Find the customer with the most rented movies- What is the employee job description with the most employees

Database management systems final project of about rental cars

Before Netflix existed, there were stores where you rented a movie in either a video cassette (VHS) format or a compact disc format (DVD). But then, in 1997, Netflix was founded by Reed Hastings and Marc Randolph as a DVD-by-mail rental service. The company initially offered a subscription service where users could rent DVDs and receive them by mail. Netflix distinguished itself from traditional video rental stores by eliminating the need for customers to leave their homes to rent movies.
Imagine you are back in the nineties and the early 2000s; imagine that VideoFlick is a video rental store that rents out movies in VHS tapes format. You are given a dataset of video rental records kept by several employees. After each employee rents out a movie/movie to a customer, they enter the transaction information into an Excel sheet. Even though VideoFlick is a one- branch store, they are trying to expand by opening more stores. The company’s leadership
realized that keeping records using an Excel sheet is not an efficient way of storing information. So, they decided to hire programmers to design and build an information system that would help employees enter the information for each transaction quickly and help in business decision-making by applying data mining algorithms to the database. The
programmers decided first to build a relational SQL database that would allow the creation of a graphical user interface and a data analysis application.
The programming team was given the Excel sheet attached to this document as an example of how employees used to keep records. Each movie has a number as a unique identifier. Also, each movie has multiple copies with copy numbers. The combination of movie number and copy number creates a unique identifier for each VHS tape in the store. Each customer might rent multiple movies, and they would all be counted as one transaction. The rental fee for each movie rented is per day. If the return date is the same as the rental date, this is considered one day. If it is the next day, this is regarded as two days. The customer must pay the fee when they

2 Dr. Islam Ebeid MCIS 5133 Database Management Systems Final Project return the movie or movies they rented. The transaction is closed only after the customer has returned the movie. If the movie were returned late, an additional fee would be applied. Each transaction has a unique identifier. Also, each transaction stores employee information, customer information, and rented movies information.

Your task
As one of the programming team, you are tasked with:
1- Studying the dataset and exploring it.
2- Designing a relational data model that would replace the Excel sheet that the employees
used before to record information.
3- Implementing the ER model you created using the MySQL database management
system and MySQL Workbench.
4- Answering the queries provided below using SQL select and join statements.

What to submit
1- A Conceptual Level model: An ER diagram describing your entities, relationships, cardinalities, and attributes.
2- A Logical Level model: A Class diagram describing your entities as classes with attributes and methods and the relationships between them, including inheritance. For example, your database might have 2 separate tables: employee and customer. Yet, in your class diagram, you might have a third class called a person from which both
customer and employee inherit, even though there might not be a table person in your database. The class diagram will be used to build other applications on top of the database in the future.

3- A Physical Level model: A Database ER Schema diagram generated using MySQL Workbench after you create your tables describing the tables, attributes, relationships, and cardinality that corresponds to your ER diagram. This diagram should include primary and foreign keys, data types, data sizes, and resolved many-to-many relationships.
4- A separate description of each table and its attributes and relationships in the ER and
the Database Schema diagrams

3 Dr. Islam Ebeid MCIS 5133 Database Management Systems Final Project
5- A separate description for each class and its relationships in your Class diagram
6- The DDL Create tables statements as a separate .sql file
7- Insert the data provided in the Excel sheet into your newly created database, then give
the insert statements as a separate .sql file
8- Your SQL answers to each of the queries below
9- The results of your SQL queries as images, as some of you have done in the previous
assignment.

Important notes
1- The ER diagram should be at least in the 3rd Normal Form
2- Use Chen notation for the ER diagram
3-Use UML notation for the Class diagram
4- Use UML notation for the Database ER Schema diagram describing your tables
5- You can insert the data in the Excel sheet using import in MySQL Workbench, but you
will have to preprocess the data a bit.

