SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

Database Course Discussion 2

 

Please see below the discussion in response to the original question asked and respond as a peer using 150 or more words.

Original Question:   As your study in this course draws to a close, it is important to reflect on new levels of understanding, skills, and knowledge that you developed as a result of your efforts throughout this course. It is particularly important to reflect on the course outcomes (what you were intended to learn in this course). 

Peer Response:  

 

When I enrolled in this course I expected to learn about the different components to a database and how I might need to structure it. We covered the database concepts, design, modeling, normalization, and statements. Each module we were able to build on what we learned. This class taught me that a database is a collection of structured information that is accessed, managed, updated, and controlled with a query language(SQL).

I learned that an Entity Relationship Diagram is to show the relationship of entities stored in a database. There are three concepts to an ER Diagram: entities, attributes, and relationships. This step is before creating your ER model which is a must before implementing your database. We do this to eliminate redundant information and make sure that all needed information is supported. I must admit that this concept seems simple but for me I had a hard breaking everything down to eliminate the repeated information. This is still a slight struggle but with a little more practice I can get it. 

Normalization is a technique used to reduce redundancy and reduce the need for insertion, updates, and deletion. There are 3 forms that we covered in this course. 1NF, 2NF, 3NF and each one will build on top of one another. 1NF should have one value and it needs to be unique. 2NF must be in 1NF and the primary key is not functionally dependent on any other key relations. 3NF must be in 2NF and no transitive functional dependencies. This was the biggest struggle I had in the entire course. I had to find visual examples to really get my understanding around this course material. 

SQL Statements was my favorite part of the whole course. The statements we used were basic and straight forward. Statements had keywords like SELECT, FROM, CREATE TABLE, INSERT INTO. The commands told you exactly what you were doing. I think I enjoyed this section so much because I was able to get the visual satisfaction of my data inputs populating in the tables. I have had experience with SQL before but to only pull information that I was looking for, so to actually write it was fun.

Thank you Dr. Kats, your classes challenge me and your feedback is very helpful. I hope to have you in another course!

Programming

Java programming using intellij.

Q1: Celsius Temperature Table

The formula for converting a temperature from Fahrenheit to Celsius is

C = 5 / 9 ( F 32 )

where F is the Fahrenheit temperature and C is the Celsius temperature. Write a method named celsius that accepts a Fahrenheit temperature as an argument. The method should return the temperature, converted to Celsius. Demonstrate the method by calling it in a loop that displays a table of the Fahrenheit temperatures 0 through 20 and their Celsius equivalents.

Q2: Test Average and Grade

Write a program that asks the user to enter five test scores. The program should display a letter grade for each score and the average test score. Write the following methods in the program:

• calcAverage—This method should accept five test scores as arguments and return the average of the scores.• determineGrade—This method should accept a test score as an argument and return a letter grade for the score, based on the following grading scale:

ScoreLetter Grade

90–100​​ A

80–89 ​​B

70–79 ​​C

60–69 ​​D

Below 60 ​​F

Q3: Conversion Program

Write a program that asks the user to enter a distance in meters. The program will then pre-sent the following menu of selections:

1. Convert to kilometers

2. Convert to inches

3. Convert to feet

4. Quit the program

The program will convert the distance to kilometers, inches, or feet, depending on the user’s selection. Here are the specific requirements:

• Write a void method named showKilometers, which accepts the number of meters as an argument. The method should display the argument converted to kilometers. Convert the meters to kilometers using the following formula:

kilometers = meters * 0.001

• Write a void method named showInches, which accepts the number of meters as an argument. The method should display the argument converted to inches. Convert the meters to inches using the following formula:

inches = meters * 39.37

• Write a void method named showFeet, which accepts the number of meters as an argument. The method should display the argument converted to feet. Convert the meters to feet using the following formula:

feet = meters * 3.281

• Write a void method named menu that displays the menu of selections. This method should not accept any arguments.• The program should continue to display the menu until the user enters 4 to quit the program.• The program should not accept negative numbers for the distance in meters.• If the user selects an invalid choice from the menu, the program should display an error message.

Here is an example session with the program, using console input. The user’s input is shown in bold.

