on the veil and the orange blossoms without being a virgin would be interpreted afterwards as a profanation of the symbols of purity† (Marquez 41). Angela represents that being a virgin was very disgraceful; hence the fact that she was returned to her parents after her husband found out that she was deflowered. Divorce was also looked down upon because the woman and man should have taken the time to know each other well before they got married. Women were granted freedom after the feminist movement where women took on jobs outside the home to help support their families. Feminists demanded equality for women; they insisted that women were as capable as men; and they tried to raise the consciousness of men and women. The movement grew and spread through the sixties and into the seventies. Latin American women today are no longer powerless. They are taking charge working, while being able to take on children and all the responsibilities of home life. A great example of a strong woman would be Gwen Estefan who went from being a Cuban refugee to having a $170 million fortune. Her concerts are contemporary and professional but still demonstrate Hispanic family values. Additionally, many families today depend on the income of both the husband and wife in order to make ends meet. â€Å"Women leave their homes for many different kinds of jobs and they experience more freedom and financial independence† (Sanna 72). Today a macho man is one who supports his family against all odds, and who disciplines his children to be honest and hard-working. It is a key factor in shaping a healthy family, and it’s a source of discipline that teaches children courtesy and high moral standards. The Latino interpretation of a macho man is one who is fervent, confident, energetic, physically strong, assertive, determined and passionate. In conclusion, Latina women are just as powerful and capable of doing the things that their husbands do; however in the 1950’s it was very different. They were expected to stay at home, bear children, and maintain the house. But as we see the evolution of society, it is proven that women and men have equal rights.

Monday, November 25, 2019

The rise of the qin dynasty Essays

The rise of the qin dynasty Essays The rise of the qin dynasty Essay The rise of the qin dynasty Essay The role/importance of Qin Shi Huang in early China Today China is a great industrial power, its rapid economic growth over the past few decades have been very remarkable. Almost everything is made in China, almost every United States citizen can be seen with at least one consumer item from the country. But this country was not always this great economic power. Long before China became the great power it is today, long before it was even a country, China was secluded from the outside world. Chinese history primarily focused on inner China because the surrounding area contained a very hostile environment. This independence thrust on the Chinese from its seclusion serves to explain how the Chinese developed a unique and independent civilization. Even within China, the country was never a unified state in ancient times. Rather, it was divided into dozens of independent Chinese states. However, after centuries of fghting, seven major kingdoms emerged, the most important being the kingdom of Qin. It was within this kingdom that Wang Ying Chen unified China after years of ruthless fighting. Under this king, China was, for the first time ever, unified under one ruler. When Wang came into power, his title as king was not good enough, so he renamed himself Shih Huang D, which means first emperor. Through his reign, he made China a greater power economically, politically and socially. Before his rule, China was not politically stable, so to avoid political chaos, conquered states could not be referred to as independent nations. Shih Huang Di then divided his empire into thirty six commanderies. These administrative units served well for China, for they made China more organized. And what made this system so unique was that it was different from what previous dynasties had done. Previous dynasties had used loose alliances and federations, which did not do the country well. Moreover, government appointments were no longer based on nepotism but rather on merit. This eliminated any corrupt activity within the government that would Jeopardize the country in any way. The first emperor of China was also responsible for unifying China economically. He standardized units of measurements for weight and measures. Moreover, he standardized the currency. And more importantly, he helped establish an extensive network of roads and canals that facilitated trade and contributed to the economic ell-being of the country. But most of all, under his rule, the Chinese script was unified. This made the communication system of China completely unified. These accomplishments were important in establishing China as a better country. China would not be the same if it were not for Qin Shih Huang. The influence he had over Chinese culture can not be doubted. Outline l. Intro a. China wasnt always as great as it was today b. Ancient times: not unified c. First emperor II. Political influence a. Standardized currency b. Network of roads c. Effect IV. Social influence a. Communication system V. Conclusion

Friday, November 22, 2019

Comparison of U.S. & Other Health System Essay Example | Topics and Well Written Essays - 750 words