Queries
1- Find all the movies with the word “earth” in their titles.
2- Find all transactions that happened on April 18th, 2011
3- Find all transactions that happened after April 18th, 2011
4- Find how many transactions each movie has in the database.
5- For each customer, find out how much they spent.
6- Find how many transactions each employee has in the database.
7- Find the customer with the most rented movies.
8- What is the employee job description with the most employees?
9- Who is the newest employee?
10- What is the most profitable movie/movies in the store?

https://www.studypool.com/questions/download?id=2816613&path=uploads/questions/5828273/20230420203924attachment_2__5_.xlsx&fileDownloadName=attachment_1

 

 

 

Briefly summarize each article, keying in on the six aims identified in “Crossing the Quality Chasm.” Discuss the regulatory effect that these reports had on the US healthcare system and patient safety.

M1 – Class2 – Healthcare information technology (HIT) has a huge impact on patient outcomes.

Healthcare information technology (HIT) has a significant impact on patient outcomes. Having effective systems that assist in converting data from useful health information will enhance clinical decisions being made. Understanding the importance of having accurate data to ensure patient safety and quality care in healthcare systems is critical in preventing medical errors.

Review the following articles:

To Err is Human: Building a Safer Health System Download To Err is Human: Building a Safer Health System
Crossing the Quality Chasm: A New Health System for the 21st Century (Attached)

Answer the following:

Briefly summarize each article, keying in on the six aims identified in “Crossing the Quality Chasm.”
Discuss the regulatory effect that these reports had on the US healthcare system and patient safety.
Assess how healthcare delivery has changed to help achieve those goals and describe the barriers to achieving those goals.
How are health care information systems used to support the delivery of care to report patient outcomes?

Define the desirable features of HIT design that serve both well-being and effectiveness and that can be used in product evaluation and comparison by purchasers or health care leaders.

M3 – Class2 – After reading the article, provide recommendations on the following:

TABLE. Efforts to Support Well-being in Technology-Mediated Work

Design technology for the health care we need

Generate a collaborative vision of next-generation health care

  • Establish workgroups of technology and industry experts to assess potential models of care and their requirements.

Use team-based care and technology to support care innovation

  • Enhance coordination through integrated interprofessional care plans with goals, steps to reach them, and overall progress.
  • Generate evidence to improve team-based models.
  • Support patient-created data and remote monitoring.

Align human and technology resources with chronic conditions

  • Support a longitudinal view of a patients treatments, disease progression or remission, etc. Support registry management.
  • Establish chronological models for various conditions. Use tools to analyze risk trajectories and respond to window periods or stages of disease with timely targeted interventions. Augment human interactions with technology-driven checkups to monitor for physical or mental health changes.
  • Integrate nonmedication interventions into care plans including individualized behavioral interventions, caregiver roles, and technologyprescriptions.

Understand the essential roles for physicians

Align physician roles with future care models

  • Discern the essential and compelling roles for physicians in future models of care.
  • Design HIT to support and quantify nonencounter physician activities toward quality, productivity, and other health care imperatives.

Develop leadership and strategies to reduce a physician bottleneck

  • Coordinate and prioritize encounter expectations from a perspective of the time, attention, and cognitive constraints of physicians in encounters.
  • Orient health care information and tasks increasingly around the patient vs through physicians.

Educate new physicians for emerging roles

  • Assess trends in HIT and develop core curriculum for human-computer collaboration in health care.
  • Train doctors in the use and oversight of AI-enhanced risk prediction, decision support, diagnostics, surveillance, etc.
Design technology for a well workforce

Develop foundational principles and methods

  • Research the intermediates of well-being and burnout in HIT, ranging from simple usability issues to satisfaction with advanced collaborative technology interactions.
  • Establish fundamental principles, goals, and methods in HIT design that lead to guidelines, standard use cases, and evaluation methods.
  • Use terms and make reference to design taxonomies to enculturate well-being as a normative design consideration.

