GO19_AC_INTRO_GRADER_CAP1 – Rugged Suppliers 1.0

GO19_AC_INTRO_GRADER_CAP1 – Rugged Suppliers 1.0

 

Project Description:

In this project, you will apply skills you practiced from the Objectives in Access Chapters 1 through 3. You will create a database that contains inventory and supplier information. In addition, you will create queries that answer specific questions relating to the inventory items and suppliers, forms for entering and updating information, and reports.

 

Start Access. Open the file Student_Access_Cap1_Rugged_Sportswear.accdb downloaded with this project.

 

Open   the Cap1 Inventory table in Design View. Rename the ID field to Item ID and change the Data Type to Short   Text. Continue adding the following fields as Short Text except for Cost,   which should have a Currency Data Type:
Item Name
Cost
Category
Sport
Supplier ID

 

Switch   to Datasheet view. Enter the following two records into Cap1 Inventory:
Item ID: 305565
Item Name: Cycling Shorts
Cost: 11.59
Category: Shorts
Sport: Biking
Supplier ID: SUPP-06
Item ID: 106556
Item Name: Fingerless Bike Gloves
Cost: 12.09
Category: Socks and Gloves
Sport: Biking
Supplier ID: SUPP-01

 

Close   the table. Append a copy of the records from the downloaded Cap1_Inventory workbook to the Cap1   Inventory table. Accept all defaults in the wizard and do not save the Import   steps. Open the table, verify there are 25 records, and apply Best Fit to all   fields. Save and close the table.

 

Import   the source data from the downloaded Cap1_Suppliers   workbook into a new table in the current database. In the wizard, click the   First Row Contains Column Headings option and set the primary key to Supplier   ID. Name the table Cap1 Suppliers.   Do not save the Import steps.

 

Open   the Cap1 Suppliers table in Design view. Delete the Fax Number field and save   the table. Switch to Datasheet view and apply Best Fit to all of the fields.   Save and close the table.

 

On   the Navigation Pane, group the objects by Tables and Related Views.

 

Create   a relationship between the two tables in the database using Supplier ID as   the common field. Enforce Referential Integrity and select both Cascade   options. One supplier can supply many inventory items.

 

Create   a relationship report. Save the report with Cap1   Relationships as the name. Close the Relationships   window.

 

Create   a query in Design view, using your Cap1 Inventory table to answer the   question What is the item name (in   alphabetical order), cost, and category for the sport of fitness? Add the   fields in that order. Do not display the Sport field in the query results.   Run the query, save it as Cap1 Fitness Query,   then close the query. Five records match the criteria.

 

Create   a copy of Cap1 Fitness Query named Cap1 Hiking or   Biking Shoes Query. Redesign the query design to answer   the question What is the sport, item   name, category, and cost for the category of shoes where the sport is hiking   or biking? Arrange the fields in the order in which they’re mentioned in   the question. Sort the records first in ascending order by Sport and then in   Descending order by Cost. Hide the Category field so that it does not display   in the results. Run and then close the query. Six records match the criteria.

 

Create   a query in Design view, using both tables to answer the question What is the category, item name, sport,   company, and phone, for a category that begins with the letter S? Add the   fields in that order. Sort the records first in ascending order by the   Category field and then in ascending order by the Item Name field. Run the   query, save it as Cap1 S Category Query,   and then close it. Eighteen records match the criteria.

 

Create   a query in Design view, using the Cap1 Inventory table to answer the question   For each item name, display the cost   and calculate the markup for each item if marked up 36% of cost. In addition,   calculate the retail price by adding the cost and markup? Add the fields   in that order. Name the first calculated field Markup   and name the second calculated field Retail Price.   Run the query and apply Best Fit to all of the fields. All numeric fields   should be formatted as Currency, with 2 Decimal Places. Save the query as Cap1 Markup Query and close it.

 

Use   the Query Wizard to create a crosstab query using the Cap1 Inventory table.   Set the Category field as the row headings, and set the Supplier ID field as   the column headings. Count the Item ID field, and do not include row sums.   Name the query Cap1 Crosstab Query   and then finish the query. Run the query and apply Best Fit to all of the   fields. Save and close the query.

 

Create   a query in Design view using the Cap1 Inventory table that prompts you to   enter the Supplier ID, and then answers the question What is the supplier id, sport, category, item name, and cost for   inventory items, sorted in ascending order by the item name? Add the   fields in that order. The query should prompt an individual to Enter the Supplier ID. Run the query, and type SUPP-04 when prompted for the criteria. Two   records match the criteria. Save the query as Cap1 Parameter   Query   and close it.

