Posts

Computer Science homework help

Computer Science homework help

POST I HAVE TO WRITE ABOUT

SaaS, PaaS, IaaS, and IDaaS are crucial components in any Cloud solution. It is important to understand how they work individually and how they complement each other. Describe how SaaS, PaaS, IaaS, and IDaaS can work together as a parts of a Cloud solution. Is there any way that they might detract from each other?

 

 

POST 1 I HAVE TO REPLY TO

Software as a service (SaaS), Platform as a service (PaaS), Infrastructure as a service (IaaS), and Identity as a service (IDaaS) are all part of the cloud and can work together or separately depending on the what need or needs the end user is fulfilling. The end user can be an individual, small business or corporation. Cloud computing is essentially the internet, we all use it and it grows more and more every day. ”For it to be considered ‘cloud computing,’ you need to access your data or your programs over the Internet.” (2016) as stated in an article in PC magazine. Cloud computing has become a multibillion dollar a year business for companies like Amazon. Who stated that revenue jumped 25 percent in the 4th quarter alone in 2018. With Amazon Web Services (AWS), individuals to governments use from one to all four as a service (aaS) functions on a metered pay-as-you-go basis. So, in no way do any of the services “detract” from on another. Each service is designed to work individually or together depending on the needs of the end user.

References

Griffith (May 3, 2016) What is Cloud Computing retrieved from https://www.pcmag.com/article/256563/what-is-cloud-computing

No Author (2019) Webpage retrieved from https://aws.amazon.com/

 

 

POST 2 I HAVE TO REPLY TO

 

SaaS, PaaS,IaaS, and IDaaS could function together as part of a Cloud solution because each component bring a different task to the table. By utilizing all solutions, the user is given more protected access to the cloud, a framework in which the cloud can employ and liaise,effectively transform the environment in which they are active, and have admittance to programs that might be required for individual operators without the burden costs of buying licenses in bulk.

Unfortunately, i was unable to find any pertinent information concerning any of these solution functioning independently but here are my sources:

A simple guide to Cloud Computing, IaaS,PaaS,BaaS,DBaaS,IPaaS,APIMaaS, (2015, April 01) Retrieved April 02,2019 from https://cloudramblings/me/2014/02/11/a-simple-guide-to-cloud-computing-iaas-paas-baas-dbaas-ipaas-idaas-apimaas/ (Links to an external site.)Links to an external site.

Understanding the Cloud Computing Stack: SaaS,PaaS,IaaS. (n.d.) Retrieved April 02,2019 from

https://support.rackspace.com/white-paper/understanding-the-cloud-computing-stack-saas-paas-iaas/ (Links to an external site.)Links to an external site.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

COM520 Written Assignment 4

Assignment: Security Audit Procedure Guide

Assignment Requirements

This assignment requires you to prepare a procedure guide for a security audit in Ken 7 Windows Limited. Ken 7 Windows Limited has acquired several new servers and workstations to support the new enterprise resource planning (ERP) software. You want to ensure the new computers comply with Microsoft’s initial secure baseline. You choose to use the Microsoft baseline security analyzer (MBSA) tool to assess the basic security for all of your Windows computers. MBSA will identify many of the basic vulnerabilities found in Windows environments. MBSA’s vulnerability report provides a good starting point for securing new and existing Windows computers. You need to develop procedures to ensure that each computer in your environment has no reported vulnerabilities. Using the format below, describe the steps to follow to scan multiple computers for security vulnerabilities using MBSA. Include steps to research and address any reported vulnerabilities. Assume you plan to run MBSA on a new server that does not have MBSA installed. Fill in the details for each procedural step to audit each computer and address discovered vulnerabilities.

1) Acquire and install MBSA.

2) Scan computers.

3) Review scan results.

4) Identify vulnerabilities you need to address.

5) Document the steps to address each vulnerability.

 

Submission Requirements

 Format: Microsoft Word

 Font: Arial, Size 12, Double-Space

 Citation Style: APA Style

 Length: 1–2 pages

 

Self-Assessment Checklist

 I have properly organized the steps necessary for malware-free environment.

 I have given a proper justification of the following steps in the security audit procedure guide:

o Download and install MBSA.

o Use MBSA to scan multiple computers.

o Review the scan results.

o Identify vulnerabilities to mitigate.

o Document the steps necessary to mitigate selected vulnerabilities.

 

 

 

COM520 Written Assignment 4

Case Scenario:

Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Ken 7 Windows Limited carries a variety of Windows and related products. It supplies builders with all of the tools and supplies to install finished Windows in any type of building. Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software package to help control costs and increase both quality and customer responsiveness. The ERP software collects and stores information including:

• Raw material costs

• Labor costs

• Materials and labor requirements for products

• Purchasing requirements

Ken 7 Windows Limited has identified six basic roles for users in the new ERP software:

• Administrators—maintain ERP data and system operation.

• Planners—run planning software and generate requirements reports.

• Shop Floor users —enter operational data (receiving, shipping, and product progress during manufacturing).

• Managers—manage department personnel.

• Purchasing users—generate purchasing documents based on planning requirements.

• Accounting users—maintain cost and accounting data.

Access controls limit what users or roles can do with different types of data. For example, consider the following types of data:

• Cost information—raw materials and labor costs, including the cost of finished goods.

• Manufacturing details—cost, amount of labor, and time required to produce finished goods.

• Purchasing requirements—rules for determining when raw materials, components, or supplies should be purchased.

Through access control:

• Cost information can be viewed only by Accounting users.

• Manufacturing details can be viewed only by Shop Floor users.

• Purchasing requirement can be viewed only by Purchasing users.

During the analysis phase of the ERP implementation, Ken 7 Windows Limited raised concerns about users being able to access restricted data.

• Accounting users are able to login to shop floor computers.

• Purchasing users are able to access human resource (HR) applications and data.

The ERP implementation team suggested the following access control measures to protect restricted data.

• Create an organizational unit (OU) in Active Directory for shop floor computers.

• Deploy Group Policy Objects (GPOs) to restrict shop floor users to the shop floor OU.

• Define data access controls in the ERP software to deny access for all non-HR users to restricted data.

 

 

COM520 Written Assignment 4

Implementation of several access control measures helped Ken 7 Windows Limited to restrict the data access. Hence access control and authentication is important, as it helped Ken 7 Windows Limited in reducing costs and increasing profits.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

CSci 430 Spring 2019

Objectives:

ˆ Explore the Process state models from an implementation point of

view.

ˆ Practice using basic queue data types and implementing in C.

ˆ Use C/C++ data structures to implement a process control block and

round robin scheduling queues.

ˆ Learn about Process switching and multiprogramming concepts.

Description:

In this assignment you will simulate a Three-State process model (ready,

running and blocked) and a simple process control block structure as dis-

cussed in Chapter 3. Your program will read input and directives from a

le. The input describes a time sequence of events that occur. These are the

full set of events you will simulate:

1

Event Description

cpu The processor executes for 1 time step the currently running process

new A new process is created and put at tail of the ready queue

done The currently running process has nished

wait X The currently running process has done an I/O operation and

is waiting on event X

event X Event X has occurred, the process waiting on that event should

be made ready.

The input le will simply be a list of events that occur in the system, in

the order they are to occur. For example:

—– simulation-01.sim ——–

new

cpu

cpu

cpu

new

cpu

cpu

cpu

cpu

wait 1

cpu

cpu

event 1

cpu

cpu

done

cpu

cpu

cpu

cpu

exit

———————————-

Your task is to read in the events, and simulate the creation and execution

of processes in the system as they move through the various three-states of

their process life cycle. You need to:

2

ˆ Dene a simple process control block (PCB) to hold information about

all processes currently running in your system. The PCB can be a

simple C struct or a C++ class. At a minimum you need to have a

eld for the process identier and the process state (Ready, Running or

Blocked). You need to also keep track of the time step that the process

entered the system, and the number of steps the process has been

running. Minimal credit will be given to programs that at least handle

new events and create a process in a simulated PCB. You probably

need a list or an array to hold the current processes that have been

created and are being managed by your simulated system.

ˆ You will need a ready queue of some kind. You should use a C++

Standard Template Library (STL) container to manage your ready

queue.

ˆ You will need to implement a simple dispatcher function. Whenever

a cpu event occurs, and no process is currently running, you should

select the next Ready process from the head of your ready queue and

start it running on the processor.

ˆ You need to also implement a simple time slicing mechanism. The

time slice value to use will be passed into your program when it is

started. At the end of a cpu cycle, you should check if the currently

running process has executed for its full time quantum. In that case,

the currently running process should timeout, and be returned to the

end of the Ready queue.

ˆ new events should cause a new process to be created (including creating

its PCB and lling it in). New processes should be placed on the tail

of the ready queue after being created. You should assign each new

process a process identier. The process identier should be a simple

integer value, and you should start numbering processes from 1.

ˆ For a done event, if a process is currently running it should then be

released. It should be removed from the CPU, and not placed back on

the ready or blocked queue. If a done occurs when the CPU is idle,

then nothing will happen as a result of this event.

ˆ A wait event simulates the currently running process performing some

I/O operation. If a wait occurs, the currently running process should

become blocked and put on the blocked queue. You also need an entry

in the PCB so you know what event the process is waiting for. The

3

wait event is followed by an integer number, which is an indication of

the type of event the process has requested.

ˆ Likewise the event directive simulates the nishing of some I/O oper-

ation. When an event occurs, you should scan your blocked processes

and make any process ready that was waiting on that event. The in-

teger value following an event indicates the type of event that just

occurred.

You have been given some example event sequences (simulation-01.sim,

simulation-02.sim, etc.) along with the expected output for those sequence

of events (simulation-01.res, simulation-02.res, etc.). The output of your

program should be sent to standard output. The correct output for the

simulation-01.sim simulation is:

Time: 1

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=1,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 2

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=2,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 3

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=3,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 4

CPU (currently running):

4

pid=1, state=RUNNING, start=1, slice=4,

Ready Queue:

pid=2, state=READY, start=4, slice=0,

Blocked Queue:

EMPTY

Time: 5

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=5,

Ready Queue:

pid=2, state=READY, start=4, slice=0,

Blocked Queue:

EMPTY

Time: 6

CPU (currently running):

pid=2, state=RUNNING, start=4, slice=1,

Ready Queue:

pid=1, state=READY, start=1, slice=5,

Blocked Queue:

EMPTY

Time: 7

CPU (currently running):

pid=2, state=RUNNING, start=4, slice=2,

Ready Queue:

pid=1, state=READY, start=1, slice=5,

Blocked Queue:

EMPTY

Time: 8

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=1,

Ready Queue:

EMPTY

Blocked Queue:

pid=2, state=BLOCKED, start=4, slice=2, event=1

Time: 9

CPU (currently running):

5

pid=1, state=RUNNING, start=1, slice=2,

Ready Queue:

EMPTY

Blocked Queue:

pid=2, state=BLOCKED, start=4, slice=2, event=1

Time: 10

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=3,

Ready Queue:

pid=2, state=READY, start=4, slice=2,

Blocked Queue:

EMPTY

Time: 11

CPU (currently running):

pid=1, state=RUNNING, start=1, slice=4,

Ready Queue:

pid=2, state=READY, start=4, slice=2,

Blocked Queue:

EMPTY

Time: 12

CPU (currently running):

pid=2, state=RUNNING, start=4, slice=1,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 13

CPU (currently running):

pid=2, state=RUNNING, start=4, slice=2,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 14

CPU (currently running):

6

pid=2, state=RUNNING, start=4, slice=3,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Time: 15

CPU (currently running):

pid=2, state=RUNNING, start=4, slice=4,

Ready Queue:

EMPTY

Blocked Queue:

EMPTY

Your output to standard out should look exactly the same as this output

(i.e. if I do a di and your program is generating the correct output, then

there will be no dierence between the output your program generates and

the above output format). The output is generated by displaying the system

state after each cpu cycle executes. Basically we print out the system time.

Then we show which process (if any) is currently running on the CPU (or

say it is IDLE if no process is running). Then we display the queue of

processes currently on the Ready and Blocked queues. Note that the queues

are displayed in order. The top of the output corresponds to the head of the

queue. Thus when a new process is dispatched, the next one selected should

be the rst process listed from the ready queue in the previous system cycle.

I have given you some template code (p2-start.cpp) to get you started

The code is meant to be run from the command line, thus from a shell or

dos prompt you would do something like:

$ p2-start simulation-01.sim 5

i.e. the program expects two parameters on the command line, which

should be the name of a le that holds the events to be simulated, and the

value to be used for the time slice quantum. If you need to test your program

and can’t gure out how to invoke running it from the command line, you

can change the line in ‘p2-start.cpp’ to explicitly run a particular simulation

le, like this:

runSimulation(“simulation-01.sim”, time_slice_quantum)

7

However, you need to make sure that your program correctly works using

the command line invocation, as shown in `p2-start.cpp`.

I have given some template code to get you started in the le called

p2-start.cpp. I have already provided you with the code needed in order to

correctly parse the command line parameters for the program, and to open

and read in the simulation le events. Your job is to implement the necessary

actions and data structures to handle the simulated events described. The

runSimulation() in ‘p2-start.cpp holds example code and indicates locations

where you need to write your own functions to implement the simulation.

You can use this as a starting point to implement your solution.

Assignment Submission and Requirements

All source les you create for you solution (.c or .cpp/.c++ and .h header

les) should be uploaded to the MyLeo Online submission folder created for

this assignment by the deadline. You should not attach any les besides the

source les containing your C/C++ code. But you should make sure you

attach all needed les you create to your submission, so that I can compile

and run your solution.

You are required to write the program in standard C/C++ programming

language. You should use a relatively recent version of the C/C++ compiler

(C90 C++98 is ne, or the more recent C99 C++11 will also be acceptable),

and/or recent IDE that has an up to date compiler. You should only use

standard C/C++ libraries, do not use Microsoft specic or other third-party

developed external libraries. This page http://en.cppreference.com/w/

provides a good up to date reference of the libraries in the standard C++ and

C languages. You may use the C++ standard template library containers

(like the list and queue items) to implement the ready queue you need. We

will go over a simple implementation of a queue using pointers and/or arrays

in class, if you would like an example implementation in plain C that might

be simpler to use than learning the STL.

8

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Article 1:

Question:

Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsville University Staff and Faculty. Only two of the three votes are required to pass this policy. In this situation you are one of the two agreeing to a dress code. What steps might you take to gain the cooperation of the third party after the policy has been initiated.

 

The Dress code for Campbellsville University Staff and Faculty should be a Dark Maroon Tuxedo with white shirt which goes with the university corporate identity. We must consider few things before finalizing the dress code such as there shouldn’t be any gender/sex discrimination for selecting the dress code.

Present Study is focusing on the insights of the school teachers, leaders and students about their dress codes as one of the important factors of their education. Education effects each individual in our society, every individual has a right of equality and any type of discrimination will not be accepted at any level regarding the dress codes in schools. The study also focuses on how to contribute to get the solutions for the dress code problem. (Birel, 2016)

In 2009, Ceara Sturgis a senior student at Wesson filed a lawsuit in the following year against the county school district, the superintendent of the school, and the principal for removing her photograph from the year book, many other cases were filed in Indiana and Ohio for wearing the dresses which is associated with the opposite sex. (Johnson, 2017)

As I have been assigned to the committee of three, I will try to convince just one more member of the committee by providing sufficient ideas and examples paving way to the policy implementation and the rules and regulations that follows it. I will do a small-scale survey with the peers at my work place/staff and people with whom I interact to assess Campbellsville employees’s (both in teaching and non-teaching departments) thought process and opinion after sharing my ideas and thereafter I am planning to lay out my work in front of other committee members in negotiating and sorting out the differences.

 

Article 2:

Question:

Hypothetically speaking, you are assigned to a committee of three to decide on a dress code for Campbellsville University Staff and Faculty. Only two of the three votes are required to pass this policy. In this situation you are one of the two agreeing to a dress code. What steps might you take to gain the cooperation of the third party after the policy has been initiated.

 

University is an educational institution where students learn on different aspects of life apart from their academic programs. Students are supposed to learn how to interact and communicate with others across different settings. The mode of dressing plays an integral role in communication.  A person can be easily judged by his or her dress code. The staffs within the university are expected to serve as role models who are supposed to guide the young students in understanding the dressing influences their professional lives. The implementation of the dress code will provide a critical outline of a specific format within the university which can improve the perceptions among students regarding the need to adopt such measures.

The implementation of the dress code policy is expected to have a positive influence on the development of students who need guidance. Dress code within a professional setup is crucial in achieving a higher level of success or limit their chances of an individual to progress despite having the needed qualifications. Therefore, I will ensure that the students understand how their lives can be improved or ruined through their choice of dressing. An individual who has the authority must be able to dress sharply so that all can see the influence they have.

I will make emphasis on the need to outline essential concepts that define individual well being within a given setting. The reason why the policy has been initiated is to ensure that all the staff serves as a better example to students. The students look at their staff and the example they set regarding how they dress and interact with them. Therefore, adoption of the dress code policy is essential and considers that interests of all stakeholders within the institution. Students seek inspiration from different sources including the staff. Thus they should carry themselves in a much-organized manner to have a positive influence on student development.

 

Article 3:

Question:

Define and briefly discuss the following brainstorming techniques, the delphi technique, brainstorming, or nominal group technique.

 

Delphi Technique

Delphi Technique is unusual because it is based on group process using written responses from different locations to a bunch of questionnaires rather than a group of people making a decision by meeting physically in one room (Delbecq, 1975). The first question asks people to respond to a question, then the second question depends on the response to the first question, this process continues until all the group of people comes to the same point. The organizer of this event will decide whether to keep the responses from a group of people public or private. Michael Campion used this process when he was editor of the research journal Personnel Psychology to determine the qualities of a research article to become a great article. Using this technique, he gathered written responses from a number of top researchers from around the world and extracted good responses based on his criteria. He was able to finish the total process without even leaving out of his office (Campion, 1993).

Brainstorming Technique

Unlike Delphi technique, Brainstorming is a technique, where people gather together physically and share their ideas without any criticism during the process (Lewicki, 2015). Some research shows that the number of the ideas, the better idea comes at the end. In his process, if we can able to gather a different kind of people together from different backgrounds, then we will get great outcome or great decision at the end. We have another type of brainstorming, that is Wildstorming, where the group of people focuses more on the ideas that are not possible to implement or think, and then they discuss how to make it possible (Scott, 2004).

Nominal Group Technique

Nominal Group Technique is a technique that makes sure all the people in the group participate fully. If I’m not wrong, this technique is somewhat integration of both Delphi and Brainstorming technique. This technique is used people facing problems in solving some problem or generating ideas. This technique involves four steps (Delbecq, 1975). In the first step, each individual in the group write their ideas, then in the second step all the ideas will be shared with them, then in the third step, group members will discuss on each and every idea of theirs and in the fourth or final step, group members will vote for the idea which they will like most. By following this four-step method we can ensure that all the group members participated fully, this avoids the problem of free credits.

Article 4:

Question:

Define and briefly discuss the following brainstorming techniques, the delphi technique, brainstorming, or nominal group technique.

 

Brainstorming

Brainstorming is a popular group decision-making technique that is used for generating ideas. In brainstorming, the leader of the session presents a problem or question, clarifies the rules of the session and then the group offers ideas in a round-robin format. Ideas are written down so that every member can see them. Brainstorming does not solve the problem but helps generate creative ideas. As a result, quantity of ideas counts, and members do not criticize ideas. To be successful, the leader of a brainstorming session must understand the problem and be able to create a relaxed and creative air.

Delphi technique

The Delphi method helps the group reach consensus without the influence of strong members of the group and the tendency to rush for a decision at the end of a meeting. It is a structured variant of the traditional expert polls and is usually used in forecasting. In this method, a questionnaire is mailed to a group of experts; administrators aggregate the results and send a second questionnaire with the results of the first round. Several rounds of questionnaires and feedback help respondents reach consensus on the debated issue. The administrators of the Delphi method decide based on the results of the rounds.

Nominal Group Technique

This group decision-making technique is used to identify problems or to evaluate alternatives. In this technique, members of the group spend five to 10 minutes writing their ideas without discussion. Then, they report their ideas individually. Ideas are written on a flip chart, and individuals try to add to the ideas. In the next phase, group members vote or rank the ideas privately. With private voting, strong members of the group can not affect the results. After voting, the group discusses results and generates more ideas. The idea generation, voting and discussion cycle can continue until a satisfactory decision is reached.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

1. Using A Microsoft Word Document, Please Post One Federal And One State Statute Utilizing Standard Legal Notation And A Hyperlink To Each Statute.

1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.

2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.

Rubric for Assignment submission

Criterion

Description

Points possible

Content

Student posts one federal statute.

Student posts one state statute.

Student posts one federal case.

Student posts one state case.

5

5

5

5

Citation

Correct use of standard legal notation

 

 

I posted the question with the requirement which i need it no plaigarism

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

GO19_AC_CH02_GRADER_2F_HW – Student Publications 1.0

 

Project Description:

In this project, you will use a database to answer questions about student publications at a college. You will import an Excel spreadsheet as a new table in the database, create a relationship between two tables, and create queries using numeric, compound, and wildcard criteria using the fields in one or both tables. You will create calculated fields, group data when calculating statistics, create a crosstab query, and create a parameter query.

 

Start Access. Open the file Student_Access_2F_Student_Publications.accdb downloaded with   this project.

 

Import   the records from the downloaded Excel file named a02F_Student_Papers.xlsx as a new table named 2F Student Papers into the database. Use the first row   of the Excel worksheet as the table column headings, and set Paper ID as the   primary key. Complete the wizard and do not save the import steps. After   importing the records, open the 2F Student Papers table and change the data   type of the Student ID field to Short Text. Apply Best Fit to the table, and   then save and close the table.

 

Using   Publisher ID as the common field, create a one-to-many relationship between   the 2F Publishers table and the 2F Student Papers table. Enforce referential   integrity and enable both cascade options. Create a relationship report with   normal margins, and then save the report as 2F Relationship   Report.   Close all open objects.

 

Create   a query in Query Design view based on the 2F Student Papers table to answer   the question, What is the Student ID, Home Campus, Award Paid, and Publisher   ID for awards greater than or equal to $50, sorted in ascending order by the   Student ID field? Display the fields in the order listed in the question.   Five records match the criteria. Save the query as 2F Awards $50 or More Query.

 

Copy   the 2F Awards $50 or More Query to create a new query with the name 2F 2nd Qtr NW Students Query. Redesign the query to answer the   questions, Which students (Student ID) from the Northwest   campus had papers published between 4/1/22   and 6/30/22, and what was the Paper Name, the   Award Paid, and the Category, sorted in ascending order by the Publication   Date field? Do not display the Home Campus field in the query results, and   display the rest of the fields in the order listed in the question. Three   records display. Close the query, saving the changes to the query.

 

Create   a query in Query Design view based on the 2F Student Papers table to answer   the question, Which Paper IDs, Paper Names, and Category for students from   the Southeast and Northeast   campuses were published that had an Award Paid greater than $25, sorted in   descending order by the Award Paid field? Display the fields in the order   listed in the question. Six records match the criteria. Run the query (six   records display). Save the query as 2F SE OR NE Over   $25 Query,   and then close the query.

 

Create   a query in Query Design view based on both tables to answer the questions,   Which Paper Names were published with a Publisher Name that has Texas as part of its name, what is the   Contact Name and Contact Phone Number, and what was the Award Paid, sorted in   descending order by the Award Paid field? (Hint: Use a wildcard character in   the criteria row.). Run the query (eight records display). Save the query as 2F Texas Publishers Query, and then close the query.

 

Create   a query in Query Design view based on the 2F Student Papers table to answer   the question, In ascending order by the Paper ID field, what will be the Federation Donation to the Writing Lab if the Federation   donates an additional 50 (.5)   percent of each award paid to students? Run the query (the first record—Paper   ID P-01—has a Federation Donation of 20).

 

Display   the query in Design view. In the fourth column of the design grid, create a   new field named Total Donation   that will answer the question, What is the total value of each scholarship   after the alumni association donates an additional 50%? Run the query (the   first record—Paper ID P-01—has   a Total Donation of $60.00).

 

Display   the query in Design view. Use the Property Sheet to format the Federation   Donation field as Currency with 2 decimal places, and then close the Property   Sheet. Run the query (for the Paper ID P-20, the Federation Donation is   $22.50 and the Total Donation is $67.50). Apply Best Fit to the fields, save   the query as 2F Federation Donation   Query,   and then close the query.

 

Create   a query in Query Design view based on the 2F Student Papers table and the Sum   aggregate function to answer the question, What are the total awards paid for   each Category, sorted in descending order by the Award Paid field? Use the   Property Sheet to format the Award Paid field with 0 decimal places, and then   close the Property Sheet. Run the query (for the Category of Student Life,   the sum of the awards paid is $265). Apply Best Fit to the fields, save the   query as 2F Awards by Category   Query,   and then close the query.

 

Use   the Query Wizard to create a crosstab query based on the 2F Student Papers   table with the Home Campus field as row headings and the Category field as   column headings. Sum the Award Paid field, and name the query 2F Campus and Category Crosstab Query.   Display the query in Design view. Use the Property Sheet to format the last   two columns with 0 decimal places, and then close the Property Sheet. Run the   query, and then apply Best Fit to the fields. Save the changes to the query,   and then close the query.

 

Create   a query in Query Design view based on the 2F Student Papers table that   prompts you to Enter the Home Campus,   and then answers the question, What is the Home Campus, Student ID, Paper   Name, Category, and Publication Date for student publications, sorted in   ascending order by the Publication Date field? Run the query, and when   prompted, enter southwest   as the criteria (seven records display). Save the query as 2F Campus Parameter Query, and then close the query.

 

Save   and close the database, and then submit for grading.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Exp19_Word_Ch03_CAP_Boston

Word Chapter 3 Capstone – Boston (PC

 

Start Word. Download and open the file named Exp19_Word_Ch03_CAP_Boston.docx. Grader has automatically added your last name to the beginning of the filename.

Display nonprinting characters. With the insertion point at the beginning of the document, press ENTER. Return to the beginning of the document and insert a 3×2 table. Type Boston Travels in the first cell on the first row.

In the first cell of the second row, insert Boston1.png. Change the picture height to 1”. In the second cell of the second row, insert Boston2.png. Change the picture height to 1”. In the third cell of the second row, insert Boston3.png and resize it to 1”.

Click the Table Move handle to select the table. AutoFit table contents. Merge all cells on the first row, and apply Align Center alignment to the row. Change the font size of text in row 1 to 22 pt.

Cell margins provide space between a cell’s inside edges and the beginning of cell contents. By reducing cell margins, you remove some of the extra space so that cell contents are more nearly aligned at the edge of a cell. Because pictures are in this table’s cells, a neater arrangement is shown when there is very little space between them.

Apply a table style of Grid Table 4 – Accent 2 (row 4, column 3 under Grid Tables). Center the table horizontally on the page. Reduce left and right cell margins to 0”.

Click the Table Move handle to select the table. Select a border style of Double solid lines, ½ pt., Orange Accent 2 (sixth column, first row under Theme Colors). Apply the border to outside borders.

By converting existing text to a table, you are able to use table design and layout tools, resulting in an attractive and well-designed feature.

Press ENTER after the last body paragraph (ending in fantastic pricing). Select text at the end of the document, from Back Bay/Fenway to 16.00. Whether you select the paragraph mark following 16.00 is irrelevant. Convert the text to a table, accepting all dialog box settings.

Insert a column before the first column in the second table. Type Family Fun Tours in the first cell of the new column. Select the first three cells in the new column and merge them. Type Patriot Tours in the second cell of the first column (below the merged area). Select the second, third, and fourth cells in the first column and merge them. Type JFK/Harvard Tours in the third cell of the first column (below the Patriot Tours merged cell). Select the last three cells in the first column and merge them.

Select the third column. Click Split Cells and deselect Merge cells before split. Accept all other dialog box settings. Change the width of the second column to 2”. Change the width of the last two columns to 0.85”.

Insert a row above the first row. Type Tour Package in the first cell of the new row. Type Attraction in the second cell on the same row. Type Discounted Admission in the third cell on the same row.

Merge the last two cells on row 1. Apply Align Center alignment to row 1. Create a formula in the last cell on row 2 that subtracts (0.4*admission price) from the admission price. The admission price is shown in cell c2, so the formula should be =c2-(0.4*c2). The Number format should be #,##0.00. Adjusting for each row, enter a discounted admission formula for each attraction in the table.

Apply a table style of List Table 4 – Accent 2 (row 4, column 3 under List Tables). Center the table horizontally on the page. Apply Align Center alignment to all cells in column 1.

Changing font color is one way to draw attention to an item of interest. In this case, you want readers to recognize the substantial discount, shown in red.

Select all numbers in the last column and change the font color to Red (second column in Standard colors). Change the price of the Freedom Trail/Statehouse Tour from 15.00 to 16.00. Update the formula field in the same row to reflect the new discount value. Check for any spelling or grammatical errors, correcting any that are identified. Ignore any clarity or conciseness concerns.

Begin a mail merge, choosing Letters and selecting Sponsors.xlsx as the data source. Data is located on Sheet1$ of the data source. Edit the recipient list to sort by Sponsor in ascending order.

Replace [Sponsor] on the last line of the document with the merge field of Sponsor. Ensure that the brackets are included in the text to be replaced. Preview results and then finish the merge, editing individual documents and merging all. Press CTRL+A to select all of the merged document and copy the selection. Display Exp19_Word_Ch03_CAP_Boston, move the insertion point to the end of the document (after the Sponsor name) and insert a page break. Paste all copied text, resulting in a 9-page document

Save and close  Exp19_Word_Ch03_CAP_Boston. Close all other open documents without saving. Submit Exp_Word_Ch03_CAP_Boston.docx as directed.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

PART I:

 

For drawings, you may use your word-processing drawing tools, graphic applications, or scanned hand drawings and insert them in the main document.  Show all of your work.

 

1.         Chapter 4 – Exercises, pages 185-187: 2(a); 4(a-g); 6(a); 8.

 

#2) (a) Suppose the main memory of the Pep/8 were completely filled with unary instructions. How many instructions would it contain?

 

 

#4) Answer the following questions for the machine language instructions 8B00AC and F70BD3.

 

(a) What is the opcode in binary?

(b) What does the instruction do?

(c) What is the register-r field in binary?

(d) Which register does it specify?

(e) What is the addressing-aaa field in binary?

(f) Which addressing mode does it specify?

(g) What is the operand specifier in hexadecimal?

 

 

#6) Suppose Pep/8 contains the following four hexadecimal values:

 

A: 19AC

X: FE20

Mem[0A3F]: FF00

Mem[0A41]: 103D

 

If it has these values before each of the following statements executes, what are the four hexadecimal values after each statement executes?

 

(a) C90A3F

 

 

#8) Determine the output of the following Pep/8 machine-language program if the input is tab. The left column is the memory address of the first byte on the line:

 

0000    490010

0003     490011

0006    490012

0009    510011

000C   510010

000F    00

 

 

 

2.         Chapter 4 – Problems, page 187: 15.

 

#15) Write a machine-language program to add the three numbers 2, –3, and 6 and output the sum on the output device. Write it in a format suitable for the loader and execute it on the Pep/8 simulator.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

You will write a flowchart, and C code for a program that does the following:

1. Uses a “for” loop.

2. Asks the user for their age.

3. Prints “Happy Birthday” for every year of the user’s age, along with the year.

Here is what the output of the program looks like.

File Submission

Upload your Flowgorithm file, your .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Adjust your audio

This is a narrated slide show. Please adjust your audio so you can hear the lecture.

If you have problems hearing the narration on any slide show please let me know.

 

1

 

Chapter 1 The Information Systems Strategy Triangle

2

 

Kaiser Permanente (KP) Opening Case

What was KP’s business strategy in 2015?

On what were bonuses to doctors based under the “fix me” system?

What would the new idea be called instead of a “fix me” system?

What is the new basis for end-of-year bonuses?

What goal alignment has helped KP’s success?

What IS components are part of this?

Could only the IS components be changed to achieve their success?

Could only the strategy be changed to achieve their success?

© 2016 John Wiley & Sons, Inc.

3

To promote better health care at lower cost

Billings

Proactive health system

Improved health of patients

Alignment between business strategy, organizational design, and information systems strategy

Fast communication with patients outside of face-to-face appointments; automatic email reminders to patients for exercise or medications

No, the business strategy must be aligned with the IS, in addition to incentives

No, without the new incentives and new IS, employees would not wish to cooperate, nor would they be able to do so.

3

4

The Information Systems Strategy Triangle

These need to be balanced.

 

Business Strategy

Organizational Strategy

Information Strategy

© 2016 John Wiley & Sons, Inc.

4

 

What is a “Strategy?”

Coordinated set of actions to fulfill objectives, purposes, or goals

It sets limits on what the organization seeks to accomplish

Starts with a mission

Company Mission Statement
Zappos To provide the best customer service possible. Internally we call this our WOW philosophy.
Amazon We seek to be Earth’s most customer-centric company for three primary customer sets: consumer customers, seller customers and developer customers.
L.L. Bean Sell good merchandise at a reasonable profit, treat your customers like human beings and they will always come back for more.

© 2016 John Wiley & Sons, Inc.

5

What is a business strategy?

It is where a business seeks to go and how it expects to get there

It is not a business model, although it includes business models as one component of a business strategy

Business models include subscriptions, advertising, licenses, etc.

Business models do not include where the business seeks to go, and only the revenue portion of how it expects to get there

 

© 2016 John Wiley & Sons, Inc.

6

Generic Strategies Framework

Michael Porter: How businesses can build a competitive advantage

Three primary strategies for achieving competitive advantage:

Cost leadership – lowest-cost producer.

Differentiation – product is unique.

Focus – limited scope – can accomplish this via cost leadership or differentiation within the segment

7

© 2016 John Wiley & Sons, Inc.

7

 

Three Strategies for Achieving Competitive Advantage

Strategic Advantage
Strategic Target Uniqueness Perceived by Customer Low Cost Position
Industry Wide Differentiation Cost Leadership
Particular Segment Only Focus

© 2016 John Wiley & Sons, Inc.

8

Three Strategies for Achieving Competitive Advantage Examples

Strategic Advantage
Strategic Target Uniqueness Perceived by Customer Low Cost Position
Industry Wide Differentiation Cost Leadership
Particular Segment Only Focus

Apple

Wal-Mart

Marriott

Ritz Carlton

© 2016 John Wiley & Sons, Inc.

9

Dynamic Strategies

Beware of Hypercompetition

Can lead to a “red ocean” environment

Cutthroat competition – zero sum game

Every advantage is eroded—becoming a cost.

Sustaining an advantage can be a deadly distraction from creating new ones.

D’Avenis says: Goal of advantage should be disruption, not sustainability

Initiatives are achieved through series of small steps. Get new advantage before old one erodes.

Better to adopt a “blue ocean” strategy

Change the industry; create new segments/products

10

© 2016 John Wiley & Sons, Inc.

10

 

Creative Destruction

GE’s Approach under Jack Welch

Ask people to imagine how to destroy and grow your business

DYB: Imagine how competitors would want to destroy your business.

GYB: Counteract that by growing the business in some way to:

Reach new customers/markets

Better serve existing customers

© 2016 John Wiley & Sons, Inc.

11

Summary

Strategic Approach Key Idea Application to Information Systems
Porter’s generic strategies Firms achieve competitive advantage through cost leadership, differentiation, or focus. Understanding which strategy is chosen by a firm is critical to choosing IS to complement the strategy.
Dynamic environment strategies Speed, agility, and aggressive moves and countermoves by a firm create competitive advantage. The speed of change is too fast for manual response making IS critical to achieving business goals.

© 2016 John Wiley & Sons, Inc.

12

Organizational Strategy

What is organizational strategy?

Organizational design and

Choices about work processes

How do you manage organizational, control, and cultural variables?

Managerial Levers

13

© 2016 John Wiley & Sons, Inc.

13

 

14

Managerial Levers

© 2016 John Wiley & Sons, Inc.

14

 

IS Strategy

What is an IS Strategy? – The plan an organization uses in providing information services.

Four key IS infrastructure components

15

© 2016 John Wiley & Sons, Inc.

15

 

16

Information systems strategy matrix.

What Who Where
Hardware The physical devices of the system System users and managers Physical location of devices (cloud, datacenter, etc.)
Software The programs, applications, and utilities System users and managers The hardware it resides on and physical location of that hardware
Networking The way hardware is connected to other hardware, to the Internet and to other outside networks. System users and managers; company that provides the service Where the nodes, wires, and other transport media are
Data Bits of information stored in the system Owners of data; data administrators Where the information resides

© 2016 John Wiley & Sons, Inc.

16

 

What Who Where
Hardware Laptops, servers to store info and back up laptops Consultants have laptops, managed by the IS Dept. Laptops are mobile; servers are centralized
Software Office suite; collaboration tools Software is on consultants’ laptops but managed centrally Much resides on laptops; some only resides on servers
Networking Internet; hard wired connections in office; remote lines from home, satellite, or client offices ISP offers service; Internal IS group provides servers and access Global access is needed; Nodes are managed by ISPs
Data Work done for clients; personnel data Data owned by firm but made available to consultants as needed Resides on cloud and copies “pulled” into laptops as needed.

17

Illustration in a Consulting Firm

© 2016 John Wiley & Sons, Inc.

17

 

One IS Strategy: Social Strategy

Collaboration

Extend the reach of stakeholders to find and connect with one-another

Engagement

Involve stakeholders in the business via blogs; communities

Innovation

Identify, describe, prioritize new ideas

© 2016 John Wiley & Sons, Inc.

18

Summary

After you have listened to this lecture and read Chapter 1 of your text

Go to Discussion Board 2 and answer the discussion prompt

Finally complete Quiz 1

© 2016 John Wiley & Sons, Inc.

19

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!