MGMT Software Solutions (MSS) is a company that works with young clients to increase their popularity on various social networks. After all, likes and views can be a ticket to fame for upcoming artists. That is, they want to follow friends; retweets are the social currency of the 21st century. MSS also negotiates to have its clients wear, advertise, use a product or brand, or even interact with a celebrity to increase their online visibility.
MGMT Software Solutions collects as much data as possible from its clients' followers. This data is generated when a follower retweets, clicks “Like,” or creates a comment, thus creating a demographic profile of that follower. For example, MSS has clients Collins, Acadia, Julia, and Tyler.
When Collins’ friends like his profile picture, Facebook tracks who his most famous friends and family are. Why? Those persons, in turn, ‘like’ products, services, and celebrities—information valuable to those advertisers.
When Acadia ‘likes’ dozens of brands on Facebook, those brands can learn more about potential customers – all of her friends.
When Julia and her friends retweet news about The Hunger Games or the Wedding Ringer, the movie studio can track their responses in real-time.
When Tyler searches YouTube, Google (which owns YouTube) can track his every move and push content that may appeal to him, including other videos of young and upcoming artists, to start their popularity.
This is where the currency of ‘likes’ and retweets and searches turns into actual currency. The selfies each client takes so that others will like them on Instagram helped that company sell for a billion dollars. Sending a tweet helped raise the value of Twitter to around $30 billion, while Facebook is valued at approximately $140 billion.
You have been asked to help the company analyze some of this data on its new clients and check the data to see who has new ‘followers’ for the day. First, you need to peruse the
• BRAND: The Company has negotiated client contracts to use these brands.
• CLIENT: The names of MGMT Software Solutions’ clients
• FAN: Followers of the company’s clients
• SOCIALWEDAPP: Various social media and apps, along with some statistics
You are asked to prepare several queries, as well as some reports.
2. Create relationships between pairs of tables and enforce referential integrity.
3. Add FIVE new clients and associate them with a brand.
4. Also, add TEN new followers along with their information.
5. Create the following queries:
a. List the followers who use WhatsApp. Name the query Q1-WhatsApp.
b. Produce the list of clients along with the number of followers. Show the client the most followers first on the list. Name this query Q2-Followers.
c. Using the name of the client with the most followers from Q2-Followers:
i. List the brand that this client is associated with. Name this query Q3-Brand.
ii. Produce a count of the brands this client’s fans follow. Include the brand name (BrandID.Value) and the client’s name. Sort the list in descending order of brand. Name this query Q4-BFollowers. Save the query again as ‘Query on Followers’
MGMT2006 – Management
(This query will have two different names)
d.
i. Create a new field name, Age, to calculate the current ages of all clients. The following calculation may be helpful:
Round (I n t ( D a t e ( ) - [ D O B ] ) / 3 6 5 . 2 5 )
ii. How many clients are under 25 years of age? Name this query Q5-Under25. (Hint: “Where” clause may be helpful.)
6. A PIVOT chart showing the results of Q2-Followers might be more effective. Create this chart with suitable labels in a spreadsheet MGMT2006_MSS_first name_last name.xlsx.
7. Using the ‘Query on Followers’, remove the client’s name from the criteria. Add fields to show Replies, Likes, Shares, and Clicks. Create a report grouped by the client’s name and sorted by the brand. Show each client's details, summary fields, and a grand report total. Give suitable report headings that are appropriately adjusted and legible. For printing purposes, ensure the report prints each client on a new page, with alternate lines shaded and the title on each page. Rearrange the fields on the report to prevent overflow of information and extra pages. Name the report ‘Report of Daily Followers by Client – October 20xxx.
8. Create a switchboard named MGMT Software Solutions Client Menu System. Include TWO queries, the database report, and an Exit option. In the bottom right-hand corner, create a label using an 8-point font that states that you made the switchboard. For example, ‘Created by <firstname lastname>.’
to generate a solution
a solution
- Several experts in the field of cybersecurity argue that fingerprinting is unethical and infringes consumers' privacy concerns. Several browsers have devised techniques to prevent leaving a browser fingerprint. Browsers have tried a number of strategies to defend themselves from fingerprint recognition.arrow_forwardWhen complete strangers post on social media begging for help, such money or medical supplies, you can find yourself wondering how you would react.arrow_forwardPhishing is one of the spoofing techniques and other computer scams. What are the most effective strategies to stop phishing and spoofing frauds?arrow_forward
- China is one of the most populous countries in the world. The Chinese government also takes many steps to control the Internet inside China to a great extent. These restrictions are often referred to as the Great Firewall of China and has been controversial for several years. Internet companies are required to abide by the government restrictions or be cut off from having access to and doing business with Chinese citizens. That doesn’t mean that information doesn’t get through, but it is a lot harder for citizens to access unapproved sites. Open a search engine (Google, Bing, DuckDuckGo) and search for Great Firewall of China. Do some research on the issue (view more than one site for information), how it works, its history and future, and what it means for citizens. Open a Word document and answer the following questions in a paper 1-2 pages long. Explain what The Great Firewall of China is, and how it works, and what types of contents are blocked, What happens if someone searches…arrow_forwardIt's a good idea to brush up on your knowledge of social networking blogs and other comparable topics.arrow_forwardEli Lilly and Company Threat: Phishing attacks are a significant threat to pharmaceutical companies like Eli Lilly. Cybercriminals may attempt to impersonate the company to steal sensitive research or personal information. Vulnerability: Employees may inadvertently fall victim to phishing emails, clicking on malicious links or downloading harmful attachments. Threat Action: Cybercriminals send convincing-looking emails that appear to be from trusted sources, tricking employees into revealing sensitive information. Vulnerability Mitigation Techniques: Employee Training: Regular training and awareness programs can educate employees about the dangers of phishing and how to recognize phishing attempts. Email Filtering: Implement advanced email filtering systems to identify and quarantine phishing emails before they reach employee inboxes. Multi-Factor Authentication (MFA): Require MFA for accessing sensitive systems and data to prevent unauthorized access. Cummins Inc.…arrow_forward
- Web browser extensions and add-ons function as a result of an algorithm.arrow_forwardSpam is marketing email that was not asked for. Some people say that "spam" isn't just "unwanted email." They think the information people want is in spam emails. Talk about the five things that make people mark emails as "spam"arrow_forwardWhy do mobile web apps reject JavaScript and Ajax?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education