Number Total number of fraud cases received from this state. IdentityTheftCompla ints

Size: px
Start display at page:

Download "Number Total number of fraud cases received from this state. IdentityTheftCompla ints"

Transcription

1 Background Information HOMEWORK INSTRUCTIONS In 2012, fraud and identity theft cost American consumers approximately $1.5 billion. Alarmingly, in many cases, the financial burden of paying for the fraud or theft falls on the victim. As the incidence of fraud and identity theft continues to climb, it behooves people and businesses to look at the issues involved with these crimes. Problem Statement In this assignment, students will analyze the incidence and impact of fraud and identity theft throughout the United States. They will also look at potential underlying causes and possible solutions to these expensive crimes. Instructions IMPORTANT: This assignment requires the Windows version of Microsoft Office. IMPORTANT: Complete the steps below in the order they are given. Completing the steps out of order may complicate the assignment or result in an incorrect result. 1. Download and extract the provided Data Files ZIP file. It contains the following files for use in this assignment: a. states.xml Information on the states, their population, household income, and aggregate fraud statistics for 2014 [1] [3]. Table: States Field Name Type Description StateAbbrv Short Text Primary key. Postal abbreviation for the state. StateName Short Text Full name of the state. Population Number 2014 Census population estimate. HouseholdIncome Currency Median household income for StateFraudComplaint s Number Total number of fraud cases received from this state. IdentityTheftCompla ints Number Total number of identity theft cases received from this state. PaidFraudComplaint s Number Number of fraud complaints where the person had to pay for fraudulent charges. PaidFraudCost Currency Total amount of money paid for supposedly fraudulent charges. Page 1 of 6 Version 19.5

2 b. fraudcomplaints.xml List of the top five types of fraud committed in each state in Table: FraudComplaints Field Name Type Description StateAbbrv Short Text Part of composite key. Postal abbreviation of state. FraudTypeAbbrv Short Text Part of composite key. Abbreviation for type of fraud. Rank Number Ranking of the fraud type for the state. FraudTypeComplaint s Number 2. Begin by creating a new Microsoft Access database named lastname_firstname_hw4_cfitp.accdb. 3. Import the following items into the database: Number of complaints received for this fraud type. a. states.xml file Import structure and data into a new table. b. fraudcomplaints.xml file Import structure and data into a new table. 4. We need to create a table to store data on the fraud types. a. Create a table named FraudTypes with the fields below. Use appropriate field types and designate a good primary key. Table: FraudTypes Field Name FraudTypeAbbrv FraudTypeName b. Enter records for all fraud theft types below. HINT: The FraudTypes table will contain 9 records. Description Abbreviation of up to three characters representing the fraud type. Full name of fraud type. FraudTypeAbbrv ARC BL CC DC IS ISC PSL SAH TMS FraudTypeName Auto-Related Complaints Banks and Lenders Credit Cards Debt Collections Impostor Scams Internet Services Prizes, Sweepstakes and Lotteries Shop-at-Home and Catalog Sales Telephone and Mobile Services Page 2 of 6 Version 19.5

3 5. Create the appropriate relationships for the following tables. Do not enforce referential integrity. a. States and FraudComplaints b. FraudTypes and FraudComplaints 6. Create separate queries to provide the information requested below. Name each query after the step in which it appears (e.g., name the query in Step 6a as Query6A). HINT: Run your queries to test them. Make sure that they display all and only the records that you would expect to appear. a. Create a query displaying fraud information for all states. List each state's name, population, household income, number of fraud complaints, and number of identity theft complaints. Sort by state name in ascending order. HINT: This query will show 50 records and 5 fields. b. We wish to compare the most common types of fraud for each state. Create a query listing the state name, fraud type name, rank, and number of fraud complaints for the fraud type. Only display fraud types where the rank is not more than 3 ( 3). Sort by state name in ascending order and then by number of complaints in descending order. HINT: This query will show 150 records and 4 fields. c. Create a query to find information on Internet fraud and other large types of fraud. List the fraud type name, state name, and number of fraud complaints for the fraud type. Only display records for the Internet Services fraud type or where at least 5,000 complaints were received in a state for the fraud type. Sort by fraud type name and then by state name, both in ascending order. HINT: This query will show 41 records and 3 fields. Page 3 of 6 Version 19.5

4 d. We wish to determine the prevalence of identity theft. Create a query listing, for each state name, its population and number of identity theft complaints. Also, include a field to calculate the identity theft complaints per 100,000 residents. You can calculate the identity theft complaints per 100,000 residents using the formula: [States. IdentityTheftComplaints] ( ) [States. Population] Format the calculated field as a standard-type number with no decimal places. HINT: This query will show 50 records and 4 fields. e. Create a query to determine the cost of each fraud complaint. List each state s name, number of paid fraud complaints, and paid fraud cost. Also, include a field to calculate the cost of each paid fraud complaint. You can calculate the cost of each paid fraud complaint using the formula: [States. PaidFraudCost] [States. PaidFraudComplaints] Only display cases where the cost of each paid fraud complaint was at least $1,400 ( 1400). Format calculated field as currency with 2 decimal places. HINT: This query will show 46 records and 4 fields. f. We wish to determine the total number of complaints for each type of fraud. Create a query listing, for each fraud type name, the sum of complaints. Format the sum of complaints as a standard-type number with no decimal places. HINT: This query will show 7 records and 2 fields. Page 4 of 6 Version 19.5