Comparison of U.S. & Other Health System - Essay Example However higher costs does not mean better quality of life, health statistics in Spain show higher life expectancies (82.2 years), lower mortality rates (10.9/1000), and overall lower incidences of population major diseases (diabetes:9.0%, cardiovascular diseases: 23.15%, obesity: 23.95%) compared to US [life expectancies (78.6 years) mortality rates (13.9/1000), major diseases (diabetes:10.85%, cardiovascular diseases: 15.6%, obesity: 31.7% ) (National Center for Health Statistics, 2013; World Health Organization, WHO, 2012). Differences come from lifestyle habits, the Spanish have an active lifestyle and Mediterranean diet, and the US a sedentary lifestyle coupled with unbalanced diet (Borkan, et al., 2010; The Department for Professional Employees, DPE, 2013; National Center for Health Statistics, 2013; WHO, 2012). Health Care Financing: Comparison between US and Spain The US has hybrid healthcare financing: government medical subsidy is combined with private or group insurance for payments: private funding ( insurance or individual’s out-of-pocket payments) amount up to 50% of the total health care spending, with the rest from federal (38%) and local or state funds (12%) (DPE, 2013). For Spain, after healthcare reform financing is also shared, but the government pays up to 74% of the expenses, the rest is paid by individuals or employers (Legido-Quigley, et al., 2013). Spanish healthcare relies more heavily on taxes than US healthcare, contributing to lower healthcare costs per person compared with the latter (WHO, 2012). Health Care Administration: Comparison between US and Spain The US principal agency in healthcare provision is the Department of Health and Human Services (HHS), which works with other agencies (e.g. Agency for Healthcare Research and Quality, Centers for Disease Control and Prevention, etc.) to improve the population’s health through research and development, establishment of quality standards, among others (National Center f or Health Statistics, 2013). In Spain the Spanish National Institute of Health (Instituto Nacional de Salud, INSALUD) similarly functions as the HHS in providing the public with quality health services, however unlike HHS it is decentralized and delegates power over regional health communities (Borkan, et al., 2010). Health Care Personnel and Facilities: Comparison between US and Spain Only around one-fifths of the healthcare facilities in the US are government-owned and the rest are private institutions, accounting for high healthcare costs per individual (DPE, 2013). A low physician-to-patient ratio of 24 physicians per 10,000 people promotes high healthcare costs but less quality services (Holtz, 2008; National Center for Health Statistics, 2013). In Spain, healthcare facilities are mostly government-owned and subsidized, and physicians and nurses are salaried, which reduce additional costs per individual (Borkan, et al., 2010). Also, services are better due to a higher physician -to-patient ratio, 39 per 10,000 persons (WHO, 2012). Access and Inequality Issues: Comparison between US and Spain US ranks first in terms of health care responsiveness due to its state-of-the-art health care delivery system, which contributes to an increase in preventable deaths (Holtz, 2008; WHO, 2012). Spain’

Wednesday, November 20, 2019

The Trusted Traveler Program Essay Example | Topics and Well Written Essays - 1000 words

The Trusted Traveler Program - Essay Example The â€Å"Trusted Traveler" program in essence was made to facilitate the frequent flyers that could include all the business entrepreneurs, government officials and employees as well as other selected individuals who could get their easy way off as regards to airport security checks. The Trusted Traveler program is undoubtedly a good idea when we literally think about it in the first go, but it is also a source of problems on the part of the security people who are present at the airports and are responsible for everything as they are at the helm of affairs when we talk about security and its long checks. This program can have its disadvantages if say for instance a terrorist gets hold of a Trusted Traveler card, would he or she still be unstoppable. The same goes true if he or she is carrying some explosives or weapons on board, would the person be allowed to board the flight? There are serious questions that can be posed with respect to the Trusted Traveler program. The â€Å"Trusted Traveler† program is in the process of being studied thoroughly by the American Senate and would soon, hopefully is put into practice so that American flyers could get extra privileges when they think of security and ease of actions at the airport and within the flights. The reason why this program has not been approved as yet owes to the fact that there are a number of glitches and loopholes through which terrorists and criminals can run off scotch free, thus delaying the whole process. Once these problems are addressed in the broader context of the airline security and with meticulous attention paid to the ease of the passengers, this program would pretty surely be in place for one and all to enjoy and witness at the airports, in the coming times. As regards to passenger authentication, it usually entails the corroboration of passenger ID, which includes from his beginning as a passenger is transited through the airport and

