Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

For this Critical Thinking assignment, you will Install and configure an SQL ser

ID: 3865069 • Letter: F

Question

For this Critical Thinking assignment, you will Install and configure an SQL server, attach the sample AdventureWorks database to the SQL server, prepare and extract data from the AdventureWorks database, and then report on your findings and propose a plan to analyze the data.

There are several preliminary steps you must go through before beginning the assignment itself:

First, download and install the Microsoft SQL Server 2012 Express software. (See installation instructions linked at the bottom of the page. This document includes instructions for both PCs and Macs.) This is the SQL Database Server.

Second, download and install the Microsoft SQL Server Management Studio 2012 Express software. (See installation instructions linked at the bottom of the page. This is the same document as above and includes instructions for both PCs and Macs.) This is the tool you will use to manage your server and access the database.

Third, download and attach the AdventureWorks database file consisting of pre-existing data and access that database using the SQL Server Management Studio. This database contains the data that you will use for this assignment. If you are using a Mac, then you will need to use the Employees_DB_Full database.

Next, evaluate the database contents based on the business problem presented below:

You have been hired by XYZ Corporation, a multinational company. XYZ Corporation has recently acquired a competitor (AdventureWorks) within the United States. XYZ Corporation management is interested in learning more about AdventureWork’s employee base. Specifically, they are looking to identify any trends or patterns within the dates of hire, demographics, performance statistics, as well as any interesting or meaningful correlations between any of the data, etc. AdventureWorks has provided XYZ Corporation management with a database. This database, while containing a plethora of information, needs your analysis. Focus on the tables and views that describe the employees of the organization.

In reviewing the data, consider the following questions:

Does the data lend itself to having various attributes mapped to the two or three axes of a plot for cluster analysis or perhaps classification approaches?

What opportunities of potential connections or relationships between the data can you identify?

Is the data more suited for one or more of the association analysis techniques?

Depending on what your findings are, clean the data and apply any necessary pre-processing techniques (e.g., aggregation, sampling, subset selection, binarization, discretization, or transformation) that you feel are needed in order to better analyze the data later. You may also want to reorganize the data into new tables or views for easy export.

(Note: You will not be conducting analysis on the data in this module, so please do not download and install the SPSS trial software until Week 8.)

Once the data has been processed and prepared for analysis, you will need to review your results and propose the analysis approach or approaches that you feel will yield the best results in order to answer the business problem. These analysis models were discussed in Modules 4 and 5. Your Critical Thinking submission must include the following elements:

Data quality considerations with regard to the database contents. Did you find any issues/missing data? If so, how do you plan on dealing with these issues?

Description of the data. Discuss what is contained within the database and how the database and the tables of interest are structured.

Methods you used to prepare your data for processing, e.g., pre-processing and organization. Include any SQL queries and views that you used along with an explanation of why you took these steps.

A restatement of the business problem along with brief proposal and explanation of the chosen analysis approach that you will be using in your Portfolio Project in Week 8.

Your well-written findings should be 2-4 pages in length and formatted according to CSU-Global Guide to Writing and APA Requirements. Include at least two credible outside references, and one citation from the course textbook, totaling three, to support: 1) the pre-processing methods used, 2) the analysis supporting the pre-processing methods, and 3) the proposed analysis approach. The outside references may include credible sources in print or from the internet. The CSU-Global Library is a great place to find resources! The results of this Critical Thinking assignment will be used in the completion of your Portfolio Project.

Explanation / Answer

permissions at various levels When defining the granularity of permissions, you should apply access permissions at the object level. Defining permissions at the object level allows you to control, in a very granular and specific way, the principles that access specific resources.reduce the administrative overhead by using scopes.if there are generalizations in your permission sets, you can use the higher levels (scopes) in the permission hierarchy to reduce the administrative overhead involved when using object-level permissions. For example, if you need to grant EXECUTE permissions to all stored procedures in a schema, you do not need to grant EXECUTE permissions to each stored procedure individually. Instead, you can grant EXECUTE permissions at the schema level. The same concept is valid if you need to grant EXECUTE permissions to all schemas—you can grant EXECUTE permissions at the database level, which will be applicable across all schemas.whether you choose permissions at the object level, schema level, or database level, you must keep in mind that the most restrictive permission takes precedence over other permissions. For example, a DENY permission at any level overrides permissions set at higher or lower granularity levels.Accessing tables directly implies that users and applications understand the internal structure of the database. If you need to implement schema changes on tables, the process of determining the impact of these schema changes becomes complex. This is because there is no centralized place to make changes, and these changes must be made for each user and application.Create stored procedures to access data Database administrators who are responsible for data security should create stored procedures to access the data in a database. Many business requirements and government regulations require DBAs to restrict access to sensitive data in their databases. Permitting ad hoc access violates these requirements and does not allow users or applications to use predefined stored procedures or view.Use predefined procedures or views to restrict data access.DBAs are responsible for users or applications that do not use predefined views or stored procedures.