Thursday, October 31, 2019
Being Aware of Effective Leadership Research Paper
Being Aware of Effective Leadership - Research Paper Example However, even those theorists have not come up with conclusive evidence as to who is an effective leader. For example, trait theorists cannot explain how individuals with similar traits perform differently in different situations or an agreed set of traits that make up great leaders. This paper will try to discuss effective leadership using one of the great leaders in history; Bill Gates. The Microsoft Corporation was founded in 1975 by two young individuals Bill Gates and Paul Allen and has grown to be a giant in the industry. William H. Gates III was born in October 28, 1955 in Seattle Washington. He was the only son of William Gates II a well known and accomplished attorney. Since his early childhood gates was very intelligent and astonished with computers. His parents wanted him to pursue a law career but that was never to be as he was more interested in computers. He was enrolled in a public school but was later transferred to lakeside school since his parents wanted him to have a more challenging environment which matched his exceptional abilities. It was while there that Bill began his journey as an inventor and a great entrepreneur. He and his friend Paul Allen took time to study computer programming by themselves and began writing computer programs (Wallace, 1992). Gates was enrolled in Harvard University in 1973 where he continued pursuing his interest in computer programming. When an opportunity arose, he quit college to pursue his career. This came about through a cover story on popular electronics magazine which carried a cover story on a microcomputer, the Altair, made by the MITS firm in New Mexico. He and his colleague Allen offered to develop an interpreter for the program; Microsoft BASIC interpreter. In 1975 they founded the Microsoft Company which is now the largest personal computer software company (Gates, 1996). He became the chief executive officer, chief software architect, chairman and the largest individual shareholder until the year 2000 when he stepped down as the CEO but retained the chairmanship of the Board. He was recognized by the times magazine as one of the 100 people who most influenced the 20th century and one of the 100 most influential people of 2004, 2005 and 2006 (Wallace, 1992). In 1994, he was recognized as the CEO of the year by CEO magazine and in 2011, he was the fifth most powerful person in the world (Forbes, 2012). This is in addition to the numerous honorary degrees he has received from various universities for his exemplary work. Bill Gates has played a great role in driving Microsoft Corporation to where it is today. First, through his efforts and that of Allen they founded the company from scratch with their skills. He was involved in designing software which was the key task in the newly formed company. They started by developing the BASIC interpreter for MITS which allowed individuals to play games among other functions. He also began the idea of charging for the use of software. Tho ugh his idea was unpopular, he persisted and later it became the norm for software developers (Gates, 1996). Gates also developed the Microsoft Disk Operating System (MS-DOS) for IBM one of the computer giant companies but retained the right to license other manufacturers. Soon the operating system became the universal standard for personal computers. He was also involved in
Tuesday, October 29, 2019
Swot analysis Walmart Research Paper Example | Topics and Well Written Essays - 2000 words
Swot analysis Walmart - Research Paper Example Introduction and Overview In this paper, I will focus upon a strategic and comprehensive analysis of the business tactics, market trends and economic trajectories of Wal-Mart, by attempting a SWOT analysis of the companyââ¬â¢s pros and cons. Every successful business has their upsides as well negative aspects. A qualitatively superior standard of operation and well-sustained market shares can only be maintained through a balanced adaptation of both to suit particular business issues and requirements. As a leading brand, Wal-Mart has been the center of several business economic, socio-economic and political economic studies and research. An updated analysis of the companyââ¬â¢s market strategies, trends and business highlights will be the primary focus of my paper. While Wal-Mart still retains an amount of prestige and holds a position in the market, it cannot be denied that it is no longer the sole retail giant in America. In a global age, the rapid increase of consumer demand has given rise to numerous small, medium and large retail corporations to provide products and customer services with the required speed ad ease to cause serious business threats to Wal-Mart. For more than 45 years, Wal-Mart has been able to remain successfully in the running against stringent rivalry and rising competing foreign market retailers. Its growth has suffered in the past years. Recent figures and statistics are not reassuring. While assessing the companyââ¬â¢s varied and diverse business aspects, I will attempt to provide a detailed reading of the same by utilizing the simple but effective SWOT model of business analysis. 2. Methodology and Procedure As stated in the Introduction, the SWOT method of business analysis is simple but highly effective in producing a detailed, comprehensive and objective research on the four major aspects of any, small or big, business: the Strengths, Weaknesses, Opportunities and Threats. With this methodology, I will attempt a study and analysis of the inner workings and the relevant problems in the operations of Wal-Mart. The effectiveness of the SWOT method lies in its operational dynamics. It penetrates inward into the basic working and process involved in running the companies, ranging from the production to public relations to retail. I intend to apply this procedural business analytic model because I believe every little aspect of a business can be summed up under the four general headings that are the purview of the SWOT model, as mentioned above. In context of Wal-Mart, this method is particularly pertinent as a comparative study of the strengths and weaknesses of a business yields a greater economic and strategic perspective of current market trends. (Pahl & Richter 7) The company gains from an analysis of competitive advantage that is directly relatable to a firmââ¬â¢s performance in the market. A well-balanced and well-thought theoretical methodology ultimately has the capacity to lead to greater prod uctivity and client satisfaction, all resulting in more generation of revenue. (Hao 15) 3. SWOT Analysis of Wal-Mart: A Comprehensive Business Study Before attempting an application of the SWOT model, I will briefly give an overview of the companyââ¬â¢s past and present profile. Figure 1. Company Overview (2012) Name Wal-Mart Stores Inc. Industries served Retail Geographic areas served Worldwide Headquarters Bentonville, US Current CEO Mike Duke Revenue $ 466.950 billion (2012) Profit $ 15.699 billion (2012) Employees 2.2 million
Sunday, October 27, 2019
Electrical Detection Of Liquid Lithium Leaks from Pipe Joint
Electrical Detection Of Liquid Lithium Leaks from Pipe Joint Contents (Jump to) 1.0 Introduction 2.0 Theory Of Operation 3.0 Hardware and Electrical Circuit 4.0 Result from Test Circuit 5.0 Summary 1.0 Introduction Liquid lithium is a candidate plasma facing component (PFC) material for a fusion reactor, and lithium PFCs have been shown to improve plasma confinement and reduce impurities in tokamaks such as TFTR, 1 CDX-U, 2 NSTX,3, 4 FTU,5 and HT-7.6 In a reactor, the liquid lithium would have to be circulated in a loop system for power handling and the removal of impurities including tritium. A circulating system is more complicated than the static configurations used to date in fusion devices, and so requires further development and testing: for example, in a liquid lithium system, the ability of a system to safely freeze, re-liquefy, and then continue operation without leaks is essential. The Liquid Lithium Test Stand (LLTS) is being constructed at Plasma Physics Laboratory (PPL) to gain experience with flowing lithium systems, and as a prototype for circulating lithium in future PFC test modules. The LLTS consists of an upper and lower reservoir, a rotating permanent magnet pump, and an electromagnetic flow meter. The top of the reservoirs are kept under vacuum. The LLTS is designed to operate at up to 500 à ¢-à ¦C and contain up to 2 l of lithium. Connections of the pipe to the reservoirs are welded, but all other joints are demountable VCR fittings to ease construction, maintenance, and reconfiguration of the loop. Compared to a weld, a demountable joint is more likely to leak, which is a major safety concern since liquid lithium is hot (over 200 à ¢-à ¦C) and reacts with atmospheric gases, water, and concrete. The LLTS therefore requires a design to minimize the impact of potential leaks, including a system to detect leaks and actuate control systems. 2.0 Theory of Operation We monitor for leaks of liquid lithium from a pipe joint by using the conductivity of the leaking liquid metal to complete a circuit. Liquid lithium at 400 à ¢-à ¦C has a resistivity9 of 32 à ¼ cm, roughly three times less than that of 316 stainless steel at the same temperature, 10 102 à ¼ cm. A conducting shell, normally electrically isolated from the pipe, surrounds each VCR fitting. If lithium leaks it will contact the shell, which will no longer be electrically isolated from the pipe. A circuit monitors for continuity between the pipe and the shell. If continuity is detected, the control systems are actuated: power to the heaters and pump motor is turned off so that the lithium in the loop can cool down and solidify. 