Wednesday, May 27, 2020

Dust Bowl Relocation - Free Essay Example

The Dust Bowl, itself left no option but to force thousands of poor families to flee especially the farmers who had farms, land and property, a high rate of crop destruction was made which caused the inability to grow crops such as cotton and wheat. The states that had suffered greatly in the early 1930s were Oklahoma, Texas, and Kansas from the rapid increase of the severe drought that lasted not even for months but for several years. People from the plains had noticed that there seemed not to be as much rainfall in the region anymore. This horrible drought had produced an ecological disaster, caused by the shocking dust storms which had arisen by the weakened plowed topsoil. Even though the Dust Bowl migration was due to poor agricultural and farming practices, there are other factors that lead this migration. One circumstance was that not all people that left in the migration were just farmers. Residents left also in the sense to settle and start a new life easily. The state of California had attracted many of the migrants coming over, and apart from the poor living conditions, the climate and its abundant resources available, the beauty of the landscape was above all. During that time there were various ways to attract people to California, such as advertisers and advertisements saying, come to California to find the good life. Obviously, many came from different states, causing a huge population growth during those years but some migrants from the south had been very successful farmers who wanted to seek more American opportunities, trying to own a piece of land in the west. Many of the migrant families were forced to migrate to California seeking work because of the drought which at the time had already lasted many years. Some problems that arose resulting, from this drought, led to a widespread hunger and poverty. More than 500,000 Americans were left homeless and over 350 houses were completely torn down. Families felt that they had no choice but to leave their country in search of work in the west. When families began to move from the Plains, especially in Oklahoma and Kansas, most fell ill and died of dust pneumonia or malnutrition. Not all immigrants traveled a long distance, some just went to the next town or county. One of the largest migrations in American history within a short time was the Dust Bowl exodus that lasted between 1930 and 1940. About 3.5 million people moved out of the Plains and migrated elsewhere. In a year, over 86,000 people migrated to California, more than the number of migrants during the 1849 Gold Rush. After migrants came to California, many hoped to be hired on California farms, learning how to grow fruits and vegetables while living on the farms they worked, instead, California farms hired seasonal workers only when they were needed and used farm workers to perform specific tasks rather than to learn new farming techniques. Many migrants from the plains who migrated particularly to San Joaquin Valley supplied various fruit and vegetables to the nations grocery stores, more than of the people were Mexicans, Filipinos, and white men workers before the Depression picked those crops, and during that time there seemed to have been more whites looking for harvest labor jobs and many of them traveling as families coming from Oklahoma, Texas, Kansas. These migrants came with great hope but were heading to a disappointment of work shortage and for low wages. Housing was difficult for them and it would be either in a tent camp or a shack. Migrants after the Great Depression ended, moved ba ck to their homeland while others remained settled in California, the economy improved dramatically because many of the migrants went off to fight in World War II, which caused the other migrants that were left, to take the better advantages to have job opportunities that had become more available. As a result, this made the migrants have a more suitable lifestyle. The economic and agricultural problem that had hit the most was in the southwest plain. There were little to no opportunities which made them alternatively to quit the area and leave. On the other hand, farmers who didnt want to abandon their farms completely, mostly the poor, went to go in search for employment at large plantations where cotton was being practiced. Their experience with cotton farming helped them to have jobs in these plantations. As more farming methods were beginning to be mechanized, the migrants way of picking cotton began to be old. This new procedure was not what the migrants were expecting. Many of these farmers thought to improve their lives but the amount of money they were getting paid made life even harder. From their earnings, they would have to buy day to day needs such as food for their family at very expensive shops causing them nowhere to live. Migrants wanted to settle down and own land but most of the land was either owned or run by large businesses and companies. Soon migrants lost hope of the desire to own land, so they migrated elsewhere in seek of other opportunities. Even though the migrants were trying to fit in, people would discriminate them in different ways, especially when they were looking for employment and were often referred to or nick named as Okies, and Arkies. A lot of the migrant farmers didnt seem to get or understand why they were called liked that, they were just some go od westerners who were just faced with a huge economic crisis beyond their control. As I said earlier, some of the areas which were majorly hit were Kansas, Oklahoma, and Texas. These regions that had come across large scale destruction were those who practiced farming the most. In brief the extreme drought and the Dust Bowl were only some of the reasons or factors that led this migration in fact the low cost of the agricultural products, and crop pest affected this migration as well. Additionally, most migrant farmers were being advised to even sell off their lands and this was because their lands would support them if sold, and sometimes they sold off their land at a very cheap price. Agricultural products ultimately started reducing in the market and shops. This caused an economic distress in the plains and surrounding counties and town as the change of depression steadily rose. Studies and findings have shown that during the Depression, the southwest region had a high rate of unemployment and residents were either jobless or didnt have a meaningful occupation. As compared to other states, the southwest owed very minimal amount of aid since their income was very low. Residents could not meet all the necessities for the southwest, these people suffered from the effects of unemployment and had a hard time in obtaining daily needs. They couldnt tolerate this situation anymore and decided to migrate to nearby urban towns where they settled in and built their shanties, which was what they called their home. It would stretch along a large area containing almost 2,500 people in it. Most of these people did some odd jobs in surrounding towns and it would include assistin g in the distribution of food aid. The settlement of the migrants in California had an impact in the economic development of the state, but this grew government concern. The government tried to identify ways of improving the state by creating more jobs. About 5 years later during the 1930s, the government took initiative by creating more factories and other employment jobs which helped raise gross domestic product of the state and most of these taxes came from the working population and not the wealthy. For the most part migrants that came to California were majorly rural based and couldnt easily match or afford the quality of life in a town and as the towns were recovering from the effects of the Depression the rate of unemployment was very high. All in all, migrant farmers and families had to adapt to the way of life in California as it was going to be their new homes and as time passed by most of them really adapted and life had to keep going.

Sunday, May 17, 2020

What Allahu Akbar Means

Although most often translated as God is great, Allahu Akbar is Arabic for God is greater or God is greatest. The phrase, known as takbir in Arabic, is expressive of a range of moods and occasions in the Islamic world, from displays of approval and happiness to entreaties or spiritual and at times propagandistic cheerleading during political rallies. Allahu Akbar is also spoken during salat, the five-times-daily prayer, and by muezzins as they chant the call to prayer from their minarets. Allahu Akbar in International News The phrase has been tainted by its usage, or rather misuse, by Islamist extremists, Salafists, and terrorists, including the 9/11 terrorists, several of whom carried copies of handwritten letters exhorting them to strike like champions who do not want to go back to this world. Shout, Allahu Akbar, because this strikes fear in the hearts of the nonbelievers. The phrase was also used with political undertones during Irans 1979 Islamic Revolution, as Iranians took to their roofs and shouted Allahu Akbar in defiance of the shahs regime. Iranians returned to the ritual in the aftermath of the fraudulent presidential election of June 2009. Common Misspellings: Allah Akbar

Saturday, May 16, 2020

Discussing The Conflict Between The Bush Administration...

