A major public university graduates approximately 10,000 students per year, and its development office has decided to build a Web-based system that solicits and tracks donations from the university's large alumni body. Ultimately, the development officers hope to use the information in the system to better understand the alumni giving patterns so that they can improve giving rates.

Required:
a. What kind of system is this?
b. What different kinds of data will this system use?
c. On the basis of your answers, what kind of data storage format(s) do you recommend for this system?

Answers

Answer 1

Answer:

a) database system

b) Transaction and Alumni data

c) Database format ( table )

Explanation:

a) The kind of system that is described in this question is a database system because a web based system that is enabled for tracking should have saved the details of the members included in the system hence it has to be databased system

b) The different kinds of data that the system will use includes: Transaction data and Alumni data.

c) The kind of data format that would be recommended for this system is

The Database format, because of certain optimizations already inbuilt in a database system such as tables


Related Questions

what are the application areas of the computer ? list them.​

Answers

Answer:

Home. Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. ...

Medical Field.

Entertainment.

Industry.

Education.

Government.

Banking.

Business.

It's currently 1:00 in the afternoon. You want to schedule the myapp program to run automatically tomorrow at noon (12:00). What two at commands could you use

Answers

Answer:

at 12 pm tomorrow

at now +23 hours

Explanation:

The at command could be used in the command line to perform a scheduled command in Unix related systems. The at command coule be ua d to program a complex script or used to perform simple scheduled reminders.

The at command is initiated by first writing the at string followed by the condition or statement to be performed.

Currently (1:00 pm) ; To make a schedule for 12pm then that will be at noon the following day:

at 12:00 pm tomorrow

Or :

Using the number of hours between the current tone and the schedule time : 12 pm tomorrow - 1:00 pm today is a difference of 23 hours ;

Hence, it can be written as :

at +23 hours


A chain of dry-cleaning outlets wants to improve its operations by using data from
devices at individual locations to make real-time adjustments to service delivery.
Which technology would the business combine with its current Cloud operations
to make this possible?
O Edge Computing
O Blockchain
O Data Visualization
O Public Cloud

Answers

A










explanation cause it is

Use the Internet to research external storage devices. Find at least three devices, with a minimum storage size of 1 terabyte (TB), from three different manufacturers. Write a paragraph, IN YOUR WORDS, for each device explaining the features and benefits. Provide the retail cost and include a reference link to each device. Next, write

Answers

Hi, you've asked an incomplete question. However, I provided suggestions on getting the desired information.

Explanation:

Considering the fact that you are required to find information about not just the cost, but also the features and benefits of three storage devices having a minimum storage size of 1 terabyte, it is recommended that you check this on a reputable e-commerce site (eg Amazon).

There you could find information about their features and benefits, as well as customer feedback about their experience using these devices.

What is the full form of USB​ ?

Answers

Answer:

universal serial bus: an external serial bus interface standard for connecting peripheral devices to a computer, as in a USB port or USB cable.

Explanation:

This criterion is linked to a Learning OutcomeCreate checkDuplicates method that receives an array of ints, and an int as parameters. It will return true if the int is found in the array, and false if the int is NOT found in the array. Call the checkDuplicates method from both the MegaMillionsLottery constructor, and the getUserPicks() method.

Answers

Answer:

Explanation:

The MegaMillions Lottery class was not provided and neither was the getUserPicks() method. Since they were not found online either, I have created the checkDuplicates method so that it works standalone. Therefore, you can simply call the method from wherever you need by pasting the call line where it needs to be called. A test case has been created in the main method so that you can see the method in action. The output is seen in the attached image below.

   public static boolean checkDuplicate(int[] myArr, int element) {

       for (int x : myArr) {

           if (x == element) {

               return true;

           }

       }

       return false;

   }

the computer that process data that are represented in the form of discrete values are called​

Answers

Answer:

Digital computer

Explanation:

The computer that process data that are represented in the form of discrete values are called digital computer.