 

Based   on the Cap1 Suppliers table, use the Form tool to create a form. Select the   form title, and apply Bold. Switch to Form view, and then using the form, add   a new record as follows:
Supplier ID: SUPP-12
Company: Beach Water Sports Inc
Email Address: info@watersports.biz
Phone: (305) 555-6543
Address: 14 South Beach Rd
City: Miami
State: FL
Postal Code: 33125
Use the Filter By Form tool to create a filter that displays records with a   State of VA   or FL. After verifying that two records   match this criteria, toggle the filter to display all twelve records. Save   the form as Cap1 Supplier Form   and close it.

 

Based   on your Cap1 Suppliers table, use the Report tool to create a new report.   Delete the following fields from the report: Supplier ID, Address, City,   State, and Postal Code. Delete the Page Number control. Apply the Facet theme   to this object only. Sort the Company field in ascending order. For the Phone   field, change the Width property to 1.25.   For the Company field, change the Left property to .75 and then close the Property Sheet.   Save the report as Cap1 Suppliers Report and   then close the report.

 

Use   the Report Wizard to create a report based on the Cap1 Inventory table. Add   the following fields to the report: Category, Sport, and Cost, in that order.   Group by the Category field. Sort in ascending order by Sport field. Find the   Average of the Cost field. Be sure that the Layout is Stepped and that the   Orientation is Portrait. For the report title, type Cap1 Average Cost by Category.   Delete the controls that begin with Summary for ‘Category’. Under Cost, click   any text box control, and then set the Width property to 1 and the Left property to 6. At the bottom of the report, in the   last column, select the last control that displays the average. Set the Width   property to 1   and the Left property to 6.5.   Close the Property Sheet. Save and close the report.

 

Close   all database objects. Open the Navigation Pane. Close the database, and then   submit for grading.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Java Quiz

Question 1 (1 point)

Question 1 Unsaved

Select the line of Java code that will correctly declare a float variable named average and assign the variable a value of 3.4.

Question 1 options:

  None of the above
  int average; average = 3.4;
  int average = 3.4D;
  int average = 3.4f;
  int average = 3.4;

Save

Question 2 (1 point)

Question 2 Unsaved

Select the correct line of Java code to assign 1000 to an int variable named myValue.

Question 2 options:

  int myValue = 1000;
  int myValue = 0x3E8;
  int myValue = 0b1111101000;
  All of the above
  None of the above

Save

Question 3 (1 point)

Question 3 Unsaved

Which of the following is an invalid Java statement:

Question 3 options:

  System.out.println(“Hello, World! “);
  int d = 14;
  d++;
  x + y/100;
  None of the above

Save

Question 4 (1 point)

Question 4 Unsaved

Which of the following statements is a comment in Java

Question 4 options:

  / This is a test
  public class Hello {
  // This is a test. //
  (String[] args)
  None of the above

Save

Question 5 (1 point)

Question 5 Unsaved

Will the following Java code compile and run?

public class QuizItem  {    public static void main(String[] args)       {           final int age = 38;      System.out.println(“Age is ” + Age);    } }

Question 5 options:

  Yes
  No

Save

Question 6 (1 point)

Question 6 Unsaved

What is the output from the following Java code?

public class Week1Quiz {

public static void main (String[] args) {

System.out.println (“Welcome”);

System.out.println (“to”);

System.out.print (“UMUC!”);

}

}

Question 6 options:

  Welcome to UMUC!
  No output as the code will not compile.
  Welcome to UMUC
  None of the above
  WelcometoUMUC

Save

Question 7 (1 point)

Question 7 Unsaved

What character is assigned to the variable myChar in the following line of Java code?

char value = ‘\u0023’;

Question 7 options:

  #
  y
  null
  ?
  X

Save

Question 8 (1 point)

Question 8 Unsaved

Will the following Java code compile and run without errors? public class QuizItem  {    public static void main(String[] args)       {           final int age = 38;      age = 39;       System.out.println(“Age is ” + age);    } }

Question 8 options:

  Yes
  No

Save

Question 9 (1 point)

Question 9 Unsaved

You are designing a program for users to enter whole numbers that range from -200 to 2147483648. What Java data type will best satisfy this range of numbers?

Question 9 options:

  int
  long
  byte
  char
  short

Save

Question 10 (1 point)

Question 10 Unsaved

Given the following sequence of Java code: int var = 4; var++; var = var + 2; var–; var = -var;   What is the final value of var?

Question 10 options:

  4
  -6
  8
  -9
  None of the above

Save

Question 11 (1 point)

Question 11 Unsaved

You are designing a program for users to enter whole numbers that range from -100 to 127. What Java data type will best and most efficiently satisfy this range of numbers?

Question 11 options:

  int
  char
  byte
  long
  short

Save

Question 12 (1 point)

Question 12 Unsaved

Given the following sequence of Java code: int var1 = 9; int var2 = 12; boolean failure = false; int result = failure ? var1 : var2; What is the value of result after executing the code?