3.0 Hardware and Electrical Circuit The loop is constructed from 316 stainless steel, which is resistant to corrosion by liquid lithium. The pipe of the loop has a 3/8 in. diameter and pipe joints are 5/8 in. Swages lock VCR fittings, with special non-silver-coated stainless steel gaskets. Each VCR fitting is surrounded by a 0.050 in. thick cylindrical copper shell, electrically isolated from the pipe by Cotronics Ultra Temp 390 ceramic tape. A mockup of the shell around VCR fittings is shown in Figure 1. The ends of the cylinders are attached to the body by a temperature compatible braze. The shell is cut in half so that it can be positioned around the fitting. The two halves then are fastened in place by a metal band. A wire lug for the leak detector circuit is attached by a tapped hole on one cylinder end face. While copper readily alloys with lithium, it was chosen as the shell material because of its high thermal diffusivity. The shells will not be thermally insulated as the pipes will, so they will be cooler than the liquid lithium inside the pipe. If lithium leaks out of a VCR fitting, it will be physically contained by the shell and cooled down by the copper acting as a heat sink. The combination of alloying and lower temperature reduces reactivity. On this principle, copper powder fire extinguishers for lithium fires were developed.11 In order to prevent lithium from reacting with air, and that which might leak from the shells from contacting the concrete floor, the loop will be surrounded by an argon-filled stainless steel enclosure which includes a floor plate with walls sufficiently high to contain the entire inventory of liquid lithium. An electrical circuit, shown in Figure 2, monitors for continuity between the copper shell and the pipe. The inputs to the circuit are the two lea ds in the lower left of the figure: the upper lead is attached to a copper shell, and the lower (ground) lead is attached to the loop. Normally, the ââ¬Å"+â⬠input of the comparator is pulled up above the ââ¬Å"ââ¬ââ⬠Comparator Reference Voltage by a 100 k resistor attached to a 5 V supply. If there is a fault in the loop such as a leak of lithium or a physical contact between some part of the copper shell and the pipe that allows current to flow from the upper lead to ground, the ââ¬Å"+â⬠input of the comparator is pulled below the reference voltage. This causes the comparator to output 0 V and the relay latches off the power to the heaters and pump. A fault draws current through the 100 k pull up resistor and also through a front panel LED, which lights. FIG. 1. One channel of the interlock circuit. If there is a fault (such as a leak) that causes the open circuit at left to be shorted, the ââ¬Å"+â⬠input of the comparator will be pulled down, the comparator will output 0 V, and the relay will open, latching off the power to the heaters and pump. FIG. 2. Block diagram of the interlock system for the heaters and pump motor. If the leak detector circuit detects a fault, or the E-stop button is pushed, power to the pump motor and heaters will be turned off until the leak detectors register no fault on all channels and the start button is pushed. ââ¬Å"MCâ⬠is the motor controller and ââ¬Å"SSRâ⬠is the solid state relays. In order to ensure that it is easy to identify the location of a fault, for each channel there is an analog LED on a front panel display that will light up in case of a fault. One additional normally-on LED for each board shows that the interlock system itself is powered on. The fault status of each channel in the interlock system is monitored and recorded by a PC with lab VIEW. The digital output of the comparator for each channel is sent to a SCB- 68A connector box which is attached to a 6323 National Instruments card in the PC. The lab VIEW program polls each interlock channel at 1 kHz, in order to record intermittent faults. Each channel has two displays in lab VIEW: one for its present status, and one indicating whether there has ever been a fault in the time since a ââ¬Å"resetâ⬠was clicked. Since the analog front panel display shows the present status, this lab VIEW display would allow an operator to see where a past fault occurred. Additionally, for ease of monitoring, a schematic of the loop shows the status of each leak detector in its proper location. Every second, for each channel, the program logs to a file whether there has been any fault during that 1 s period. Along with thermocouple and pressure data in the same file, this could aid in reconstruction of the circumstances surrounding a fault. Note that the PC with Lab VIEW is for monitoring and logging only, and it is not at present part of any control loop. 4.0 Result from Test Circuit The electrical systems described were constructed. The open-circuit voltage between the sensing terminals was 3.5 V, and the short-circuit current (limited by the 220 resistor) was 15 mA. The reference voltage potentiometers were adjusted for maximum sensitivity so that any resistance between the sensing terminals of less than 2 k triggers the interlock. A test of the interlock system was performed in air with gallium as a surrogate liquid metal. Gallium was poured into a section of pipe with a VCR fitting gasket that was intentionally damaged by cutting a small slit. As expected, gallium leaked out from the damaged gasket, contacted the copper shell, and triggered the interlock. 5.0 Summary The resistance of a liquid lithium leak should be much less than the 2 k maximum resistance to trigger the interlock: even a 1 cm long, 1 à ¼m radius cylinder of liquid lithium between the copper shell and pipe would have a resistance of only 1 k and would trigger the interlock. The LTS will be in an argon-filled enclosure to minimize lithium reactions if leaks occur. Lithium compounds that do form with any residual gases will dissolve in the liquid lithium, 12 and should not affect its electrical conductivity in the time it takes to trigger the interlock system. One potential problem of this system is that an open circuit between the two sensing terminals is the normal condition: if one of the sensing wires were to become disconnected or be cut, that channel would cease to be able to detect a fault, but there would be no indication in the system of a problem. A testing procedure or additional system could be developed to ensure operation of all leak detector channels. Another issue is that only VCR fitting joints are monitored. A leak elsewhere in the LTS would not trigger the interlock system. It could be advantageous to have an additional non-localized leak detection system, for example, by monitoring for a sudden change in pressure in the loop. While the vacuum pressure above the reservoirs is monitored and logged, pressure readings are not at present incorporated into the interlock system. The LTS, a test stand for flowing liquid lithium and liquid lithium PFC test modules at PPL, is being constructed. A circuit to detect leaks at the demountable joints in the loop has been constructed and tested with a surrogate liquid metal, gallium. If a leak is detected, the circuit actuates a control system, latching off power to the heaters and pump in order to bring the loop to a safer state. Liquid lithium leaking from joint contacts the surrounding copper shell, completing the leak detector circuit. The copper shell helps lower the reactivity of leaking lithium b y alloying with the lithium and by acting as a heat sink.
Friday, October 25, 2019
The Execution of Private Slovik Essay -- Literary Analysis, William B
In the narratorââ¬â¢s quest for information about the bombing of Dresden, he wrote to the Air Force, hoping to gain more knowledge about what went into the decision. His only official response at the time was ââ¬Å"that the information was top secret stillâ⬠(11). How bombing of Dresden could ever be considered classified when it had such a devastating effect on so many people is just one of the many absurdities pointed out by the narrator in his quest to provide a balanced view of the war. One novel, The Execution of Private Slovik by William Bradford Huie, details the only execution of an American soldier for desertion during World War II. The narrator quotes from the opinion of a staff judge advocate who supported Slovikââ¬â¢s sentence, stating: ââ¬Å"If the death penalty is ever to be imposed for desertion, it should be imposed in this case, not as a punitive measure nor as retribution, but to maintain that discipline upon which alone an army can succeedâ⬠(45). The view that a soldier should have to die in order for the military to maintain unit cohesion and essentially teach a lesson to other draftees who may want to desert their post is a hard one for those not in the military to sympathize with. Furthermore, it illustrates the paradoxical nature of militaristic actions, where one is forced to fight against enemies who wish to do them harm, or face death at the hands of their fellow servicemen if the choose not to fight. During a Lions Club luncheon meeting Billy attends back in Ilium, a Marine Corp Major who had served in Vietnam addressed the attendees. The Marine spoke of his experience serving in Vietnam, and his view that ââ¬Å"the Americans had no choice but to keep fightingâ⬠¦ until the Communists realized that they could not force their wa... ...cation of the bombings of Dresden as tit for tat in an attempt to rationalize civilian killings is abhorrent to those who see life as sacred, regardless of which side of the civilian line one falls. Saundy is much more sympathetic than Eaker to those who lost their lives in the Dresden bombing. Saundy believed ââ¬Å"that the bombing of Dresden was a great tragedy none can denyâ⬠, and that it wasnââ¬â¢t necessary to the Allies efforts to win the War (187). However, he does defend those who directed the bombing, stating they ââ¬Å"were neither wicked nor cruelâ⬠, but instead forced into making a tough decision in a decisive time in the War (187). Saundy presents a much more humane view of the bombing of Dresden than Eaker. Saundy doesnââ¬â¢t attempt to justify or condemn the bombing; he instead portrays it as one of the many horrors of war that can only be viewed in hindsight as such.