Select the correct answer.
What testing approach does a development team use when testing the developed code rather than just the functionality of the code?
A.
white box testing
B.
black box testing
C.
acceptance testing
D.
usability testing

Answers

Answer:

D. usability testing

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis and requirements.

3. Software design and prototyping.

4. Development (coding).

5. Integration and testing

6. Deployment.

7. Operations and maintenance.

Usability testing is a testing technique used by a software development team to test a developed code rather than just the functionality of the code.

The main purpose of usability (user experience) testing is to determine how easy, user-friendly or difficult it is for end users (real people) to use a software application or program.

What is garbage in garbage out?​

Answers

Answer: it means if you give a bad input it will result in a ad output.

Explanation:

It has n acronym GIGO which refers to how the quality of an output is determined by the quality of input.

Garbage is trash info... or input. And grabage out is the trash output.

Consider a system with seven processes: E, F, G, H, I, J, K and six resources: U, V, W, X, Y, Z. Process E holds U and wants V. Process F holds nothing but wants W. Process G holds nothing but wants V. Process H holds X and wants V and W. Process I holds W and wants Y. Process J holds Z and wants V. Process K holds Y and wants X. Is this system deadlocked?

a. Yes
b. No

Answers

Answer:

a. Yes

Explanation:

System is deadlock due to process HIK. Process H holds X and wants V and W. Process I holds W and wants Y. Process K holds Y and wants X. The system will become deadlock due to these three different processes.

which animal is the computer to store data information and instruction ​

Answers

Answer:

human is the answwr of the quest

major characteristics of the bus in computer architecture​

Answers

Answer:

A bus is characterized by the amount of information that can be transmitted at once. This amount, expressed in bits, corresponds to the number of physical lines over which data is sent simultaneously. A 32-wire ribbon cable can transmit 32 bits in parallel.

In computer architecture, a bus (related to the Latin “omnibus”, meaning “for all”) is a communication system that transfers data between components inside a computer, or between computers. This expression covers all related hardware components (wire, optical fiber, etc.)

Explanation:

ng questions two features of computer .​

Answers

Explanation:

accuracy, diligence, versatility

There is an interface I that has abstract class AC as its subclass. Class C inherits AC. We know that C delegates to an object of D to perform some computations. Besides, C consists of two C1s and one C2 as subcomponents. Object of C2 is still reusable when its major component C is depleted. C1 has a method that takes in an object of E as argument. Which one is invalid

Answers

Answer:

are u in HS or college work

I am trying to understand

Write a program that divides mystery_value by mystery_value #and prints the result. If that operation results in an #error, divide mystery_value by (mystery_value + 5) and then print the result. If that still fails, multiply mystery_value #by 5 and print the result. You may assume one of those three things will work.
1 mystery_value = 5 2 3 #You may modify the lines of code above, but don't move them! 4 #when you submit your code, we'll change these lines to 5 #assign different values to the variables. 6 I 7 #write a program that divides mystery value by mystery_value 8 #and prints the result. If that operation results in an 9 #error, divide mystery value by (mystery_value + 5) and then 10 #print the result. If that still fails, multiply mystery_value 11 #by. 5 and print the result. You may assume one of those three 12 #things will work, 13 # 14 #You may not use any conditionals. 15 # 16 #hint: You're going to want to test one try/except structure 17 #inside another! Think carefully about whether the second 18 #one should go inside the try block or the except block. 19 20 21 #Add your code here! 22

Answers

Answer:

mystery_value = 5  

try:

   print(mystery_value / mystery_value)

except:

   try:

       print(mystery_value / (mystery_value + 5))

   except:

       print(mystery_value * 5)

what is example of application of machine learning that can be imposed in eduction. (except brainly.)