 

Question 12 options:

  12
  9:12
  9
  3
  0.75

Save

Question 13 (1 point)

Question 13 Unsaved

Select the Java code that will correctly declare a boolean variable named success and assign it a value of false.

Question 13 options:

  Boolean success = true;
  int success = false;
  None of the above
  boolean success = 1;
  boolean success = 0;

Save

Question 14 (1 point)

Question 14 Unsaved

Given the following sequence of Java code: int var1 = 9; int var2 = 12; int var3 = 12;   Which of the following statements evaluate to true

Question 14 options:

  var1 != var2
  var1 < var2
  var1 <= var2
  var2 == var3
  All of the above

Save

Question 15 (1 point)

Question 15 Unsaved

What is the output from the following Java code?

public class Week1Quiz {

public static void main (String[] args) {

System.out.print (“Welcome”);

System.out.print (“to “);

System.out.println (“UMUC”);

System.out.print (“!”);

}

}

Question 15 options:

  WelcometoUMUC
  Welcome to UMUC
  Welcome to UMUC !
  No output as the code will not compile.
  None of the above

Save

Question 16 (1 point)

Question 16 Unsaved

What Java keyword can used to create a named constant?

Question 16 options:

  static
  default
  final
  enum
  public

Save

Question 17 (1 point)

Question 17 Unsaved

If we declared the following variables in Java

int age = 27;           int cafe = 0xCAFE;      int number1 =0b0001;   What is the output for the following Java statement?

System.out.println(age + cafe + number1);

Question 17 options:

  2720001
  51994
  54,false,A5194327
  None of the above

Save

Question 18 (1 point)

Question 18 Unsaved

A non-local boolean variable is declared with the following Java code:

boolean myVar;

What is the value of myVar?

Question 18 options:

  true
  false
  null
  Unknown
  None of the above

Save

Question 19 (1 point)

Question 19 Unsaved

Given the following sequence of Java code: int var1 = 4; int var2 = 6; int var3 = 10; int results = (var1 + var2) * var3 /(var1 + var3) – var2%var1; What is the values of results after executing the code?

Question 19 options:

  6
  5
  -2
  9
  None of the above

Save

Question 20 (1 point)

Question 20 Unsaved

Given the following sequence of Java code: int var1 = 9; int var2 = 12; int var3 = 12; Which of the following statements evaluate to true

Question 20 options:

  (var1 == var2) || (var1 < var2)
  (var1 == var2) && (var1 < var2)
  !(var2 == var3)
  (var2 <= var3) && (var2 < var1)
  None of the above

Save

Question 21 (1 point)

Question 21 Unsaved

What is the filename extension used for all Java source files.

Question 21 options:

  .js
  .java
  .javac
  .cs
  None of the above

Save

Question 22 (1 point)

Question 22 Unsaved

From the list of Java variable names below, select the illegal variable name.

Question 22 options:

  K149a$
  2ForMe
  XXXXXXXXXXXXXXYYYYYYYYYYYYYYYzzzzzzzzzzzzzzzz
  Johns1290sX4k
  NoneForYou

Save

Question 23 (1 point)

Question 23 Unsaved

What must be installed on a computer to be able to run bytecodes?

Question 23 options:

  Java Virtual Machine (VM)
  Microsoft Visual Basic
  Ubuntu Server
  Oracle Database (11g or higher)
  None of the above

Save

Question 24 (1 point)

Question 24 Unsaved

What is the filename extension used for all Java compiled files.

 

Question 24 options:

  .cs
  .javac
  .bytes
  .class
  None of the above

Save

Question 25 (1 point)

Question 25 Unsaved

What development tool do you use to launch Java bytecodes?

Question 25 options:

  java
  javadoc
  javac
  jconsole
  All of the above
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Clemenson Imaging LLC

