I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA)
Database Course Discussion 2
Please see below the discussion in response to the original question asked and respond as a peer using 150 or more words.
Original Question: As your study in this course draws to a close, it is important to reflect on new levels of understanding, skills, and knowledge that you developed as a result of your efforts throughout this course. It is particularly important to reflect on the course outcomes (what you were intended to learn in this course).
Peer Response:
When I enrolled in this course I expected to learn about the different components to a database and how I might need to structure it. We covered the database concepts, design, modeling, normalization, and statements. Each module we were able to build on what we learned. This class taught me that a database is a collection of structured information that is accessed, managed, updated, and controlled with a query language(SQL).
I learned that an Entity Relationship Diagram is to show the relationship of entities stored in a database. There are three concepts to an ER Diagram: entities, attributes, and relationships. This step is before creating your ER model which is a must before implementing your database. We do this to eliminate redundant information and make sure that all needed information is supported. I must admit that this concept seems simple but for me I had a hard breaking everything down to eliminate the repeated information. This is still a slight struggle but with a little more practice I can get it.
Normalization is a technique used to reduce redundancy and reduce the need for insertion, updates, and deletion. There are 3 forms that we covered in this course. 1NF, 2NF, 3NF and each one will build on top of one another. 1NF should have one value and it needs to be unique. 2NF must be in 1NF and the primary key is not functionally dependent on any other key relations. 3NF must be in 2NF and no transitive functional dependencies. This was the biggest struggle I had in the entire course. I had to find visual examples to really get my understanding around this course material.
SQL Statements was my favorite part of the whole course. The statements we used were basic and straight forward. Statements had keywords like SELECT, FROM, CREATE TABLE, INSERT INTO. The commands told you exactly what you were doing. I think I enjoyed this section so much because I was able to get the visual satisfaction of my data inputs populating in the tables. I have had experience with SQL before but to only pull information that I was looking for, so to actually write it was fun.
Thank you Dr. Kats, your classes challenge me and your feedback is very helpful. I hope to have you in another course!
Programming
Java programming using intellij.
Q1: Celsius Temperature Table
The formula for converting a temperature from Fahrenheit to Celsius is
C = 5 / 9 ( F − 32 )
where F is the Fahrenheit temperature and C is the Celsius temperature. Write a method named celsius that accepts a Fahrenheit temperature as an argument. The method should return the temperature, converted to Celsius. Demonstrate the method by calling it in a loop that displays a table of the Fahrenheit temperatures 0 through 20 and their Celsius equivalents.
Q2: Test Average and Grade
Write a program that asks the user to enter five test scores. The program should display a letter grade for each score and the average test score. Write the following methods in the program:
• calcAverage—This method should accept five test scores as arguments and return the average of the scores.• determineGrade—This method should accept a test score as an argument and return a letter grade for the score, based on the following grading scale:
Score Letter Grade
90–100 A
80–89 B
70–79 C
60–69 D
Below 60 F
Q3: Conversion Program
Write a program that asks the user to enter a distance in meters. The program will then pre-sent the following menu of selections:
1. Convert to kilometers
2. Convert to inches
3. Convert to feet
4. Quit the program
The program will convert the distance to kilometers, inches, or feet, depending on the user’s selection. Here are the specific requirements:
• Write a void method named showKilometers, which accepts the number of meters as an argument. The method should display the argument converted to kilometers. Convert the meters to kilometers using the following formula:
kilometers = meters * 0.001
• Write a void method named showInches, which accepts the number of meters as an argument. The method should display the argument converted to inches. Convert the meters to inches using the following formula:
inches = meters * 39.37
• Write a void method named showFeet, which accepts the number of meters as an argument. The method should display the argument converted to feet. Convert the meters to feet using the following formula:
feet = meters * 3.281
• Write a void method named menu that displays the menu of selections. This method should not accept any arguments.• The program should continue to display the menu until the user enters 4 to quit the program.• The program should not accept negative numbers for the distance in meters.• If the user selects an invalid choice from the menu, the program should display an error message.