Define the desirable features of HIT for well-being

  • Define the desirable features of HIT design that serve both well-being and effectiveness and that can be used in product evaluation and comparison by purchasers or health care leaders.

Establish accountability for well-being in the work environment

  • Establish leadership accountable to the work environment, especially HIT impacts. This is contrasted with, but complementary to, current resiliency-focused efforts.

Monitor HIT for human impacts and remediate

  • Assess HIT impacts not only for outcomes but for efficiency, user stress, etc. Seek feedback from physicians and objective measures via audit logs etc.
  • Increase the overlap between design and implementation to allow for change in technologies that fall short in effectiveness or humanistic design.

Describe your evaluation of the IT strategic plan’s goals, and identify if there are missing components or issues that should be addressed.

Option #1: Selection of a Patient Safety Strategy Case Study

(Case study 16 is on page 332 of the E-book and on page 93 of the actual text book).

Describe your evaluation of the IT strategic plan’s goals, and identify if there are missing components or issues that should be addressed. The CIO and Director of Pharmacy disagree with how the medical center should implement the system. Discuss the pros and cons of their points of view. Make recommendations for the course of action they should take and support your position if you were to help them come to an agreement.

Provide a table showing the relationship between goals and their supporting objectives, including outcomes or deliverables. Provide a description of project goals, objectives, and deliverables.

DISCUSSION ESSAY

COMPETENCIES
981.1.1 : Capstone
The graduate integrates and synthesizes competencies from across the degree program, thereby demonstrating the ability to participate in and contribute value to the chosen professional field.

INTRODUCTION
For this task, you will use the attached “IT Capstone Proposal Template.”
This task will consist of a proposal for a major IT project that was approved by a course mentor. The proposal will identify a problem and propose an IT solution to the problem. Your proposal will also explain how you plan to implement your project to successfully resolve the problem, including a methodology for project development.
Your work for task 2 will not be evaluated until the appropriate forms in task 1 have been submitted and evaluated.

REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The originality report that is provided when you submit your task can be used as a guide. You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

Discuss (suggested length of 15–20 pages) your project in a narrative proposal by doing the following:

A. Proposal Overview (suggested length of 2–4 pages) : Create an IT proposal and project overview by doing the following:

  • Identify the problem.
    TASK OVERVIEW SUBMISSIONS EVALUATION REPORT
    Downloaded by nive bicea ([email protected])
    lOMoARcPSD|24284018
    9/27/21, 11:19 AM WGU Performance Assessment
    https://tasks.wgu.edu/student/000784159/course/20240006/task/2637/overview 2/6
  • Propose an IT solution.
  • Explain the plan to implement this proposed project.

B. Review of Other Work (suggested length of 3–4 pages) : Provide a review of four other works that have been completed on your topic and that you will use as background for this proposed project.
Note: These other works may include interviews, white papers, research studies, or other types of work by industry professionals.

  • Describe how each work reviewed relates to the proposed development of this project.

C. Rationale (suggested length of 1–2 pages) : Provide a rationale showing the need for your proposed project.

D. Current Project Environment (suggested length of 2–3 pages) : Provide a description of the current state of the project environment or the current state of affairs that makes your proposed project necessary.

E. Methodology (suggested length of 1–2 pages) : Explain how you will apply a standard methodology (such as ADDIE or SDLC) for the implementation of your project.

F. Project Goals, Objectives, and Deliverables (suggested length of 3–5 pages) : Explain the goals, objectives, and deliverables for the project, including the following information:

  • Provide a table showing the relationship between goals and their supporting objectives, including outcomes or deliverables.
  • Provide a description of project goals, objectives, and deliverables.

G. Project Timeline with Milestones (suggested length of 1–2 pages) : Provide a projected timeline with milestones for your project, including the duration and start and end dates of each milestone.

H. Outcome (suggested length of 1–2 pages) : Reflect on how you will measure the success and effectiveness of this project.

  • Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.