Enter a distance in meters: 500 [Enter]

1. Convert to kilometers

2. Convert to inches

3. Convert to feet

4. Quit the program

Enter your choice: 1 [Enter]

500 meters is 0.5 kilometers.

1. Convert to kilometers

2. Convert to inches

3. Convert to feet

4. Quit the program

Enter your choice: 3 [Enter]

500 meters is 1640.5 feet.

1. Convert to kilometers

2. Convert to inches

3. Convert to feet

4. Quit the program

Enter your choice: 4 [Enter]

Bye!

Q4: Present Value

Suppose you want to deposit a certain amount of money into a savings account, and then leave it alone to draw interest for the next 10 years. At the end of 10 years, you would like to have $10,000 in the account. How much do you need to deposit today to make that happen? You can use the following formula, which is known as the present value formula, to find out:

P = F / ( 1 + r ) n

The terms in the formula are as follows:

P is the present value, or the amount that you need to deposit today.• F is the future value that you want in the account. (In this case, F is $10,000.)• r is the annual interest rate.• n is the number of years that you plan to let the money sit in the account.

Write a method named presentValue that performs this calculation. The method should accept the future value, annual interest rate, and number of years as arguments. It should return the present value, which is the amount that you need to deposit today. Demonstrate the method in a program that lets the user experiment with different values for the formula’s terms.

Deliverables:

1. Source codes – 4 X 20 = 80%2. Screenshots of the program output. – 4 X 5 = 20%

Note: Sparingly comment your java source code, save all the files in your_lastname_lab_2 folder, zip it, and upload for grading.

Thank you!

Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory

#Exp19_Excel_Ch12_Cap_Bulldog_Collectibles

 #Exp19_Excel_Ch12_Cap_Inventory 

Project Description:

You are the operations manager for Bulldog collectables, a small  start-up company that deals with sports memorabilia. As you prepare to  document your inventory, you decide to utilize a template to save time.  To complete this task, you will create a worksheet based on an  Office.com template; you will also use the Macro Recorder and Visual  Basic for Application to automate sorting and calculations within the  workbook.

Start   Excel. Download and open the file named EXP19_Excel_Ch12_Cap_Inventory.xlsx. Grader has automatically added   your last name to the beginning of the filename. 

Delete the Inventory Pick List   and Bin Lookup worksheets.

Delete the INVENTORY PICK LIST   and BIN LOOKUP icons located  respectively in cells E2 and F2. Then Clear all   existing Data  Validation in the range A1:K15.

Delete the values in the range   B5:J15.

Record a macro named Sort, be sure to use relative    references. Ensure the macro sorts the data in the table in ascending  order   based on SKU (column A). Stop the Macro Recorder and Save the  workbook as a   Macro-Enabled Template.

Create a form control button   that spans the cell E2:E3. Assign the Sort macro and edit the button text to Sort.

Use the VBA Editor to create a   new module.
 

  Type the following VBA code to create a custom Inventory Value  function then   save and exit the VBA Editor (be sure to leave a blank  line between each line   and before End Function):
 

Function   InventoryValue (QTY, COST)
 

InventoryValue   = QTY * COST
 

Click cell J5 and use the newly   created InventoryValue function to  calculate the value of the inventory for   each item in column I.

Use the VBA Editor to create a   new module named ProtectWorkbook. Type the following VBA statements to create the   sub procedure (leave appropriate line spacing).
 

Sub   ProtectWorkbook()
 

‘Protect   workbook using the password eXploring
Worksheets(“Inventory   List”).Protect Password:=”eXploring”

Insert a new module named UnprotectWorkbook. Type  the following VBA   statements to create the sub procedure and then save  and exit the VBA Editor   (leave appropriate line spacing).
 

Sub   UnprotectWorkbook()
 

‘Unprotect   workbook using the password eXploring
Worksheets(“Inventory   List”).Unprotect Password:=”eXploring”

Insert a Form Control Button   spanning cells F2:F3 named Unprotect. Assign the UnprotectWorkbook macro to the newly   created Control Button.

Insert a Form Control Button   spanning the range G2:H3 named Protect. Assign the macro ProtectWorkbook.