Procedures

Clemenson Imaging
Second Quarter Mobile Image Procedures
Technician Location Date Patients Image Type Category
Donna McFarland Green Bay 4/4/16 4 Dexascan Scheduled
MaryAnne Vonbank Manitowoc 4/8/16 5 CT Scan Walk-in
Jonathan Douglas Appleton 4/10/16 1 MRI Walk-in
Samantha Woods Green Bay 4/20/16 6 Ultrasonography Walk-in
Annie Olander Green Bay 4/22/16 5 Angiography Scheduled
Patti Lynfield Manitowoc 4/27/16 3 Dexascan Scheduled
James Boyd Manitowoc 4/30/16 4 MRI Scheduled
Donna McFarland Appleton 5/2/16 1 MRI Scheduled
MaryAnne Vonbank Appleton 5/5/16 3 Angiography Walk-in
Annie Olander Green Bay 5/8/16 2 Angiography Scheduled
Patti Lynfield Appleton 5/10/16 6 Ultrasonography Walk-in
James Boyd Manitowoc 5/12/16 2 Ultrasonography Scheduled
Donna McFarland Manitowoc 5/14/16 3 MRI Scheduled
MaryAnne Vonbank Appleton 5/16/16 12 Dexascan Scheduled
MaryAnne Vonbank Appleton 5/18/16 5 Dexascan Walk-in
Jonathan Douglas Green Bay 5/20/16 3 CT Scan Walk-in
Samantha Woods Appleton 5/22/16 1 CT Scan Scheduled
Annie Olander Green Bay 5/24/16 4 MRI Scheduled
Patti Lynfield Manitowoc 5/26/16 4 MRI Walk-in
James Boyd Manitowoc 5/28/16 8 CT Scan Walk-in
Jonathan Douglas Appleton 5/30/16 2 CT Scan Walk-in
Samantha Woods Appleton 6/1/16 3 MRI Scheduled
Annie Olander Green Bay 6/3/16 1 MRI Scheduled
Patti Lynfield Manitowoc 6/5/16 6 Ultrasonography Scheduled
MaryAnne Vonbank Appleton 6/7/16 1 MRI Scheduled
Donna McFarland Appleton 6/9/16 7 Dexascan Walk-in
James Boyd Green Bay 6/11/16 7 Dexascan Scheduled
Jonathan Douglas Appleton 6/13/16 8 CT Scan Walk-in
Annie Olander Green Bay 6/15/16 3 CT Scan Scheduled
Patti Lynfield Manitowoc 6/17/16 2 Angiography Scheduled
MaryAnne Vonbank Appleton 6/19/16 1 Angiography Scheduled
Donna McFarland Green Bay 6/21/16 8 Ultrasonography Walk-in
James Boyd Manitowoc 6/23/16 4 Ultrasonography Walk-in
Jonathan Douglas Appleton 6/25/16 3 Angiography Scheduled
MaryAnne Vonbank Green Bay 6/27/16 1 MRI Scheduled
Patti Lynfield Manitowoc 6/29/16 3 MRI Scheduled

Summary

Clemenson Imaging
Second Quarter Summary
Technician Procedure # of Patients
MRI
CT Scan
Angiography
Angiography
MRI
MRI
CT Scan
Patient Category Location # of Patients
Scheduled Appleton
Walk-In Green Bay

Technicians

Boyd Douglas Lynfield McFarland Olander Vonbank Woods
James Jonathan Patti Donna Annie MaryAnne Samantha

Financials

Clemenson Imaging, LLC
Purchase and Training Cost Analysis
Cost of CT Scan Equipment -$200,000
Cost of Staff Training -$25,000 Net Present Value
Additional Revenue Year 1 $30,000
Additional Revenue Year 2 $30,000
Additional Revenue Year 3 $45,000
Additional Revenue Year 4 $45,000
Additional Revenue Year 5 $48,000
Additional Revenue Year 6 $48,000
Additional Revenue Year 7 $50,000

Times

Clemenson Imaging
Time Duration for Procedures in Hours
Patient ID Location Image Type Start End Duration
CL024 Green Bay Dexascan 9:15 AM 9:30 AM
CL027 Manitowoc CT Scan 1:00 PM 1:45 PM
CL030 Appleton MRI 10:15 AM 11:30 AM
CL033 Green Bay Ultrasonography 9:00 AM 10:00 AM
CL036 Green Bay Angiography 2:30 PM 4:15 PM
CL039 Manitowoc Dexascan 10:30 11:00 AM
CL042 Manitowoc MRI 2:45 PM 4:15 PM
CL045 Appleton MRI 8:00 AM 10:30 AM
CL048 Appleton Angiography 1:30 PM 3:45 PM
CL051 Green Bay Angiography 3:00 PM 4:45 PM
CL054 Appleton Ultrasonography 1:00 PM 1:45 PM
CL057 Manitowoc Ultrasonography 11:30 AM 1:45 PM
CL060 Manitowoc MRI 10:15 AM 11:30 AM
CL063 Appleton Dexascan 10:30 11:00 AM
CL066 Appleton Dexascan 11:00 AM 11:20 AM
CL069 Green Bay CT Scan 2:15 PM 3:30 PM
CL072 Appleton CT Scan 3:30 PM 5:00 PM
CL075 Green Bay MRI 8:00 AM 11:00 AM
CL078 Manitowoc MRI 9:00 AM 11:30 AM
CL081 Manitowoc CT Scan 4:00 PM 5:30 PM
CL084 Appleton CT Scan 8:00 AM 9:45 AM
CL087 Appleton MRI 12:00 PM 2:30 PM
CL090 Green Bay MRI 2:15 PM 4:45 PM
CL093 Manitowoc Ultrasonography 1:00 PM 1:45 PM
CL096 Appleton MRI 10:15 AM 11:30 AM
CL099 Appleton Dexascan 11:00 AM 11:20 AM
CL102 Green Bay Dexascan 8:00 AM 8:20 AM
CL105 Appleton CT Scan 2:00 PM 3:30 PM
CL108 Green Bay CT Scan 3:00 PM 3:45 PM
CL111 Manitowoc Angiography 4:00 PM 4:45 PM
CL114 Appleton Angiography 3:45 PM 5:00 PM
CL117 Green Bay Ultrasonography 11:00 AM 11:20 AM
CL120 Manitowoc Ultrasonography 12:00 PM 1:30 PM
CL123 Appleton Angiography 4:00 PM 4:45 PM
CL126 Green Bay MRI 10:15 AM 11:30 AM
CL129 Manitowoc MRI 9:00 AM 11:15 AM
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Midwest Health Systems: Case Analysis Assignment

Midwest Health Systems

Case Analysis Assignment

In this case, the context is Midwest Health Systems (Midwest) and the scenario is evaluating a enterpise information security architecture. Your analysis of this case will be framed around a number of questions that are presented at the end of this writeup. As laid out in our syllabus, your analysis should, at minimum, meet the “2-why” standard.

While you can find a number of strategies out there for conquering case analyses (many of them are very good), I recommend the approach of reading the case at least once without consideration of the questions. That opens the mind up to absorbing details that might otherwise erroneously get dismissed in a “know the questions, hunt for the answers” type of approach. After that, lay our your outline with each question framing a new major section. Then, re-read the case analysis and as you go through, build the outline of your answer with references to page numbers so you can quickly go back. Once the outline is built, you should have a clean connection between your point and some evidence from the case. At that point, it is a matter of polishing the communication without inadvertently changing the thesis.

The case can be found in your Harvard Coursepack, referenced in the Materials section of our syllabus. The case analysis must be submitted through Blackboard in Microsoft Word or .pdf format before 11:59pm Sunday, March 28th.

Case Analysis Questions:

1. Identify the IT general control risks evident from the case. For each risk identified, identifiy possible controls to mitigate those risks and explain why you believe the control would work.

2. Define residual risk and then identify at least three such risks from the case, mapping those examples conceptually to your definition of residual risk.

3. Do you agree with the audit team’s conclusion that the only significant areas of concern in IT general controls are access security and change management? Please explain your answer at a “2-why” minimum standard.

4. What course(s) of action do you recommend that Nelson take based on your analysis of identified risks and suggested controls?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

E-Commerce Security Plan

Review figure 5.12, Developing an E-Commerce Security Plan. (Attached File)

 

Create a detailed outline for a security plan for the e-commerce website you prototyped in Week Two. (See attached file for week two prototype)

 

Include at least five subtasks for each of the five major tasks/steps listed in the figure.

 

Provide a description of the security risks most likely to be encountered.

Wall-Mart Website Improvement

Lasha Ruff

Prototype for Walmart

Current-Status Improvement
Economized white spaces, too many clicks toward an objective, distracting elements etc. Focusing on Readability.
Too many clicks and scrolling, disturbing data collection forms, etc. Effortless Usage. Clear up busy areas.
Frequent downtime and high response time. Improve response time and availability.

 

 

Snippet from site shows the large selection of items Wal-Mart has but presents too many clicks and scrolling on the user’s part creating disturbing data collection forms and overbearing functionality. To correct this I would take out every other row outlined in black as shown.

3

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Analyzing-And-Visualzing-Data.

Initial Post

Kirk (2016) tells us that all requirements and restrictions of a project must be identified.  Select 1 key factor below and discuss why Kirk (2016) states it will impact your critical thinking and shape your ambitions:

  • People: stakeholders, audience.
  • Constraints: pressures, rules.
  • Consumption: frequency, setting.
  • Deliverables: quantity, format.
  • Resources: skills, technology

Reference: Kirk, Andy. Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications

first student post

 

I chose “Resources: skills, technology” to discuss why Kirk states it will impact my critical thinking and shape my ambition.
Skills, you must take inventory of the available capabilities on the team. You may take inventory of yourself, on the personal capabilities that you possess. Not only offer what skills you have and what skills you don’t, but also which of these skills are you good at. What skills go you have available as a team and what weaknesses exist. Working as a team some skills can be compensated for or enhanced. By recognizing the available talent in the group, you should choose and place wisely to optimize available resources. The availability and optimal utilization (critical thinking) of skills can shape ambition.

Technology tools are plentiful for data visualization and becoming more and more holistic. Meaning there are some packages that will do almost everything, as a complete suite. In previous times, varying tools were used to accomplish different tasks. Different tasks entailed the many stages of prepping the data, developing the data, and visually presenting the data. Now technological tools accomplish almost every task. However, cleaning the data is sometimes a manual task and may require writing custom code in languages such Python and R. (The R Project for Statistical Computing, 2018)

Skills must be learned, enhanced, and adapted to ever changing technology. Skills must have the underlying principles that are developed as critical thinking when stepping though a process and knowing the correct and efficient direction. Having clear knowledge of data analysis principles allows ambition to grow, knowing you can accomplish the task. Possessing the skills (principle fundamentals and critical thinking), and technology allow you to “embrace the constraints” and “heighten your creative senses and lead to successful, innovative solutions”. (Kirk, 2016)

second student post

 

  • People: Stakeholders, audience  One of the most important parts of your stakeholder mapping is to identify the impact a stakeholder can have on the success of your project. Keep it simple. High or low is often enough. The impact that a stakeholder can have is a combination of two things; Their formal authority and also their ability to influence others. At the top of the tree of influence are Apex Stakeholders. They can influence other stakeholders without being easily influenced themselves. Make it your priority to find these people and bring them over to your point of view. Once you do, you will be able to use their influence as a lever to amplify your own.  Stakeholders are a major part of the project. Everything in a project should go the way they want and if not, it would be difficult for the people who worked on the project. These stakeholders can be really helpful in helping secure your future. The ideas and the works that have been found under the supervision of the stakeholders, benefits people and help them in a lot of ways.  Theories, concepts and models of audiences, stakeholders or publics, public relations and communication are important because they help us understand and explain our public relations campaigns and the situations these campaigns address. They determine how we plan and conduct public relations. Thus the different theories we hold will lead to different ways of planning and practicing public relations.

and   Assignment 2

 

Complete the “Police Killings” Exercise located at the following link:

http://book.visualisingdata.com/chapter/chapter-4

Working With Data

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

computer science

Copyright Cengage Learning. Powered by Cognero. Page 1

Quiz 1: Name:____________________________________

1. For each user, Windows 10 can reserve a special area called a(n) ____ where each user can keep his or her own files. a. password b. Microsoft account c. log in d. locked 2. Which of the following is a set of instructions written for a computer? a. program b. Microsoft account c. log it d. password 3. A(n) ____ is an action you take with your fingertip directly on the screen, such as tapping or swiping. a. pointer b. log in c. gesture d. sign in 4. The Windows 10 desktop has controls, also known as its ____, that allow you to interact with the Windows 10 operating system. a. gestures b. tiles c. apps d. user interface 5. The Start menu includes variously-sized shaded rectangles, called ____ . a. icons b. tiles c. apps d. gestures 6. Each tile represents a(n) ____. a. app b. gesture c. icon d. gadget 7. At the bottom of the Windows 10 desktop is a bar called the ____, with buttons representing commonly used programs and tools. a. startup bar b. apps bar c. live bar d. taskbar 8. In Windows 10, a feature called ____ updates content in some Windows 10 apps. a. Windows updater b. live updates c. live tile d. live app 9. Windows apps are also known as ____ apps. a. universal b. static c. live d. traditional 10. ____ apps are fully-featured programs that may be available at an online store or on disk. a. Universal b. Static c. Desktop d. Single-user 11. Microsoft _____ is the new Microsoft web browser that lets you display and interact with webpages. a. WordPress b. Edge c. Webzilla d. Cortana 12. A pointing device controls the movement of the ____. a. status bar b. cursor c. taskbar d. mouse pointer

 

 

Copyright Cengage Learning. Powered by Cognero. Page 2

13. Clicking and double-clicking are two of the five _____. a. desktop actions b. pointing device actions c. pointing device apps d. operating system actions 14. The area below the title bar is called the ____ and it contains tabs, commands, and the Address bar. a. document window b. Ribbon c. taskbar d. Application bar 15. The area at the top of the window, which displays the name of the window, is called the ____. a. title bar b. App bar c. taskbar d. options bar 16. ____ are groupings of buttons and other controls you use to interact with an object or a program. a. Pointers b. Tabs c. Apps d. Files 17. Buttons act as ____, which instruct Windows to perform tasks. a. select statements b. pointers c. commands d. gestures 18. The ____ shows the name and location of the item you have open. a. taskbar b. address bar c. title bar d. status bar 19. You can ____ a desktop icon, such as the Recycle Bin, by left-clicking it with the mouse pointer and dragging it. a. move b. delete c. duplicate d. organize 20. ____ also work well on tablets and phones. a. Windows apps b. Desktop apps c. Charms d. Operating apps 21. Some smaller desktop apps, called Windows ____, such as Paint, come already installed in Windows 10. a. utilities b. operating apps c. accessories d. default apps 22. The Windows ___ is an app that lets you find all kinds of apps for use on Windows personal computers, tablets, and phones. a. Deal b. Try c. Swap d. Store 23. When you start an app, its _____, a frame displaying the app’s tools, opens. a. dialog box b. icon c. window d. rectangle 24. Buttons are often organized on a ____ into tabs, and then into groups. a. Ribbon b. panel c. palette d. status bar