Determine why the attack on Azumer Water’s infrastructure was successful, including the specific vulnerabilities that allowed the attack to occur. Provide details from the case study to support your claims.

DISCUSSION ESSAY

COMPETENCIES

4043.3.1 : Information Security Governance
The graduate recommends modifications to established information security governance to increase information assurance levels within an organization.
4043.3.2 : Threat & Vulnerability Management
The graduate recommends risk mitigation strategies that meet regulatory and ethical compliance.
4043.3.3 : Information Security Management
The graduate recommends changes to established security management programs in response to a cyber- related incident on an organization.
4043.3.4 : Incident Response
The graduate develops security incident response plans that align to an organization’s security goals and objectives and maintain business continuity.

INTRODUCTION
Many organizations marginalize the management of the security of their infrastructure in hopes that they will not be the target of cyberattacks. However, cyberattacks happen frequently and tend to become more sophisticated over time. In reality, every organization is a likely target of malicious actors. These attacks result in a range of impacts on an organization and its core business and could significantly interrupt operations.
To be proactive, organizations need to have structures, processes, and plans in place to counter and respond to potential attacks and to deal with the consequences of successful attacks. A suitable security management plan and well-defined security goals that support the overall goals of the organization can ensure a reasonable level of business continuity, even in the case of security incidents.
In any organization, the individuals on the IT staf must work together to support the security goals of the organization. These individuals play significant roles in detecting and preventing security incidents before they occur. In the case of successful attacks, security management professionals are tasked with acting quickly to mitigate the attack’s efects.
In this assessment, you will refer to the attached “Case Study,” which contains details regarding a security incident at a small non-governmental organization (NGO). In part one of this task, you will analyze the security incident and provide specific examples and details from the case study to support your risk assessment. In part two, you will create a plan to efectively address the aftermath of the incident and manage the NGO’s ongoing security risks.

REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by
more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.

Part I: Incident Analysis and Response

A. Determine why the attack on Azumer Water’s infrastructure was successful, including the specific vulnerabilities that allowed the attack to occur. Provide details from the case study to support your claims.

B. Explain how the confidentiality, integrity, and availability of Azumer Water’s operations and PII (personally identifying information) data have been compromised, using NIST, ISO 27002, or another industry-standard framework to support your claims.

C. Identify the federal regulations this NGO violated, providing specific examples from the case study as evidence of Azumer Water’s noncompliance.

D. Recommend immediate steps to mitigate the impact of the incident, using specific examples from the case study to justify how these steps would mitigate the impact.

E. Explain how having an incident response plan in place will benefit Azumer Water, using details from the case study to support your explanation.

Part II: Risk Assessment and Management

F. Recommend processes to increase information assurance levels within the organization and bring Azumer Water into compliance with the violated federal regulations.

G. Recommend technical solutions to counter the remaining efects of the attack in the case study and to prevent future attacks.

H. Recommend an organizational structure for IT and security management, including a logical delineation of roles and adequate coverage of responsibilities, to support the efficient discovery and mitigation of future incidents.

I. Describe your risk management approach for Azumer Water based on the likelihood, severity, and impact of the risks in the case study.

J. Acknowledge sources, using APA in-text citations and references, for content that is quoted, paraphrased, or summarized.

K. Demonstrate professional communication in the content and presentation of your submission.

State conclusions or solutions clearly and precisely. Identify the problem to be solved. Define the specifications of required technologies. Create documentation appropriate to the stakeholder.

Power Point Presentation

The questions are based on fundamental networking concepts that are likely to be asked at an entry-level networking job interview. The following topics are covered:

  • LAN topologies
  • OSI model and layers
  • networking devices
  • common protocols
  • IP ranges
  • class of network and default subnet mask
  • autonomous system

You will also need to include either an audio file along with your presentation or record a screen-capture video of the presentation. These presentation resources can help you prepare and record your presentation. Your presentation should be done as if you were in an actual interview. The presentation should be about five to 10 minutes.

