Exp19_Access_Ch04_HOEAssessment – Leadership Conference 1.1

  

Exp19_Access_Ch04_HOEAssessment – Leadership Conference 1.1

Access Chapter 4 Hands-On Exercise Assessment – Leadership Conference 

Exp19 Access Ch04 HOEAssessment Leadership Conference 1.1

  

Project Description:

You will create a form so that users of the database can enter and edit registrations to the conference easily. You create an attractive report that groups the conference sessions by speaker, and then export it to PDF format for easy distribution. Finally, you create a Navigation Form so that database users can switch between major objects in the database readily.

     

Start Access. Open the downloaded   Access file named Exp19_Access_Ch04_HOEAssessment_Conference.accdb. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

   You will create a form to manage the data in the Registration table. Use the   Form tool to create the form and then modify the form as required. You will   also remove the layout control from the form so that the controls can be   repositioned freely.
 

  Select the Registration table as   the record source for a form. Use the Form tool to create a new form with a   stacked layout.

 

Change   the form’s title to Enter/Edit Registrants.   Click the layout selector and with all of the fields and labels selected, set   the width of the controls to about 3″.

 

Set   the background color of the RegistrationID text box to Tan, Background 2, and set the font size to 14. Save the form as Edit Registrations.

 

Open   the Edit Registrations form in   Design view. Select all controls in the Detail section of the form, and then   remove the layout. View the form in Layout view. Delete the City label from the form and move the   text box up and to the right of   Address so that their top edges are aligned.

 

Delete   the State/Provence and Postal Code labels from the form and   move the Postal Code text box up   and to the right of State so that their top edges are aligned. Move the State/Provence and Postal Code text boxes up to below Address and City so that they close in the   white space, keeping the spacing close to that of the controls above them.

 

View   the form in Print Preview and set the orientation to Landscape. Switch to Form view, and then save and close the form.

 

You   will create a report based on the Speaker and Room Schedule query. You decide   to use the Report Wizard to accomplish this task. You are planning to email a   copy of the report to your speakers, who are not all familiar with Access, so   you will export the report as a PDF file prior to sending it.
 

  Select the Speaker and Room Schedule   query in the Navigation Pane as the record source for a report. Activate   the Report Wizard and use the following options as you proceed through the   wizard steps:
 

  Select all of the available fields for the report. View the data by Speakers.   Accept the default grouping levels and click Next. Use Date as the   primary sort field in ascending order.
 

  Accept the Stepped and Portrait options. Save the report as Speakers by Name.

 

Switch   to Layout view and apply the Retrospect   theme to this report only. Switch to Report view to determine whether all   the columns fit across the page. Switch back to Layout view.

 

Delete   the Room ID label and text box from the report. Drag the right   edge of the Session Title text box   to the right so that the column width is wide enough to display the values in   the field (approximately 3″). Save the report.

 

Switch   to Print Preview and export the report as a PDF file named Speaker by Name. Close the reader program that   displays the PDF report and return to Access. Close Print Preview. Close the   report.

 

You   realize that the StartingTime field was not included in the query that is the   record source for your report. You add the field to the query and then modify   the report in Layout view to include the missing field.
 

  Open the Speaker and Room Schedule   query in Design view. Add the StartingTime   field from the Sessions table to the query design grid, after the Date   field. Run, save, and close the query.

 

Open   the Speakers by Name report in Layout view. Add the StartingTime field from the Field List pane by dragging it into   the report layout. Click the selection handle at the top of the StartingTime column and move the   column immediately to the right of the SessionTitle field. Switch to Print   Preview, then save and close the report.

 

You   will create a Navigation Form so that users can switch between objects in the   database readily.
 

  Create a Vertical Tabs, Left   Navigation Form.

 

Drag   the Edit Registrations form icon   from the Navigation Pane onto the [Add   New] tab at the left of the form.

 

Drag   the Speakers by Name report icon   from the Navigation Pane onto the second   [Add New] tab at the left of the form. Save the Navigation form with the   default name, Navigation Form. Close the form.

 

View   the Room Information form and the   data in Form view. Sort the records by Capacity in descending order. Save and   close the form.

