GO16_AC_CH01_GRADER_1F_AS – Literary Festival Events

GO16_AC_CH01_GRADER_1F_AS – Literary Festival Events

  

Project Description:

In this project, you will use a database template and create database objects to track events for the Literary Festival at a college. You will enter records into the Events table using a multiple-items form and a single-items form. You will append data from Excel to the Events table. You will create a second table in the database that tracks contact information for the festival events.

     

Start   Access. Open the downloaded file named go_a01_grader_a2_Literary_Events.accdb   and enable the content.

 

In   the Event List multiple-items form that opened automatically, in the new   record row, enter the following two records (the Start Time and End Time data   will reformat automatically):
 

  Title: Conversation with Aliyah Jones   Start Time: 9/11/21 10a
  End Time: 9/11/21 12p   Description: African American   Nonfiction   Location: Northeast Campus   Theater
  Title: Faculty/Student/Staff Readings   Start Time: 9/11/21 2p
  End Time: 9/11/21 4p   Description: Favorite Passages Location:   Southeast Campus Forum

 

 

In   the Event List form, click New Event and in the Event Details single-record   form, enter the following record (the Start Time and End Time data will   reformat automatically):
 

  Title: An Evening with Michael Evans
  Start Time: 9/11/21 7p
  End Time: 9/11/21 9p
Location:   Northwest Campus Atrium
  Description: Historical Writings

 

 

Close   the Event Details single-record form and the Event List form. Append the   records from the downloaded Excel file go_a01_grader_a2_Literary_Events.xlsx   to the Events table.

 

Open   the Navigation Pane. In the Navigation Pane, organize the objects by Tables   and Related Views. Open the Events table (the table has 13 records). Apply   Best Fit to all of the fields in the table, and then save and close the   table.

 

In   Datasheet view, create a new table. Beginning in the second column of the   table and using the data type of Short Text, create the Campus, Last Name,   First Name, Phone Number,   and Email Address fields (in that order).
 

 

For   the ID field, change the data type to Short Text and rename the field to Contact ID.

 

Starting   in the Contact ID field, add the following two records to the new table:
 

  C-01|Northeast|Woodward|Jean|(512) 555-3704|[email protected]
  C-02|Southeast|Snyder|Amanda|(512) 555-8391|[email protected]

 

Starting   in the Contact ID field, add the following two records to the new table:

  C-03|Northwest|Bass|Jordan|(512) 555-1740|[email protected]
  C-04|Southwest|Sweeney|Megan|(512) 555-7832|[email protected]
 

 

Apply   Best Fit to all of the fields in the table, and then save the table as Festival Contacts.

 

Close   all database objects and exit Access. Submit the database as directed.

Implementing Security Audits

 Discuss whether internal security audits are enough for an organization or do they need to perform external audits as well. Also discuss in which scenarios the external audits are mandatory to perform. 

Theme Park

 Don’t use chegg or coursehero

Programming Assignment 7 – Theme Parks and Threads   
Amusement parks are a lot of fun, but everyone agrees the worst part of the experience is waiting.
Some companies invest in a lot of clever systems to help manage and control their lines more efficiently.
To see behind the scenes at how Disney does this, check out:
https://www.nytimes.com/2010/12/28/business/media/28disney.html
Now we’re going to create our own command station that uses threads to activate and track rider
movement throughout a bustling amusement park.  
Program Requirements
• Create a new class called “ThemePark.” Inside it, put your main program. This program will
manage and monitor all the theme park rides in the park. ThemePark should extend Thread.
• Create a new class called “Amusement.” This class should extend Thread. This class will have the
following variables and methods to access them. (Remember to use proper Object-Oriented
design in its creation):
o A ride type (e.g., “Bumper Cars,” “Rollercoaster,” “Carousel”)
o A waiting Queue (those waiting in line)
o A ride Queue (those actively riding the ride)
o A maximum capacity (controls how many people can ride)
o A ride duration (how long the ride takes)
o A running Boolean (is the ride running? True/false) – initially set to false
• Override the run() function inside your “Amusement” class. This function should do the
following
o Set the “running” state to true
o Sleep for x seconds (where x is the ride’s duration)
o When finished, set the “running” state to false
• Inside ThemePark, instantiate five Amusement objects. Assign each Amusement a type,
capacity, and duration. Put the capacity at around 20–60 riders at one time
o Create a new Queue called “attendees.” Fill this with unique numbers from 1–1000
o Start each of the Amusement threads. Have ThemePark check every second on the
“running” status of each Amusement. If an Amusement is not running, first put all of
the riders in the Amusement’s ride Queue into the “attendees” Queue. Put the
maximum number of riders from the ride’s waiting Queue into the ride Queue. Finally,
take a set number of riders from the “attendees” Queue and place them in the
Amusement’s waiting Queue

Note: here is a diagram to help you make sense of the flow of riders into the various
Queues:  

 
• If the user types “END,” stop all of the threads and place the riders back into the attendees
Queue. Then exit the program

Include appropriate comments throughout your code. Remember to use standard Java naming
conventions. Put your name and description of the program in the comments at the top. Submit your
ThemePark, Amusement, and all associated project Java and class files, as well as a screenshot of it in
operation on your computer. Package all of these in a zip file and name the submission in the format:
NAME_COURSE_ASSIGNMENT_DATE.zip
Submission is due by 11:59 p.m. ET.  
• If the user types “END,” stop all of the threads and place the riders back into the attendees
Queue. Then exit the program

Include appropriate comments throughout your code. Remember to use standard Java naming
conventions. Put your name and description of the program in the comments at the top. Submit your
ThemePark, Amusement, and all associated project Java and class files, as well as a screenshot of it in
operation on your computer. Package all of these in a zip file and name the submission in the format:
NAME_COURSE_ASSIGNMENT_DATE.zip 

business enterprise

 

 Your consulting company has been hired to design and implement a network for a small to mid-sized vertically integrated sales and manufacturing company with about 75 employees and 40 PC’s.  They have provided you with the following requirements:  

• Central Domain Structure including the design of the OUs for management of workstations and users should be developed based on the Company organizational chart provided. • Group Policies configured to support the following • Encrypted files on clients with appropriate recovery setup • Setup File Shares with appropriate permissions based on the AD structure you configured.   o Departments should each have a shared location accessible only to that department’s users to store files. • Configure a central update server with appropriate groups and enableconfigure client side targeting • Configure Roaming Profiles for the users along with folder redirection for key folders to help with login times, ensure the security settings are correct on these folders so as to prevent other users from being able to access a profile that is not theirs. o Redirected folders should include Documents, Desktop, and Favorites • Setup DNS in your environment as needed. • Develop a plan for future DHCP Configuration, it is not necessary to implement this. • Setup and configure a print server to share printers with appropriate permissions o The CEO doesn’t like to wait behind others when he prints and expects you to provide a solution o There needs to be a way to control who can print to the color printer. • You should also include a recommended backup and recovery plan but you do not have to implement this. • They would like a secure solution for Remote Access to allow employees to access applications from either a personal device or when traveling with a work device. 

For your final deliverables of this project you will submit complete documentation of your proof of concept environment and the plans detailed in the requirements document.  This documentation should be complete technical documentation with enough detail to allow the reader to reproduce your solution and understand why you made the configuration selections you did.   There are some articles and tips linked in the Course Resources section on how to write successful documentation.

For your presentation you will provide a business targeted video presentation of how you addressed their requirements.   This presentation should include some sort of visual aidshandouts and should not be overly technical in nature.   Your presentation should be between 5 to 10 minutes long and you need to make sure to include any background information or assumptions that you needed even if the items do not directly correlate to a requirement.

Interpreting HTML Markup

Unit 4 DB: Interpreting HTML Markup

Unit 4 DB: Interpreting HTML MarkupComplete the Chapter 6 reading, up to and including Exercise 6.2 (Creating “Hello, world!” in HTML). Then go to page 249, and complete the Chapter 6 Lab, where you view the markup behind two websites. After exploring the answers to the seven questions for both websites, and recognizing the components of HTML markup, in your discussion post explain your experience. Could you easily identify the page contents compared to the page code? What languages did the pages use, and were they easy to identify? Why do you think the website developers used those languages?

Chapter 6 Lab

If you want to become a programmer, you will need to study one or more languages. You have a variety of options available, including online materials, in-person classes, and study guides. While this chapter certainly didn’t teach you everything you need to know to become a programmer, you did learn some concepts and a bit about how to read and understand code. For this lab, you will look at a few different websites and see how their code was constructed.

Open the website www.youtube.com in Chrome or Edge. To view the source code in Chrome, right-click the page, and choose View Page Source. In Edge, press the F12 key to show the code. (Or, you can click the Settings And More menu—the three horizontal dots in the upper-right corner—and click F12 Developer Tools.)

Here are some questions for you:

  1. In what language is the page written?

JavaScript  

  1. What organizational techniques do you see?
  2. Do you see any branching or looping logic?
  3. Does the page use functions at all?
  4. Which scripting languages are used on the home page?
  5. Find a string of text. Can you find where that string is on the web page?
  6. Can you find any instances of where a background color is set?

Technology discussion

  Referencing the Learning Resources for this module, choose a different question from the previous discussion in the research project list and answer it in relation to an issue in religion and technology.  

 

  1. What is the problem for which this technology is the solution?
  2. Whose problem is it?
  3. Which people and what institutions might be most seriously harmed by a technological solution?
  4. What new problems might be created because we have solved this problem?
  5. What sort of people and institutions might acquire special economic and political power because of technological change?
  6. What changes in language are being enforced by new technologies, and what is being gained and lost by such changes?

 

Exp19_Excel_Ch12_Cap_Bulldog_Collectibles

 #Exp19_Excel_Ch12_Cap_Bulldog_Collectibles 

 #Exp19 Excel Ch12 Cap Bulldog Collectibles  

 #Excel Chapter 12 Captsone – Inventory  

  

Project Description:

You are the operations manager for Bulldog collectables, a small start-up company that deals with sports memorabilia. As you prepare to document your inventory, you decide to utilize a template to save time. To complete this task, you will create a worksheet based on an Office.com template; you will also use the Macro Recorder and Visual Basic for Application to automate sorting and calculations within the workbook.

     

Start Excel. Download and open   the file named EXP19_Excel_Ch12_Cap_Inventory.xlsx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Delete the Inventory Pick List   and Bin Lookup worksheets.

 

Delete the INVENTORY PICK LIST   and BIN LOOKUP icons located respectively in cells E2 and F2. Then Clear all   existing Data Validation in the range A1:K15.

 

Delete the values in the range   B5:J15.

 

Record a macro named Sort, be sure to use relative   references. Ensure the macro sorts the data in the table in ascending order   based on SKU (column A). Stop the Macro Recorder and Save the workbook as a   Macro-Enabled Template.

 

Create a form control button   that spans the cell E2:E3. Assign the Sort macro and edit the button text to Sort.

 

Use the VBA Editor to create a   new module.
 

  Type the following VBA code to create a custom Inventory Value function then   save and exit the VBA Editor (be sure to leave a blank line between each line   and before End Function):
 

Function   InventoryValue (QTY, COST)
 

InventoryValue   = QTY * COST
 

 

Click cell J5 and use the newly   created InventoryValue function to calculate the value of the inventory for   each item in column I.

 

Use the VBA Editor to create a   new module named ProtectWorkbook. Type the following VBA statements to create the   sub procedure (leave appropriate line spacing).
 

Sub   ProtectWorkbook()
 

‘Protect   workbook using the password eXploring
Worksheets(“Inventory   List”).Protect Password:=”eXploring”

 

Insert a new module named UnprotectWorkbook. Type the following VBA   statements to create the sub procedure and then save and exit the VBA Editor   (leave appropriate line spacing).
 

Sub   UnprotectWorkbook()
 

‘Unprotect   workbook using the password eXploring
Worksheets(“Inventory   List”).Unprotect Password:=”eXploring”

 

Insert a Form Control Button   spanning cells F2:F3 named Unprotect. Assign the UnprotectWorkbook macro to the newly   created Control Button.

 

Insert a Form Control Button   spanning the range G2:H3 named Protect. Assign the macro ProtectWorkbook.

 

Insert the comment Inventory   based on values in column J. in cell B3 (include the period).

 

Insert the comment Count of   items in column C.   in cell C3 (include the period).

 

Inspect the document for private   information and hidden properties. Save the file when prompted then remove   Document Properties and Personal Information, and Headers and Footers.
 

  Note: Mac users, from the Excel menu, open your preferences, click Security,   and then click the check box to Remove personal information from this file on   save. Delete any headers or footers in the workbook.

 

Check the document for   accessibility issues. Use the Accessibility Checker pane to change the cell   styles to Normal in order to repair the issue.

 

Check the document for   compatibility with Excel 2010, 2013, and 2016.
 

  Note: Mac users, skip this step.

 

Insert a new worksheet named Code.

 

Open the VBA Editor, open Module   1, and copy the code. Paste the code in the Code worksheet starting in cell   A1. 

 

In the VBA Editor, open Module   2, and copy the code. Paste the code in the Code worksheet starting in cell   A22. 

 

In the VBA Editor, open the   ProtectWorkbook, and copy the code. Paste the code in the Code worksheet   starting in cell A28. 

 

In the VBA Editor, open the   UnprotectWorkbook module, and copy the code. Paste the code in the Code   worksheet starting in cell A35. 

 

Close the VBA Editor and save   the workbook as an xlsx file (not Macro-Enabled).

 

Close EXP19_Excel_Ch12_CAP_Inventory.xlsx. Exit Excel. Submit the file   as directed.

Vulnerability

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Post between 100-300. Use your own words.

communication in organization

 

part 1:

Question 1:

Select any ONE of the topics you would like to write about from the list below.

a. Algorithms in Social Media
b. Non-Fungible Tokens 
c. Biases in Artificial Intelligence
d. 3D Printing 

Question 2:

Write in point form – what you would like to cover for the topic you have chosen.
Provide a balanced view.

Question 3:

Review what you have written in question 1, and narrow down your title. This could include a statement of a problem or opportunity within the topic.

Question 4:

Research three journal articles in the Charles Sturt University Library Database related to your topic. Three journal articles must not be older than three years old.
Enter the references of these three journal articles here, in APA 7th edition format. This is the standard format for most Charles Sturt University subjects. You will use the contents of these journals to write your structured report.

Question 5:

Research three (or more) other articles (magazines, newspaper, reports, etc) related to your topic. You may find them in the Charles Sturt University Database or Google. Articles may be older than three years old. Enter the references of these three other articles here, in APA 7th edition format. You will use the contents of these articles to write your structured report.

Question 6:

After completing the first five questions, comment briefly on what you have discovered (through the research process) about the topic you have selected. This reflection should be no more than 200 words.

part 2:

 

Task

Write a report based on the preparation done in Assessment 2. Use the guidelines below to structure your report

Report SectionChecklistTitleThe title must be narrow and focused.
You might want to review this title after you have finished the entire report.
The title should give the reader a good idea of what to expect in your report.
Do not format it as a question.

IntroductionAbout 170-200 words.
Clear introduction of the topic through background, statement of report’s purpose/argument, and a preview of main points and recommendations.
Correct use of third-person writing.
No references or quotes.

Body of Report

About 700-800 words.
Statements made must be backed up by literature.
Paraphrase or quote correctly to style.
Do not write in dot (or numbered) points.
Subheadings are optional.
Use third-person writing.
Arguments ‘for’ and ‘against’ are to be included to give a balanced outlook of the topic.
Use of at least 3 journal papers plus other sources.

RecommendationsAbout 350-400 words.
At least three evidence-based recommendations are informed by literature.
Ensure recommendations are logically supported in the body.
Clear and concise.
Do not introduce new topics/issues.
Do not write in dot (or numbered) points.
Correct use of third-person writing.

ConclusionAbout 170-200 words.
Concluding the entire report only.
No new material (or thoughts) is to be introduced here.
No quotes or references.
Correct use of third-person writing.

Reference ListConform to APA 7th edition style.
Check for punctuation, capitals, etc. in your reference list.
Due to the Interact2 Journal interface, the lecturer understands the difficulty in trying to
use indentation in the Reference List. Not inserting indentation will not cause you to lose
marks.