5 g. We want to compare the number of identity theft cases to the number of fraud cases on a per-state basis. Copy-and-paste this SQL code into a new query: SELECT States.StateName, States.IdentityTheftComplaints, States.StateFraudComplaints, Round(IdentityTheftComplaints/StateFraudComplaints,2) AS IdentityTheftPerFraud FROM States ORDER BY Round(IdentityTheftComplaints/StateFraudComplaints,2) DESC; IMPORTANT: Do not make any modifications to this query other than entering the above SQL code. HINT: This query will show 50 records and 4 fields. 7. We need to create a new table to store analysis questions responses. a. Create a table named AnalysisQuestions with the fields below. Use appropriate field types and designate a good primary key. Table: AnalysisQuestions Field Name QuestionNumber Response Description Question being answered. Response to the analysis question prompt. 8. In the AnalysisQuestions table, answer four of the five analysis questions below. Respond to one question per record. a. Is there any relationship between a state s household income and its fraud rate? Why might this be the case? b. Which state has the highest rate of identity theft complaints per 100,000 residents? Why do you think this state has such a high rate? c. What other types of crime might be related to fraud or identity theft? d. Why do some states have lower levels of identity theft than other states? e. Name at least one thing that could be done by the government or companies to reduce identity theft or fraud. Briefly explain what your proposal would do. 9. Run the Compact and Repair Database utility on your database. Ignore any errors you receive when running the utility. Page 5 of 6 Version 19.5

6 Grading Rubric HOMEWORK INSTRUCTIONS This assignment is worth 50 points. It will be graded by your instructor using this rubric, with partial credit awarded as appropriate: Step 3 3 points Steps 6a-g 4 points each Steps 4a-b 4 points total Step 7a 2 points Step 5 3 points Steps 8a-e (pick 4 of 5) 2.5 points each The analysis questions in Steps 8a-e will be evaluated using this rubric: Standard Meets Requirements (1.25 points) Does Not Meet Requirements (0 points) Answer is reasonable. Answer addresses the question prompt and is factually correct or a reasonable interpretation of available data. Answer does not address the question prompt, is factually incorrect, or is an unreasonable interpretation of available data. Answer is supported. Acknowledgments Logical rationale is provided to support the given answer. Logical rationale is not provided to support the given answer. The image in the introduction appears courtesy of the Federal Trade Commission [4]. References [1] Consumer Sentinel Network Data Book for January-December 2014, Federal Trade Commission, Feb Available: [2] Household Income: 2013, U.S. Census Bureau, Sep Available: br13-02.pdf. [3] Population Estimates, U.S. Census Bureau. Available: [4] Federal Trade Commission Seal Available: Page 6 of 6 Version 19.5

In this assignment, students will analyze commuter statistics for counties across the United States from 2006 to 2010.

In this assignment, students will analyze commuter statistics for counties across the United States from 2006 to 2010. Background Information HOMEWORK HELP PROJECT INSTRUCTIONS Every day, millions of workers commute across county lines for their jobs. Commuting patterns vary widely across the United States but are influenced

More information

b. companies.xml Listing of companies appearing on the Fortune 500 list [1], [2].

b. companies.xml Listing of companies appearing on the Fortune 500 list [1], [2]. Background Information HOMEWORK INSTRUCTIONS The Fortune 500 listing has been published since 1955 to analyze the top five hundred companies in the United States with publicly available financial information.

More information

Background Information. Instructions. Problem Statement. HOMEWORK HELP PROJECT INSTRUCTIONS Homework #5 Help Box Office Sales Problem

Background Information. Instructions. Problem Statement. HOMEWORK HELP PROJECT INSTRUCTIONS Homework #5 Help Box Office Sales Problem Background Information Each year, hundreds of millions of Americans go to the theaters for at least one movie. According to an MPAA study, the average moviegoer saw about 8.5 films. All told, ticket sales

More information

This project includes information on West Virginia Senate elections from 2000 to 2014.

This project includes information on West Virginia Senate elections from 2000 to 2014. Topics Create a new database Import database tables and data Create database tables Add records Create lookup fields Create relationships Answer analysis questions Compact and repair the database Background

More information

Background Information. Instructions. Problem Statement. HOMEWORK HELP PROJECT INSTRUCTIONS Homework #5 Help Travel and Tourism Industry Problem

Background Information. Instructions. Problem Statement. HOMEWORK HELP PROJECT INSTRUCTIONS Homework #5 Help Travel and Tourism Industry Problem Background Information Travel and tourism comprise one of the largest industries in the world. Across the globe, it supports 101 million jobs and contributes $2.1 trillion to the world economy. The travel

More information

This project includes information on West Virginia K-12 schools from 2010 to 2016.