 

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

discussion V1

 

Ransomware is malicious software that encrypts files and requires a key to decrypt the files. To get the files decrypted, the company or organization must typically pay the hackers a large fee, often in Bitcoin or another cryptocurrency. It is important to note that cryptocurrency payments are one-way transactions that are impossible to trace. There is risk, too. If the hackers do not provide the organization with the decryption key after payment, there is no refund.

Hackers in recent years have targeted businesses such as hospitals for ransomware attacks, as well as cities and towns, large and small. Black hat hackers encrypted the city of Baltimore’s systems, as well as two smaller cities in Florida.

Read these brief articles from the UMGC library to learn about the ransomware incidents:

Chokshi, N. (2019, May 23). Attacked With Ransomware, Baltimore Isn’t Giving In. New York Times, p. B6(L).

Mazzei, P. (2019, June 28). Another City in Florida Pays a Ransom to Computer Hackers. New York Times, p. A17(L).

If the organization does not pay the ransom, it would need to either use backups to restore to an earlier network or system state, or to rebuild its systems and data. In the case of the Baltimore city government, its backup systems were also encrypted, so the city was unable to process real estate transactions.

Depending on the complexity of the environment and the amount of data encrypted, this could cost the organization more than the ransom, perhaps even 10 to 20 times the amount.

  • What would you do if you were the cybersecurity analyst that had to advise the city of Baltimore and/or the smaller cities?
  • Would you pay the ransom? Consider both sides of the argument by conducting internet research to understand the different viewpoints. When you are ready, explain why you would or would not pay the ransom.
  • If you agree to pay the ransom, what are you going to tell the CEO if the hackers don’t end up providing the decryption key to unlock the files or come back and ask for even more money?
  • If you don’t agree to pay the ransom, what are you going to tell the CEO, especially if the costs to restore far exceed the ransom?
  • Are there ethical considerations? If your organization pays, will other organizations be vulnerable to similar attacks on their systems?
  • Would you have a different decision if you were working for a small organization like Mercury USA?

Demonstrate programming fundamentals – decisions, loops, arithmetic operations, arrays, use of objects, constructing and using methods, parameter passing, etc.

 

Objectives

  1. Demonstrate programming fundamentals –  decisions, loops, arithmetic operations, arrays, use of objects,  constructing and using methods, parameter passing, etc.
  2. Demonstrate console I/0
  3. Demonstrate text file input
  4. Demonstrate ability to follow a program specification

Outcome

  1. Produce a program that converts temperature values between 4 different scales -Fahrenheit, Celsius, Kelvin, Rankine.
  2. A  starting program (TemperatureConversion.java) with required methods to  complete is provided below. No credit is given if this starting file is  not used. and must be used to receive credit 

Requirements

  1. Produce the four methods defined in the provided starting program TemperatureConversion.java:

public double fahrenheitToOther (double value, char scale)

public double celsiusToOther (double value, char scale)

public double kelvinToOther (double value, char scale)

public double rankineToOther (double value, char scale)

Each  of these takes two parameters, a double value and a target scale. The  scale values will be one of these characters: ‘F’, ‘C’, ‘K’, ‘R’. For  example, fahrenheitToOther assumes that the given value is in Fahrenheit  and converts that value to the new scale and returns the converted  value.

For example, the method below shows celsiusToOther in  use. An original value and a new scale are passed to it. As the name of  the method celsiusToOther implies, the original value is of scale  Celsius. The celsiusToOther method must contain the code to convert the  given value to the given scale.

public double doConversion (double originalValue, char originalScale, char newScale)

{

double newValue = 0.0;

if (OriginalScale == CELSIUS)

  newValue = celsiusToOther(originalValue, newScale);

return newValue;

}

Do  not change the signatures of any of the methods. You are required to  use the char type to assess the problem. Use defined constants where  needed.

  1. Complete the doConversion method that is  defined in TemperatureConversion.java. Notice that it only allows for  conversion from Celsius. Decisions and calls for the other conversion  methods must be added to use the other three xxxToOther methods.  Remember that to use a class, an object of that class type must be  created.

Conversion factors for translating between the  different scales are readily available on various sites on the internet.  Use defined constants whenever possible stylistically.

