two 2 hours

two  in 2 hours

relational set operators 1

“Relational Set Operators” Please respond to the following:

  • A relational Database Model allows database users to analyze data thoroughly. To accomplish this, advanced commands such as UNION and INTERSECT may be used.  Describe a business scenario where a UNION relational set operator may be used to merge two similar data sets. Within the context of your business scenario, analyze the analysis and data consistency advantages of using a UNION operator rather than simply merging two data sets into one result table.
  • Suppose you are tasked with finding common data elements amongst various data sets. Specify how an INTERSECT operator may assist you in accomplishing this task. Construct a query that can perform the same function as the INTERSECT operator without using the “INTERSECT” syntax within the query. Note: The Strayer Oracle Server may be used to test and compile the SQL Queries developed.  

introduction project risk management 1

1000 words

Overview:-

Risks fall in a few categories, known and unknown. It is extremely important in any project to effectively plan for both with a contingency budget and resources because some will happen. In this class, you are asked to develop a Risk Management Strategy and Plan that identifies potential risks, ranks them by impact and likeliness, contains mitigation strategies, and includes a way to control and communicate them. You will select a project that you may have developed in a previous class or a known project in your organization to create this strategy and plan for.

Throughout this course, you will be working on developing several components of a final Key Assignment. Additional information and the deliverables for each Individual Project will be provided in the assignment description for this project.

In this first Individual Project, you are asked to develop the outline of the sections that will be included in the “Risk Management Strategy and Plan” document and a draft of a proposal to submit to your instructor. The other information you will include is a high-level description of the project you will be conducting the risk analysis on.

You will also be setting up the final Key Assignment outline that you will add to each week. The combined Individual Project (IP) assignments will be your final Key Assignment deliverable.

Project Selection:

The first step will be to select a project that you to develop a risk management strategy and plan for. This project will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

  1. Nontrivial: The selected project candidate should reflect a real-life project that has at least the major milestones identified.
  2. Domain Knowledge: You will be applying knowledge of this project to address assignments related to identifying and analyzing risks.

Select a project that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first few days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval.

Assignment:

Your first task in this process will be to select a project to use as the basis of your Key Assignment. You will also create the shell document for the final project Key Assignment document deliverable that you will be working on throughout the course. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery, which is the Risk Management Strategy and Plan.

The following project deliverables:

  1. Submit project proposal to instructor for approval
  2. Risk Management Strategy and Plan Document Shell
    • Use Microsoft Word
    • Title Page
      1. Course number and name
      2. Project name
      3. Student name
      4. Date
    • Table of Contents
      1. Use auto-generated TOC
      2. Separate page
      3. Maximum of three levels deep
      4. Be sure to update the fields of the TOC so it is up-to-date before submitting your project.
  3. Section Headings (create each heading on a new page with TBD as content except for sections listed under “New Content” below)
      1. Project Outline
      2. Risk Management Justification
      3. Project Risks Identification
      4. Project Risks Assessment
      5. Project Risks Responses Strategy
      6. Project Risks Responsibility Plan
      7. Project Risks Monitoring & Control Plan
      8. Project Risks WBS & Budget Updates
      9. Project Risks Communications Plan
  4. New Content to be Inserted in Above Shell
    • Project Outline
      1. Brief description of the project. 
      2. The milestones and/or WBS for the project.
      3. Material can be taken from approved proposal submitted to the instructor, and this will serve as the draft for the proposal.
      4. Be sure this project is approved by the instructor.
  5. Risk Management Justification
      1. Discuss why risk management is so important to the success of the selected project in a letter to the project sponsor.
      2. Describe the steps that will be used to develop the Risk Management Plan.
      3. Represent this process in a flow diagram as well.
    1. Project Risks Identification
      1. Start brainstorming, at a high level, on some categories where risk could occur in this project (Note: you will continue this brainstorming activity in the next week with specifics, likelihood, and impact).

Name the document yourname_MPM344_IP1.doc, and submit the document for grading.

compute value 34 years 1000 deposit earning 10 percent year do not round intermediate calc 0

please write out the work for this problem  thank you.

advanced database 8569597 2

(a) For this part of the problem, you can assume we are using the immediate update protocol. We saw that UNDOs have to be done right to left i.e. later writes are undone first and then earlier writes. Give an example to show why it should be done this way by doing the following: i. Find a simple example where it does make a difference whether the UNDOs are done left to right or right to left. ii. Show what the results will be if the UNDOs are done right to left. iii. Show what the results will be if the UNDOs are done left to right. (b) For this part of the problem, you can assume we are using the immediate update protocol We saw that REDOs have to be done left to right i.e. earlier writes are redone first and then later writes. Give an example to show why it should be done this way by doing the following: i. Find a simple example where it does make a difference whether the REDOs are done left to right or right to left. ii. Show what the results will be if the REDOs are done left to right. iii. Show what the results will be if the REDOs are done right to left. (c) Explain why is it that if we are using the immediate update protocol we need to keep the old value (BFIM) of an item along with the new value (AFIM), but if we are using deferred update protocol, we need to only keep the new value. 3. (10 points) Suppose that we use the immediate update protocol for the schedule given in the last slide of the week 5 power point notes. (a) Show what will be the steps taken at the time of the recovery process i.e. specify, in the correct order, what are all the operations (undo and/or redo) which are carried out by showing what changes are made. No additional explanation is needed. (b) What are the final values of A and B; no explanation needed

im looking someone do my homework music history

I’m looking for someone to take my “homework” in my Music history 105 and the due is a week from now.