Thursday, October 24, 2019
Drm Exma Ii
Chapter 6 1. Which of the following is a purpose of the SQL standard? A)To specify syntax and semantics of SQL data definition and manipulation B)To specify minimal and complete standards, which permit different degrees of adoption in products C)To define the data structures and basic operations for SQL databases D)All of the above Answer: D Level: ModeratePage Ref: 312 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 2. The benefits of a standardized relational language include: A)application longevity. B)reduced training costs. C)cross-system communication.D)All of the above Answer: D Level: ModeratePage Ref: 313 Topic: The Role of SQL in a Database Architecture AACSB Use of Information Technology 3. The _____ is the structure that contains descriptions of objects such as tables and views created by users. A)SQL B)schema C)catalog D)master view Answer: B Level: EasyPage Ref: 314 Topic: The SQL Environment AACSB Use of Information Technology, Ana lytic Skills 4. _____ is a set of commands used to control a database, which includes security. A)DML B)DDL C)DCL D)DPL Answer: C Level: EasyPage Ref:315 Topic: The SQL Environment AACSB Use of Information Technology . _____ is a set of commands used to update and query a database. A)DML B)DDL C)DCL D)DPL Answer: A Level: EasyPage Ref: 315 Topic: The SQL Environment AACSB Use of Information Technology 6. DDL is typically used during which phases of the development process? A)Implementation B)Physical design C)Analysis D)All of the above Answer: B Level: DifficultPage Ref: 314, 315 Topic: The SQL Environment AACSB Use of Information Technology, Analytic Skills 7. The SQL command _____ defines a logical table from one or more tables or views. A)create table B)alter table C)create view D)create relationshipAnswer: C Level: EasyPage Ref:319 Topic: Defining A Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology 8. Any create command may be rev ersed by using a ________ command. A)truncate B)drop C)delete D)unpack Answer: B Level: EasyPage Ref: 319 Topic: Defining a Database in SQL Subtopic: Generating SQL Database Definitions AACSB Use of Information Technology, Analytic Skills 9. The first in a series of steps to follow when creating a table is to: A)identify columns that must be unique. B)identify each attribute and its characteristics. C)create an index.D)identify columns that must be null. Answer: B Level: ModeratePage Ref: 319 Topic: Defining a Database in SQL Subtopic: Creating Tables AACSB Use of Information Technology, Analytic Skills 10. The SQL command _____ adds one or more new columns to a table. A)create table B)alter table C)create view D)create relationship Answer: B Level: EasyPage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology, Analytic Skills 11. What does the following SQL statement do? Alter Table Customer_T Add (Type Varchar (2)); A) Alters the Customer_T table to accept Type 2 VarcharsB)Alters the Customer_T table to be a Type 2 Varchar C)Alters the Customer_T table, and adds a field called ââ¬Å"Typeâ⬠D)Alters the Customer_T table by adding a 2-byte field called ââ¬Å"Varcharâ⬠Answer: C Level: ModeratePage Ref: 323 Topic: Defining a Database in SQL Subtopic: Changing Table Definitions AACSB Use of Information Technology 12. What does the following SQL statement do? Delete from Customer_T where state = ââ¬ËHIââ¬â¢; A)Deletes all records from customer_t where the state is equal to HI B)Removes the customer_t table from the database C)Deletes all records from the customer_t table D)None of the aboveAnswer: A Level: ModeratePage Ref: 326 Topic: Inserting, Updating, and Deleting Data Subtopic: Deleting Database Contents AACSB Use of Information Technology, Analytic Skills 13. What does the following SQL statement do? Update Product_T Set Unit_Price = 775 Where Product_ID = 7 A)Changes the price of a unit called Product_T to 7 B)Changes the unit price of Product 7 to 775 C)Changes the length of the Unit_Price field to 775 D)Updates the Product_T table to have a unit price of 775 Answer: B Level: ModeratePage Ref: 327 Topic: Inserting, Updating, and Deleting Data Subtopic: Updating Database ContentsAACSB Use of Information Technology, Analytic Skills 14. Which of the following is a technique for optimizing the internal performance of the relational data model? A)Avoiding indexes on secondary keys B)Clustering data C)Not reporting statistics to save machine resources D)Using random index organizations Answer: B Level: ModeratePage Ref: 327 Topic: Internal Schema Definitions in RDBMSs AACSB Use of Information Technology 15. Indexes are created in most RDBMSs to: A)provide a quicker way to store data. B)decrease the amount of disk space utilized. C)provide rapid random and sequential access to base-table data.D)increase the cost of implementation. Answer: C Level: ModeratePage Ref: 328 Topic: Internal Schema Definition in RDBMSs Subtopic: Creating Indexes AACSB Use of Information Technology 16. In an SQL statement, which of the following parts states the conditions for row selection? A)Select B)From C)Where D)Group By Answer: C Level: EasyPage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 17. What does the following SQL statement do? Select * From Customer Where Cust_Type = ââ¬Å"Bestâ⬠A)Selects all the fields from the Customer table for each row with a customer labeled ââ¬Å"bestâ⬠B)Selects the ââ¬Å"*â⬠field from the Customer table for each row with a customer labeled ââ¬Å"bestâ⬠C)Selects fields with a ââ¬Å"*â⬠in them from the Customer table D)Selects all the fields from the Customer table for each row with a customer labeled ââ¬Å"*â⬠Answer: A Level: ModeratePage Ref: 329 Topic: Processing Single Tables Subtopic: Clauses of the SELECT Statement AACSB Use of Information Technology, Analytic Skills 18. What result will the following SQL statement produce? Select Avg(standard_price) as average from product_v;A)The average of all products in product_v B)The average standard_price of all products in product_v C)The average price of all products D)None of the above Answer: B Level: ModeratePage Ref: 331 Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 19. Which of the following questions is answered by the SQL statement? Select Count (Product_Description) from Product_T; A)How many products are in the Product Table? B)How many products have product descriptions in the Product Table? C)How many characters are in the field name ââ¬Å"Product_Descriptionâ⬠?D)How many different columns named ââ¬Å"product Descriptionâ⬠are there in table Product_T? Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: U sing Functions AACSB Use of Information Technology, Analytic Skills 20. What results will be produced by the following SQL query? Select sum(standard_price) as total_price from product_v where product_type = ââ¬ËWOODââ¬â¢; A)The total price of all products that are of type wood B)The total price of all products C)The standard_price of the first wood product in the table D)The standard_price of any wood product in the table Answer: A Level: DifficultPage Ref: 331Topic: Processing Single Tables Subtopic: Using Expressions AACSB Use of Information Technology, Analytic Skills 21. Which of the following counts ONLY rows that contain a value? A)Count B)Count(*) C)Tally(*) D)Checknum Answer: A Level: ModeratePage Ref: 331,332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 22. Which of the following will produce the minimum of all standard prices? A)Select standard_price from product_v where standard_price = min; B)Select min(standard_price) from product_v; C)Select standard_price from min(product_v);D)Select min(standard_price) from product_v where standard_price = min(standard_price); Answer: B Level: ModeratePage Ref: 331, 332 Topic: Processing Single Tables Subtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 23. What will result from the following SQL Select statement? Select min(product_description) from product_v; A)The minimum value of product_description will be displayed. B)An error message will be generated. C)The first product description alphabetically in product_v will be shown. D)None of the above. Answer: C Level: DifficultPage Ref: 331, 332 Topic: Processing Single TablesSubtopic: Using Functions AACSB Use of Information Technology, Analytic Skills 24. Which of the following is the wildcard operator in SQL statements? A) B) * C) = D) & Answer: B Level: EasyPage Ref: 332, 333 Topic: Processing Single Tables Subtopic: Using Wildcards AACSB Use of Information Technology, Analytic Skills 25. What result set will the following query return? Select item_no from order_v where quantity > 10; A)The item_no of all orders that had more than 10 items B)The order_id of all orders that had more than one item C)The order_id of all orders that had more than 10 itemsD)The item_no of all orders that had 10 or more items Answer: A Level: ModeratePage Ref: 333 Topic: Processing Single Tables Subtopic: Using Comparison Operators AACSB Use of Information Technology, Analytic Skills 26. Which of the following is true about the SQL statement? Select * From Product Where Quantity = 1 Or Quantity = 2; A)All fields will be selected from the Product table for products that have a quantity of 1. B)All fields will be selected from the Product table for products that have a quantity of only 2. C)All fields will be selected from the Product table for products that have a quantity of 1 or 2.D)None of the above. Answer: C Level: ModeratePage Ref: 333-336 Topic: Proces sing Single Tables Subtopic: Using Boolean Operators AACSB Use of Information Technology, Analytic Skills 27. What result set will the following query return? Select item_no, description from item where weight > 100 and weight < 200; A)The item_no and description for all items weighing less than 100 B)The item_no for all items weighing between 101 and 199 C)The item_no and description for all items weighing between 101 and 199 D)The item_no for all items weighing more than 200 Answer: C Level: ModeratePage Ref: 336, 337Topic: Processing Single Tables Subtopic: Using Ranges for Qualification AACSB Use of Information Technology, Analytic Skills 28. To eliminate duplicate rows in a query, the _____ qualifier is used in the SQL Select command. A)alter B)distinct C)check D)specific Answer: B Level: EasyPage Ref: 337, 338 Topic: Processing Single Tables Subtopic: Using Distinct Values AACSB Use of Information Technology 29. What result set is returned from the following