This project includes information on West Virginia K-12 schools from 2010 to 2016. Topics Create a SELECT query to retrieve data Use a DISTINCT clause to remove duplicate results Use an ORDER BY clause to sort query results Use a JOIN clause to include results from multiple tables Use

More information

Federal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission

Federal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission Federal Trade Commission Protecting Consumer Privacy J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission FTC s Approach to Privacy Consumers are concerned about consequences

More information

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision

Federal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision YOU HAVE THE POWER TO STOP IDENTITY THEFT A message from the federal bank, credit union and thrift regulatory agencies Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation

More information

Important Information

Important Information Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland

More information

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information

More information

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam Frauds & Scams Why is the Internet so attractive to scam artists? Anonymity Low cost Rapid growth Easy to adapt Be Cyber Savvy with C-SAFE 118 2006 Internet Fraud Trends Average Loss Online Auctions 34%

More information

THE CAR SHARE RESERVATION DATABASE

THE CAR SHARE RESERVATION DATABASE CASE 4 THE CAR SHARE RESERVATION DATABASE Designing a Relational Database to Create Tables, Forms, Queries, Reports, and Navigation Panes PREVIEW In this case, you ll design a relational database reservation

More information

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group Common Scams and Fraud Charlottesville/Albemarle County TRIAD Group What We ll Cover 3 parts of a scam or fraud Common scams What can you do? Common Scams Three Parts of Any Scam or Fraud 1. Victim has

More information

INFORMATION ABOUT SCAMS FOR RESIDENTS

INFORMATION ABOUT SCAMS FOR RESIDENTS INFORMATION ABOUT SCAMS FOR RESIDENTS A Word From The Chief... Each week, too many of our residents become victims of financial fraud whether through a scam, a data breach or identity theft. Scams, (also

More information

Content-Based Assessments

Content-Based Assessments Content-Based Assessments GO! Fix It Project 2H Social Sciences For Project 2H, you will need the following file: a02h_social_sciences Lastname_Firstname_2H_Social_Sciences 2a ccess In this project, you

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2007 H 1 HOUSE BILL 1699 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 0 H HOUSE BILL Short Title: Option to Stop Junk Mail. (Public) Sponsors: Representatives Fisher; Alexander, Faison, Harrison, and Samuelson. Referred to: Judiciary

More information

Identity Theft Victim s Complaint and Affidavit

Identity Theft Victim s Complaint and Affidavit Average time to complete: 10 minutes Identity Theft Victim s Complaint and Affidavit A voluntary form for filing a report with law enforcement, and disputes with credit reporting agencies and creditors

More information

Publishers clearing house scam complaint

Publishers clearing house scam complaint Search Search pages & people Search Search Search pages & people Search Publishers clearing house scam complaint Feb 9, 2018. The Better Business Bureau said they have about two thousand complaints of

More information

Copyright 2018 MakeUseOf. All Rights Reserved.

Copyright 2018 MakeUseOf. All Rights Reserved. The Beginner s Guide to Microsoft Excel Written by Sandy Stachowiak Published April 2018. Read the original article here: https://www.makeuseof.com/tag/beginners-guide-microsoftexcel/ This ebook is the

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

Intermediary Oracle FLEXCUBE Universal Banking Release [May] [2011] Oracle Part Number E

Intermediary Oracle FLEXCUBE Universal Banking Release [May] [2011] Oracle Part Number E Intermediary Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011] Oracle Part Number E51511-01 Table of Contents Intermediary 1. ABOUT THIS MANUAL... 1-1 1.1 INTRODUCTION... 1-1 1.1.1 Audience...

More information

Sweepstakes clearinghouse

Sweepstakes clearinghouse Sweepstakes clearinghouse Feb 27, 2018. The PCH Prize Patrol! And for anyone like Jo Ann who has been entering the Publishers Clearing House Sweepstakes for years that is a. The Automated Clearing House

More information

Remote Deposit. User Guide. Copyright 2008 v3.2 The remote capture software is powered by Wausau Financial Systems, Inc.