Monday, November 18, 2019

The Fiscal and Monetary Policy and Economic Fluctuations Essay

The Fiscal and Monetary Policy and Economic Fluctuations - Essay Example It is estimated to be a fifth of the universal total. The country also has a mixed economy and has sustained a steady Gross Domestic Product rate of growth, high levels of research and capital investment, and moderate rate of unemployment. The current economic situation in America is evidently different from the economic situation five years ago. The present Federal Reserve interest rate is between 0 and 0.25% and the Federal Reserve aims to maintain it until 2015. The Federal Reserve decreased the interest rate by half point in December, 2008. Also, the rate of inflation in the United States as of October 2012 was 2.16%. The current rate of inflation is 2.1% in comparison to the 3.8% rate of inflation recorded in 2008. The American inflation estimate constitutes transportation, apparel, recreation, education and communication, medical care, energy, housing, and food and beverages. Finally, the rate of unemployment as of March 2013 was 7.6%. This is equivalent to 11.7 million individ uals. On the other hand, the administration’s larger U-6 rate of unemployment, which incorporates those who are unemployed, was 13.9%. In contrast, the unemployment rate in America five years ago was 4.6% (Wallison, 2013). Question 2 The changes in interest rates, rates of inflation, and rates of unemployment can be attributed to several reasons. The changes in interest rates have been largely influenced by the activities of the Federal Reserve. The Federal Reverse has had an impact on the interest rates through altering the rate at which it loans out fund to financial institutions, altering reserve requirements of financial institutions, and by influencing the supply of funds through open market activities. Also, the Federal Reverse’s Board of Governors have largely contributed to the changes in interest rates by making decisions on changes in discount rates after receiving recommendations from one or more regional Federal Reverse Banks. The changes in rates of inflat ion have been facilitated by the activities of policymakers. The rate of inflation has changed because the law makers have assessed a wide range of fundamental inflation measures to assist in recognizing inflation tendencies. The most conventional forms of inflation measures leaves out commodities that tend to fluctuate in worth often or dramatically, for example, energy and food items. The rate of inflation has decreased because law makers have attempted to steady general consumer costs (LeRoy, 2011). Finally, the rate of unemployment has also changed due to a number of factors, one of them being employment by educational attainment. University educated individuals with a degree or higher educational qualification make up the most significant employment rate with approximately 44,648,000 of them having full time employment. In addition, this group makes up the least rate of unemployment of 4.6%. The highest numbers of unemployment are made up of people who do not have high school d iplomas. These people are followed by high school graduates who do not possess college degrees. Also, people with less than a diploma constitute the least number of people who are employed, at more than 10 million. Question 3 The strategies include encouraging entrepreneurship and small businesses and lowering taxes. Small businesses in America are the base of the United States economy providing employment to a large number of people. Encouraging business startups will encourage