 

 

Copyright Cengage Learning. Powered by Cognero. Page 3

25. Most buttons open menus and some open ____. a. submenus b. dialog boxes c. panels d. apps 26. In the Paint program, the white drawing area is called the ____. a. paper b. artboard c. workspace d. canvas 27. You can use the Windows 10 ____ app to learn more about help options. a. Support b. Technical Help c. Getting Started d. Info 28. When shutting down the computer, after clicking Start buton, you then click ____ for a list of shut down options. a. Power b. Options c. Exit Windows d. Controls 29. Which option for ending a Windows 10 session completely turns off the computer? a. Shut down b. Exit c. Log off d. End 30. Which button on the desktop do you click to examine your existing folder and file structure? a. Internet Explorer b. File Explorer c. Windows Explorer d. Desktop Explorer 31. A ____ is a three- or four-letter sequence, preceded by a period, that identifies the file type. a. filename b. file extension c. file suffix d. file property 32. In the Save As dialog box, below the Address bar, the ____ contains command buttons that you can click to perform actions. a. navigation bar b. taskbar c. File list d. toolbar 33. __________ is a Windows 10 program that creates files in RTF format. a. Explorer b. FileMaker c. WordPad d. Paint 34. What is the typical drive letter for the hard drive? a. A: b. B: c. C: d. D: 35. A USB Flash drive is a(n) ____ disk. a. floppy b. hard drive c. internal d. removable 36. When you view the File list on the C: drive, you will see the ____ folder. a. Users b. People c. Creators d. Files 37. The Documents folder is in the ____ folder. a. Users b. My Files c. My Computer d. People

 

 

Copyright Cengage Learning. Powered by Cognero. Page 4

38. The set of appearance choices for files and folders is known as the ____. a. Hierarchy b. View c. Design d. Order 39. Windows 10 offers eight different ____ for viewing your files and folders. a. styles b. designs c. themes d. layouts 40. The Sort by button allows you to sort your files using several ____. a. criteria b. lists c. languages d. prompts 41. While looking at your list of files and folders, you can also preview them without ____ them. a. deleting b. copying c. opening d. closing 42. Which tab in Windows do you use to open a file? a. New b. File c. Open d. Edit 43. Making changes to a document is also known as ____. a. processing b. editing c. fixing d. changing 44. When you save an existing file, the ____ dialog box does not open. a. New b. Exit c. Save As d. Save 45. If you open a file and make changes to it and then save the changes, that file has been ____. a. edited b. duplicated c. formatted d. saved as another file 46. A copy or replacement of a file is known as a(n) ____. a. extra b. double c. dupe d. backup 47. When you copy a file, a duplicate remains on the ____. a. clipboard b. flash drive c. hard drive d. desktop 48. In File Explorer, the New Folder button is in the New group on the ____ tab on the Ribbon. a. Edit b. Home c. File d. New 49. When you cut and paste a file, you are actually ____ it. a. deleting b. storing c. moving d. copying 50. To rename a file in File Explorer, click the Rename button in the ____ group. a. File b. Naming c. Filter d. Organize

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

For Kenzym04

1. List the seven OSI layers in the indicated sequence where layer 7 is closest to the end user.

Layer 7:

Layer 6:

Layer 5:

Layer 4:

Layer 3:

Layer 2:

Layer 1:

2. Compare the total number of links in an 11 node network for:

a) Mesh Topology

b) Star Topology (counting the hub as one of the nodes)

c) Ring Topology

d) Bus Topology

3. Which OSI layer, by number or name, is most applicable to the following? (Note: All layers are represented at least once)

__________ a) Addressing messages between two processes

__________ b) Bits:

__________ c) Congestion control:

__________ d) Determine where a frame starts and ends

__________ e) Frames

__________ f) Internet browsers

__________ g) Establishing, maintaining, and terminating a Session:

__________ h) Translation between different coding systems

__________ i) Route Determination

__________ j) Interface to transmission media

4. Use the OSI Model Learning Object to determine which OSI layer, by number or name, is most applicable to the following protocols.