Remote Deposit. User Guide. Copyright 2008 v3.2 The remote capture software is powered by Wausau Financial Systems, Inc. Remote Deposit User Guide Copyright 2008 v3.2 The remote capture software is powered by Wausau Financial Systems, Inc. Table of Contents Remote Deposit User Guide The Remote Deposit Application...2 Using

More information

Voice Authorization QUICK REFERENCE GUIDE

Voice Authorization QUICK REFERENCE GUIDE QUICK REFERENCE GUIDE Voice Authorization Get credit card authorizations using any touch-tone telephone enter the authorization codes when your POS system is ready. Voice authorization systems allow you

More information

Graded Project. Microsoft Excel

Graded Project. Microsoft Excel Graded Project Microsoft Excel INTRODUCTION 1 PROJECT SCENARIO 1 CREATING THE WORKSHEET 2 GRAPHING YOUR RESULTS 4 INSPECTING YOUR COMPLETED FILE 6 PREPARING YOUR FILE FOR SUBMISSION 6 Contents iii Microsoft

More information

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES

Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY II. GENERAL PRIVACY GUIDELINES Privacy Policy I. COOKEVILLE COMMUNICATIONS PRIVACY POLICY Cookeville Communications Media is committed to maintaining robust privacy protections for its users. Our privacy policy is designed to help you

More information

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

Identity Theft, Fraud & You. PrePare. Protect. Prevent. PrePare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer

More information

METHODS EXERCISES GuessNumber and Sample run SumAll Sample Run

METHODS EXERCISES GuessNumber and Sample run SumAll Sample Run METHODS EXERCISES Write a method called GuessNumber that receives nothing and returns back nothing. The method first picks a random number from 1-100. The user then keeps guessing as long as their guess

More information

Economic Update. Automotive Insights Conference. Paul Traub. Federal Reserve Bank of Chicago January 18, Senior Business Economist

Economic Update. Automotive Insights Conference. Paul Traub. Federal Reserve Bank of Chicago January 18, Senior Business Economist Economic Update Automotive Insights Conference Federal Reserve Bank of Chicago January 18, 2018 Paul Traub Senior Business Economist Main Economic Indicators Year-over-year Comparison 2015 2016 2017 GDP

More information

Your security on click Jobs

Your security on click Jobs Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can

More information

Ouachita Baptist University. Identity Theft Policy and Program

Ouachita Baptist University. Identity Theft Policy and Program Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program

More information

Top 5 Tips To Take A Stand Against Telephone Scams

Top 5 Tips To Take A Stand Against Telephone Scams Scammers often use the telephone as a method to gain personal details and con people out of their life savings. Avoid being one of them, protect yourself. Top 5 Tips To Take A Stand Against Telephone Scams

More information

COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process

COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process COST PER LEAD ADVERTISING BY THE NUMBERS 10 Steps That Will Transform Your Acquisition Process Whitepaper by: Steve Rafferty - Founder/CEO ActiveProspect Running a Cost Per Lead advertising campaign seems

More information

Graded Project. Microsoft Excel

Graded Project. Microsoft Excel Graded Project Microsoft Excel INTRODUCTION 1 PROJECT SCENARIO 2 CREATING THE WORKSHEET 2 GRAPHING YOUR RESULTS 4 INSPECTING YOUR COMPLETED FILE 6 PREPARING YOUR FILE FOR SUBMISSION 6 Contents iii Microsoft

More information

WEB OF DECEIT. Why are seniors targeted?

WEB OF DECEIT. Why are seniors targeted? A challenge for senior citizens who embrace the computer age is knowing how to avoid online fraud. Although people of all ages are at risk, statistics show that when it comes to online safety, seniors

More information

2017 Autosoft, Inc. All rights reserved.

2017 Autosoft, Inc. All rights reserved. Revised 01/2017 Copyright 2017 Autosoft, Inc. All rights reserved. The information in this document is subject to change without notice. No part of this document may be reproduced, stored in a retrieval

More information

emerge Help Document Table of Contents

emerge Help Document Table of Contents Table of Contents Logging Into emerge... 2 Navigation Bar... 3 Main Menu... 4 Creating a New Order... 6 Order Checklist... 6 Information... 7 Overview... 8 Geography... 9 List Select... 12 Demographics...

More information

Protecting your Privacy Winchester Cathedral Privacy Notice

Protecting your Privacy Winchester Cathedral Privacy Notice Protecting your Privacy Cathedral Privacy Notice Introduction Cathedral is committed to protecting the privacy of any personal information it may hold regarding individuals. This Privacy Note explains

More information

[Utility Name] Identity Theft Prevention Program

[Utility Name] Identity Theft Prevention Program [Utility Name] Identity Theft Prevention Program Effective beginning, 2008 Minnesota Municipal Utilities Association Sample Red Flag policy I. PROGRAM ADOPTION The [Utility Name] ("Utility") developed

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

National Travel Associates

National Travel Associates National Travel Associates Fraud Prevention Module 2012 National Travel Associates Fraud In The Travel Industry With the popularity of online booking engines in the 90 s there was a huge insurgence of

More information

Identity Theft Policies and Procedures

Identity Theft Policies and Procedures Identity Theft Policies and Procedures Davis & Wehrle, LLC 1104 S. Mays, Suite 105 Round Rock, TX 78664-6700 United States (512) 346-1131 Davis & Wehrle Identity Theft Policies & Procedures September 2017