Saturday, November 16, 2019

Subcontractors

Subcontractors 1.0 Introduction Wikipedia (2009) defined subcontractor as â€Å"an individual or in many cases a business that signs a contract to perform part or all of the obligations of another’s contract†. Other authors, Gerald N. Hill Kathleen T. Hill (2005) defined subcontractor as â€Å"a person or business which has a contract with a contractor to provide some portion of the work or services on a project which the contractor has agreed to perform†. Generally, a subcontractor performs his work under a contract with a main contractor who is hired by the employer. In building construction, a main contractor usually hires a subcontractor to perform a specific task such as roofing, plumbing, electrical, cement work and plastering, as part of the overall project. Hence, if the main contractor does not pay for the subcontractor, then the subcontractor has the right to enforce a â€Å"mechanic’s lien† on the real property upon which the work was done to collect. There are three types of subcontractor that is: Nominated subcontractor (Specialist subcontractor) Domestic subcontractor Named subcontractor Nominated subcontractor is essentially selected or appointed by the employer for some specific works. If the employer wants to nominate a subcontractor for an element of work, then he will instruct the main contractor to use the nominated subcontractor through the architect. The element of work usually is the engineering package such as piling, structural frame or some ME services works. In this kind of subcontract, there is a direct contractual relationship between the employer and the subcontractor. On the other hand, domestic subcontractor is selected and appointed by the main contractor who is hired by the employer. The domestic subcontractor doesn’t have the direct contractual relationship with the employer but he contract with the main contractor. Domestic subcontractors usually execute the part of work from the main contract and supply or fix the materials and goods. The employer will not involve in the election of this kind of subcontractor and the main contractor take the responsibility of the subcontractor. The Named subcontractor is contractually same as the domestic subcontractor. However, the different between them is the employer states that which contractor is acceptable without take responsibility for their final selection and appointment. Chapter 2: Forms of Contract 2.0 Forms of Contract 2.1 Review the method of appointing specialist subcontractor JCT 98 The JCT 1998 is the pre JCT Form which was used when selecting and choosing the subcontractor. There are two types of subcontractor in this form of Building Contract which are Nominated subcontractor and Domestic subcontractor. In the JCT Form, except the Employer, the Architect has the highest authority in making decision. Nominated subcontractor is essentially appointed by the Architect or the Employer when they need the subcontractor in some specific works. Daniel Atkinson (1999) defined nomination as â€Å"sub-letting sections of the work allowing the Employer full involvement in choosing the company early and using the subcontractor’s expertise for design or coordination†. There are some reasons that the Employer nominated a subcontractor (Daniel Atkinson, 1999): The Employer can select any company that he likes to be his subcontractor without based on the price. The subcontractor’s design expertise and his knowledge can be utilized due to he can be involved early. Since the specialist subcontractor involves, the Contractor will not waste his time on some particular work which the Contractor does not expert in it. The Employer can understand his responsibilities clearly since the clear contractual liability is established. Delay in time can be prevented by the direct links and involvements are established. According to the Jennie Price (1994), the procedure of nominating a subcontractor under the Standard Form of JCT 1998, Clause 35.4: The Architect sends the both of invitation to tender in part 1 of the standard form of tender, NSC/T, and the relevant section of the employer/ nominated subcontractor agreement, NSC/W, together with the drawings/specification/bill of quantities which describe the work, to those companies the employer wishes to invite to tender. Then the tenderers complete the standard form of tender (part 2 of NSC/T) and the relevant sections of the warranty, NSC/W, and return both documents to the Architect. The Architect chooses the subcontractor, and arranges for the Employer to sign the selected subcontractor’s tender to confirm his approval of it, and to execute the warranty, NSC/W. The Architect nominates the subcontractor to the main contractor using the standard nomination instruction, NSC/N. He also sends the main contractor a copy of the invitation to tender and the successful subcontractor’s tender, the drawings/specification/bills of quantities on which the tender was based, and the executed warranty. After received those documents, the main contractor has the right of reasonable objection to the selected tenderer within 7 days. If he does not object, he must reach agreement with the selected tenderer on the ‘Particular Conditions’ set out in Part 3 of NSC/T. These include the subcontract period, insurance details and the identity of the adjudicator and trustee stakeholder. When agreement on the Particular Conditions has been reached, the main contractor and subcontractor sign Part 3 of NSC/T, and execute the subcontract articles of agreement, NSC/A, which incorporate by reference the subcontract conditions NSC/C. The main contractor sends a copy of the signed NSC/T Part 3 and the executed NSC/A to the Architect for his records. 