query? Select cust omer_name, telephone from customers where city in (ââ¬ËBostonââ¬â¢,ââ¬â¢New Yorkââ¬â¢,ââ¬â¢Denverââ¬â¢); A)The customer_name and telephone of all customersB)The customer_name and telephone of all customers living in either Boston, New York or Denver C)The customer_name and telephone of all customers living in Boston and New York and Denver D)The customer_name of all customers living in Boston, New York or Denver Answer: B Level: ModeratePage Ref: 339 Topic: Processing Single Tables Subtopic: IN and NOT IN with Lists AACSB Use of Information Technology, Analytic Skills 30. To get all the customers from Hawaii sorted together, which of the following would be used? A)Order By B)Group By C)Having D)Sort Answer: A Level: EasyPage Ref: 339, 340 Topic: Processing Single TablesSubtopic: Sorting Results: The ORDER BY Clause AACSB Use of Information Technology, Analytic Skills 31. A single value returned from an SQL query that includes an aggregate function is called a(n): A )agate. B)scalar aggregate. C)vector aggregate. D)summation. Answer: B Level: EasyPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 32. Multiple values returned from an SQL query that includes an aggregate function are called: A)vector aggregates. B)scalar aggregates. C)agates. D)summations. Answer: A Level: EasyPage Ref: 340, 341Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 33. Which of the following can produce scalar and vector aggregates? A)Order By B)Group By C)Having D)Sort Answer: B Level: ModeratePage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 34. What will be returned when the following SQL statement is executed? Select driver_no,count(*) as num_deliveries from deliveries gr oup by driver_no; A)A listing of all drivers, sorted by driver numberB)A listing of each driver as well as the number of deliveries that he or she has made C)A count of all of the deliveries made by all drivers D)None of the above Answer: B Difficulty: DifficultPage Ref: 340, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 35. What will be returned when the following SQL statement is executed? Select driver_no, count(*) as num_deliveries from deliveries where state = ââ¬ËMAââ¬â¢ group by driver_no; A)A listing of all drivers who made deliveries to state = ââ¬ËMAââ¬â¢, sorted by driver number.B)A listing of each driver who made deliveries to state = ââ¬ËMA as well as the number of deliveries that each driver has made to that state. C)A count of all of the deliveries made to state = ââ¬ËMAââ¬â¢ by all drivers. D)None of the above. Answer: B Difficulty: DifficultPage Ref: 3 40, 341 Topic: Processing Single Tables Subtopic: Categorizing Results: The GROUP BY Clause AACSB Use of Information Technology, Analytic Skills 36. Which of the following finds all groups meeting stated conditions? A)Select B)Where C)Having D)Find Answer: C Level: EasyPage Ref: 341, 342 Topic: Processing Single TablesSubtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 37. What will be returned when the following SQL query is executed? Select driver_no, count(*) as num_deliveries from deliveries group by driver_no having count(*) > 2; A)A listing of all drivers who made more than 2 deliveries as well as a count of the number of deliveries B)A listing of all drivers C)A listing of the number of deliveries greater than 2 D)A listing of all drivers who made more than 2 deliveries Answer: A Level: DifficultPage Ref: 341, 342 Topic: Processing Single TablesSubtopic: Qualifying Results by Categories: The HAVING Clause AACSB Use of Information Technology 38. Which of the following is true of the order in which SQL statements are evaluated? A)The select clause is always processed first. B)The select clause is always processed last. C)The select clause is processed before the order by clause. D)The group by clause is processed before the where clause. Answer: C Level: DifficultPage Ref: 329 Topic: Processing Single Tables AACSB Use of Information Technology 39. A _______________ view is materialized when referenced. A)virtual B)dynamic C)materialized D)base Answer: BLevel: ModeratePage Ref: 342 Topic: Using and Defining Views AACSB Use of Information Technology 40. A view may not be updated directly iF it contains: A)the distinct keyword. B)derived columns and expressions in the select clause. C)uses the group by or having clause. D)all of the above. Answer: D Level: EasyPage Ref: 345 Topic: Using and Defining Views AACSB Use of Information Technology Chapter 7 1. A join operation: A) brings together data from two different fields. B) causes two tables with a common domain to be combined into a single table or view. C) causes two disparate tables to be combined into a single table or view.D) is used to combine indexing operations. Answer: B Level: EasyPage Ref: 358 Topic: Processing Multiple Tables AACSB Use of Information Technology 2. A join in which the joining condition is based on equality between values in the common columns is called a(n): E) equi-join. F) uni-lateral join. G) natural join. H) both A and C. Answer: D Level: EasyPage Ref: 358 Topic: Processing Multiple Tables Subtopic: Equi-join AACSB Use of Information Technology 3. A join that is based upon equality between values in two common columns with the same name and where one duplicate column has been removed is called a(n): I) equi-join.J) natural join. K) multivariate join. L) inner join. Answer: B Level: EasyPage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 4. The most common ly used form of join operation is the: M) outer join. N) union join. O) equi-join. P) natural join. Answer: D Level: ModeratePage Ref: 360 Topic: Processing Multiple Tables Subtopic: Natural Join AACSB Use of Information Technology 5. A join in which rows that do not have matching values in common columns are still included in the result table is called a(n): Q) natural join. R) equi-join. S) outer join. T) union join. Answer: CLevel: EasyPage Ref: 361 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 6. In which of the following situations would one have to use an outer join in order to obtain the desired results? U) A report is desired that lists all customers who placed an order. V) A report is desired that lists all customers and the total of their orders. W) A report is desired that lists all customers, the total of their orders during the most recent month, and includes customers who did not place an order during the month (their total will be zero). X) There is never a situation that requires only an outer join.Answer: C Level: DifficultPage Ref: 361,362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology, Analytic Skills 7. One major advantage of the outer join is that: Y) information is easily accessible. Z) information is not lost. [) the query is easier to write. ) All of the above. Answer: B Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Outer Join AACSB Use of Information Technology 8. A type of join implemented in SQL-1999 and by extension SQL-2003 that returns all of the data from each table that is joined is called a(n): ]) outer join. ^) inner join. ) union join. `) intersect join. Answer: C Level: ModeratePage Ref: 362 Topic: Processing Multiple Tables Subtopic: Union Join AACSB Use of Information Technology 9. A type of query that is placed within a WHERE or HAVING clause of another query is called a: a) master query. b) subquery. c) sup erquery. d) multi-query. Answer: B Level: EasyPage Ref: 340 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 10. _________ takes a value of true if a subquery returns an intermediate results table which contains one or more rows. e) In f) Having g) Exists h) Extents Answer: CLevel: ModeratePage Ref: 367 Topic: Processing Multiple Tables Subtopic: Subqueries AACSB Use of Information Technology 11. In SQL, a _____________ subquery is a type of subquery in which processing the inner query depends on data from the outer query. i) correlated j) paired k) natural l) inner Answer: A Level: ModeratePage Ref: 368 Topic: Processing Multiple Tables Subtopic: Correlated Subqueries AACSB Use of Information Technology 12. A ______________ ____________ is a temporary table used in the FROM clause of an SQL query. m) correlated subquery n) derived table o) view table p) None of the above. Answer: BLevel: ModeratePage Ref: 369 Topic: Processing Multiple Tabl es Subtopic: Using Derived Tables AACSB Use of Information Technology 13. The UNION clause is used to: q) combine the output from multiple queries into a single result table. r) join two tables together to form one table. s) find all rows that do not match in two tables. t) None of the above. Answer: A Level: EasyPage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 14. In order for two queries to be UNION-compatible, they must: u) both have the same number of lines in their SQL statements. ) both output compatible data types for each column and return the same number of rows. w) both return at least one row. x) All of the above. Answer: B Level: ModeratePage Ref: 369 Topic: Processing Multiple Tables Subtopic: Combining Queries AACSB Use of Information Technology 15. Establishing IF-THEN-ELSE logical processing within an SQL statement can be accomplished by: y) using the if-then-else construct. z) using the immediate if stat ement. {) using the CASE keyword in a statement. |) using a subquery. Answer: C Level: ModeratePage Ref: 372 Topic: Processing Multiple Tables Subtopic: Conditional ExpressionsAACSB Use of Information Technology 16. Explicit commands to manage transactions are needed when: }) a transaction consists of just one SQL command. ~) multiple SQL commands must be run as part of a transaction. ) autocommit is set to off. ) None of the above. Answer: B Level: DifficultPage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 17. User-defined transactions can improve system performance because: ) transactions are processed as sets, reducing system overhead. ) transactions are mapped to SQL statements. ) speed is improved due to query optimization. ) All of the above.Answer: A Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology 18. An interactive command that can be used to dynamically control a user session for a ppropriate integrity measures is: ) rollback. ) rollforward. ) set autocommit. ) expunge. Answer: C Level: ModeratePage Ref: 377 Topic: Ensuring Transaction Integrity AACSB Use of Information Technology, Analytic Skills 19. If the DBA wishes to describe all tables in the database, which data dictionary view should be accessed in Oracle? ) dba_tab_privs ) dba_tab_comments ) dba_table_label ) dba_tables Answer: DLevel: ModeratePage Ref: 378 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 20. What results would the following SQL statement produce? select owner, table_name from dba_tables where table_name = ââ¬ËCUSTOMERââ¬â¢; ) A listing of all customers in the customer table ) A listing of the owner of the customer table ) A listing of the owner of the customer table as well as customers ) An error message Answer: B Level: ModeratePage Ref: 379 Topic: Data Dictionary Facilities AACSB Use of Information Technology, Analytic Skills 21. User-de fined data types: ) can be a subclass of a standard type. can behave as an object. ) can have defined functions and methods. ) can have all of the above. Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL AACSB Use of Information Technology 22. A new set of analytical functions added in SQL:200n are referred to as: ) OLAF Functions ) MOLAP Functions ) Average Functions ) OLAP Functions Answer: D Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology 23. RANK and DENSE-RANK are examples of: ) Ceilings ) Door Functions ) Window Functions ) Moving FunctionsAnswer: C Level: ModeratePage Ref: 380 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Analytical Functions AACSB Use of Information Technology, Analytic Skills 24. All of the following are new data types added in SQL:200n EXCEPT: ) BIGINT ) BIT ) MULTISET ) XML Answer: B Level: ModeratePa ge Ref: 381 Topic: SQL: 2003 Enhancements and Extensions to SQL Subtopic: New Data Types AACSB Use of Information Technology, Analytic Skills 25. The MERGE command: ) Allows one to combine the INSERT and UPDATE operations ) Allows one to combine the INSERT and DELETE operations ) Joins 2 tables together None of the above. Answer: A Level: ModeratePage Ref: 382 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Other Enhancements AACSB Use of Information Technology, Analytic Skills 26. Extensions defined in SQL-99 that include the capability to create and drop modules of code stored in the database schema across user sessions are called: ) stored procedures. ) Persistent Stored Modules. ) flow control modules. ) None of the above. Answer: B Level: ModeratePage Ref: 383 Topic: SQL: 200n Enhancements and Extensions to SQL Subtopic: Programming Extensions AACSB Use of Information Technology 27.A named set of SQL statements that are considered when a data modification occurs a re called: ) stored procedures. ) treatments. ) triggers. ) trapdoors. Answer: C Level: EasyPage Ref: 384 Topic: Triggers and Routines AACSB Use of Information Technology 28. While triggers run automatically, ______________ do not and have to be called. ) trapdoors ) routines ) selects ) updates Answer: B Level: ModeratePage Ref: 386 Topic: Triggers and Routines AACSB Use of Information Technology 29. SQL-invoked routines can be: ) procedures. ) functions. ) All of the above. ) None of the above. Answer: C Level: EasyPage Ref: 386Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 30. All of the following are advantages of SQL-invoked routines EXCEPT: ) flexibility. ) efficiency. ) sharability. ) security. Answer: D Level: ModeratePage Ref: 387 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 31. A procedure is: ) stored within the database. ) given a unique name. ) called by name. ) All of the above. Answer: D Level : ModeratePage Ref: 387, 388 Topic: Triggers and Routines Subtopic: Routines AACSB Use of Information Technology 32. Embedded SQL consists of: hard-coded SQL statements included in a program written in another language. ) SQL encapsulated inside of other SQL statements. ) SQL written into a front-end application. ) SQL translated to a lower-level language. Answer: A and C are both plausible answers. Level: EasyPage Ref: 389 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 33. In order to embed SQL inside of another language, the ________ _______ statement must be placed before the SQL in the host language. ) GET SQL ) EXEC SQL ) RUN SQL ) SQL SQL Answer: B Level: ModeratePage Ref: 390 Topic: Embedded SQL and Dynamic SQLAACSB Use of Information Technology, Analytic Skills 34. Dynamic SQL: ) is used to generate appropriate SQL code on the fly, as an application is processing. ) is quite volatile. ) is not used widely on the Internet. ) creates a less flexible ap plication. Answer: A Level: EasyPage Ref: 390 Topic: Embedded SQL and Dynamic SQL AACSB Use of Information Technology 35. On-line transaction processing is: ) A system used for reporting only. ) A system used in transaction-oriented applications that involves real-time processing of SQL transactions. ) A set of tools that provides users with a graphical view of data. ) None of the above.Answer: B Level: EasyPage Ref: 391 Topic: OLAP SQL AACSB Use of Information Technology 36. OLAP systems differ from OLTP systems in several ways except: ) Size ) Processing ) Queries ) Physical Storage Answer: B Level: EasyPage Ref: 392 Topic: OLAP SQL AACSB Use of Information Technology Chapter 8 1. Which of the following have affected the way businesses use computing systems to meet the demand of the competitive marketplace? A)GUI evolutions B)Networking advances C)Communication changes D)All of the above. Answer: D Level: ModeratePage Ref: 403 Topic: Introduction AACSB Use of Information Technolog y 2.Which of the following is a component of processing logic? A)Input B)Output C)Retrieval D)Business rules Answer: D Level: EasyPage Ref: 404 Topic: Client/Server Architectures AACSB Use of Information Technology 3. A device that manages file operations and is shared by each client PC on a LAN is called a: A)file server. B)file processor. C)database server. D)fat client. Answer: A Level: EasyPage Ref: 405 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 4. In a file server architecture, which of the following is performed by a client? A)Provides significant LAN trafficB)File storage C)User interface processing D)All of the above. Answer: C Level: ModeratePage Ref: 404 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 5. Which of the following is true about file servers on a LAN? A)Each client must devote memory to a full version of its DBMS. B)Not much data movement i s generated. C)The DBMS copy has little responsibility. D)Application programmers need little knowledge about DBMSs. Answer: A Level: ModeratePage Ref: 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology . Which of the following is NOT a limitation to using file servers on local area networks? A)Considerable data movement is generated across the network. B)Each client workstation must devote memory to a full version of the DBMS. C)Stored procedures can be run on the file server. D)The DBMS copy in each workstation must manage the shared database integrity. Answer: C Level: ModeratePage Ref: 405, 406 Topic: Client/Server Architectures Subtopic: File Server Architectures AACSB Use of Information Technology 7. A(n) _____ is a module of code written in SQL or some proprietary language to run business rules on a server.A)SQL program B)select module C)select procedure D)stored procedure Answer: D Level: EasyPage Ref: 407 Topic: Cl ient/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 8. Which of the following is an advantage of stored procedures? A)Data integrity improves when fewer applications access the procedure. B)The layers get cleaner. C)Stored procedures result in fatter clients. D)Performance improves for compiled SQL statements. Answer: D Level: EasyPage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Architectures AACSB Use of Information Technology 9.Which of the following is not a disadvantage of stored procedures? A)Writing stored procedures takes more time than writing an application in Visual Basic or PowerBuilder. B)Decreases in network traffic are realized. C)Stored procedures are proprietary and not easy to move from one RDBMS to another. D)Each client must be loaded with the application to be used at that location. Answer: B Level: ModeratePage Ref: 407 Topic: Client/Server Architectures Subtopic: Database Server Archite ctures AACSB Use of Information Technology 10. A PC configured to handle user interface with little or no local storage is called a: A)server.B)fat client. C)thin client. D)workstation. Answer: C Level: EasyPage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 11. Which of the following is true about three-tier architectures? A)Less scalable than two-tier B)Increased risk C)More technological flexibility D)All of the above Answer: C Level: ModeratePage Ref: 409 Topic: Three-Tier Architectures AACSB Use of Information Technology 12. _____ is the process of assigning pieces of application code to clients or servers. A)Application partitioning B)Modularizing programs C)Code distribution D)Program breakup Answer: A Level: EasyPage Ref: 410Topic: Partitioning an Application AACSB Use of Information Technology 13. Which of the following is not a common distribution logic for two-tiered server environments: A)Fat Client B)Tall Client C)Thin Client D)Distributed Answer: A Level: ModeratePage Ref: 411 Topic: Partitioning an Application AACSB Use of Information Technology 14. Which of the following is true of mainframes in the client/server environment? A)Managers have a difficult time moving between platforms. B)Supporting distributed environments is easier than mainframe support. C)Migrating from mainframes to client/server is a relatively simple process.D)All of the above. Answer: A Level: ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 15. Moving mission critical applications to client/server environments is likely to cause serious problems in the transition from the pilot phase to production unless: A)Developers rewrite all code for the system. B)Brand new hardware is purchased. C)Developers anticipate scalability issues and address them as they develop code D)None of the above. Answer: C Level; ModeratePage Ref: 412 Topic: Role of the Mainframe AACSB Use of Information Technology 16. ____ is any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A)User interface enhancers B)Middleware C)Interface managers D)MPP Answer: B Level: EasyPage Ref: 413 Topic: Using Middleware AACSB Use of Information Technology 17. Which of the following does not connect applications to databases over networks? A)Asynchronous RPC middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)SMP Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 