Here is an example session with the program, using console input. The user’s input is shown in bold.
Enter a distance in meters: 500 [Enter]
1. Convert to kilometers
2. Convert to inches
3. Convert to feet
4. Quit the program
Enter your choice: 1 [Enter]
500 meters is 0.5 kilometers.
1. Convert to kilometers
2. Convert to inches
3. Convert to feet
4. Quit the program
Enter your choice: 3 [Enter]
500 meters is 1640.5 feet.
1. Convert to kilometers
2. Convert to inches
3. Convert to feet
4. Quit the program
Enter your choice: 4 [Enter]
Bye!
Q4: Present Value
Suppose you want to deposit a certain amount of money into a savings account, and then leave it alone to draw interest for the next 10 years. At the end of 10 years, you would like to have $10,000 in the account. How much do you need to deposit today to make that happen? You can use the following formula, which is known as the present value formula, to find out:
P = F / ( 1 + r ) n
The terms in the formula are as follows:
• P is the present value, or the amount that you need to deposit today.• F is the future value that you want in the account. (In this case, F is $10,000.)• r is the annual interest rate.• n is the number of years that you plan to let the money sit in the account.
Write a method named presentValue that performs this calculation. The method should accept the future value, annual interest rate, and number of years as arguments. It should return the present value, which is the amount that you need to deposit today. Demonstrate the method in a program that lets the user experiment with different values for the formula’s terms.
Deliverables:
1. Source codes – 4 X 20 = 80%2. Screenshots of the program output. – 4 X 5 = 20%
Note: Sparingly comment your java source code, save all the files in your_lastname_lab_2 folder, zip it, and upload for grading.
Thank you!
Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory
#Exp19_Excel_Ch12_Cap_Bulldog_Collectibles
#Exp19_Excel_Ch12_Cap_Inventory
Project Description:
You are the operations manager for Bulldog collectables, a small start-up company that deals with sports memorabilia. As you prepare to document your inventory, you decide to utilize a template to save time. To complete this task, you will create a worksheet based on an Office.com template; you will also use the Macro Recorder and Visual Basic for Application to automate sorting and calculations within the workbook.
Start Excel. Download and open the file named EXP19_Excel_Ch12_Cap_Inventory.xlsx. Grader has automatically added your last name to the beginning of the filename.
Delete the Inventory Pick List and Bin Lookup worksheets.
Delete the INVENTORY PICK LIST and BIN LOOKUP icons located respectively in cells E2 and F2. Then Clear all existing Data Validation in the range A1:K15.
Delete the values in the range B5:J15.
Record a macro named Sort, be sure to use relative references. Ensure the macro sorts the data in the table in ascending order based on SKU (column A). Stop the Macro Recorder and Save the workbook as a Macro-Enabled Template.
Create a form control button that spans the cell E2:E3. Assign the Sort macro and edit the button text to Sort.
Use the VBA Editor to create a new module.
Type the following VBA code to create a custom Inventory Value function then save and exit the VBA Editor (be sure to leave a blank line between each line and before End Function):
Function InventoryValue (QTY, COST)
InventoryValue = QTY * COST
Click cell J5 and use the newly created InventoryValue function to calculate the value of the inventory for each item in column I.
Use the VBA Editor to create a new module named ProtectWorkbook. Type the following VBA statements to create the sub procedure (leave appropriate line spacing).
Sub ProtectWorkbook()
‘Protect workbook using the password eXploring
Worksheets(“Inventory List”).Protect Password:=”eXploring”
Insert a new module named UnprotectWorkbook. Type the following VBA statements to create the sub procedure and then save and exit the VBA Editor (leave appropriate line spacing).
Sub UnprotectWorkbook()
‘Unprotect workbook using the password eXploring
Worksheets(“Inventory List”).Unprotect Password:=”eXploring”
Insert a Form Control Button spanning cells F2:F3 named Unprotect. Assign the UnprotectWorkbook macro to the newly created Control Button.
Insert a Form Control Button spanning the range G2:H3 named Protect. Assign the macro ProtectWorkbook.