Presidential Signing Statements When the President is presented with a bill to sign into law he has two choices under the Constitution. He can veto the law under Article I Section VII or faithfully execute the law under Article II Section III. Many political pundits believe that signing statements are illegal because they go against the presidential oath office. While others believe signing statements give the president more power, which goes against the system of checks and balances. Some members of Congress say that signing statements defeats the purpose of the law. In this paper I will discuss what signing statements are and what role they play in the different presidential administrations. I will then discuss the conflict between the Bush administration and Congress over signing statements. A presidential signing statements is a written comment issued by a President at the time of signing legislation (Woolley). When signing a bill to law, the President can write a comment about how he plans to authorize the bill. Many presidential sign statements are expressing the President’s opinion about the legislation. There are many types of signing statements that are controversial, because they can dictate which portions of a bill the president would not execute because it might infringe on the executive powers granted in the Constitution (Moyers). Before President Reagan, the Presidency had only ever issued 75 signing statements (Moyers). Presidential signingShow MoreRelatedAmerican Civil Rights Movement Essay15820 Words   |  64 Pagesmanagers a great deal of flexibility in determining their capital and governance structure, relying on the market for capital to create competition that will allow shareholders to choose the one they think is best. Individual ownership evolved over time into a variety of models of collective enterprise. In Darwinian terms, the corporate model has prevailed as the legal structure of choice in modern commerce because it was the fittest. Among the special attractions of the corporate form orRead MoreAlternative Dispute Resolution Mechanism21967 Words   |  88 Pages ACKNOWLEDGMENT This article is a contribution from UNESCO’s International Hydrological Programme to the World Water Assessment Programme. It was prepared within the framework of the joint UNESCO–Green Cross International project entitled â€Å"From Potential Conflict to Co-operation Potential (PCCP): Water for Peace,† and was made possible by the generous financial assistance of the Japanese government. CONTENTS Summary 1. Introduction and Overview 2. The ADR (Alternative Dispute Resolution) Spectrum 3.Read MoreFundamentals of Hrm263904 Words   |  1056 Pages262 Intrinsic versus Extrinsic Rewards 262 ETHICAL ISSUES IN HRM: Salary Negotiation and Discrimination 262 Financial versus Nonfinancial Rewards 263 Performance-Based versus Membership-Based Rewards 263 Compensation Administration 264 Government Influence on Compensation Administration 265 Fair Labor Standards Act 265 The Civil Rights and Equal Pay Acts 265 Linking Concepts to Practice: Discussion Questions 283 Developing Diagnostic and Analytical Skills 283 Case Application 11: Re-Thinking CompensationRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesAssociation TEMPLE UNIVERSITY PRESS PHILADELPHIA Temple University Press 1601 North Broad Street Philadelphia, Pennsylvania 19122 www.temple.edu/tempress Copyright  © 2010 by Temple University All rights reserved Published 2010 Library of Congress Cataloging-in-Publication Data Essays on twentieth century history / edited by Michael Peter Adas for the American Historical Association. p. cm.—(Critical perspectives on the past) Includes bibliographical references. ISBN 978-1-4399-0269-1Read MoreManagement Course: Mba−10 General Management215330 Words   |  862 PagesManagement, Fourth Edition I. Management 17 17 2. The Evolution of Management Thought Hughes−Ginnett−Curphy †¢ Leadership, Fifth Edition I. Leadership is a Process, Not a Position 51 51 70 1. Leadership is Everyone’s Business 2. Interaction between the Leader, the Followers the Situation Cohen †¢ Effective Behavior in Organizations, Seventh Edition 11. Leadership: Exerting Influence and Power 94 94 Text Palmer−Dunford−Akin †¢ Managing Organizational Change 2. Images of Managing Change Read MoreRastafarian79520 Words   |  319 Pagesoutside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above You must not circulate this book in any other binding or cover and you must impose this same condition on any acquirer Library of Congress Cataloging-in-Publication Data Edmonds, Ennis Barrington. Rastafari : from outcasts to culture bearers / Ennis Barrington Edmonds. p. cm. Includes bibliographical references and index. ISBN 0-19-513376-5 1. Rastafari movement. 2. Jamaica—ReligiousRead MoreContemporary Issues in Management Accounting211377 Words   |  846 PagesDepartment, Oxford University Press, at the address above You must not circulate this book in any other binding or cover and you must impose the same condition on any acquirer British Library Cataloguing in Publication Data Data available Library of Congress Cataloguing in Publication Data Data available Typeset by SPI Publisher Services, Pondicherry, India Printed in Great Britain on acid-free paper by Antony Rowe Ltd., Chippenham, Wiltshire ISBN 0–19–928335–4 978–0–19–928335–4 ISBN 0–19–928336–2 (PbkRead MoreMarketing and E-commerce Business65852 Words   |  264 Pagesmanufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed in initial caps or all caps. Library of Congress Cataloging-in-Publication Information Is Available 10 9 8 7 6 5 4 3 2 1 ISBN 10: 0-13-302444-X ISBN 13: 978-0-13-302444-9 P RE FA C E E-commerce. Business. Technology. Society. 10E provides you with an in-depth introduction to the field

Wednesday, May 6, 2020

The Cabot School District Strives to Meet the Educational...

Strategic Diversity Plan Outline Mission and Overview The Cabot School district is committed to educating all students to be responsible citizens who value learning, treat others with dignity and respect, and successfully adapt to the demands of a rapidly changing society. The Cabot School District strives to meet the needs of â€Å"Every Child, Every Classroom, and Every Day†. The Cabot School District is committed to meeting the needs of all students not only academically but also socially and culturally by creating an atmosphere that embraces diversity and provides students with meaningful diversified and multicultural educational opportunities. The goals and objectives set forth in this strategic planned are aimed at providing a†¦show more content†¦The limited diversified make-up of the Cabot Public Schools current enrollment makes interacting with a diversified student body a challenge. To acquire and understanding of diversity, the curriculum implemented in the classrooms must provide stud ents with the opportunity to gain insight in to other cultures, lifestyles and backgrounds. II. Where do we need to be in the future? Due to the large Caucasian community that resides in Cabot, it is essential for the school district to provide opportunities for students to be exposed to diversity. Although a school district cannot change its population make-up, it can provide opportunities to its students that teach diversity, tolerance, dignity and respect. Students must realize that, although their every day encounters with students during their school years are limited in regards to diversity, the world that awaits them when they graduate is composed of people of different races, ethnicities, socioeconomic backgrounds, etc. It is essential that the Cabot School District provide not only a sound academic foundation for students but a highly, diversified cultural foundation, as well. III. How do we get there? The Cabot School District must look to provide resources, experiences and a curriculum that allow students the opportunity to understand, experience and embrace diversity. The district must provide experiences that allow students to see outside of their community and more of a worldwide,

Critically Examine How a ‘Sector Matrix’ Framework Is...

