Easy Power point computer instructions

 

  1. Download the attached data file Customer.pptx then, save it as CustomerPresentation. Make sure you know the location where you are placing your saved file before you continue with step 2.
  2. In the title slide, add OfficePro as the title, press the Enter key, and then type Cleaning Specialists. The title text AutoFit to the title text box. Add your name as the subtitle.
  3. Delete slide 3 (“Our Cleaning Staff”).
  4. Move Slide 6 (“Weekly Services”) so it becomes slide 3.
  5. On Slide 3 (“Weekly Services”), at the end of the bulleted list, add Stair and elevator cleaning as a new first-level bulleted item.
  6. On slide 3, add Remember to pause for questions from the audience, as the speaker note.
  7. On slide 2, (“Daily Services”), at the end of the bulleted list, add Restroom cleaning and disinfecting as a new first-level bulleted item.
  8. On Slide 4, (“Specialized Services”), move the “Pressure washing” and “Carpet cleaning” bulleted items so that they appear below “Stripping and refinishing” and above “Air condition vent cleaning.”
  9. On Slide 2 (“Daily Services”), in the second first-level bulleted item, make the word Sinks a new first-level bullet.
  10. On Slide 2 (“Daily Services”), demote the bulleted item “Sinks” and “Toasters” to second-level bullets so that four second-level bulleted items now appear under “Kitchen and lounge area cleaning including.”
  11. Animate the slide titles for all the slides with the Darken animation in the Emphasis category. (If you do not have Darken animation, please feel free to use other that you like).
  12. Animate all of the bulleted lists with the Shape animation in the Entrance category using progressive disclosure for all bullet levels. Do not animate the text in the content text box on Slide 6 (“For More Information”). (If you do not have Shape animation, please feel free to use other that you like).
  13. On Slide 6 (“For More Information”), animate the content text box using the Fly In animation in the Entrance Category. (If you do not have Fly In, please feel free to use other that you like).
  14. Add the Push transition to all of the slides, and then remove it from the title slide. (If you do not have Push transition, please feel free to use other that you like).
  15. Display the footer text Presentation for New Clients as well the slide number and the current date on all of the slides except the title slide.
  16. Check the spelling throughout the presentation. Change misspelled words to the correct spelling.
  17. View the slide show. If you see any errors, press the Esc key to the end the slide show, correct the error, and then start the slide show again from the current slide. Save your changes. Close the presentation. Submit your presentation.
  • In case you need help with any step, contact me immediately. Please do not procrastinate because we will need to move on to the next class Unit at the scheduled time.
  • This assignment is due on Sunday, September 13th at midnight; please remember that 10 points per day will be deducted for late submissions regardless of the reason for that and after three days this assignment will no longer be accepted.

Describe

 

1. Describe a fully developed use case for Receive new book in the university library system and then:

o Describe (UML) Activity diagram for the Enter new patient information use case

o Develop a first-cut sequence diagram that only includes the actor and problem domain classes.

o Develop a design class diagram based on your solution. Be sure to include your controller class.

o Add the view layer classes and the data access classes to your   diagram. You may do this with two separate diagrams to make them easier   to work with and read.

o Explain What is the difference between designing with CRC cards and designing with sequence diagrams?

o Explain the syntax of a message on a sequence diagram.

o What is the purpose of the first-cut sequence diagram? What kinds of classes are included?

o What is the purpose of the use case controller?

2. Using RMO that is the case in your text book answer the following:

Assume that RMO will begin asking a random sample of customers who   order by telephone about purchases made from competitors. RMO will give   customers a 15 percent discount on their current order in exchange for   answering a few questions. To store and use this information, RMO will   add two new classes and three new associations to the class diagram.  The  new classes are Competitor and ProductCategory. Competitor has a   one-to-many association with ProductCategory, and the existing Customer   class also has a one-to-many association with ProductCategory.   Competitor has a single attribute called Name. ProductCategory has four   attributes: Description, DollarAmountPurchased, MonthPurchased, and   YearPurchased. Revise the relational database schema shown in Figure   12-10 to include the new classes and associations. All tables must be  in  3NF.

3. Read this narrative and then make a list of system capabilities   and describe how the project could be developed  for the company:

The new direct sales and accounting system for Especially for You   Jewelers will be an important element in the growth and success of the   jewelry company. The direct sales portion needs to track every sale and   be able to link to the inventory system for cost data to provide a  daily  profit and loss report. The customer database needs to be able to   produce purchase histories to assist management in preparing special   mailings and special sales to existing customers. Detailed credit   balances and Aged accounts for each customer would help solve the   problem with the high balance of accounts receivables. Special notice   letters and credit history reports would help management reduce  accounts  receivable.

information security-Delete Yourself from the Internet (Is it possible and how can it be accomplished?)

  

Do you feel you are vulnerable to hackers or identity thieves because you have a large online presence? Have you ever thought of removing your personal data from the net? Well, it’s not quite as simple as it should be. There are a few easy-to-follow steps that should point you in the right direction that can be found online, but the story does not end there. How can you make sure your personal information or financial data will not be exposed on sites that do not have your written permission? Is it possible to completely remove yourself from the web?

  

Project Plan

In this case project, we will determine the many options and the companies that collect your personal information. They’re called data brokers and they have names like Spokeo, Whitepages.com, PeopleFinder, BeenVerified, as well as plenty of others. 

1) In addition to the sites named above, list 5 additional agencies you find that collect this type of personal data. Hint: Many of them claim to be marketing agencies.

2) Provide a list of the companies that you find that claim to be able to remove your personal information from the data broker sites and the methods they use to delete this information.

3) Write a report with a step-by-step written summary of the processes and the methods which describe how you would go about DELETING yourself from the Internet. 

EH week 3

 Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT.

agile Wk3

 In your opinion, what might be some team responsibilities that are not covered in any of these roles? Could you see yourself becoming a scrum master? Why or why not? 

250-300 words

Need 4 pages on Disaster recovery and business continuity plan

 Write a 4 page APA formatted paper comparing your organization’s disaster recovery and business continuity plans with the best practices outlined in your course text.  Content should include, but not be limited to:  selecting the DR. team, assessing risks and impacts, prioritizing systems and functions for recovery, data storage and recovery sites, developing plans and procedures, procedures for special circumstances, and testing the disaster recovery plan.  Your paper should include an abstract and a conclusion and a reference page with 3-5 references 

Access control discussion 9

What technology can a business use to assist in the access control.

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.