(Note: All layers are represented at least once)

___________a) CDR – Common Data Representation

___________b) IPSec – Internet Protocol Security Protocol

__________ c) WEP – Wired Equivalent Privacy

_________ d) PAP – Password Authentication Protocol

__________ e) SMTP – Simple Mail Transfer Protocol

__________ f) TLS –Transport Layer Security

__________ g) SSH – Secure Shell

__________ h) X.21:a – a specification for serial communications over synchronous lines

1

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Write A Proposal For A Visual Basic Project

Application Design Documentation

Your assignment is to create initial design documentation for a proposed final application project. Your final project for this class will require building a complete application of your choosing and design in Visual Studio. The application may be written in either Visual Basic, Visual C#, or a combination of both languages.

 

Your final project must be a Windows application that involves at least five (5) of the programming techniques used in this class. You must use the .Net Framework classes and create derived classes from them (counts as one technique). The other four (4) techniques are up to you.

For example, you could use forms, data validation, structures, and animation. While you have not yet covered all of the techniques, you now have a good idea of the kind of skills you will gain in the course. Providing this proposal now allows you to work on the project while you are completing the course.

 

This assignment creates the proposal and design document for your final project in this class. Submit the document in a Word-readable format (.docx, .doc, .rtf, .txt). The following tasks should be outlines in your design document.

 

State the application you wish to create for your final project. Justify why you feel this application will effectively demonstrate your programming skill. List and describe the five (5) techniques you will demonstrate through creating the application. This means writing the name of the technique, stating and discussing why you believe it is important, and describing how you will implement the technique.

NOTE: Think about what you can do and how much time it will take. How can you create an interesting application quickly and easily? Think seriously about what coding tasks were easy or interesting for you versus what tasks you disliked. Your goal is to design a practical project that you can complete during this course.

 

DO NOT PROPOSE OR SUBMIT A PROJECT FROM THE TEXTBOOK!

Please submit your design document to your instructor for grading.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Assignment-ACCESS DataBase

I already have the solution Manual to this attached (I need this translated in Access Database with different screenshots. Final Solution should include an Access DB file and all quetions answered in Word (in own words)with screenshots)

San Juan Sailboat Charters (SJSBC) is an agency that leases (charters) sailboats. SJSBC does not own the boats. Instead, SJSBC leases boats on behalf of boat owners who want to earn income from their boats when they are not using the boats themselves, and SJSBC charges the owners a fee for this service. SJSBC specializes in boats that
can be used for multiday or weekly charters. The smallest sailboat available is 28 feet in length, and the largest is 51 feet in length.

Each sailboat is fully equipped at the time it is leased. Most of the equipment is provided at the time of the charter. The majority of the equipment is provided by the owners, but some is provided by SJSBC. Some of the owner-provided equipment is attached to the boat, such as radios, compasses, depth indicators and other instrumentation, stoves, and refrigerators. Other owner-provided equipment is not physically attached to the boat, such as sails, lines, anchors, dinghies, life preservers, and equipment in the cabin (dishes, silverware, cooking utensils, bedding, and so on). SJSBC provides consumable supplies such as charts, navigation books, tide and current tables, soap, dish towels, toilet paper, and similar items. The consumable supplies are treated as equipment by SJSBC for tracking and accounting purposes. Keeping track of equipment is an important part of SJSBC’s responsibilities. Much of the
equipment is expensive, and those items not physically attached to the boat can be easily damaged, lost or stolen. SJSBC holds the customers responsible for all of the boat’s equipment during the period of their charter.
SJSBC likes to keep accurate records of its customers and charters, and customers are required to keep a log during each charter. Some itineraries and weather conditions are more dangerous than others, and the data from these logs provides information about the customer experience. This information is useful for marketing purposes, as well as
for evaluating a customer’s ability to handle a particular boat and itinerary. Sailboats need maintenance (two definitions of boat are: (1) “break out another thousand” and (2) “a hole in the water into which one pours money”). SJSBC is required by its contracts with the boat owners to keep accurate records of all maintenance activities and costs.

A. Create a sample list of owners and boats. Your list will be similar in structure to that in Figure 1-30, but it will concern owners and boats rather than owners and pets. Your list should include, at the minimum, owner name, phone, and billing address, as well as boat name, make, model, and length.

B. Describe modification problems that are likely to occur if SJSBC attempts to maintain the list in a spreadsheet.

C. Split the list into tables such that each has only one theme. Create appropriate ID columns. Use a linking column to represent the relationship between a boat and an owner. Demonstrate that the modification problems you identified in part B have been eliminated.

D. Create a sample list of owners, boats, and charters. Your list will be similar to that in Figure 1-31. Your list should include the data items from part A as well as the charter date, charter customer and the amount charged for each charter.

E. Illustrate modification problems that are likely to occur if SJSBC attempts to maintain the list from part D in a spreadsheet.

F. Split the list from part D into tables such that each has only one theme. Create appropriate ID columns. Use linking columns to represent relationships. Demonstrate that the modification problems you identified in part E have been eliminated.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!