Critically examine how a ‘sector matrix’ framework is useful for analysing demand and supply linkages. Use two contrasting examples. From Industry Value Chain to Sector Matrix Introduction Deviating from the industry value chain first introduced by Porter (1985) and later adapted by Gereffi (1996), a fairly recent alternative has been established by Froud, Haslam, Johal amp; Williams (1998) called the ‘sector matrix’. Until about a decade ago competitive focus was on the production process, the steps taken to develop a product being the ‘primary’ activities and company strategies outlined as ‘support’ activities. With continually increasing complexity within corporations, new and more innovative means of analysis are required. A†¦show more content†¦One will see differences in value chains of firms within the same industry sometimes, as the variance from company to company depends on differences in strategic approach and whether or not the firms have the same breed of vertical supply linkages. Analysis, being constrained by the aspects mentioned above, means the strategic options of a company are limited. Additionall y, the value chain can only provide valid analyses to firms which operate within a single industry, defined by common technology (Haslam et al, 2000) (see Figure 1, p. 1). Further, if the company at hand is pertinent to this form of analysis, only the processes from acquiring any raw material to finished manufacture are involved. Sector Matrix The matrix Froud et al introduced in response to these short chains is a more complex system which adapts to more intricate networks of manufacturing and production. This new scheme succeeds Gereffi’s studies on global commodity chains, which contributed to the initial development of additional chain analysis types but still followed an overly simple linear concept (Froud et al, 1998). Sector matrix focuses specifically on the extension of linear production chains. In developing a sector matrix, Froud et al â€Å"choose to start from demand,† and they believe â€Å"it is logical to suggest, therefore, that the limits of the sector should be defined by patterns ofShow MoreRelatedCritically Examine How Useful the ‘Sector Matrix’ Framework Is2117 Words   |  9 PagesCritically examine how useful the ‘sector matrix’ framework is for analysing demand and supply linkages in all industries. Use two contrasting examples In recent years several frameworks have been developed for analyzing product markets and competitive advantages of companies. Many academic authors have tried to explain what gives competitive advantage in certain industries and how companies inside these industries should restructure in order to achieve greater profitability. This essay isRead MoreAN EMPIRICAL ANALYSIS OF ENVIRONMENTAL IMPACT OF FOREIGN DIRECT INVESTMENT IN THE MINING SECTOR IN NIGERIA15805 Words   |  64 Pagesï » ¿ABSTRACT This study attempted to estimate the environmental impact of Foreign Direct Investment in the mining sector in Nigeria. It is argued that only those countries that have reached a certain income level can absorb new technologies and benefit from technology diffusion, and thus reap the extra advantages that FDI can offer. The mining industry in Nigeria is dominated by oil. Indeed, Nigeria is the largest producer of this commodity in Africa and sixth largest producers in the world. This researchRead MoreCase Study148348 Words   |  594 PagesEvolution and Revolution in the Hi-Fi Sector Amazon.com ï £ ©2007 - Early 2009 The Formula 1 Constructors Web Reservations International: Challenging Industry Norms Manchester United FC: Continuing Success but at What Cost? Hermes Fund Management, Total and Premier Oil: The Responsibility and Accountability of Business From Small Town Pharmacy to a Multinational Corporation: Pierre Fabre, Culture as a Competitive Advantage Cordia LLP: Service Ref orm in the Public Sector 170 175 180 183 193 196 201 207 213Read MoreLearning from the Fashion Industry: a Structured Literature Review39302 Words   |  158 PagesCRANFIELD UNIVERSITY ELEFTHERIA DIMITRAKOU LEARNING FROM THE FASHION INDUSTRY: A STRUCTURED LITERATURE REVIEW CRANFIELD CENTRE FOR LOGISTICS SUPPLY CHAIN MANAGEMENT MSc THESIS CRANFIELD UNIVERSITY CRANFIELD SCHOOL OF MANAGEMENT CRANFIELD CENTRE FOR LOGISTICS SUPPLY CHAIN MANAGEMENT MSc THESIS Academic Year 2006-2007 ELEFTHERIA DIMITRAKOU Learning from the Fashion Industry: A Structured Literature Review Supervisor: Dr. Chris Morgan August 2007 This thesis isRead MoreMba Outline16812 Words   |  68 Pagesstudents with an overview of how accounting data is used in making business decisions. The subject covers a broad range of topics including the regulatory framework of accounting, preparation and analysis of financial statements, investment analysis and ethics in accounting. It provides students with basic skills, knowledge and attitudes that enable them to process financial data, to analyse and interpret accounting reports, and to present the results within an ethical framework, to financial decisionRead MoreStrategic Marketing Management337596 Words   |  1351 Pagesproductivity The use of ratios Analysing ratios and trends Ratios and interfirm comparison vi CONTENTS 3.13 3.14 A strategic approach Summary 112 116 117 119 119 120 128 136 139 149 153 159 165 167 169 169 170 174 182 188 192 202 214 215 221 223 223 230 236 241 246 248 250 251 255 261 4 Market and environmental analysis 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8 4.9 4.10 Learning objectives Introduction: the changing business environment (or the new marketing reality) Analysing the environment The natureRead MoreStrategic Human Resource Management72324 Words   |  290 PagesIntroduction What is Strategy? What is Strategic HRM? How is Strategic HRM Different from Other Aspects of HRM? How Does Research Show that Strategic HRM Adds Value to an Organisation? How Does Strategic HRM Support the Management of Change? Who Holds the Responsibility for Strategic HRM? When is it Appropriate to Create a Dedicated HR Function? Vertical Integration and Human Resources Strategy Introduction What are the Benefits of Vertical Integration? How do we Promote the Vertical Integration of Our HRRead MoreMarketing Management130471 Words   |  522 Pagesto customers and for managing customer relationships in ways that benefit the organization and its stakeholders. Hence it can be surmised that marketing is basically meeting unmet needs for target markets, identifying those unmet needs and planning how to meet them through products, services, and ideas. Communicating the value to them along with pricing which is affordable and profitable and also distributing the products so that customers have appropriate accessibility and have quick and easy deliveryRead MoreSales and Marketing for Financial Institutions80443 Words   |  322 PagesAcquiring customers Making the most of channels Managing customer relationships Legal compliance and ethics in marketing and sales The bottom line — measuring the effectiveness of marketing and sales Introduction Subject aims In a competitive, demand-driven financial services environment, an understanding of sales and marketing is crucial to success. This subject provides an understanding of the key elements of sales and marketing, with a focus on market evaluation, strategy, customer acquisitionRead MoreOrganisational Theory230255 Words   |  922 PagesOrganizational Theory takes you on a joyful ride through the developments of one of the great enigmas of our time – How should we understand the organization? Jan Ole Similà ¤, Assistant Professor, Nord-Trà ¸ndelag University College, Norway I really enjoyed this new text and I am sure my students will enjoy it, too. It combines rigorous theoretical argument with application and consideration of how managment practice is formed and shaped by ideas and concepts. The authors have brought their wealth of experience