3: Add console input

Modify  the main program in TemperatureConversion.java to allow for user input  of single conversions. Loop and solicit console input until a user  indicates that he/she is finished. Your program should prompt for a  value, starting scale, and target scale then perform the conversion and  output the result. 

  • Make sure that your program works for both upper and lower case input.
  • Make  sure that you can recover from user input of an incorrect scale. Your  program should continue and not terminate with incorrect alpha  characters.
  • Check for negative Kelvin and Rankine input  temperatures. Your program should continue and not terminate with the  input of a negative Rankine or Kelvin temperature.
  • Be sure to test at least three of each conversion. See the test data spreadsheet included on canvas.

4: Add File input

Prompt  for the name of a file that contains a series of conversions and  perform those conversions. The file should be a text file with the  following format:

             There is one set of conversion data per line of the file.

             Each line of the file contains an original value, an original scale, and the target scale, for example,

23 F C

18.5 K R

You  will use the text file temptest.txt, which I created in notepad. The  file is in canvas. Note that in case of an error in the file a zero is  displayed for the conversion along with a message. A complete run of the  program output is at the end of this document. You may want to test  your program with no error data and then test it with the error data to  make sure you meet the specifications.

  1. Use some Error Handling

Your  program should handle errors with a console message and return 0.0 when  any conversion is not possible. For example, if a user enters ‘V’  instead of ‘C’, a console error message is displayed and the conversion method returns 0.0

Sample Program Run

Here is the sample run of a program that uses console input and file input. User input is in green.

 Enter a number to choose one of the following options:

  1. Convert temperatures one at a time.
  2. Convert temperature from a list of value in a .txt file.
  3. End the program

1

 You selected 1

Enter temperature:  25.5

Enter scale (F, C, K, R): 

c

Enter scale to convert to (F, C, K, R): 

f

25.50 C is 77.90 F

Would you like to doanother conversion? (y/n): 

y

Enter temperature:  100

Enter scale (F, C, K, R): 

c

Enter scale to convert to (F, C, K, R): 

k

100.00 C is 373.15 K

Would you like to doanother conversion? (y/n): 

n

Enter a number to choose one of the following options:

  1. Convert temperatures one at a time.
  2. Convert temperature from a list of value in a .txt file.
  3. End the program

2

 You selected 2

Enter name of inputfile

temptest.txt

60.00 F is 288.71 K

70.00 F is 529.67 R

30.00 F is -1.11 C

50.50 C is 122.90 F

60.50 C is 333.65 K

70.50 C is 618.57 R

20.00 K is -423.67 F

30.00 K is -243.15 C

40.00 K is 72.00 R

20.50 R is 480.17 F

30.50 R is -256.21 C

40.50 R is 22.50 K

error invalid original scale specified D

0.00 D is 0.00 F

0.00 C is 32.00 F

error invalid original scale specified A

25.30 A is 0.00 K

error invalid conversion scale specified A

27.00 F is 0.00 A

54.00 F is 12.22 C

20.00 K is -253.15 C

End of file processing.

Enter a number to choose one of the following options:

  1. Convert temperatures one at a time.
  2. Convert temperature from a list of value in a .txt file.
  3. End the program

3

 You selected 3

Goodbye

Project 1, coding bootcamp

Create a travel application that allows a user to retrive information for travel, weather, … based on city, state or zipcode. This is a group project but I’m only I charge of the weather part using openweather API https://dparmar32.github.io/TrekStats/

3 discussions and 3 case studies

Discussion 5.1 ( Executive leadership)

How has the COVID-19 pandemic changed and affected the way day-to-day business operations are conducted? What are some of the lesson’s learned and experienced gained during the pandemic that enhance future business and company operations? Cite your reference for opinionated support. 

Discussion 5.2 (Computer Forensic)

Some virtual machines can be loaded on a USB drive. Research which type 2 hypervisors fit on a USB drive of less than 16 GB. Which OS and forensics tools could you load on this drive?

Discussion 5.3 ( Computer Forensic)

Your company wants to send a working VM to customers with a sample of its new software, but you’re concerned about the security of the software and data. What precautions can you take?

Case Study 5.1 ( Computer Forensics)

As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (not including title or reference page) page paper that describes how you would organize an investigation for a potential fraud case. In addition, list methods you plan to use to validate the data collected from drives and files such as Word and Excel, with hashes. Specify the hash algorithm you plan to use, such as MD5 or SHA1. Make sure you follow the grading rubric and write your paper in APA format.

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)
  • Include at least two peer reviewed sources that are properly cited
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Case Study 5.2 ( Executive Leadership)

Due: Sunday, End of Module by 11:55 p.m. EST

Address the four questions associated with the chapter seven Opening Case Application: Mark Zuckerberg – Facebook Founder and CEO on page 231 in a three to five page paper (excluding title, abstract, and reference pages). Completely review the company website noted in the case. Include at least three peer reviewed sources found in the Potomac Library properly cited and referenced. Assignment must be in 7th edition APA compliance. 

Please use this strategy when you analyze a case:

  1. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).
  2. List all indicators (including stated “problems”) that something is not as expected or as desired.
  3. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps a and b.
  4. Identify the areas that need improvement (use theories from your textbook)
    • Specify and prioritize the criteria used to choose action alternatives.
    • Discover or invent feasible action alternatives.
    • Examine the probable consequences of action alternatives.
    • Select a course of action.
    • Design and implementation plan/schedule.
    • Create a plan for assessing the action to be implemented.
  5. Conclusion (every paper should end with a strong conclusion or summary)

Case Study 4.1 ( Computer Forensics)

Apple vs. FBI Case Study

Was Apple wrong for not complying with the FBI’s request? If so, why?  If not, why not?

What ethical issues are involved in this case?

Who are the stakeholders in this situation?

Apple’s values are listed on the bottom of its home page at apple.com. Is the company’s decision consistent with its values?  Is that important?

Complete individual paper and presentation on the FBI vs. Apple Case Study

Reference:
Apple vs. FBI Case Study (2016).  https://www.scu.edu/ethics/focus-areas/business-ethics/resources/apple-vs-fbi-case-study/ ;

Writing Requirements: 

  • 5-6 page paper in APA format, for citations and references
  • Use the APA template located in the Student Resource Center to complete the assignment.
  • Use smarthinking.com tutoring service to improve your paper

How do you create an object of a class, in COBOL

26. How do you create an object of a class, in COBOL?

27. Write the code to test if ITEM contains both letters and numbers.

28. . Given the following code:

05 IMPATIENS-COLOR PIC 9.

88 RED VALUE 1.

88 PINK VALUE 2.

88 ORANGE VALUE 3.

Write the EVALUATE statement to validate this input.

29. The weekly payroll program for an Internet start-up company contains an input field, HOURS-IN with PIC 999. Employees routinely work long hours, but no one is permitted to work more than 150 hours in a week. Write the PROCEDURE DIVISION code to validate the data input. Use EVALUATE.

30. Write the code to count the number of occurrences of the digit 6 until the first space is encountered in ITEM. Use A-COUNT as the storage parameter.

31. Write the PROCEDURE DIVISION code segment to sum all the numbers from 1 through 100. Use an in-line PERFORM UNTIL.

32. . Write the PROCEDURE DIVISION code segment to sum all the numbers from 1 through 100. Use a PERFORM paragraph-name ..TIMES.

33. Given the following code:

MOVE 10 TO NUM

MOVE 1 TO TOTAL

a) Recode this using an in-line PERFORM N TIMES.

b) What is output?

 

Discussion week 2reply 2

Read classmates post and respond with 50 words:

The modifier that is exempt from being used in the Medicine section is Modifier 51. It is used to identify the second and subsequent procedure to third party payers. This code shows that there are multiple procedure discounts that should be applied to the reimbursement for the code. This means that a doctor performed two or more surgical services during one treatment visit. 

An example of a code in the Medicine section is 92310. The guideline states that this code is: Prescription of the optical and physical characteristics of and fitting of contact lenses with medical supervision of adaptation; corneal lens, both eyes, except for aphakia. 

WC 106

References

Medical Billing Outsourcing Services and Consulting Solutions by OMG, LLC.A Medical Billing Service That’s Right For Your Practice. OMG’s Medical Billing Outsourcing & Consulting Services Increase Medical Revenue for Providers Nationwide.