Create a table named faculty to store facultyid

Assignment Help Computer Engineering
Reference no: EM131864613

Assignemnt

LAB 1

Lab submission details:

As part of the submission for this Lab, you will design your own tables and populate them with data based on the following requirements. For each of the requirements, be sure to save the specific SQL statements that you used. Please label each SQL statement corresponding to the numbered requirements below:

1. Create a table named Faculty to store FacultyID( Primary key), FirstName, LastName, Email, Date of birth and number of courses taught to date. You should select the appropriate data types and constraints for the table.

2. Create a table named Courses to store CourseID (Primary key), Discipline Name (e.g. SDEV), Course Number (e.g. 300), Number of Credits (e.g. 3), Year first offered (e.g. 2010) and Course Title. You should select the appropriate data types and constraints for the table.

3. Create a table named FacultyCourses to store the Faculty and the Courses they have taught. You should design the table based on the Faculty and Courses tables you previously created.

4. Use Insert statements to populate at least 10 faculty records, 5 Course records, and 25 FacultyCourses records

5. Use update statements to update all Courses to 4 credits

6. Use update statements to update any Faculty who have taught more than 4 courses to modify the number to 5 courses taught

7. Delete any Faculty record whose LastName starts with the letter ‘Z'

8. Delete any Course record that was first offered in 1999

9. Use select statements to display all records in all 3 tables. Order by the Faculty lastname, and Course title as appropriate. Note you should use 3 separate select statements to satisfy this requirement.

10. Use Select statements to display all Faculty who have not taught any courses

11. Use Select statements to display all Courses offered before 1984

12. Use Select and appropriate joins to display all columns from the Faculty and Course tables for each Faculty and Course in the FacultyCourse table. Note: this will be a 3-table join.

Create screen captures showing the successful running of each your scripts. Be sure to fully describe each screen capture.

For your deliverables, you should submit a zip file containing your word document (or PDF file) with screen captures of the application running successfully along with your SQL script file. You do not need separate files for each script. You can include them in one SQL script.

LAB 2

Lab submission details:

As part of the submission for this Lab, you will create a simple e-Commerce supports displaying, adding, updating and deleting products from a database that are part of products in your store. Specifically, all product data must be organized in one or more MySQL tables. In addition, you will need to store your customer data as they order from your store.

Your product data should be dynamic allowing the ability for the store owner to insert new products, update existing products, delete existing products and list all available products. When designing your application, be sure to use prepared statements to minimize SQL injection. Also, make sure your Forms flow logically within your application and are presented in an attractive easy-to-use Web interface.

Create screen captures showing the successful running your application. Each screen capture should be fully described.

For your deliverables, you should submit a zip file containing your word document (or PDF file) with screen shots of the application running successfully along with your SQL script file. Include your full name, class number and section and date in the document.

LAB 3

Lab submission details:

As part of the submission for this Lab, you will run manual and automatic attacks on your lab submission and the UMUC Tutor app on your VM.

Be sure to work on each application separately and document the issues you found and the process you used to fix the applications. You can provide the findings in one well-organized document. You should work to eliminate all alerts in both applications and clearly document specifically what you did to mitigate each issue.

Create screen captures demonstrating your process and results. Each screen capture should be fully described. The document should be well-organized and include a table of contents, page numbers, figures, and table numbers. The writing style should be paragraph style with bullets used very sparingly to emphasize specific findings. In other words, this should be a professional report and demonstrate mastery of writing.

Be sure your process includes both manual and automatic scanning. When researching your security alerts, be sure to document your references using APA style. You should show both before and after fix vulnerability reports. Your final vulnerability report should show zero alerts and vulnerabilities.

For your deliverables, you should submit a zip file containing your word document (or PDF file) along with the before and after application files. (including sql and parameter files) If you made changes to your VM environment (e.g. security.conf, apache2.conf, php.ini) you should provide those files also.

Include your full name, class number and section and date in the document.

Reference no: EM131864613

Questions Cloud

Determine the gain of the servo valve : An electro hydraulic servo system contains the following characteristics: Determine the gain of the servo valve in units of (cm3/s)/mA.
Which reasons can you use to justify fiber-optic cable : Which of the following reasons can you use to justify fiber-optic cable in this case, and why?
What is best type of medium for open-ended bandwidth needs : Explain what kind of connections would work in the elevator shaft. What's the best type of medium for open-ended bandwidth needs? Explain your answer.
What signal might the decision not to fire bill give : Why does Angelica have the option of joining or not joining the union? Hint: Nevada is a right-to-work state.
Create a table named faculty to store facultyid : Create a table named Faculty to store FacultyID( Primary key), FirstName, LastName, Email, Date of birth and number of courses taught to date.
Explain your reflection regarding the article : Article : Congress' budget deal affirms church access to FEMA disaster aid By S.A. Miller .Summarize the article. Do not use quotes. Only use your own words.
Describe the main function of emotions : Describe the main function of emotions in conflict resolution activities. Provide a conflict example which supports how emotions help people adapt.
Describe an organizational change initiative : Describe an organizational change initiative that you have experienced or researched (choose one). In what specific instances would that change initiative.
Which of the tsa measures or programs for aviation security : Which of the TSA measures or programs for aviation security do you consider to be the most effective and beneficial?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd