Automation Testing Script using Celenium Java

Please request the candidate to have below 2 sets of exercises (Java8 and above) completed by tomorrow and share the GitHub link

 1. Selenium WebDriver – Page Object Model:

1. Visit amazon.com Page

2. Search for Book ‘qa testing for beginners’

3. Click on 1st item in the listed results.

 

4. Before Click on add to cart Add to Cart asset price from Step3. 

5. Click on Add to Cart.

6. Before Click on Proceed to Checkout asset price from Step3.

7. Click on proceed to checkout

5. On the checkout page assert price from Step3.

 2. API automation using Rest-assured or Karate API Test

 1. Use any 2 methods(Get, and Delete) from end-points listed in

http://dummy.restapiexample.com/

2. Perform assertions for 

   – Get & Delete – Status code to be Successful.

   – Get – Return specific Employee details(Any).

   – Delete – “message”: “successfully! deleted Records”.

comparing and contrasting documentation

 

Given the material covered in Module 3 (Hardware) and Module 4 (Software), your personal experience, and our good friend reliable sources, provide a well-formatted MS Word document (with citations) that provides a framework for comparing two different computing solutions for both hardware and software issues. [Hint: Such a document would most likely include an introduction paragraph, a table comparing individual characteristics, and a conclusion paragraph.]

For example, you might want to compare an iPhone X with an iPhone 7, or an iPhone X with a Galaxy 7, or a PS4 with an XBox, or an Apple Air with a Razer Blade Stealth.

Considerations might include:

  • # of (or importance of) exclusive software products available for that system
  • backwards compatibility for “old” materials from previous systems
  • cost of the system
  • compatibility of the system with supporting services (such as the cell phone network, gaming community, or preferred app store) 
  • availability of support for the system
  • disk space
  • type of external media supported
  • Graphics Card capabilities
  • Processor speed
  • Peripherals support

…Or any other considerations you consider important. A minimum of 2 hardware and 2 software factors must be included.

R

 

Assessment  002 R Analysis and Report (maximum 3000 words)

In this assignment you are going to simulate data from an area chosen by yourself. It can be cyber related, healthcare, industrial, financial/credit card fraud, commerce – anything. However, run your ideas past me first before diving in. If you recall from the dplyr tutorials we were able to simulate small amounts of data based on several dataframes. We then linked the data we required using join() commands, etc. We then obtained summaries of the data and could use ggplot2 to highlight trends, etc.  

  1. Carefully, choose your domain. Give a rationale for simulating it.
  2. Define your data frames, generate them using sample_n and/or other commands. There is a package called charlatan you may find useful for generating personal names and other values. About 4-5 dataframes will suffice.
  3. Think about seeding trends and patterns in your simulated data that you can “detect” later.
  4. Use dplyr to extract the columns you need from the dataframes.
  5. Use some sort of analysis such as summaries to get statistics on your data. Break it down by a category variable such as e.g. time, gender, fraudulent V normal, etc.
  6. In the write-up, I will expect to see an introduction section, methods, and then sections for Simulation of data and transforming data, Analysis of data; marks for plots should of course be in the Analysis section.

Part 1: Analysis of the Data (70 marks)

You will need to develop R code to support your analysis, use dplyr where possible to get the numeric answers. Regarding ggplot2, be careful as to what type of plot you use and how you use them as you have many records and want the charts to be readable. You should place the R code in an appendix at back of the report (it will not add to word count).  Section each piece of code with # comments and screenshots of outputs.

  • Simulation of data (20 marks)
  • Transforming data (10 marks)
  • Analysis of data and plots (20 marks)
  • Write-up of the data analysis (similar format of my R tutorials) (20 marks)

Part 2: Scale-up Report (30 marks)

The second part will involve writing a report. Now assuming your Part 1 was an initial study for your organisation, what are the issues when you scale it up and start using it in practice?

  • Discussion of Cyber security, big data issues, and GDPR issues (20 marks)
  • Structure of report, neatness, references. Applies to both Part 1 and Part 2 (10 marks)

Penalties: Do not go over word limit of 3,000 (other than ±10%) as loss of marks will occur according to the university guidance on penalties.

Output: Submit PDF electronic copy to Canvas before the deadline, along with a file containing your R code. The data should be generated from the R code, so do not submit any data.

Write an essay for 500 words for the give description?

Investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.

how positive team culture can correct the impact of lagging leadership creativity

 

This week’s journal article focus on the how positive team culture can correct the impact of lagging leadership creativity. Additionally, we discussed how digital transformation leaders in regard to artificial intelligence (AI).  After reviewing the reading, please answer the following questions:

  1. What is your definition of AI?  Please explain.
  2. What is your opinion of AI, is the technology currently available? Why or why not?
  3. Please note at least four AI technologies, explain if they are truly AI or something else.  Thoroughly explain your answer.
  4. How is AI perceived as different in various industries and locations? Please explain.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Writing

Heinrich Koch is a second-year college student. Last semester his best friend had his laptop stolen. The laptop was an old computer that he planned to replace soon, but the greatest loss was his data: he had not performed a backup and all his data was lost. Heinrich himself does not perform data back-ups but knows that he needs to do that on a regular basis. He has decided to use an online backup service that will auto-matically back up his data whenever it changes. Evaluate and compare reviews of online backup services. Consider iDrive, Carbonite, Acronis True Image, BackBlaze, and others you might find in your research. Recommend a service that you consider the best solution for Heinrich. Discuss your reviews and mention speed, security, and features in your recommendation.

Requirements:

  • APA format, 3-4 pages in length (excluding cover page, abstract, and reference list)
  • Minimum of 2-3 peer reviewed resources
  • The paper must be 3-4 pages long. double space, and must have an introduction with a clear thesis statement, a body discussing the three main points and a conclusion
  • Conduct research to find relevant information using reliable sources to support your views; Use at least 2-3 peer review resources
  • Use APA Style for in-text citations, and references

computer science

 explain the following

1. Build confidence with mock technical interview preparation and whiteboard challenges, get connected with top employers, and navigate your job search from end-to-end with a dedicated career coach. 

 2. Showcase your coding and collaboration skills to potential employers, creating full-stack web applications that leverage modern programming languages, frameworks, and tools. 

BSWA Week 6

 

Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 300 words.