More information

UNIFORM REPORT IDENTITY FRAUD/THEFT

UNIFORM REPORT IDENTITY FRAUD/THEFT Background: UNIFORM REPORT IDENTITY FRAUD/THEFT ANNOTATED CODE OF MARYLAND Article PUBLIC SAFETY During the 2010 legislative session the Maryland Legislature repealed and reenacted, with amendments: Public

More information

Case 1:18-cr TSE Document 2 Filed 06/20/18 Page 1 of 9 PageID# 2 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA

Case 1:18-cr TSE Document 2 Filed 06/20/18 Page 1 of 9 PageID# 2 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Case 1:18-cr-00308-TSE Document 2 Filed 06/20/18 Page 1 of 9 PageID# 2 IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA Alexandria Division i 20 2018 1:1 UNITED STATES OF AMERICA

More information

Accounts Payable MODULE USER S GUIDE

Accounts Payable MODULE USER S GUIDE Accounts Payable MODULE USER S GUIDE INTEGRATED SOFTWARE SERIES Accounts Payable MODULE USER S GUIDE Version 3.1 Copyright 2005 2009, Interactive Financial Solutions, Inc. All Rights Reserved. Integrated

More information

Us postal service tracking #

Us postal service tracking # P ford residence southampton, ny Us postal service tracking # 2-8-2013 The Postal Service takes a picture of every letter and package mailed in the United States and will give a photo to a requesting law

More information

FRAUDULENT TRAVEL SCAMS

FRAUDULENT TRAVEL SCAMS FINANCIAL INTELLIGENCE CENTRE (FIC) REPUBLIC OF NAMIBIA P.O.BOX 2882, Windhoek Tel: + 264 61 2835100, Fax +264 61 2835259 Web address: www.fic.na E-mail address: helpdesk@fic.na FRAUDULENT TRAVEL SCAMS

More information

CRIME ANALYSIS SACRAMENTO COUNTY SHERIFF S DEPARTMENT

CRIME ANALYSIS SACRAMENTO COUNTY SHERIFF S DEPARTMENT 27 February 2018 Five Year Uniform Crime Reporting (UCR) Analysis 2013-2017 Page 1 16 SACRAMENTO COUNTY UNIFORM CRIME REPORT 2013-2017 This report provides a five-year analysis of crime trends within the

More information

Financial scams. What to look for and how to avoid them.

Financial scams. What to look for and how to avoid them. Financial scams What to look for and how to avoid them. Keep your money secure We take the security and wellbeing of our customers very seriously. So we ve created this guide to highlight the most common

More information

HOMEWORK 7. M. Neumann. Due: THU 8 MAR PM. Getting Started SUBMISSION INSTRUCTIONS

HOMEWORK 7. M. Neumann. Due: THU 8 MAR PM. Getting Started SUBMISSION INSTRUCTIONS CSE427S HOMEWORK 7 M. Neumann Due: THU 8 MAR 2018 1PM Getting Started Update your SVN repository. When needed, you will find additional materials for homework x in the folder hwx. So, for the current assignment

More information

MDM 4UI: Navigating and Using the Statistics Canada Website

MDM 4UI: Navigating and Using the Statistics Canada Website MDM 4UI: Navigating and Using the Statistics Canada Website Method 1: Module search How to search the Statistics Canada website to find articles and data for projects The Statistics Canada website (www.statcan.gc.ca)

More information

CS 370: Problem Set 2

CS 370: Problem Set 2 CS 370: Problem Set 2 Section: TR 10-11:50 am Total: 150pts Due: 03/01/2016 Instructions: 1. I leave plenty of space on each page for you. If you need more sheet, please attach your work right behind the

More information

THE EXCEL ENVIRONMENT... 1 EDITING...

THE EXCEL ENVIRONMENT... 1 EDITING... Excel Essentials TABLE OF CONTENTS THE EXCEL ENVIRONMENT... 1 EDITING... 1 INSERTING A COLUMN... 1 DELETING A COLUMN... 1 INSERTING A ROW... DELETING A ROW... MOUSE POINTER SHAPES... USING AUTO-FILL...

More information

Identity Theft Prevention Program. Effective beginning August 1, 2009

Identity Theft Prevention Program. Effective beginning August 1, 2009 Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's

More information

Protect Yourself From. Identify Theft

Protect Yourself From. Identify Theft Protect Yourself From Identify Theft What is Identity Theft? Identity theft occurs when someone uses another person identifying information without their permission in order to access resources, obtain

More information

Safaricom Data Privacy Statement

Safaricom Data Privacy Statement Safaricom Data Privacy Statement Page 1 of 7 Table of Content 1.0 Introduction... 3 2.0 Definitions... 3 3.0 Statement Details... 3 3.1 Collection of Information... 3 3.2 What Customer Information is Collected?...

More information

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Cybercrime Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1: Organizations can prevent cybercrime from occurring through the proper use of personnel, resources,

More information

In your school or local public library, log on to the library catalogue.