Insert the comment Inventory based on values in column J. in cell B3 (include the period).
Insert the comment Count of items in column C. in cell C3 (include the period).
Inspect the document for private information and hidden properties. Save the file when prompted then remove Document Properties and Personal Information, and Headers and Footers.
Note: Mac users, from the Excel menu, open your preferences, click Security, and then click the check box to Remove personal information from this file on save. Delete any headers or footers in the workbook.
Check the document for accessibility issues. Use the Accessibility Checker pane to change the cell styles to Normal in order to repair the issue.
Check the document for compatibility with Excel 2010, 2013, and 2016.
Note: Mac users, skip this step.
Insert a new worksheet named Code.
Open the VBA Editor, open Module 1, and copy the code. Paste the code in the Code worksheet starting in cell A1.
In the VBA Editor, open Module 2, and copy the code. Paste the code in the Code worksheet starting in cell A22.
In the VBA Editor, open the ProtectWorkbook, and copy the code. Paste the code in the Code worksheet starting in cell A28.
In the VBA Editor, open the UnprotectWorkbook module, and copy the code. Paste the code in the Code worksheet starting in cell A35.
Close the VBA Editor and save the workbook as an xlsx file (not Macro-Enabled).
Close EXP19_Excel_Ch12_CAP_Inventory.xlsx. Exit Excel. Submit the file as directed.
2 discussion and 1 Assignment
2 discussions
1 assignment
PFA for details.
How do I make money as a kid
How do I make money
Problem set
For this week you will return into the Changepoint PPM tool and continue working on the project that
you created in prior weeks. As a project goes through the execution phase, project control is critical to
ensure that a project stays within the constraints of time, cost, and scope. A project manager will use
different monitoring techniques to help keep the project within these constraints. If a project incurs
changes, becomes delayed, or costs become higher, a project manager will execute change control to
document and determine how to handle the change.
Once a project is completed, the project team should complete a final project report, which is the
administrative record of the completed project, which identifies all its functional and technical
components as well as other important project history. It includes all the strengths and weaknesses of
the project as it progressed and offers a final assessment of what went right (or wrong) throughout the
life of the project. It is essentially a “lessons learned” document of the project.
1. Log back into the Changepoint PPM (Daptiv) tool.
2. If not already existing, add a deliverable related to Project Close in your project with a work
packages titled “Perform Lessons Learned Workshop” and “Complete Project Close Report.”
3. Flag all tasks as complete
a. Complete this by either selecting each task and setting the status as Done, or you
may use your shift key and select all tasks (first task -> hold shift key -> last task).
Then right click on Status and choose ‘Mark as Complete’
4. Close all risks
a. Complete this by going to your Risk list, and updating the status for each to ‘Risk
Resolved’
5. Add in at least four (4) lessons learned
a. You will be creative with this assignment and make up some lessons learned that
you believe you may have learned from completing the project.
b. Steps:
i. Go to ‘Lessons Learned’ on the left menu
ii. Click ‘Add’ on the top
iii. Complete the fields: Lesson Type, Topic, Lesson, and Impact.
iv. Repeat to add in at least three different lessons learned.
6. Update project status to complete
a. Using the ‘Status’ button in the top right.
b. Update the ‘State” field to ‘Completed’
c. Update the ‘Phase’ field to ‘Close Out’
d. Within the Update Notes add in 2-3 sentences on what you learned this week. Also
add in 1-2 sentences about your experience with Daptiv.
7. Runs/save a project report and submits to the instructor for grading
CS2205A
assignment
Assignment and Discussion
Week Three Assignment
Do a bit of research on CWE, Common Weakness Enumeration.Write a brief overview of their scoring system.Pick one of common weaknesses identified on their site and describe it.
Your assignment should be 200-300 of your own words.
Week Three Discussion
Read the section in this week’s reading assignment on secure passwords.
Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure.t
Read and respond to at least two other students Discussions.
Post between 200 and 300 words.
Business Intelligence Discussion
Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?
Your response should be 250-300 words.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.