2.2 Review the method of appointing specialist subcontractor JCT 05 JCT 2005 Form of Building Contract (with quantities) has been updated, amended, merged and retired most of its important contracts. This form was set out in clear, understandable, and well-ordered for the user and it had simplified on wording such as change the word â€Å"Determination† to â€Å"Termination†. There is a little deviation between JCT 1998 and JCT 2005 regarding to the subcontracting. In this form of Building Contract, the nomination of subcontractor has been omitted. According to the Chappell D. (2007), there are a lot of problems arise between the main and subcontractor since a project is not ready for the subcontractor to start his work on the anticipated date. Due to the delay of the commence work, the subcontractor may argue and claims for more money. On the other hand, Ndekugri I. and Rycroft M. (2009) stated that JCT 1998 had extensive provisions on nominated subcontracting but due to the bad experience from the inherent pitfall of nomination of subcontracting and its complexity, the provision has been omitted in JCT 2005. There are three principles of appointing a subcontractor under the JCT 2005 Form of Building Contract: Consent to sub-contracting (Clause 3.7) According to this clause, main contractor cannot appoint or subcontract whole or any part of works to anybody without the Architect’s or the Contract Administrator’s consent. However, the Architect also cannot withhold or delay his consent unreasonably. If the Contractor insists to sub-letting his works to anyone without consent, then the employer entitles to terminate the Contractor’s contract under clause 8.4.1.4. Besides that, under the clause 3.7.2, the contractor cannot subcontract the design portion to anyone without the Employer’s consent. Lists in Contract Bills (Clause 3.8) Under this clause, annexations of lists of subcontractor to work packages which are defined in the Contract Bills are required. Clause 3.8.2 has stated that the list of subcontractor must not less than three persons. Then the Architect has to choose among the three persons to be the subcontractor. It is similar as pervious clause that the Architect cannot withhold or delay his consent unreasonably. If the Contractor submitted the list which less than three persons, then either: The Employer and the Contractor shall by agreement add the names of other persons to make sure the list comprises not less than three persons; or The Contractor carries out the works by himself. Conditions of sub-contracting (Clause 3.9) The subcontract shall state the condition that upon the termination of the Contractor with any reason, then the employment of the subcontractor will be automatically terminated too under the Clause 3.9.1. Besides that, the subcontract shall provide that subcontractor cannot remove the site materials which have been delivered to the works without the Contractor’s written consent except for use on the works. If the materials or goods have been paid by the Contractor, then they will become the Employer’s property and the subcontractor cannot deny it. On the other hand, if the Contractor has paid the subcontractor for any site materials before their value is included in the Interim Certificate, then the materials will become the Contractor’s property. Under the Clause 3.9.4, if the Contractor fails to make the payment to the subcontractor, then the Contractor shall pay simple interest to the subcontractor until the payment is made. Then according to the Clause 3.9.5, the Contractor could get the warranty from the subcontractor for his execution of works within 14 days of receipt of a written request by the Contractor. If the subcontract comply the three principles above, then the Architect could select and choose among the three persons in the list to be the domestic subcontractor. 2.3 Review the method of appointing specialist subcontractor NEC 3 ECC 05 The NEC 3 ECC 2005 is essentially used by Government for public works such as road, bridge etc. In JCT Form, the Architect has the highest authority while the Project Manager has the highest authority in this NEC 3. He plays an important role in this Form of Building Contract especially in subcontracting. The Project Manager is the person who approves the appointment of the subcontractor by the Contractor. In other words, the Project Manager dominates in the selection of subcontractor. Under the Clause 26.1, the Contractor still takes the responsibility to the works even though he had subcontracted the works to the Domestic subcontractor. Therefore, the Contractor must select the subcontractor carefully in case of the omission of the subcontractor. However under the Clause 26.2, the subcontractor who has been proposed by the Contractor must be accepted by the Project Manager. If the Project Manager does not accept the subcontractor, then the Contractor cannot appoint such subcontractor. Under the Clause 26.3, the Contractor has to submit the proposed conditions of contract for every subcontract to the Project Manager for his acceptance and approval unless an NEC Contract is proposed. Besides that, if the Project Manager agreed that no submission is required then the Contractor is not need to submit it. This clause also stated that the reasons that the Project Manager does not accept the subcontractor who is proposed by the Contractor are: The subcontractor will not allow the Contractor to provide the works. The subcontractor does not include a statement that the parties to the subcontract shall act in a spirit of mutual trust and cooperation. Chapter 3: Reasons of why Nomination has been stopped 3.0 Reasons of why Nomination has