Internet Usage Policy of an Organization-Free-Sample for Students

Question: Discuss about the usage and the limitations of Internet Usage Policy of a particular Organization. Answer: Introduction Security policies are set of instructions or rather can be referred to as rules of a particular organization that help the employees to understand the basic constraints of an employee. Internet Usage Policy is the policy that describes about the guidelines and rules of the suitable utilization of the organizations network, equipment, andaccess to internet (Wall, Palvia and Lowry 2013). The Internet Usage Policyis the chief certificate that is signed by all staff members and employees before starting their work in the organization. Violation of these policy norms can end the employee or staff member in prison or he can be penalized. The report outlines the usage and the limitations of Internet Usage Policy of a particular organization. This report clearly defines about the guidelines and the rules of the Internet Usage Policy. It also covers a brief overview, the purpose and the scope of this particular policy. The report also specifies the penalty and the legal actions that are to be taken if there is any kind of violation in the policy. The policy mentions the authorized and the prohibited users. The report also emphasizes on the confidentiality of the information of this Internet Usage Policy. The description of the discussion is given in the following paragraphs. Discussion Security Policy Security policycan be defined as the set of norms or guidelines, which state the security of information or data for a system, company or organization. This policy helps the employees of the organization to understand the rules of the organization and so that there is no violation of rules for the policy (Cheng et al. 2013). For a particular organization, the security policy addresses the limitations or constraints on the conduct of its employees and members as well as limitations inflicted on competitors or challengers by different mechanisms such as locks, keys, doors, and walls (Pieters, Dimkov and Pavlovic 2013). However, the security policy for systems is slight different. In systems, the policy addresses restrictions on functions and move among the functions, limitations on ingress by external competitors, adversaries and systems including access to data and programs by authorized people. There are many systematic strategies of risk assessment and various methodologies to ensur e the comprehensiveness of the security policies and reassure that the policies are completely imposed (Wall, Palvia and Lowry 2013). In various complex systems, such asinformation systems, security policies can be degraded into several sub-policies to facilitate the allotment of security mechanisms to prosecute sub-policies. Internet Usage Policy Internet Usage Policy defines the access and the restrictions of internet in an organization. All employees of that organization follow this policy (Orr, Ptacek and Song 2012). The Internet Usage Policy is applicable to all Internet users, which mean individuals working for the organization that include permanent part-time and full-time employees, business partners, vendors, temporary agency workers and contract workers, who utilizes the Internet through the networking or computing resources (Sommestad et al. 2014). The organization's Internet users are presumed to be well known with and to comply with this internet usage policy, and are needed to exercise good judgment and use their common sense while using the Internet services. Internet is to be accessed for only business purposes. The following Internet services are to be accessed. a) E-mail: Receive or send emails from the Internet that would be with or without attachments. b) File Transfer Protocol (FTP): Sending files or information and receiving incoming data and files, as required for organizational c) Navigation: Employees will get complete access to the Internet and restricted access from the Internet (Sommestad et al. 2014). Management retains the authority to add or remove services as organization needs change and alterations. Internet Access The employee is required to read the Internet usage Policy. He/she will then sign the statement that he or she agrees to comply with the policy. The user does not have any other option except to sign this policy (Choyi and Vinokurov 2012). The employee is granted policy acknowledgement and awareness. After he requests for the internet access, by submitting an IT Access Request form along with an attached copy of a signed Internet Usage Coverage Acknowledgement Form, he will get the access from the IT department. Internet access will be stopped upon completion of contract, resignation of employee, termination of service of non-employee, or legal action arising from violating this policy (Safa, Von Solms and Furnell 2016). All users are given certain ID for their internet access and when they stop working, their IDs are taken back. Utilizing the companys Internet will be supported and given only if practicable business requirements are recognized (Berger 2014). Internet access will be allowed on the basis of the current job responsibilities of a staff member. When an employee shifts to any other business unit or changes his job functions, a new request for Internet access must be submitted to IT department within 5 days (Vance and Siponen 2012.). The requirements will be reviewed on a monthly basis by the organization. Allowed Usage Internet usage is given for the purpose of doing business activities and to carry out the job functions (Cheng et al. 2013). All employees must follow the principles of the organization regarding usage of Internet. The access of Internet can include: Communication between the employees for business purposes; Downloading software patches and upgrades; Viewing possible websites for the product information; For technical information. Personal Usage The employees do not have the right to use the companys Internet for their personal reasons. However, if the reason is genuine, the employee can take permission from the authority and access the Internet (Orr, Ptacek and Song 2012). Users, who opt to transmit or store their personal information such as credit card numbers, private keys, or any confidential access, do so at their own risk. The organization is not responsible for any kind of breaching or loss of information. Prohibited Usage The employees are not allowed to access any illegal web sites and access data from those web sites (Bayuk et al. 2012). Storage, acquisition and usage of information that is not legal, or that negatively protrays sex, race or creed is highly prohibited. The organization also stops the behavior of a political activity that is engaging in fraudulent activities, and in any structure of intelligence collection from the provisions. Other activities are strictly prohibited. The activities include: Access of company information which is not within the opportunity of an individuals work (Berger 2014). This includes unauthorized access of personnel file information, reading of customer account information, and accessing information, which is not needed for the proper completion of job functions. Disclosing or misusing without perfect permission, and changing customer information. This includes making unauthorized alterations to a file or sharing personnel data with unauthorized users (Choyi and Vinokurov 2012). Any behavior that would encourage a criminal offense, or violate any regulations, state, national or international, local law. Transmission, use, voluntary or duplication receipt of material that infringes on the trademarks, copyrights or patent rights of any organization or person. Transmission, use of any confidential or sensitive information without any proper controls. Transmission, creation, posting or voluntary receipt of any threatening, offensive, unlawful, harassing material, including comments that are based on national origin, race, sex, age, religion, political beliefs or disability (Orr, Ptacek and Song 2012). Any type of gambling. Downloading of any unauthorized programs for utilization without permission from the IT Department (Pieters, Dimkov and Pavlovic 2013). Ordering or shopping of goods on the Internet. Accessing of any games. The above-mentioned activities are strictly prohibited as per the Internet Usage Policy of an organization. The employees should make sensible efforts