Answers

Answer:

Machine Learning Examples

Recommendation Engines (Netflix)

Sorting, tagging and categorizing photos (Yelp)

Self-Driving Cars (Waymo)

Education (Duolingo)

Customer Lifetime Value (Asos)

Patient Sickness Predictions (KenSci)

Determining Credit Worthiness (Deserve)

Targeted Emails (Optimail)

If one wish to create a loop such that it will continuously add time elapsed between two functions with variable computation time until 1 hour is passed, what type of loop would be best

Answers

"Between two functions" not sure of what you mean there but here's a quick way to execute a function for an hour

Answer and Explanation:

var interval=setInterval(function(){

var i=0;

for (i=0; i <=60; i++){

for (i=0; i <70; i++){

console.log(i); }

}}, 60000);

g Palindrome counting. Write a Python program stored in a file q3.py to calculate the number of occurrences of palindrome words and palindrome numbers in a sentence. Your program is case-insensitive, meaning that uppercase and lowercase of the same word should be considered the same. The program should print the palindromes sorted alphanumerically with their number of occurrences. Numbers must be printed first, and words must be printed nex

Answers

Answer:

The program is as follows:

sentence = input("Sentence: ")

numbers = []; words = []

for word in sentence.split():

   if word.lower() == word[::-1].lower():

       if word.isdigit() == False:

           words.append(word)

       else:

           numbers.append(int(word))

words.sort(); numbers.sort()

print(numbers); print(words)

Explanation:

This gets input for sentence

sentence = input("Sentence: ")

This initializes two lists; one for numbers, the other for word palindromes

numbers = []; words = []

This iterates through each word of the sentence

for word in sentence.split():

This checks for palindromes

   if word.lower() == word[::-1].lower():

If the current element is palindrome;

All word palindromes are added to word palindrome lists

       if word.isdigit() == False:

           words.append(word)

All number palindromes are added to number palindrome lists

       else:

           numbers.append(int(word))

This sorts both lists

words.sort(); numbers.sort()

This prints the sorted lists

print(numbers); print(words)

If x=50.7,y=25.3 and z is defined as integer z,calculate z=x+y​

Answers

Answer:

Ans: 76

Explanation:

z=x+y

=50•7 + 25•3

=76#

When planning out the new data center where he is building a private cloud, Juan knows that he needs to account for all of the physical and logical resources that the servers will need in that new network. Which of the following must he account for in regard to the network part of his planning?
a. Ensure that he has enough MAC addresses for the virtual machines.
b. Ensure that he has enough IP addresses for the networks and subnets to account for the vNICs that are in bridging mode.
c. Ensure that there is one network card or port per virtual machine on each host.
d. Ensure that all of the virtual machines are configured with the same VLAN so that they can all communicate with one another.

Answers

b. ensure that he has enough IP addresses for the networks and subnets to account for the vNICS that are in bridging mode.

When in global configuration mode, which steps are necessary to edit an ip address on an Ethernet interface?

Answers

Answer:

I. You should enter interface configuration mode.

II. Configure the IP address and subnet mask.

Explanation:

A node refers to the physical device that make up a network and are capable of sending, receiving, creating and storing data in communication.

Some examples of network nodes are modem, hubs, computer, switches, phone and printers.

In Computer networking, network devices such as routers and switches are usually configured (programmed) through the use of specific network commands commonly referred to as configs e.g show int description, config terminal (config t), show IP address, etc.

In Cisco devices, there are five (5) main types of command modes;

1. Sub-interface configuration mode.

2. Interface configuration mode.

3. Line configuration mode.

4. Router configuration method.

5. Global configuration mode.

Global configuration mode is a configuration mode that avail network engineers and end users with the ability to modify or edit the running (global) system configuration of a networking device. Thus, any change effected at the global configuration mode will affect the network device as a whole.

In global configuration mode, the steps which are necessary to edit an ip address on an Ethernet interface include;

I. You should enter interface configuration mode using the "configure terminal" command.

II. Configure the IP address and subnet mask.

See an example below;

"Router(config-if)# IP address 192.168.1.2 255.255.255.0"

Scenario You are a network engineer and it is your first day working with ASU and you have been given the job of creating a network for the IT program. You are given the following three tasks to complete. 1. Configure IP addressing settings on network devices. 2. Perform basic device configuration tasks on a router. 3. Verify Layer 3 connectivity via a routing protocol. 4. Setup some access control lists.