How Will My Work Be Evaluated?

As you progress in your networking career, you will interview for positions and may even find yourself making presentations to customers, client audiences, and management. Effective interviewing includes a systematic, purposeful conversation. Your goal is to demonstrate your knowledge, skills, and/or experience; and ability to do the job successfully. You can achieve this by explicitly and confidently answering the questions posed.

The interview questions selected are likely to be asked during an interview for an entry-level networking position. Successfully answering these questions conveys a foundational networking knowledge that will help you land the position! Use the provided PowerPoint template to document your answer, then record yourself answering each question. Submit to the Assignment folder when complete.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.1.2: Support the main idea and purpose of a communication.
1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.
2.3.1: State conclusions or solutions clearly and precisely.
10.1.1: Identify the problem to be solved.
10.1.3: Define the specifications of required technologies.
13.1.1: Create documentation appropriate to the stakeholder.

Write an essay that explains the role of digital, the structural and non-structural challenges, and how they can be dealt with in any part of the world.

Digital Marketing

Digital marketing remains promising compared to traditional advertising because it has become the cheapest and most cost-effective tool to reach customers (Chorddigital, 2020, July 21, Top 5 Benefits of Digital Marketing in Nigeria. Online: https://chorddigital.com/top-5/). Despite these promises, digital faces structural and non-structural. Write an essay that explains the role of digital, the structural and non-structural challenges, and how they can be dealt with in any part of the world.

Identify relevant threats. List 1 per row. Determine the type of data threatened (data-at-rest, data-in-transit, or processing) for that threat. Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A.

Wk 1 – Apply: Summative Assessment: Threats to Confidentiality, Integrity, and Availability

Assignment Content

Consider yourself a network security specialist. As you try to secure the security posture of your environment, you realize that different threats can interfere with the confidentiality, integrity, and availability of data-at-rest, data-in-transit, and processing. Some threats may affect only 1 of these elements of security (such as confidentiality only), and other threats affect more than one or even all these elements.

In this assignment, you will be evaluated on your asset protection skill.

Create a 1- to 2-page table in Microsoft® Word identifying a minimum of 6 threats, using the column headers and details below:

Column Headers

Threat
Threat to Type of Data
Confidentiality/Integrity/Availability
Mitigation Suggestion

Details Within Your Table

Identify relevant threats. List 1 per row.
Determine the type of data threatened (data-at-rest, data-in-transit, or processing) for that threat.
Determine if confidentiality, integrity, or availability was affected. Use the labels C, I, and/or A.
Describe the mitigation plan in 2 to 3 sentences in the column.

Include a paragraph that highlights 2 access control techniques that enforce security.

Many students confuse Threats with Vulnerabilities and Risks and there is a distinct difference between them. Review the article below to ensure you understand the difference between them as this assignment is asking specifically for threats.

  • Link to Threats vs Vulnerabilities and Risks
  • Cite at least 2 resources to support your assignment.
  • Format your assignment according to APA guidelines.

Provide high-level steps to recover both your databases and telecommunications at an alternate data center. Provide a high-level guide for recovery/replacement of other IT assets.

Wk 5 – Apply: Summative Assessment: Backup Policies

Assignment Content

Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.

Create a 3- to 4-page paper detailing D/R and backup policies used to address when your data center is inaccessible.

Include the following:

List the tools that can be used for backup purposes.
Explain the staff operations including:
Where employees will work during a disaster situation.
How employees can get to the backup data from this location.
The communication methods for updates throughout the disaster period
Provide high-level steps to recover both your databases and telecommunications at an alternate data center.
Provide a high-level guide for recovery/replacement of other IT assets.
State your policies for backup media storage.
State your policies for encryption of backup data.

Cite at least 2 resources to support your assignment.

Organize your paper into distinct sections for each point and provide a header to identify. Consider the timeliness of recovery and cost in your approach for alternate work locations as you review the differences between DR site options.