to use the internet in ways that do not affect other employees (Banuri et al. 2012). Specific departments should set regulations on resource allocation and bandwidth use, and should ban downloading of particular file types. Software License The organization strongly supports strictness to software vendors license agreements. When at work, or when company computing or networking resources are employed, copying of software in a manner that is not consistent with the vendors license is strictly prohibited (Ifinedo 2012). Similarly, production of materials that are available over the Internet must be done only with the written permission of the owner or author of the document. Permission is necessary if the user is wanting to make copies of contents that already exists. Copies of materials can be anything including journals, magazines, books, newsletters or other online documents (Neisse, Steri and Baldini 2014). Using organizations computer resources to access the Internet for personal purposes, without the approval from the IT department and the users manager, will be considered cause for legal action including and up to termination. The employees who choose to transmit or store their personal information for example the passwords, credit or debit card numbers, private keys, encrypted certificates will do so at their own risk (Knapp and Ferrante 2012). This can be quite risky as there is always a chance of hacking in Internet that is accessed by many people. The employees should be careful about their privacy and confidentiality. Review of Public Information All the directories that are publicly written on Internet-connected computers will be cleared and reviewed each month end. This process is required to stop the anonymous exchange of data that are inconsistent with company business (Gouglidis, Mavridis and Hu 2014). Examples of public information that are unauthorized include use of credit and debit cards, pirated information, and passwords. Privacy of the users personal information and data are expected to be secured. These are secured through various functions like monitoring, confidentiality of emails and maintaining a corporate image (Vance and Siponen 2012.). Monitoring The IT department should periodically monitor the internet activities so that the users should be aware of their access and they try to limit their illegal usage and activities (Vance and Siponen 2012.). Management should have the right to check and evaluate the personal file directories, emails, web access and all other information, which are stored on the company computers, at any time without any kind of notice (Ifinedo 2012). This examination and evaluation assures compliance with internet usage policy and the employees are afraid to do any illegal work in office premises. This monitoring will even help the other employees to feel safe and secure. E-mail Confidentiality Confidentiality of personal mails or emails is another major function to secure the privacy of personal and official information. The employees should be aware that a clean text email is not a secured mode of communication (Banuri et al. 2012). There is a chance of hacking in such cases. The organization will not guarantee that electronic communications will be private. The users should be aware that the electronic communications could be intercepted, printed, forwarded, and stored by others. The users should also be aware that once an email is transmitted it might be changed (Orr, Ptacek and Song 2012). Removing an email from an employee workstation will not delete it from the different systems across which the email has been transmitted. Maintaining Corporate Image While using the company resources to use and access the Internet, the users should realize that they represent their company (Bayuk et al. 2012). Whenever the employees state an affiliation to the organization, they must also clearly reflect that the opinions are expressed from their own and not necessarily those of their company. The users should not keep company material for example documentation, press releases, internal memos, and product or usage information on any public news group, mailing list or such service (Gouglidis, Mavridis and Hu 2014). Any posting of materials must be approved by the employees manager and the information technology department and will be kept by an authorized person. All the business units and individuals wishing to develop a WWW home page or site should first develop implementation, business, and maintenance plans (Neisse, Steri and Baldini 2014). Official permission should be acquired through the IT Department. This will maintain publishing and content standards needed to ensure appropriateness ad consistency. Moreover, contents of the material that are made available to the public through the Internet should be formally reviewed and supported before being published (Knapp and Ferrante 2012). All material should be to the Corporate Manager for initial approval to continue. Conclusion Therefore, from the above discussion, it can concluded that security policies are extremely important for all organization. Such policies keep the confidentiality and the authenticity of the company. The report focuses on the Internet Usage policy. This policy defines about the utilization and the limitations of access to internet in an organization. This policy is maintained by all employees. The internet usage policy has some instructions or rules for the employees so that they do not cross their limits while using office internet. The above report points out a set of guidelines that are to be followed by the employees of all organization regarding internet. This policy is extremely beneficial and helpful to mitigate or reduce cyber crime and unnecessary usage of companys internet References Banuri, H., Alam, M., Khan, S., Manzoor, J., Ali, B., Khan, Y., Yaseen, M., Tahir, M.N., Ali, T., Alam, Q. and Zhang, X., 2012. An Android runtime security policy enforcement framework.Personal and Ubiquitous Computing,16(6), pp.631-641. Bayuk, J.L., Healey, J., Rohmeyer, P., Sachs, M.H., Schmidt, J. and Weiss, J., 2012.Cyber security policy guidebook. John Wiley Sons. Berger, T.U., 2014. Norms, Identity, and National Security.Security Studies: A Reader. Cheng, L., Li, Y., Li, W., Holm, E. and Zhai, Q., 2013. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory.Computers Security,39, pp.447-459. Choyi, V.K. and Vinokurov, D., Alcatel Lucent, 2012.System and method of network access security policy management for multimodal device. U.S. Patent 8,191,106. Gouglidis, A., Mavridis, I. and Hu, V.C., 2014. Security policy verification for multi-domains in cloud systems.International Journal of Information Security,13(2), pp.97-111. Ifinedo, P., 2012. Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory.Computers Security,31(1), pp.83-95. Knapp, K.J. and Ferrante, C.J., 2012. Policy awareness, enforcement and maintenance: Critical to information security effectiveness in organizations.Journal of Management Policy and Practice,13(5), p.66. Neisse, R., Steri, G. and Baldini, G., 2014, October. Enforcement of security policy rules for the internet of things. InWireless and Mobile Computing, Networking and Communications (WiMob), 2014 IEEE 10th International Conference on(pp. 165-172). IEEE. Orr, D.B., Ptacek, T.H. and Song, D.J., Arbor Networks, Inc., 2012.Method and system for authentication event security policy generation. U.S. Patent 8,146,160. Ouedraogo, W.F., Biennier, F. and Ghodous, P., 2012, April. Adaptive Security Policy Model to Deploy Business Process in Cloud Infrastructure. InCLOSER(pp. 287-290). Pieters, W., Dimkov, T. and Pavlovic, D., 2013. Security policy alignment: A formal approach.IEEE Systems Journal,7(2), pp.275-287. Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model in organizations.computers security,56, pp.70-82. Sommestad, T., Hallberg, J., Lundholm, K. and Bengtsson, J., 2014. Variables influencing information security policy compliance: a systematic review of quantitative studies.Information Management Computer Security,22(1), pp.42-75. Vance, A. and Siponen, M.T., 2012. IS security policy violations: a rational choice perspective.Journal of Organizational and End User Computing (JOEUC),24(1), pp.21-41. Wall, J.D., Palvia, P. and Lowry, P.B., 2013. Control-related motivations and information security policy compliance: The role of autonomy and efficacy.Journal of Information Privacy and Security,9(4), pp.52-79