Insert the comment Inventory   based on values in column J. in cell B3 (include the period).

Insert the comment Count of   items in column C.   in cell C3 (include the period).

Inspect the document for private   information and hidden properties.  Save the file when prompted then remove   Document Properties and  Personal Information, and Headers and Footers.
 

  Note: Mac users, from the Excel menu, open your preferences, click  Security,   and then click the check box to Remove personal information  from this file on   save. Delete any headers or footers in the workbook.

Check the document for   accessibility issues. Use the Accessibility  Checker pane to change the cell   styles to Normal in order to repair  the issue.

Check the document for   compatibility with Excel 2010, 2013, and 2016.
 

  Note: Mac users, skip this step.

Insert a new worksheet named Code.

Open the VBA Editor, open Module   1, and copy the code. Paste the code in the Code worksheet starting in cell   A1. 

In the VBA Editor, open Module   2, and copy the code. Paste the code in the Code worksheet starting in cell   A22. 

In the VBA Editor, open the   ProtectWorkbook, and copy the code. Paste the code in the Code worksheet   starting in cell A28. 

In the VBA Editor, open the   UnprotectWorkbook module, and copy the  code. Paste the code in the Code   worksheet starting in cell A35. 

Close the VBA Editor and save   the workbook as an xlsx file (not Macro-Enabled).

Close EXP19_Excel_Ch12_CAP_Inventory.xlsx. Exit Excel. Submit the file   as directed.

Problem set

For this week you will return into the Changepoint PPM tool and continue working on the project that

you created in prior weeks. As a project goes through the execution phase, project control is critical to

ensure that a project stays within the constraints of time, cost, and scope. A project manager will use

different monitoring techniques to help keep the project within these constraints. If a project incurs

changes, becomes delayed, or costs become higher, a project manager will execute change control to

document and determine how to handle the change.

Once a project is completed, the project team should complete a final project report, which is the

administrative record of the completed project, which identifies all its functional and technical

components as well as other important project history. It includes all the strengths and weaknesses of

the project as it progressed and offers a final assessment of what went right (or wrong) throughout the

life of the project. It is essentially a “lessons learned” document of the project.

1. Log back into the Changepoint PPM (Daptiv) tool.

2. If not already existing, add a deliverable related to Project Close in your project with a work

packages titled “Perform Lessons Learned Workshop” and “Complete Project Close Report.”

3. Flag all tasks as complete

a. Complete this by either selecting each task and setting the status as Done, or you

may use your shift key and select all tasks (first task -> hold shift key -> last task).

Then right click on Status and choose ‘Mark as Complete’

4. Close all risks

a. Complete this by going to your Risk list, and updating the status for each to ‘Risk

Resolved’

5. Add in at least four (4) lessons learned

a. You will be creative with this assignment and make up some lessons learned that

you believe you may have learned from completing the project.

b. Steps:

i. Go to ‘Lessons Learned’ on the left menu

ii. Click ‘Add’ on the top

iii. Complete the fields: Lesson Type, Topic, Lesson, and Impact.

iv. Repeat to add in at least three different lessons learned.

6. Update project status to complete

a. Using the ‘Status’ button in the top right.

b. Update the ‘State” field to ‘Completed’

c. Update the ‘Phase’ field to ‘Close Out’

d. Within the Update Notes add in 2-3 sentences on what you learned this week. Also

add in 1-2 sentences about your experience with Daptiv.

7. Runs/save a project report and submits to the instructor for grading

Assignment and Discussion

 

Week Three Assignment

Do a bit of research on CWE, Common Weakness Enumeration.Write a brief overview of their scoring system.Pick one of common weaknesses identified on their site and describe it.
Your assignment should be 200-300 of your own words. 

 Week Three Discussion

Read the section in this week’s reading assignment on secure passwords.

Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure.t

Read and respond to at least two other students Discussions.

Post between 200 and 300 words.

Business Intelligence Discussion

 Excel is probably the most popular spreadsheet software for PCs. Why? What can we do with this package that makes it so attractive for modeling efforts?
Your response should be 250-300 words.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.