been stopped In the opinion of Jennie Price (1999), the disadvantages toward the main contractor are some of the reasons that the nomination has been stopped. The Main Contractor will lose his right to choose his favorite subcontractor to carry out the part of works. He would hard to communicate with the subcontractor who is nominated by the Employer thus cannot cooperate well. Since the Main Contractor is forced to employ the subcontractor so he is unable to impose his own terms and conditions which are more commercially advantageous to him. Other than that, the Nominated Contractor is normally difficult to be managed and controlled since their direct link with the professional team and the Employer. They will not easily listen to the Main Contractor on the design works due to the works are their expertise. Since some of employer will repeat the business with the nominated subcontractor, then the said nominated subcontractor will monopoly in this industry. Other subcontractors will not have chance to receive the job and make them suffer in their incomes. On the other hand, quality of the works might be dropped due to some nominated subcontractors handle few projects in the same period. They cannot concentrate on a single project and make the quality of every works will be dropped. 3.1 Advantages and Disadvantages toward the Employer Jennie Price (1999) agreed that Nomination provides some advantages and disadvantages toward the Employer which are shown as below: Advantages to the Employer: The Employer is able to select the person whom he wishes to carry out the subcontract works. Through the warranty NSC/W, the Employer has the direct contractual link with the subcontractor. It can covers matters such as design or materials selection by the subcontractor. Disadvantages to the Employer: The Employer has to take the risks and bear the responsibilities on the Nominated subcontractor due to his omission of works. If any defaults have been found, then the Employer should bear the extra costs. There are no rights against the main contractor in the event of defective design by the Nominated subcontractor. The Main Contractor entitles to claim Extension of Time if the progress of the main contract works is delayed by the Nominated subcontractor. Besides that, he could also claim for the Loss and Expenses due to the delay of works which is caused by the subcontractor. Since the Main Contractor does not take any responsibility on the Nominated subcontractor, there may be lack of management of the progress of the works on site of the subcontractor. 3.2 Opinion for the new appointment procedure of subcontractor In my opinion, the new specialist subcontractor/supplier appointment procedures are more complex to render the duties of the Architect / Project Manager / Quantity Surveyor. This is because the design teams have not direct contact with the subcontractor. All the instructions which are given by the design teams are passed through the Main Contractor. That might be appeared some mistake in the communication. By the way, the design team also cannot directly manage the subcontractor since the subcontractor only contract with the Main contractor. Chapter 4: Conclusion 4.0 Conclusion After the research, we will know that the procedure of nomination in JCT Form 98 and the reasons for nomination under this Form. Then we know that no more nomination under JCT Form 05. We also get the three methods that appoint a specialist subcontractor in JCT Form 05. NEC 3 ECC 2005 is only for the government works and the Project Manager has the highest authority in this Form. As a conclusion, nomination provides some disadvantages to the Main contractor such as difficult to cooperate between them and the main contractor cannot impose his own terms and conditions to the subcontract. Besides that, the main contractor is usually hard to manage the nominated subcontractor because he has the direct link with the professional design team. Other than that, nomination will make the monopolies arise in the construction industry due to the repeat business between the nominated subcontractor and the Employer. Quality of the works is low since the subcontractor cannot concentrate on single project. The Employer needs to bear the risks and take the responsibilities on the nominated subcontractor. Hence, nomination has been stopped. Finally, in my opinion, there are a lot of benefits that nomination has been stopped since there were a lot of disadvantages. Chapter 5: References Atkinson D. (2009), Sub-Contracting. [Online]. Last accessed on 24th July 2009 available at http://www.atkinsonlaw.com/cases/CasesArticles/Articles/SubContracting.htm CHAPPELL, David (2007). Understanding JCT Standard Building Contracts Eight Edition, Abingdon, Taylor Francis. Gerald N. Hill Kathleen T. Hill (2005), Subcontractor [Online]. Last accessed on 24th July 2009 available at http://legal-dictionary.thefreedictionary.com/Subcontractor NDEKUGRI I. and RYCROFT M. (2009). The JCT 05 Standard Building Contract Law and Administration Second Edition, Oxford, Butterworth-Heinemann. PRICE, Jennie (1999). Sub-contracting under the JCT Standard Forms of Building Contract, London, Macmillan Press LTD Wikipedia (2009), Types of Subcontractor [Online]. Last accessed on 24th July 2009 available at http://en.wikipedia.org/wiki/Subcontractor#Types_of_subcontractor Bibliography Barnes P. and Davies M (2008). Sub-contracting under The JCT 2005 Forms First Edition, Oxford, Blackwell. GERRARD, Robert (2005). NEC2 and NEC3 Compared. Great Britain, Bell Bain. ME Contractor Magazine (2005), what sort of subbie are you. [Online]. Available at http://www.eca.co.uk/IndustryGuidance/CCandL/Download/WhatSortOfSubbieRU.pdf