In your school or local public library, log on to the library catalogue. 1.3 Databases A database is an organized store of records. Databases may contain information about almost any subject incomes, shopping habits, demographics, features of cars, and so on. INVESTIGATE &

More information

emerge Help Document Table of Contents

emerge Help Document Table of Contents Table of Contents Logging Into emerge... 2 Navigation Bar... 3 Main Menu... 4 My Account... 6 My Information... 6 Manage Lists... 7 Manage Seeds... 8 Search/Add Suppress... 9 Update My Suppress... 10 Creating

More information

Protect Yourself. Collaboration between Texas A&M Information Technology and Human Resources. Newsletters Presentations Outreach Activities

Protect Yourself. Collaboration between Texas A&M Information Technology and Human Resources. Newsletters Presentations Outreach Activities Protect Yourself Collaboration between Texas A&M Information Technology and Human Resources Newsletters Presentations Outreach Activities Education, Education, Education Your Best Resource for Mitigating

More information

HKTA TANG HIN MEMORIAL SECONDARY SCHOOL SECONDARY 3 COMPUTER LITERACY. Name: ( ) Class: Date: Databases and Microsoft Access

HKTA TANG HIN MEMORIAL SECONDARY SCHOOL SECONDARY 3 COMPUTER LITERACY. Name: ( ) Class: Date: Databases and Microsoft Access Databases and Microsoft Access Introduction to Databases A well-designed database enables huge data storage and efficient data retrieval. Term Database Table Record Field Primary key Index Meaning A organized

More information

You can write a command to retrieve specified columns and all rows from a table, as illustrated

You can write a command to retrieve specified columns and all rows from a table, as illustrated CHAPTER 4 S I N G L E - TA BL E QUERIES LEARNING OBJECTIVES Objectives Retrieve data from a database using SQL commands Use simple and compound conditions in queries Use the BETWEEN, LIKE, and IN operators

More information

Complaint Referral Form Internet Crime Complaint Center

Complaint Referral Form Internet Crime Complaint Center Complaint Referral Form Internet Crime Complaint Center Please review your complaint for accuracy, prior to submitting it to the IC3. The following information was provided by the victim and may be forwarded

More information

Exam code: Exam name: Database Fundamentals. Version 16.0

Exam code: Exam name: Database Fundamentals. Version 16.0 98-364 Number: 98-364 Passing Score: 800 Time Limit: 120 min File Version: 16.0 Exam code: 98-364 Exam name: Database Fundamentals Version 16.0 98-364 QUESTION 1 You have a table that contains the following

More information

CHAPTER 6 SUMMARY. Objective 1: Identify Good Database Design

CHAPTER 6 SUMMARY. Objective 1: Identify Good Database Design Objective 1: Identify Good Database Design CHAPTER 6 SUMMARY A database is an organized collection of data facts about people, events, things, or ideas related to a specific topic or purpose. Information

More information

Remote Deposit Capture Remote Deposit Complete. Remote Deposit Complete Handbook

Remote Deposit Capture Remote Deposit Complete. Remote Deposit Complete Handbook Remote Deposit Capture Remote Deposit Complete Remote Deposit Complete Handbook Contents Support Contact Information... 3 I. Introduction... 1 II. Logging In... 2 III. Installing Device Control... 2 IV.

More information

CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR)

CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR) CHASE GRAMMAR SCHOOL PRIVACY STATEMENT General Data Protection Regulations (GDPR) The GDPR is the biggest change to data privacy laws in the last 20 years and comes into effect on 25 May 2018. The new

More information

In This Lecture. Yet More SQL SELECT ORDER BY. SQL SELECT Overview. ORDER BY Example. ORDER BY Example. Yet more SQL

In This Lecture. Yet More SQL SELECT ORDER BY. SQL SELECT Overview. ORDER BY Example. ORDER BY Example. Yet more SQL In This Lecture Yet More SQL Database Systems Lecture 9 Natasha Alechina Yet more SQL ORDER BY Aggregate functions and HAVING etc. For more information Connoly and Begg Chapter 5 Ullman and Widom Chapter

More information

6232B: Implementing a Microsoft SQL Server 2008 R2 Database

6232B: Implementing a Microsoft SQL Server 2008 R2 Database 6232B: Implementing a Microsoft SQL Server 2008 R2 Database Course Overview This instructor-led course is intended for Microsoft SQL Server database developers who are responsible for implementing a database

More information

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Seattle University Identity Theft Prevention Program. Purpose. Definitions Seattle University Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate identity theft in connection

More information

Fraud Mobility: Exploitation Patterns and Insights

Fraud Mobility: Exploitation Patterns and Insights WHITEPAPER Fraud Mobility: Exploitation Patterns and Insights September 2015 2 Table of Contents Introduction 3 Study Methodology 4 Once a SSN has been Compromised, it Remains at Risk 4 Victims Remain

More information

CAREERBUILDER.COM - PRIVACY POLICY

CAREERBUILDER.COM - PRIVACY POLICY Effective Date: September 15, 2010 CareerBuilder, LLC and its subsidiaries and divisions (collectively, CareerBuilder, We or Our ) has drafted its Privacy Policy to ensure that you can use CareerBuilder

More information

Statisticians in the Federal Government: Producing Data on the Criminal Justice System

Statisticians in the Federal Government: Producing Data on the Criminal Justice System Statisticians in the Federal Government: Producing Data on the Criminal Justice System Washington Statistical Society Gonzaga College High School Washington, DC February 5, 2019 Jeri M. Mulrow Vice President

More information

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS STOCKTON UNIVERSITY PROCEDURE Identity Theft Prevention Program Procedure Administrator: Director of Risk Management and Environmental/Health/Safety Authority: Fair and Accurate Credit Transactions Act

More information

Red Flag Policy and Identity Theft Prevention Program

Red Flag Policy and Identity Theft Prevention Program Unified Government of Wyandotte County and Kansas City, Kansas Adopted: 5/11/2011 Red Flag Policy and Identity Theft Prevention Program Authority: The Mayor and the Board of Commissioners are responsible

More information

ID Theft Information Form - Instructions

ID Theft Information Form - Instructions ID Theft Information Form - Instructions Identity Theft may occur when someone uses your personally identifiable information such as your name or social security number (SSN) to obtain services from Charter

More information

Signs of Financial Fraud of the Elderly. Brenda Charles-Edwards National Notary Association Ambassador for Washington State

Signs of Financial Fraud of the Elderly. Brenda Charles-Edwards National Notary Association Ambassador for Washington State Signs of Financial Fraud of the Elderly Brenda Charles-Edwards National Notary Association Ambassador for Washington State Topics of Discussion I. What is the Abuse and Who is Affected? II. What are the

More information

Retail/Consumer Client Internet Banking Awareness and Education Program

Retail/Consumer Client Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 1) E-mail Risk... 3 2) Internet Risks... 4 3) Telephone

More information

Federal Reserve Bank of Chicago 22 nd Annual Economic Outlook Symposium. Automotive Outlook. Will Shearin December 5, 2008

Federal Reserve Bank of Chicago 22 nd Annual Economic Outlook Symposium. Automotive Outlook. Will Shearin December 5, 2008 Federal Reserve Bank of Chicago 22 nd Annual Economic Outlook Symposium Automotive Outlook Will Shearin December 5, 2008 Ability to Buy Leading Indicators Nov 07 Nov 08 Disposable Income Green Red Household

More information

Eastern Bank TreasuryConnect Balance Reporting User Manual

Eastern Bank TreasuryConnect Balance Reporting User Manual Eastern Bank TreasuryConnect Balance Reporting User Manual This user manual provides instructions for setting up or editing a user and accessing services within the three Balance related groups. Within

More information

3.1 Measures of Central Tendency

3.1 Measures of Central Tendency 3.1 Measures of Central Tendency 3.1 Measures of Central Tendency A statistic is a characteristic or measure obtained by using the data values from a sample. A parameter is a characteristic or measure

More information

Please process as per my usual instructions.

Please process as per my usual instructions. Same Day Process Service 1413 K Street, NW 7th Floor Washington, DC 20005 (202) 398-4200 Fax (202) 658-7925 www.samedayprocess.com info@samedayprocess.com Dear Brandon, Please process as per my usual instructions.

More information

ACE - Online Application Instructions FOLLOW THESE DIRECTIONS EXACTLY AS INDICATED *

ACE - Online Application Instructions FOLLOW THESE DIRECTIONS EXACTLY AS INDICATED * ACE - Online Application Instructions [If technical problems occur specific to this ACE process, please contact Nancy Nelson at nnelson@csus.edu, 916/278-2829] FOLLOW THESE DIRECTIONS EXACTLY AS INDICATED

More information

Atlas 5.0 for Microsoft Dynamics AX Advanced reporting system.

Atlas 5.0 for Microsoft Dynamics AX Advanced reporting system. TRAINEE WORKBOOK Atlas 5.0 for Microsoft Dynamics AX Advanced reporting system. Table of Contents 1 Introduction... 4 1.1 Welcome... 4 1.2 About this course... 4 1.2.1 Course description... 4 1.2.2 Audience...

More information

Today s Presentation. Define phishing Explain phishing techniques Examples of phishing Statistics about phishing Defense against Dark Arts Resources

Today s Presentation. Define phishing Explain phishing techniques Examples of phishing Statistics about phishing Defense against Dark Arts Resources Welcome. Pamela King Professor, Digital Forensics Chestnut Hill College, Philadelphia, PA 17 years law enforcement digital forensics 10 years private industry digital forensics and e-discovery. Academics

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

Check off these skills when you feel that you have mastered them.