Answers

B because one cause…………………

In which generation of computers are we in?​

Answers

It should be the Sixth generation

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which cloud computing option would be most suitable for GuardIN?

Answers

Answer:

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which cloud computing option would be most suitable for GuardIN?

Explanation:

when describing a software lincense what does the phrase "open source" mean?

Answers

Open source is like we’re you can your your notes

User-Defined Functions: Miles to track lapsOne lap around a standard high-school running track is exactly 0.25 miles. Define a function named MilesToLaps that takes a float as a parameter, representing the number of miles, and returns a float that represents the number of laps.Then, write a main program that takes a number of miles as an input, calls function MilesToLaps() to calculate the number of laps, and outputs the number of laps. Ex: If the inout is 1.5the output is 6.0 Ex: If the input is 2.2the output is 8.8 Your program should define and call a function Function Miles ToLaps(float userMiles) returns float userLaps 12 // Deine Milestola hert. 34 // Deine Minhert. Your code ust call llestola 5

Answers

Answer:

Explanation:

The following is written in Java. The MilesToLaps method creates a variable called laps and gives it the value of the input parameter miles divided by 0.25. Then it returns the variable laps to the user. In the main method a Scanner object was created and asks the user for the number of miles which are passed to the MilesToLaps method which returns the number of laps. This can be seen in the attached image below.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("How many miles?");

       float miles = in.nextFloat();

      System.out.println("This is " + MilesToLaps(miles) + " laps");

   }

   public static float MilesToLaps(float miles) {

       float laps = (float) (miles / 0.25);

       return laps;

   }

}

DEFINITION of COMPONENT HARDWARE?

Answers

Answer: See explanation

Explanation:

Computer hardware refers to the physical parts of a computer, which includes the monitor, mouse, central processing unit (CPU), keyboard, computer data storage etc.

Hardware are the physical, computer devices, which helps in providing support for major functions like input, processing, output, and communication. The computer hardware is directed by the software to perform an instruction.

The process by which the kernel temporarily moves data from memory to a storage device is known as what?

Answers

Answer: Swapping

Explanation:

Swapping is referred to as the process by which the kernel temporarily moves data from memory to a storage device.

Swapping is simply a memory management scheme whereby the process can be swapped temporarily from the main memory to the secondary memory in order for the main memory to be available for other processes. Swapping is used for memory utilization.

Select the correct statement(s) regarding PONS. a. only MMF cables can be used, since MMF enables greater data capacities compared to SMF b. PONS systems require active amplifiers, since high frequency signals attenuate quickly over distance c. PONS systems use passive devices between OLT and ONT d. all are correct statements

Answers

Answer:

The correct statement regarding PONS is:

c. PONS systems use passive devices between OLT and ONT

Explanation:

PON means Passive Optical Network. Based on fiber-optic telecommunications technology, PON is used to deliver broadband network access to individual end-customers.  It enables a single fiber from a service provider to maintain an efficient broadband connection for multiple end-users (homes and small businesses).  OLT means Optical Line Terminal, while ONT means Optical Network Terminal.  They provide access to the PON.

Imagine you are trying to choose what restaurant to visit. You have a list of restaurants, each with a collection of star ratings. You also have a minimum standard; you will only go to a restaurant whose star rating is at least your minimum standard. Write a function called restaurant_rating. restaurant_rating has two parameters. The first is a dictionary, where the keys are restaurant names and the values are lists of ratings. The second parameter is your minimum rating. If a restaurant's average rating is above your minimum rating, you might visit it. If it is not, you won't. restaurant_rating should return a list of restaurants eligible for you to visit. That is, it should return a list of restaurant names from the dictionary whose average ratings (the average of the ratings in their lists) is greater than or equal to your minimum rating. This list should be sorted alphabetically. For example: rest_and_rating

Answers

Answer:

The function in Python is as follows:

def restaurant_rating(restaurants,minRatings):

   restaurantList = []

   for key in restaurants:

       if restaurants[key] >= minRatings:

           restaurantList.append(key)

           

   restaurantList.sort()

   return restaurantList

Explanation:

This declares the function

def restaurant_rating(restaurants,minRatings):

This initializes the list of eligible restaurants

   restaurantList = []

This iterates through the restaurant dictionary

   for key in restaurants:

If the ratings is greater than or equal to minimum ratings

       if restaurants[key] >= minRatings:

The restaurant name is appended to the restaurant list

           restaurantList.append(key)

Sort the eligible lists            

   restaurantList.sort()

Return the list

   return restaurantList

Other Questions
A project with an initial investment of $460,100 will generate equal annual cash flows over its 11-year life. The project has a required return of 8.2 percent. What is the minimum annual cash flow required to accept the project write two properties of 1 There are 84 students in a speech contest. Yesterday, 1/4 of them gave their speeches. Today, 3/7 of the remaining students gave their speeches. How many students still haven't given their speeches? What is the answer with explaining and what I put in the empty box Examine the cartoon and read the annotation. Then respond with a brief essay giving your personal reaction to Johnson's approach to Reconstruction. Present at least three specific points in your analysis.Link o the website they gave us about the cartoon (with the annotations): https://www.harpweek.com/09Cartoon/BrowseByDateCartoon.asp?Month=September&Date=1 please helpabd=58 and bdc=32 what is the measure of adb El Sol cuando incide sobre una placa fotovoltaica transforma la energa radiante en energa 15. How can these two sentences be combined into one compound sentence?The dog wanted to jump into the water. The owner wouldn't allow it.Although the dog wanted to jump into the water, the owner wouldn't allow it.As the dog wanted to jump into the water, the owner wouldn't allow it.The dog wanted to jump into the water, but the owner wouldn't allow itThe owner wouldn't allow it: The dog wanted to jump into the water. how all work. A) What is the average rate of change of the function g(x) = 14x + 6 over the interval [0, 5]?B) What is the average rate of change of the function g(x) = 3(2x) - 6 over the interval [0,5]?C) How does this compare to your Answers for Problem 4? What is the product? (3s + 2t)(4s t) Find the length of XW. C Qu. 97 Bioclean Co. sells a biodegradable... Bioclean Co., a merchandiser, sells a biodegradable cleaning product and has predicted the following sales for the first four months of the current year: Jan. Feb. March April Sales in Units2,500 2,700 2,900 2,400 Ending inventory for each month should be 20% of the next month's sales, and the December 31 inventory is consistent with that policy. How many units should be purchased in February 1. List and discuss the different factors that can influence your adoption of mobile telephone for academic and social activities/endeavors. In your response, you may add more factors to the ones in the articles based on your personal experience(s) in the use of mobile telecommunication services. write an equation of the line that passes through the point (-8,3) with slope 6 Which of the following processes does NOT facilitate containment? the length of a photograph is 11.4 inches if the photo is enlarged so that its length is increased by 2.25 inches what the new length A large protein that passes through the nuclear pore must have an appropriate A)sorting sequence, which typically contains the positively charged amino acids lysine and arginine. B)sorting sequence, which typically contains the hydrophobic amino acids leucine and isoleucine. C)sequence to interact with the nuclear fibrils. D)Ran-interacting protein domain. Multiple Choice most rights of citizens were under the control of state governments rather than the federal government. states could not interfere with vigorous federal enforcement of a broad array of civil rights guaranteed by the Fourteenth Amendment. the federal government had sole authority under the Commerce Clause to regulate the meatpacking industry. voting rights of African-Americans under the Fifteenth Amendment could not be abridged or denied by any state. Reconstruction had progressed too far and was now officially ended. please help me with this question. The game of basketball is considered