Tuesday, May 5, 2020

Database Implementation and Queries

Questions: A. Understanding and Implementation of the DatabaseUsing the supplied schema file, create the database for CQR. The supplied file populates all tables to reflect the content of the artefacts provided in Assignment 1 and is a cut-down version of the practice at the close of business on 15th September 2014. . At this stage, you are to imagine what the state of the database would be at the close of business on the next day, subject to the requirements of this task, and all subsequent tasks.Write queries to find out the following: Find the unused structures e.g. there is one Superannuation client but no Partnership clients on the starter database. Find the unused sectors; Find the unrequested services; Find the unused billing cost types; Find domains for which there is none or only one current employee with that expertise; Find the minimum billing rate for each employee type for the most recent billing rate effective date;B. Test DataThis task will only be completed after you have finish ed this and all subsequent tasks. You should create a single script satisfy this sections requirements; satisfy the specific scenarios outlined below in section C; and where necessary provide meaningful data for the SQL queries specified in sectionD.Queries that are correct and do not produce output using your test data will lose 50% of the marks allocated so you should carefully check your test data and ensure it thoroughly validates your SQL queries. For example if a query asks to display the full details for all CLIENTS who have a TAS or a NT address then at least two rows are expected to be displayed. If the data provided in the supplied schema file does not do this you need to work out a way of doing that and include in your script file.There should be comments in the script to explain what is being done and to identify what parts of the assignment are being covered. The script should contain a single COMMIT statement as the last line of the script, i.e. all inserts should be treated as a single transaction. The data should be structured in such a way that once it has been inserted and the "commit" SQL command has been run, the database is in a consistent state.Specifically for this section, and using the information obtained from the previous section, you should add as a minimum: Three new clients. These clients should:o have a structure that has not been used yet;o operate in sectors that have not been used yet (but may include existing ones if they operate in more than one);o require services that have not been requested yet (but may include existing ones);o have one unique billing on cost type charged to them for the day; Two new employees one Accountant and one Administrator. They need to:o at least work in domains for which there is none or only one current employee with that expertise;o Have a billing rate the same as that of the same employee type with the minimum rate for that employee;C. Specific Scenarios Manipulate the DatabaseIn the follow ing section, the SQL scripts must correctly manage transactions. You should also ensure that any related data impacted by your script actions are correctly managed.1. A new accountant is to be added (assume it has not been updated from the HR system). His name is Matthias Window. He has expertise in Taxation and Corporate affairs and will be charged out at a rate of $160.00 per hour from today (16th September 2014).Include this new employee and his details on the CQR database. Assume that the employee number for this new employee is 1 more than the largest employee in the BILLINGEMPLOYEE table.2. His first work is to give some tax advice to an existing client who he thinks is Bill Wilson. He spends an hour from 8:30 doing so but cant find the service type code so creates a new one for donations and uses that. He then moves on to some research for half an hour for an existing client Richard Smith. In both cases he forgets to key in an end time.Include the details of this sequence of billing in the database.3. At 10:00 Matthias realises he actually worked for Bill Watson initially not Bill Wilson, that he should have used the communication code for that work and that he should have completed the times correctly.Include the details of these corrections in the database.4. Matthias is then tasked with completing a corporate return for 2 Boys Plumbing Pty. Ltd. He gets the time wrong and keys in 9:30am and spends 2 hours completing the return, updating the completion time to 11:30 when he is finished. As part of the process he raises an on-cost record for the lodgement fee ($110.00) for the return.Include the above changes in the database.5. Alan Counting reduces Matthias Windows billing rate by 25%.D. Querying of Database using SQL Statements1. Display the full details for all clients - the name details (firstname and lastname) should be shown in one column called 'Client Name' and the address details (street1, street2, city, state and postcode) in one column calle d Client Address'.2. Display the full details for all clients who have a TAS or a NT address.3. Display the full details for all service types in the CQR service type table which have the word 'advice' (upper or lowercase) in any of their columns. 4. Alan is considering what the effect of increasing the billing rate on all employees by 5% would be. Display the employee number, name, effective date and increased billing rate of all employees in CQR. 5. Display the full details for the cheapest billing employee provided by CQR. 6. Display the details of all clients for whom no billing on cost records exist for the current year (2014). Display in client concatenated firstname, lastname order. 