 

immune

Abnormal immune responses can trigger a range of autoimmune diseases, in which an individual’s immune system is attacking normal tissues in the body. Well-known examples of autoimmune diseases are type 1 diabetes mellitus, lupus, and multiple sclerosis.

Ideally, one would like to harness the immune system to attack abnormal substances or tissues like cancer, while sparing the normal (unaffected) tissue. Many tumor cells produce antigens (proteins) that theoretically ought to trigger an immune response: that is, one’s immune system ought to recognize cancer cells as somehow foreign or abnormal, and thereafter eliminate these cells from the body. The field of cancer immunotherapy is actively pursuing this study.

Tumor antigens may also be useful for diagnostic tests; high levels of tumor antigens could be taken as markers or indicators of cancer. In this assignment, you will be examining levels of tumor-associated antigens (TAAs) as determined from immunoassays (i.e., biochemical tests that measure the concentrations of the tumor-associated antigens in serum samples).

  • Download the Excel file MHA610_assignment_3_data.xls, and open it.
  • The spreadsheet contains data on 250 individuals: 90 normal individuals from San Diego (the controls), and 160 individuals from Korea and China, all of whom were diagnosed with hepatocellular carcinoma (HCC).
    • Serum samples were taken from the controls and from the cases at time of diagnosis of HCC. Levels of a panel of 12 tumor-associated antigens (TAAs) were assessed via immunoassays in all individuals;
      • The levels are given in the columns with headings Ab14, HCC1, IMP1, KOC, MDM2, NPM1, P16, P53, P90, RaIA, and Survivin. (These are the designations of the 12 TAAs, all of which were thought to be potentially predictive of cancer.)
  • The underlying question is whether we can effectively discriminate between the cases and controls on the basis of the levels of these TAAs. This is sometimes termed a classification problem in the statistics and biostatistics literature: we wish to classify individuals as normal or cancer patients on the basis of their TAA levels.
  • We will examine these data in Statdisk. Use the MHA610_Week 3_Assignment_Data.CSV file to upload this information into Statdisk.
    • If you choose the latter option, Start Statdisk, then choose File>Open and select the .csv file you created (unless you changed the name, it ought to be MHA610_assignment_3_data.csv)
    • Check the box that specifies the data contains column titles or headers, select Comma separated for how the data are delimited, click finish, and the dataset will have been successfully imported into Statdisk.
    • NOTE: you may want to read through the remainder of the assignment first, before proceeding with this step. This may save you some work afterwards!
  • Note that Statdisk operates on columns of data, and that both cases and controls are contained in each column of TAA levels. It will be necessary to separate the cases and controls for further analyses. This can be accomplished either by copying within Statdisk or by reverting to the original Excel workbook, copying in Excel, exporting as a .csv file, and then importing into Statdisk. (Don’t say you weren’t warned!)
  • Explain if you would characterize any or all of the TAA levels as approximately normally distributed for the controls and for the cases.
    • Provide plots and statistics in support of your conclusions.
  • Explain if any of the TAAs are useful for discriminating between the cases and controls.
    • Provide plots and statistics in support of your conclusions.
  • All writing assignments should be at least 250-500 words in APA format supported by scholarly sources.

BONUS. In the above, we pooled all cases together.  Summarize whether you think this is legitimate or whether the levels of any of the TAAs appear to differ significantly between the cases from China and the cases from Korea. Provide evidence in support of your conclusion.

project managment 5

fill up the follwoing inforamation(not the bold font) as in the attchment (image.png) file with full details about my parts of the project  and each section need to be filled alone and they are:

3.7.2. Marketing Promotions

3.7.2.1. IMC Plan

3.7.3. Coordinate Research and Promotion

 

3.7.3.1. Information Request Form

————————————————-

Name of 3.x Section

Date of Writing

 

Project Name: Sycamore Lunch Express

WBS Item Number: 3.

WBS Item Name:

Predecessor(s): 

Successor(s): 

Classes Involved: 

Resource Requirements: 

Constraints: 

Start Date: 

Finish Date: 

Assumptions: How it will be done, who will do it

 

Completed: Yes/No

——————————-

due in Monday night EST.

online final exam global business environment 1

I have an online course that have online final exam , am looking for someone to get me an A on this .

the course outline is attached but this for the in-class just to give you an idea about my course

acc568 week 8 assignment 4 transfer pricing

ACC568 WEEK 8 ASSIGNMENT 4 TRANSFER PRICING