Check off these skills when you feel that you have mastered them. Chapter Objectives Check off these skills when you feel that you have mastered them. Understand the purpose of a check digit and be able to determine one for various schemes. Given an identification number

More information

1.204 Computer Algorithms in Systems Engineering Spring 2010 Problem Set 2: Municipal Database Due: 12 noon, Wednesday, February 24, 2010

1.204 Computer Algorithms in Systems Engineering Spring 2010 Problem Set 2: Municipal Database Due: 12 noon, Wednesday, February 24, 2010 1.204 Computer Algorithms in Systems Engineering Spring 2010 Problem Set 2: Municipal Database Due: 12 noon, Wednesday, February 24, 2010 1. Problem statement You are given a realistic, though fictitious,

More information

[Page 177 (continued)] a. if ( age >= 65 ); cout << "Age is greater than or equal to 65" << endl; else cout << "Age is less than 65 << endl";

[Page 177 (continued)] a. if ( age >= 65 ); cout << Age is greater than or equal to 65 << endl; else cout << Age is less than 65 << endl; Page 1 of 10 [Page 177 (continued)] Exercises 4.11 Identify and correct the error(s) in each of the following: a. if ( age >= 65 ); cout

More information

Target Breach Overview

Target Breach Overview Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems

More information

Lecture 18. Business Intelligence and Data Warehousing. 1:M Normalization. M:M Normalization 11/1/2017. Topics Covered

Lecture 18. Business Intelligence and Data Warehousing. 1:M Normalization. M:M Normalization 11/1/2017. Topics Covered Lecture 18 Business Intelligence and Data Warehousing BDIS 6.2 BSAD 141 Dave Novak Topics Covered Test # Review What is Business Intelligence? How can an organization be data rich and information poor?

More information

Group means any company within the STB Leasing Limited s group of companies and/or the ThinkSmart group of companies.

Group means any company within the STB Leasing Limited s group of companies and/or the ThinkSmart group of companies. PRIVACY DECLARATION In this Privacy Declaration, unless the context otherwise requires: We, us, our means STB Leasing Limited, and/or RentSmart Limited trading as ThinkSmart ( ThinkSmart / we / us ), and

More information

ADD/EDIT VENDOR. 1. To add a new vendor to the system from within the Accounts Payable module, navigate to: Accounts Payable Vendors.

ADD/EDIT VENDOR. 1. To add a new vendor to the system from within the Accounts Payable module, navigate to: Accounts Payable Vendors. ADD/EDIT VENDOR 1. To add a new vendor to the system from within the Accounts Payable module, navigate to: Accounts Payable Vendors. Vendors can also be added from within the Purchasing module. Regardless

More information

Intellicus Enterprise Reporting and BI Platform

Intellicus Enterprise Reporting and BI Platform Designing Adhoc Reports Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Designing Adhoc Reports i Copyright 2012 Intellicus Technologies This

More information

AUSTIN COMMUNITY COLLEGE CONTINUING EDUCATION. INTERMEDIATE DATABASE/FILE AMANGEMENT (Access Intermediate) (12 hours) ITSW 1055 COURSE SYLLABUS

AUSTIN COMMUNITY COLLEGE CONTINUING EDUCATION. INTERMEDIATE DATABASE/FILE AMANGEMENT (Access Intermediate) (12 hours) ITSW 1055 COURSE SYLLABUS Course Description: Instruction in data validation, data manipulation, browsing through records, records selection and query, indexing, and sorting. Topics include modifying tables, using database wizards,

More information

Simple SQL. Peter Y. Wu. Dept of Computer and Information Systems Robert Morris University

Simple SQL. Peter Y. Wu. Dept of Computer and Information Systems Robert Morris University Simple SQL Peter Y. Dept of Computer and Information Systems Robert Morris University Simple SQL create table drop table insert into table values ( ) delete from table where update table set a to v where

More information

New Jersey economic issues poll April 5-14, 2018 Stockton Polling Institute Weighted frequencies

New Jersey economic issues poll April 5-14, 2018 Stockton Polling Institute Weighted frequencies New Jersey economic issues poll April 5-14, 2018 Stockton Polling Institute Weighted frequencies Q1. How would you rate the U.S. economy: Frequency Valid Valid Excellent 47 6.6 6.6 6.6 Good 302 42.1 42.1

More information

CS 582 Database Management Systems II

CS 582 Database Management Systems II Review of SQL Basics SQL overview Several parts Data-definition language (DDL): insert, delete, modify schemas Data-manipulation language (DML): insert, delete, modify tuples Integrity View definition

More information

Identity Theft and Account Takeover Prevention

Identity Theft and Account Takeover Prevention Identity Theft and Account Takeover Prevention Sgt. Rick Radinsky,CFE 520-837-7814 Det. Jeff Van Norman 520-837-7827 Introduction Tucson Police Financial Crimes Unit Responsible for investigation of fraud

More information

( Utility Name ) Identity Theft Prevention Program

( Utility Name ) Identity Theft Prevention Program ***DRAFT*** ( Utility Name ) Identity Theft Prevention Program Implemented as of, 2008 *** This document is intended to give guidance to municipal utilities in their understanding of the FTC Red Flag Rule.

More information