7. Provide the total number of employees, total billing rate, average billing rate for the practice.8. Calculate the total charges, excluding on-costs per client for the month of September 2014.9. Display the employee number, client number, service ID and billingstarttime for service types of Advi ce or Communication type where the actual charge on any billing record is cheaper than $150 and the time duration is between 15 and 30 minutes. Order the list such that the billingrecords which are least expensive are listed first.10. For all clients currently in the CQR system, display details about the clients and those with sector records and those without sector records: for each client with sectors: display the string 'With sectors', the client number, client first name concatenated with the client last name, and the total number of sectors the client is involved in, and for each client without sector records: display the string 'Without sectors', the client number, client first name concatenated with the client last name, and the total number of sectors as a string of Not applicable.11. Display details of all employees (number, name) for whom billingrecords have been created when they are not identified as having that expertise i.e. those employees who have charged to a servic e that they do not have a domain record for. (2 marks)12. Select employee number and the distinct service from the billingrecords where any record for that service took in excess of 1 hour to complete. You should only display one employee number, service and description combination even when multiple records qualify.13. Display the structure details for which the smallest total billable activity (time) has been performed in the last month (17-08-2014 to 16-09-2014)14. Report the average number of billing records per employee per day. Answers: A. Understanding and Implementation of the Database Find the unused structures e.g. there is one Superannuation client but no Partnership clients on the starter database Query: SELECT * FROM structure WHERE StructureID NOT IN (SELECT StructureID FROM client); Find the unused sectors Query: SELECT * FROM Sector WHERE SectorID NOT IN (SELECT SectorID FROM ClientSector); Find the unrequested services Query: SELECT * FROM Service WHERE ServiceID NOT IN (SELECT ServiceID FROM ClientService); Find the unused billing cost types Query: SELECT * FROM BillingOnCostType WHERE BillingOnCostTypeID NOT IN (SELECT BillingOnCostTypeID FROM BillingOnCost); Find domains for which there is none or only one current employee with that expertise Query: SELECT * FROM Service WHERE ServiceID IN (SELECT ServiceID FROM EmployeeDomain WHERE EmployeeNumber IN (SELECT EmployeeNumber FROM EmployeeDomain GROUP BY EmployeeNumber HAVING COUNT(*)=0 OR COUNT(*)=1)); Find the minimum billing rate for each employee type for the most recent billing rate effective date Query: SELECT et.EmployeeType,ber.BillingRateEffectiveDate,MIN(ber.BillingRate) AS MinBillingRate FROM BillingEmployeeRate ber,Billing Employee be,EmployeeType et WHERE ber.EmployeeNumber=be.EmployeeNumber AND be.EmployeeType=et.EmployeeType GROUP BY et.EmployeeType,ber.BillingRateEffectiveDate order by ber.BillingRateEffectiveDate DESC limit 4; B. Test Data: INSERT INTO Client (ClientFirstName,ClientLastName, ClientStreet1, ClientStreet2,ClientCity,ClientState,ClientPostcode, ClientContact, ClientContactPhone,ClientTFN,ClientABN,ClientAddDate,StructureID, ClientLink) VALUES ('John','Smith','24, TT Ct','', 'Ararat','NT',3300,'Henry Micheal','09494038585','98494398438','949934892874','2015-01-01',1,168750); INSERT INTO Client (ClientFirstName,ClientLastName, ClientStreet1, ClientStreet2,ClientCity,ClientState,ClientPostcode, ClientContact, ClientContactPhone,ClientTFN,ClientABN,ClientAddDate,StructureID, ClientLink) VALUES ('Andrew','William','72, TT Ct','81 RR Ct','Gosfort','TAS',3302,'Nitin','4737445745','984324634634','9499342637565','2015-01-06',4,null); INSERT INTO Client (Client First Name, Client Last Name, ClientStreet1, ClientStreet2,ClientCity,ClientState,ClientPostcode, ClientContact, ClientContactPhone,ClientTFN,ClientABN,ClientAddDate,StructureID, ClientLink) VALUES ('Stephen','Oliver','90, MM Street','120 PP Ct','Morwell','NSW',4200,'Peter','834838403489','98438958934','773273459873','2015-01-12',7,124545); INSERT INTO ClientSector(ClientNumber,SectorID) VALUES ('168754',4); INSERT INTO ClientSector(ClientNumber,SectorID) VALUES ('168759',9); INSERT INTO ClientSector(ClientNumber,SectorID) VALUES ('168754',7); INSERT INTO ClientSector(ClientNumber,SectorID) VALUES ('16854',5); INSERT INTO ClientService (ClientNumber,ServiceID) VALUES (168754,'ADM'); INSERT INTO ClientService (ClientNumber,ServiceID) VALUES (168755,'CRP'); INSERT INTO ClientService (ClientNumber,ServiceID) VALUES (168756,'RCV'); INSERT INTO ClientService (ClientNumber,ServiceID) VALUES (145968,'AUD'); INSERT INTO ClientService (ClientNumber,ServiceID) VALUES (168750,'LIQ'); INSERT INTO ClientService (ClientNumber,ServiceID) VALUES (168752,'MGT'); INSERT INTO BillingOnCost (ClientNumber, BillingOnCostDate,BillingOnCostTypeID, BillingOnCostCharge) VALUES (168754,'2015-02-01',1,30); INSERT INTO BillingOnCost (ClientNumber, BillingOnCostDate,BillingOnCostTypeID, BillingOnCostCharge) VALUES (168755,'2015-01-25',3,60); INSERT INTO BillingOnCost (ClientNumber, BillingOnCostDate,BillingOnCostTypeID, BillingOnCostCharge) VALUES (168756,'2015-01-27',2,8); INSERT INTO BillingEmployee (EmployeeNumber,EmployeeName,EmployeeType) VALUES (102678,'George Queen',1); INSERT INTO BillingEmployee (EmployeeNumber,EmployeeName,EmployeeType) VALUES (102679,'Francis Peter',2); INSERT INTO EmployeeDomain (EmployeeNumber,ServiceID) VALUES (102677,'LIQ'); INSERT INTO BillingEmployeeRate(EmployeeNumber,BillingRateEffectiveDate,BillingRate) VALUES (102677,'2015-01-20',45); INSERT INTO BillingEmployeeRate(EmployeeNumber,BillingRateEffectiveDate,BillingRate) VALUES (102678,'2015-01-27',60); C. Manipulate the Database A new accountant is to be added (assume it has not been updated from the HR system). His name is Matthias Window. He has expertise in Taxation and Corporate affairs and will be charged out at a rate of $160.00 per hour from today (16th September 2014). Include this new employee and his details on the CQR database. Assume that the employee number for this new employee is 1 more than the largest employee in the BILLINGEMPLOYEE table. INSERT INTO BillingEmployee (EmployeeNumber,EmployeeName,EmployeeType) VALUES (102680,'Matthias Window',1); INSERT INTO BillingEmployeeRate(EmployeeNumber,BillingRateEffectiveDate,BillingRate) VALUES (102680,'2014-09-16',160); INSERT INTO EmployeeDomain (EmployeeNumber,ServiceID) VALUES (102680,'TAX'); INSERT INTO EmployeeDomain (EmployeeNumber,ServiceID) VALUES (102680,'CRP'); His first work is to give some tax advice to an existing client who he thinks is Bill Wilson. He spends an hour from 8:30 doing so but cant find the service type code so creates a new one for donations and uses that. He then moves on to some research for half an hour for an existing client Richard Smith. In both cases he forgets to key in an end time. Include the details of this sequence of billing in the database. INSERT INTO ServiceType (ServiceTypeID,ServiceTypeDescription,ServiceTypeNote) VALUES ('DONA','Donation','New Donation Scheme'); INSERT INTO BillingRecord (EmployeeNumber,BillingDate,ClientNumber,BillingStartTime,ServiceID,ServiceTypeID,BillingComment) VALUES (102680,'2014-09-16',168750,'08:30:00','TAX','DONA','New