18.Which of the following could send and receive email, while the client works on other things? A)ORBs middleware B)Synchronous RPC middleware C)SQL-oriented middleware D)MOM Answer: D Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 19. Microsoftââ¬â¢s Transaction Server and IBMââ¬â¢s CICS are examples of: A)Asynchronous Remote Procedure Call (RPC) B)Synch ronous RPC C)MOM D)ORB Answer: B Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 20. ______________ makes it possible for applications to send objects and request services in an object-oriented system.A)MOM B)RPC C)ORB D)API Answer: C Level: EasyPage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 21. A(n) _____ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system. A)API B)MOM C)RPC D)LAN Answer: A Level: ModeratePage Ref: 414 Topic: Using Middleware AACSB Use of Information Technology 22. Which of the following is true of moving to client/server environments? A)Functionality must be delivered all at once. B)There are no hidden costs. C)Services can be placed appropriately. D)None of the above. Answer: C Level: EasyPage Ref: 416Topic: Client/Server Issues AACSB Use of Information Technology 23. Which of the following is NOT a benefit of moving to cli ent/server environments? A)Functionality can be delivered in stages to end users. B)Business process reengineering is facilitated. C)Network traffic and response times are increased. D)Users are encouraged to utilize the applicationââ¬â¢s functionality. Answer: C Level: ModeratePage Ref: 416, 417 Topic: Client/Server Issues AACSB Use of Information Technology 24. The most common bottleneck in a client/server environment is the: A)users B)software C)network D)company politics Answer: C Level: ModeratePage Ref: 416Topic: Client/Server Issues AACSB Use of Information Technology 25. In order to establish client/server security: A)Network security must be established B)Biometric authentication must be used C)Server security must be established D)Both A and C Answer: D Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 26. Multi-tier make sense if all of the following environments except: A) More than 100 users B)High-volume transaction process ing C)Workgroups D)Real-time processing Answer: C Level: ModeratePage Ref: 416 Topic: Client/Server Issues AACSB Use of Information Technology 27.Which of the following is not a parameter that must be specified in order to establish an ODBC connection? A)Specific ODBC driver needed B)Back-end server name to connect to C)JDK version D)Database name to connect to Answer: C Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 28. Which of the following is a distinguishing characteristic of Level-2 API capabilities? A)Send and receive partial results B)Call a translation library C)Commit or rollback transactions D)Prepare and execute SQL statements Answer: B Level: ModeratePage Ref: 417Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 29. An application programming interface that enables an application program to process RDBMS databases meets the: A)objec t linking and embedding standard. B)open database connectivity standard. C)multi-platform connectivity standard. D)open source standard. Answer: B Level: EasyPage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 30. Which of the following parameters must be defined in order to establish an ODBC connection? A)ODBC driver B)Back-end server nameC)Database name to connect to D)All of the above Answer: D Level: ModeratePage Ref: 417 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology. Analytic Skills 31. The ability to call a translation library is a distinguishing characteristic of: A)Core-API ODBC conformance. B)Level-1 API ODBC conformance. C)Level-2 API ODBC conformance. D)Level-3 API ODBC conformance. Answer: C Level: DifficultPage Ref: 418 Topic: Using ODBC to Link External Tables Stores on a Database Server AACSB Use of Information Technology 32. JDBC is similar to ODBC EXCEPT: A)ODBC is language independent and JDBC is not.B)ODBC can be used to execute SQL queries on a server while JDBC does not have this capability. C)ODBC can run on multiple platforms, while JDBC is platform specific. D)None of the above. Answer: A Level: ModeratePage Ref: 385 Topic: Using JDBC to Link External Tables Stored on a Database Server AACSB Use of Information Technology, Analytic Skills Chapter 9 1. The analysis of summarized data to support decision making is called: A)operational processing. B)informational processing. C)artificial intelligence. D)data scrubbing. Answer: B Level: EasyPage Ref: 461 Topic: Introduction AACSB Use of Information Technology 2.The characteristic that indicates that a data warehouse is organized around key high-level entities of the enterprise is: A)subject-oriented. B)integrated. C)time-variant. D)nonvolatile. Answer: A Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology 3. Wh en we consider data in the data warehouse to be time-variant, we mean: A)that the time of storage varies. B)data in the warehouse contain a time dimension so that they may be used to study trends and changes. C)that there is a time delay between when data are posted and when we report on the data. D)none of the above.Answer: B Level: ModeratePage Ref: 462 Topic: Basic Concepts of Data Warehousing AACSB Use of Information Technology, Analytic Skills 4. Which of the following advances in information systems contributed to the emergence of data warehousing? A)Improvements in database technology, particularly the relational data model B)Advances in computer hardware, especially affordable mass storage and parallel computer architectures C)Advances in middleware products that enabled enterprise database connectivity across heterogeneous platforms D)All of the above Answer: D Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data WarehousingSubtopic: A Brief History AACSB Use of Infor mation Technology 5. Which of the following factors drive the need for data warehousing? A)Businesses need an integrated view of company information. B)Informational data must be kept together with operational data. C)Data warehouses generally have better security. D)None of the above Answer: A Level: ModeratePage Ref: 463 Topic: Basic Concepts of Data Warehousing Subtopic: The Need for Data Warehousing AACSB Use of Information Technology 6. Which of the following organizational trends does not encourage the need for data warehousing? A)Multiple, nonsynchronized systemsB)Focus on customer relationship management C)Downsizing D)Focus on supplier relationship management Answer: C Level: ModeratePage Ref: 463ââ¬â464 Topic: Basic Concepts of Data Warehousing Subtopic: Need for a Companywide View AACSB Use of Information Technology 7. Informational systems are designed for all of the following EXCEPT: A)running a business in real time. B)supporting decision making. C)complex queries. D)data mining. Answer: A Level: ModeratePage Ref: 466 Topic: Basic Concepts of Data Warehousing Subtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 8.Operational and informational systems are generally separated because of which of the following factors? A)A data warehouse centralizes data that are scattered throughout disparate operational systems and makes them readily available for decision support applications. B)A properly designed data warehouse adds value to data by improving their quality and consistency. C)A separate data warehouse eliminates contention for resources that results when informational applications are confounded with operational processing. D)All of the above Answer: D Level: EasyPage Ref: 466 Topic: Basic Concepts of Data WarehousingSubtopic: Need to Separate Operational and Informational Systems AACSB Use of Information Technology 9. A data mart is a(n): A)enterprisewide data warehouse. B)smaller system built upon file processing technology. C)data warehouse that is limited in scope. D)generic on-line shopping site. Answer: C Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 10. One characteristic of independent data marts is complexity for end users when they need to access data in separate data marts.This complexity is caused by not only having to access data from separate databases, but also from: A)the possibility of a new generation of inconsistent data systems, the data marts themselves. B)lack of user training. C)denormalized data. D)incongruent data formats. Answer: A Level: DifficultPage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology 11. All of the following are limitations of the independent data mart EXCEPT: A)separate extraction, transformation, and loading processes are developed for each data mart.B)data marts may not be consistent with one another. C)there is no capability to drill down into greater detail in other data marts. D)it is often more expedient to build a data mart than a data warehouse. Answer: D Level: ModeratePage Ref: 469 Topic: Data Warehouse Architectures Subtopic: Independent Data Mart Data Warehousing Environment AACSB Use of Information Technology, Reflective Thinking 12. A dependent data mart: A)is filled with data extracted directly from the operational system. B)is filled exclusively from the enterprise data warehouse with reconciled data.C)is dependent upon an operational system. D)participates in a relationship with an entity. Answer: B Level: ModeratePage Ref: 470 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 13. An operational data store (ODS) is a(n): A)place to store all unreconciled data. B)represen tation of the operational data. C)integrated, subject-oriented, updateable, current-valued, detailed database designed to serve the decision support needs of operational users.D)small-scale data mart. Answer: C Level: EasyPage Ref: 471 Topic: Data Warehouse Architectures Subtopic: Dependent Data Mart and Operational Data Store Architecture: A Three-Level Approach AACSB Use of Information Technology 14. A logical data mart is a(n): A)data mart consisting of only logical data. B)data mart created by a relational view of a slightly denormalized data warehouse. C)integrated, subject-oriented, detailed database designed to serve operational users. D)centralized, integrated data warehouse. Answer: B Level: ModeratePage Ref: 472 Topic: Data Warehouse ArchitecturesSubtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 15. All of the following are unique characteristics of a logical data mart EXCEPT: A)logical data marts are not physically