piecework workers are paid by
piecework workers are paid by the piece. Workers who produce a greater
quantity of output are often paid at a higher rate.
Form: Use text boxes to obtain the person’s name and the number of
pieces completed. Include a Calculate button to display the dollar amount
earned. You will need a Summary button to display the total number of
pieces, the total pay, and the average pay per person. A Clear button
should clear the name and the number of pieces for the current employee
and a Clear All button should clear the summary totals after confirming
the operation with the user.
Include validation to check for missing data. If the user clicks on the
Calculate button without first entering a name and the number of pieces,
display a message box. Also, you need to make sure to not display a summary
before any data are entered; you cannot calculate an average when
no items have been calculated. You can check the number of employees
in the Summary event handler or disable the Summary button until the
first order has been calculated.
Pieces
Pieces completed Price paid per piece for all pieces
1–199 .50
200–399 .55
400–599 .60
600 or more .65
Policy, Legal, Ethics, & Cmplc week 1
Week 1 Discussion
Week 1 DiscussionRead this article about Cambridge Analytica in Wired Magazine. Discuss whether you think the premise of the article is correct and that people are more aware of privacy concerns. Use at least three sources. Use the Research Databases available from the Danforth Library, not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. Do not use attachments as a submission. Do not zip your submissions.Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Digital Forensics Examination Report
Topic URL:
https://ultratechlife.com/tech/gabby-petitos-digital-clues-some-lessons-to-learn/
Sub Topics:
1.Chain Of Custody
2. Storage
Attaching a file for example
Write a method with the signature
Write a method with the signature “public static int findMax(int[][] data)” which finds the maximum value in the given array and returns it. Is there a limit to the number of dimensions can an array have? Why might you use a two-dimensional array?
10 Slide Power Point about the history of computers.
History of Computers PowerPoint Presentation
Select one of the items on the attached sheet. Research this item and create a 10 slide PowerPoint Presentation that includes a beginning and ending slide. Be sure to include a link to your sources. Include pictures and descriptions of the device and the process(es) of designing the device. Do not limit your research to Wikipedia. You can find a wealth of information at many history sites.
GRCA JUNE 1
Please use the same EXCEL sheet that you used to input HOW and WHAT in the blue sections,
ADD the who, where, when, and why in the salmon sections
Submit the sheet with both the blue and salmon sections filled in.
Please create an APA-7-compliant References page with all 3 or 4 references you found.
(the title page and references page must be one document, with numbered pages 1 and 2)
PLEASE use the resources in your manual pages 19-20 and page 28, also attached here, AND the template below. Remember, there are VERY specific rules about capitalization and italics. You have a “ways to get help” document in your content folder.
PSPC
Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Discussion 250 words
The CIA Triad is a well-known, venerable model for the development of security policies used in identifying problem areas, along with necessary solutions in the arena of information security. It’s important to understand what the CIA Triad is, how it is used to plan and also to implement a quality security policy while understanding the various principles behind it. It’s also important to understand the limitations it presents. When you are informed, you can utilize the CIA Triad for what it has to offer and avoid the consequences that may come along by not understanding it.
Discussion Questions
- What are the components of triad of information security?
- How does the information security triad help us keep information secure?
- What is the importance of CIA triad explain them with examples?
Case Problem – Computer Base
Case Problem: Capital State University Game-Day Magazines
Page 783 (use data file magazinesCSU.xlsx attached below)
Managerial Report
Use the concepts you have learned from Chapters 2, 3, 7, and 11 to write a study document that will help Kris analyze football magazine sales in Years 1 through 9 to determine an order amount for Year 10.
Address items 1-3 and explain in detail how you developed your solution and why you think your analysis is accurate using the concepts and tools you learned throughout this course:
- There is a considerable amount of data available in the file Magazines CSU, but not all of it may be useful for your purposes here. Are there variables contained in the file Magazines CSU that you would exclude from a forecast model to determine football magazine sales in Year 10? If so, why? Are there particular observations of football magazine sales from previous years that you would exclude from your forecasting model? If so, why?
- Based on the data in the file Magazines CSU, develop a regression model to forecast the average sales of football magazines for each of the seven home games in the upcoming season (Year 10). That is, you should construct a single regression model and use it to estimate the average demand for the seven home games in Year 10. In addition to the variables provided, you may create new variables based on these variables or based on observations of your analysis. Be sure to provide a thorough analysis of your final model (residual diagnostics) and provide assessments of its accuracy. What insights are available based on your regression model?
- Use the forecasting model developed in Part 2 to create a simulation model that Kris can use to estimate the total football magazine sales amounts in Year 10. Your simulation model should have seven uncertain inputs: one input for football magazine sales at each CSU game in Year 10. Then you should sum these sales amounts for each individual game to create a total football magazine sales amount for Year 10.
Submit a .doc/.pdf for the final report and attach the .xlsx file you used for developing the model/simulation.