Plan'); INSERT INTO BillingRecord (EmployeeNumber,BillingDate,ClientNumber,BillingStartTime,ServiceID,ServiceTypeID,BillingComment) VALUES (102680,'2014-09-16',124545,'08:30:00','TAX','RSCH','Tax research'); At 10:00 Matthias realises he actually worked for Bill Watson initially not Bill Wilson, that he should have used the communication code for that work and that he should have completed the times correctly. Include the details of these corrections in the database. UPDATE CLIENT SET CLIENTLASTNAME='Watson' WHERE ClientNumber=168750; INSERT INTO BillingRecord (EmployeeNumber,BillingDate,ClientNumber,BillingStartTime,ServiceID,ServiceTypeID,BillingComment,BillingEndTime) VALUES (102680,'2014-09-16',168750,'10:00:00','TAX','COMM','Communications','11:00:00'); INSERT INTO BillingRecord (EmployeeNumber,BillingDate,ClientNumber,BillingStartTime,ServiceID,ServiceTypeID,BillingComment,BillingEndTime) VALUES (102678,'2014-09-16',168750,'06:00:00','TAX','COMM','Communications','06:20:00'); Matthias is then tasked with completing a corporate return for 2 Boys Plumbing Pty. Ltd. He gets the time wrong and keys in 9:30am and spends 2 hours completing the return, updating the completion time to 11:30 when he is finished. As part of the process he raises an on-cost record for the lodgement fee ($110.00) for the return. Include the above changes in the database. INSERT INTO BillingRecord (EmployeeNumber,BillingDate,ClientNumber,BillingStartTime,ServiceID,ServiceTypeID,BillingComment) VALUES (102680,'2014-09-16',168752,'09:30:00','CRP','MTNG','Communications') UPDATE BillingRecord SET BillingEndTime='11:30:00' WHERE EmployeeNumber=102680 AND BillingDate='2014-09-16' AND ClientNumber=168752; INSERT BillingOnCost (ClientNumber,BillingOnCostDate,BillingOnCostTypeID,BillingOnCostCharge) VALUES (168752,'2014-09-16',1,110); INSERT BillingEmployeeRate (EmployeeNumber,BillingRateEffectiveDate,BillingRate) VALUES ((SELECT EmployeeNumber FROM BillingEmployee WHERE EmployeeName='Alan Counting'),'2014-09-16',200*0.75); D. Querying of Database using SQL Statements 1. Display the full details for all clients - the name details (firstname and lastname) should be shown in one column called 'Client Name' and the address details (street1, street2, city, state and postcode) in one column called Client Address'. SELECT CONCAT(ClientFirstName , ' ' , ClientLastName) AS "Client Name", CONCAT(ClientStreet1,', ',IFNULL(ClientStreet2,''),', ',ClientCity,', ' ,ClientState,', ',ClientPostCode) AS "ClientAddress" FROM Client; 2. Display the full details for all clients who have a TAS or a NT address. SELECT * FROM Client WHERE ClientState='NT' OR ClientState='TAS'; 3. Display the full details for all service types in the CQR service type table which have the word 'advice' (upper or lowercase) in any of their columns SELECT * FROM ServiceType WHERE LOWER(ServiceTypeDescription) LIKE '%advice%' OR LOWER(ServiceTypeNote) LIKE '%advice%'; 4. Alan is considering what the effect of increasing the billing rate on all employees by 5% would be. Display the employee number, name, effective date and increased billing rate of all employees in CQR. SELECT be.EmployeeNumber,be.EmployeeName,CURDATE() AS "Latest Effective Date",ber.BillingRate*1.05 AS "Increasing the BillingRate" FROM BillingEmployee be, BillingEmployeeRate ber , (SELECT EmployeeNumber, MAX(BillingRateEffectiveDate) AS LatestBillDate FROM BillingEmployeeRate GROUP BY EmployeeNumber) mbe WHERE be.EmployeeNumber=ber.EmployeeNumber AND (be.EmployeeNumber=mbe.EmployeeNumber AND ber.BillingRateEffectiveDate=mbe.LatestBillDate); 5. Display the full details for the cheapest billing employee provided by CQR. SELECT emp.EmployeeNumber,emp.EmployeeName,emp.employeeType FROM BillingEmployee emp, (SELECT EmployeeNumber, MAX(BillingRateEffectiveDate) AS LatestBillDate,BillingRate FROM BillingEmployeeRate GROUP BY EmployeeNumber ORDER BY BillingRate LIMIT 1) ne WHERE emp.EmployeeNumber=ne.EmployeeNumber; 6. Display the details of all clients for whom no billing on cost records exist for the current year (2014). Display in client concatenated firstname, lastname order. SELECT * FROM Client WHERE ClientNumber NOT IN (SELECT ClientNumber FROM BillingOnCost WHERE YEAR(BillingOnCostDate) = 2014) ORDER BY CONCAT(ClientFirstName,ClientLastName); 7. Provide the total number of employees, total billing rate, average billing rate for the practice. SELECT COUNT( DISTINCT(EmployeeNumber)) AS "Total Employee", SUM(BillingRate) AS "Total Billing Rate",AVG(BillingRate) AS "Average Billing Rate" FROM BillingEmployeeRate; 8. Calculate the total charges, excluding on-costs per client for the month of September 2014. SELECT SUM(BillingOnCostCharge) AS "Total Cost Excluding September Client" FROM BillingOnCost WHERE YEAR(BillingOnCostDate)2014 AND MONTH(BillingonCostDate)9; 9. Display the employee number, client number, service ID and billingstarttime for service types of Advice or Communication type where the actual charge on any billing record is cheaper than $150 and the time duration is between 15 and 30 minutes. Order the list such that the billingrecords which are least expensive are listed first. SELECT EmployeeNumber,ClientNumber,ServiceID, BillingStartTime FROM BillingRecord WHERE ((BillingEndTime-BillingStartTime)/100 BETWEEN 15 AND 30 ) AND ServiceTypeID IN (SELECT ServiceTypeID FROM ServiceType WHERE ServiceTypeDescription='Advice' OR ServiceTypeDescription='Communication') AND EmployeeNumber IN (SELECT EmployeeNumber FROM BillingEmployeeRate WHERE BillingRate150); 10. For all clients currently in the CQR system, display details about the clients and those with sector records and those without sector records: for each client with sectors: display the string 'With sectors', the client number, client first name concatenated with the client last name, and the total number of sectors the client is involved in, and for each client without sector records: display the string 'Without sectors', the client number, client first name concatenated with the client last name, and the total number of sectors as a string of Not applicable. SELECT 'With Sectors',c.ClientNumber,CONCAT(c.ClientFirstName,', ',c.ClientLastName) AS "Client Name",COUNT(*) AS "Total Sector Involved" FROM Client c, ClientSector cs WHERE c.ClientNumber=cs.ClientNumber GROUP BY cs.SectorID UNION ALL SELECT DISTINCT 'Without Sectors',c.ClientNumber,CONCAT(c.ClientFirstName,', ',c.ClientLastName) AS "Client Name",'Not Applicable' AS "Total Sector Involved" FROM Client c WHERE c.ClientNumber NOT IN (SELECT ClientNumber FROM ClientSector csec,Sector s WHERE s.SectorID=csec.SectorID);