s eparate databases, but rather a relational view of a data warehouse. B)the data mart is always up-to-date since data in a view is created when the view is referenced. C)the process of creating a logical data mart is lengthy. D)data are moved into the data warehouse rather than a separate staging area. Answer: C Level: EasyPage Ref: 472 Topic: Data Warehouse ArchitecturesSubtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 16. The real-time data warehouse is characterized by which of the following? A)It accepts near-real time feeds of transaction data. B)Data are immediately transformed and loaded into the warehouse. C)It provides near-real-time access for the transaction processing systems to an enterprise data warehouse. D)All of the above Answer: D Level: EasyPage Ref: 473-474 Topic: Data Warehouse Architectures Subtopic: Logical Data Mart and Real-Time Data Warehouse Architecture AACSB Use of Information Technology 7. Data that are detailed, current, and intended to be the single, authoritative source of all decision support applications are called _____ data. A)reconciled B)subject C)derived D)detailed Answer: A Level: EasyPage Ref: 475 Topic: Data Warehouse Architectures Subtopic: Three-Layer Data Architectures AACSB Use of Information Technology 18. A database action that results from a transaction is called a(n): A)transition. B)event. C)log entry. D)journal happening. Answer: B Level: EasyPage Ref: 476 Topic: Some Characteristics of Data Warehouse Data Subtopic: Status Versus Event DataAACSB Use of Information Technology, Analytic Skills 19. Data that are never physically altered once they are added to the store are called _____ data. A)transient B)override C)periodic D)complete Answer: C Level: EasyPage Ref: 477 Topic: Some Characteristics of Data Warehouse Data Subtopic: Transient Versus Periodic Data AACSB Use of Information Technology 20. Which of the following is an objective of derived data? A) Ease of use for decision support systems B)Faster response time for user queries C)Support data mining applications D)All of the above Answer: D Level: EasyPage Ref: 481Topic: The Derived Data Layer Subtopic: Characteristics of Derived Data AACSB Use of Information Technology 21. .A star schema contains both fact and _______ tables. A)narrative B)cross functional C)dimension D)starter Answer: C Level: ModeratePage Ref: 481 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 22. The level of detail in a fact table determined by the intersection of all the components of the primary key, including all foreign keys and any other primary key elements, is called the: A)span. B)grain. C)selection. D)aggregation. Answer: BLevel: EasyPage Ref: 485 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 23. Conformed dimensions allow users to do the following: A)share nonkey dimension data. B)query across fact tables with consistency. C)work on facts and business subjects for which all users have the same meaning. D)all of the above. Answer: D Level: ModeratePage Ref: 488-489 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 24. An expanded version of a star schema in which all of the tables are fully normalized is called a(n): A)snowflake schema.B)operational schema. C)DSS schema. D)complete schema. Answer: A Level: EasyPage Ref: 492 Topic: The Derived Data Layer Subtopic: The Star Schema AACSB Use of Information Technology 25. All of the following are ways to handle changing dimensions EXCEPT: A)overwrite the current value with the new value. B)for each dimension attribute that changes, create a current value field and as many old value fields as we wish. C)create a new dimension table row each time the dimension object changes. D)create a snowflake schema. Answer: D Level: ModeratePage Ref: 494 Topic: The Derived Data LayerSubtopic: The Star Schema AA CSB Use of Information Technology 26. The use of a set of graphical tools that provides users with multidimensional views of their data is called: A)on-line geometrical processing (OGP). B)drill-down analysis. C)on-line analytical processing (OLAP). D)on-line datacube processing (ODP). Answer: C Level: EasyPage Ref: 500 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 27. OLAP tools that use the database as a traditional relational database are called: A)ROLAP tools. B)MOLAP tools. C)slice and dice.D)none of the above. Answer: A Level: ModeratePage Ref: 500-501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 28. Rotating the view of a multidimensional database for a particular data point is called data: A)cubing. B)drill-down. C)dicing. D)pivoting. Answer: D Level: ModeratePage Ref: 501 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 29. Going from a summary view to progressively lower levels of detail is called data: A)cubing. B)drill-down. C)dicing.D)pivoting. Answer: B Level: ModeratePage Ref: 502 Topic: The User Interface Subtopic: On-Line Analytical Processing (OLAP) Tools AACSB Use of Information Technology 30. Which of the following data mining techniques identifies clusters of observations with similar characteristics? A)Case reasoning B)Rule discovery C)Clustering and signal processing D)Neural nets Answer: C Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 31. Which of the following data-mining techniques searches for patterns and correlations in large data sets?A)Case reasoning B)Rule discovery C)Signal processing D)Neural nets Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 32. Which of the following dat a mining applications identifies customers for promotional activity? A)Population profiling B)Target marketing C)Usage analysis D)Product affinity Answer: B Level: ModeratePage Ref: 506 Topic: The User Interface Subtopic: Data-Mining Tools AACSB Use of Information Technology 33. Which of the following is true of data visualization?A)It is easier to observe trends and patterns in data. B)Correlations and clusters in data can be easily identified. C)It is often used in conjunction with data mining. D)All of the above. Answer: D Level: ModeratePage Ref: 503 Topic: The User Interface Subtopic: Data Visualization AACSB Use of Information Technology, Analytic Skills Chapter 10 1. High quality data are data that are A) Accurate B)Consistent C)Available in a timely fashion D)All of the above Answer: D Level: EasyPage Ref: 524 Topic: Managing Quality Data AACSB Use of Information Technology, Analytic Skills
Wednesday, October 23, 2019
Adult Day Care
Adult day care (ADC) service centers should be built in our community to take care of elders during the day time when their family members are out at work or unable in pertaining necessary heed to the elders. Thus it is necessary to action in this regard. Services usually take place in their residences or in designated hospice residences or hospitals.Hospice services consist of basic nursing heed, mental health counseling, homemaker and personal care help, plus pastoral care and spiritual counseling. In addition, physician-directed procedures are used to assist in pain control and acute or chronic system management.II. Project DescriptionA. IntroductionWith a heart full of sun drenched reminiscences of his golden times of yore, when a person steps into the dusky horizon of old age, after traveling through all crests and troughs of life, he seeks a peaceful shelter to stay for the rest of his life. Parents or guardians when capable, bring up their children, provide them food, educatio n and fulfill all their basic needs.Therefore it also becomes the responsibility of the young to take care of their parents or guardians when they grow old.à There are elderly people, who entertain intensive care and affection from their families, but there also exist elderly persons who either do not have anybody in their family to pay attention to them or their family members are too busy to do so. Such elderly people can take the help of Adult day care services.B. Rationale and Significance:1. Definition of the problemOld age brings with it chronic diseases, intolerable pain, frustrating incapability, never ending solitude, etc. Though, it can become a peaceful shelter with care and affection of family and friends. But being a primary caregiver for an elder can be a difficult job.Matters like Bathroom Safety, pain management, proper nutritional care, special care for elders living with Incontinence, etc have to be always kept in mind. All these are not so easy for a busy perso n. The hours are time-consuming and it can be a wearisome and anxiety-provoking duty, for even the most enduring person.2. Background of the ProblemIn this dynamic world, that is moving from progress to greater progress, in an endless motion people are compelled to devote most of their time to their work and social life. Thus people are unable to dedicate the necessary time and care to the elders. Establishment of Adult day care (ADC) can prove to be a cost-effective way out to a loved one's care requirements during the daytime.Adult day care (ADC) services, with all modern medical equipments and techniques, endow with daytime care for feeble elders and aged people with disabilities in form of a group termed as adult day care center. Services may differ depending on the requirements of the people served.3. Need for a SolutionAs a result there is a specific need for solution to this problem. With varying routine of care, ADCs serve its members with wide range of social, health, recre ational, medical care, or rehabilitation to persons with chronic diseases or disabilities. Thus, it is necessary to comprehend what echelon of care can exactly meet the needs of the person to be admitted.4. There will be weekly evaluations doneAs corruption and unnecessary delay are common practices, which easily becomes part of any organization, weekly evaluations of the performance of the Adult day care (ADC) service centers should be done by government personnel, such as government doctors, food inspectors, health department representatives, etc, to provide the best of care to the elders of the community.5. Benefits from the solutionAdult day care put forward a dual benefit for elders and their families. Participants can get benefited from socialize with fellow members and receiving desired care services. Caregivers can also get benefited by getting a break from care giving responsibilities during the day time while being well convinced that a loved one is in good hands and they do not have to worry for them. Adult day care (ADC) services take profound care of their members.6. Feasibility of the solutionADCs are becoming more and more popular these days. More than 4,000 ADCs currently function in the U.S only and most of them are nonprofit programs. These ADCs acquire specialization in a particular populace or echelon of care, establishing qualification on oneââ¬â¢s diagnosis or purposeful status and occasionally on age. Thus ADC can come up as a gainful system to meet the care requirements of elders in our community during the daytime.C. Plan of work:A. ScopeWith government subvention, support and direction, donations and assistance from non government or non profit or public welfare organizations, funds collected from residents of the community, and with their voluntary assistance Adult day care (ADC) service centers can be establisher in the community.B. MethodsAdult day care is a term generally used to portray different categories of adult day care s ervices. Most of the ADCs services serve to older adults where as some may specialize in taking care ofà younger adults with disabilities, or those with developmental disabilities. Different adult day care foundations use different terms to describe their services.Though the programs may in names, three most widespread types of ADCs are social day care, adult day health care, and dementia day care. The social day care form offers a gentle environment for persons without particular health care requirements.Activities usually comprise socialization with other members, group activities which are ethnical and specially designed for the aged, such as, current proceedings, singing or games, therapeutic activities and meals, personal care support, etc.C. Task breakdownThe adult day health care (ADHC) form helps persons with an array of health, rehabilitative, social and mental health requirements, often relating a physician's assessment and recommendation. Nursing and health care servic es are offered on the program, such as help with medications, health monitoring, physical therapy, occupational therapy, incontinence care and speech therapy, etc.The aim of ADHC is to reinstate or maintain a memberââ¬â¢s best possible functioning. AS ADHC is more medically designed, licensed organizations may be paid back by Medicaid for making it available to low-income members. The dementia day care program specializes in helping persons with Alzheimer's disease, or other such challenging conditions, such as Parkinson's disease, Huntington's disease, stroke, etc.Dementia day care aims at preventing early institutionalization of persons with dementia and to endow with a break for family caregivers. Specialized programs proffer suitable activities for those who are suffering with confusion or memory loss, such as music or art, reminiscence, therapeutic activities in a harmless, secure surrounding with proper care and staff-to-participant proportion.Staffs with experience and tra ining in dementia care, behavior management strategies, and communication techniques are appointed in Dementia day care. Along with the above models few more models of ADC are also available these days, such as Living board and care model, Independent living centers, Hospice care and Respite care. The Living board and care model consists of smaller group homes which endow with concern for seniors and feeble elders have several names.D. Time and work scheduleA hospice team associate is on-call 24-hours to provide advice or assistance with an emergency. Hospice clients obtain services in accordance with an individualized plan of service. A social worker is usually charged with supporting the patient and family and in helping the care team in working efficiently with the family.Respite care is formed to alleviate caregivers of their everyday jobs. Some Adult Day Health Centers even organize transportation facilities. Home health agencies can also enter the field to provide assistance b y introducing a homemaker or home health assistant.à Moreover, home health organization can arrange for round the clock care and over night care.E. Problem AnalysisDepending on where one resides, they could be termed as board and care homes, assisted living, personal care, adult group homes, adult foster care, boarding care homes or adult family homes. These dwellings proffer room and board in a small home like atmosphere, usually accommodating about 10 persons or less. They are often positioned in residential vicinity and provide a less professional substitute to trained nursing facilities of nursing homes or hospitals.As these homes do not provide medically-prescribed skilled nursing facilities, they usually can not be paid back by Medicaid. Some states provide licensing supplies for board and care homes which control services, staffing, facility environment and reimbursement. Alternate means of paying back such as supplemental security income ââ¬â SSI are also accepted for low-income members.Independent living centers (ILCs) are usually private charitable community-based institutions which grant services and advocacy to persons with all sorts of disabilities. The majority are also consumer-controlled by persons with disabilities. The importance is on helping persons to maximize their prospective and live as autonomously as feasible in the community.The expansion of ILCs develops from the disability rights movement where persons with disabilities fought to recover their independence and reduce the requirements for institutional care. ILCs often make use of their constituencies to promote the rights of individuals with disabilities at the local, state, and national levels.Issues include admission to public buildings such as government buildings, restaurants, movie theaters, restrooms, parks, disabled parking and public transportation, and housing. They may be implicated in raging war against discrimination in the place of work and promoting employment prospects for citizens with disabilities, as well as engaging in avenues to increase health care exposures, contact to medical specialists and enduring care services.ILCs recruit staffs having knowledge on public reimbursements such as Medicaid, disability insurance, etc. Additionally, some ILCs also offer support groups, workshops, or instruction. Hospice services provide palliative care for persons with terminal sickness in the last stages of life and their families.Hospice coalesce medical, emotional, social and spiritual support to ease the dying person and his family and maintain dignity at the end-of-life. Services are dispensed through the involvement of physicians, nurses, social workers, therapists and volunteers.F. Likelihood of SuccessRespite care intends to ease the stress allied with care giving. Respite care can also be an unofficial arrangement, where acquaintances of the elder or another family member does the care giving duties for a few hours or a few days a week.à Adult Day Health Centers, Respite Centers, Senior Centers, and Skilled Nursing Facilities also offer respite care.Skilled nursing facilities that offer short-term respite are also available for the clients who require nursing care. Thus it becomes necessary to choose which services are to be provided in the ADC service center to meet our requirements and also fit within our budget. Once all these elements are analyzed and evaluated and implemented in accordance to plan there is no reason that the plan would ever fail. Thus likelihood of success is guaranteed.D. Facilities and Equipment:An Adult day care (ADC) service center having ultra modern equipments, well experienced and proficient doctors and nurses, surplus supply of medicines other stuffs, etc, required for instant diagnosis and proper treatment, should be formed in the community.A total carpet area of 3000 to 3500sqfts is required where there would be at least 8 to 10 rooms. Additionally there would be gardens or vast o pen areas. Modern medical equipments such as X-ray machines, CT scan, Ultra Sonography, ECG, Pace makers and other important instruments would be installed. Arrangements should be made to provide necessary and instant medical treatment to the elders in case of emergencies.III. Personnel Qualifications:Qualified physiotherapists, psychiatrists, yoga trainers etc should be appointed to endow with spiritual heal along with physical and mental fitness to the elders. Nutritionists and center supervisors can also be appointed to administer the workings in the center, so as to provide proper healthy food and maintain hygiene of the center.IV. Budget:Establishment of an Adult day care (ADC) service center accommodating at least a hundred members in it and providing all aforementioned facilities require a large area of about 3000 to 3500sqfts, having at least 8 to 10 rooms with gardens or vast open areas.à This may cost approximately $122000 to $134000.Costs of modern medical equipments s uch as X-ray machines, CT scan, Ultra Sonography, ECG, Pace makers and several other devices can be all together rounded up to $490000 to $580000. Remunerations of doctors, nurses and other employees together calculated makes near about $8000 to $12200 per month.Along with these disbursements expenses on purchase of food and medicines, payments of electricity bills, telephone bills, taxes, etc also have to be considered.à (Roy, 2006)V. Urge to Action:By and large people feel unenthusiastic to use adult day care services for the reason that they give the unknown impression, or since a loved one is tentative to endeavor something untried. Knowledge about Adult day care (ADC) services has to be made available to them. Some people, who are economically not so sound, may ADC expensive to use. Some concessions and relaxation in fees should be provided to them.VI. AppendixOld age never comes alone. It brings with it chronic diseases, intolerable pain, frustrating incapability, never end ing solitude, etc. Thus the journey in the twilight of life becomes a painful hell. Old age can become a peaceful shelter with care and affection of family and friends.Adult day care (ADC) services lend a helping hand to both the elder and their family. It relives from the pressure and monotone of taking care of their loved ones, at the same time endowing with the best care to the elder. Thus Official Proposal for Adult Daycare program in the Community is seriously needed.Reference:Roy, S; (2006) List of Instruments with Price; Medical Collage Equipment Handout- Year 2006; Kolkata Medical Collage. Kolkata: Universal Press
Subscribe to:
Posts (Atom)