https://www.wireshark.org
Java Programming
You will write a program that recommends treatment for a contagious disease on an alien planet.
The file you upload should be named “XYProjectOne.java”, where “X” and “Y” are your first and last initials.
Mobile Application – Practical connection paper
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
ABSOLUTELY ZERO PLAGIARISM
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
Write up on why I'm interested in xxx Company and role Senior Software Development Engineer.
Bachelor’s degree in Computer Science or other related field OR equivalent work experience.
5 + years of IT work experience completing application development in a distributed multi-tier environment.
Excellent written and verbal communication skills and the ability to create excellent software development lifecycle documentation.
Ability to work on a variety of programming languages. Stays abreast of the development in area of professional competence.
General:
Visual C#
Angular JS 6.0 and above
- ASP.Net Core
Entity Framework
Web API’s
Team foundation server
- Telerik controls
- Visual Studio 2017
SQL server 2016
SharePoint a plus
Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory
Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory
#Exp19_Excel_Ch12_Cap_Bulldog_Collectibles
#Exp19_Excel_Ch12_Cap_Inventory
Project Description:
You are the operations manager for Bulldog collectables, a small start-up company that deals with sports memorabilia. As you prepare to document your inventory, you decide to utilize a template to save time. To complete this task, you will create a worksheet based on an Office.com template; you will also use the Macro Recorder and Visual Basic for Application to automate sorting and calculations within the workbook.
Start Excel. Download and open the file named EXP19_Excel_Ch12_Cap_Inventory.xlsx. Grader has automatically added your last name to the beginning of the filename.
Delete the Inventory Pick List and Bin Lookup worksheets.
Delete the INVENTORY PICK LIST and BIN LOOKUP icons located respectively in cells E2 and F2. Then Clear all existing Data Validation in the range A1:K15.
Delete the values in the range B5:J15.
Record a macro named Sort, be sure to use relative references. Ensure the macro sorts the data in the table in ascending order based on SKU (column A). Stop the Macro Recorder and Save the workbook as a Macro-Enabled Template.
Create a form control button that spans the cell E2:E3. Assign the Sort macro and edit the button text to Sort.
Use the VBA Editor to create a new module.
Type the following VBA code to create a custom Inventory Value function then save and exit the VBA Editor (be sure to leave a blank line between each line and before End Function):
Function InventoryValue (QTY, COST)
InventoryValue = QTY * COST
Click cell J5 and use the newly created InventoryValue function to calculate the value of the inventory for each item in column I.
Use the VBA Editor to create a new module named ProtectWorkbook. Type the following VBA statements to create the sub procedure (leave appropriate line spacing).
Sub ProtectWorkbook()
‘Protect workbook using the password eXploring
Worksheets(“Inventory List”).Protect Password:=”eXploring”
Insert a new module named UnprotectWorkbook. Type the following VBA statements to create the sub procedure and then save and exit the VBA Editor (leave appropriate line spacing).
Sub UnprotectWorkbook()
‘Unprotect workbook using the password eXploring
Worksheets(“Inventory List”).Unprotect Password:=”eXploring”
Insert a Form Control Button spanning cells F2:F3 named Unprotect. Assign the UnprotectWorkbook macro to the newly created Control Button.
Insert a Form Control Button spanning the range G2:H3 named Protect. Assign the macro ProtectWorkbook.
Insert the comment Inventory based on values in column J. in cell B3 (include the period).
Insert the comment Count of items in column C. in cell C3 (include the period).
Inspect the document for private information and hidden properties. Save the file when prompted then remove Document Properties and Personal Information, and Headers and Footers.
Note: Mac users, from the Excel menu, open your preferences, click Security, and then click the check box to Remove personal information from this file on save. Delete any headers or footers in the workbook.
Check the document for accessibility issues. Use the Accessibility Checker pane to change the cell styles to Normal in order to repair the issue.
Check the document for compatibility with Excel 2010, 2013, and 2016.
Note: Mac users, skip this step.
Insert a new worksheet named Code.
Open the VBA Editor, open Module 1, and copy the code. Paste the code in the Code worksheet starting in cell A1.
In the VBA Editor, open Module 2, and copy the code. Paste the code in the Code worksheet starting in cell A22.
In the VBA Editor, open the ProtectWorkbook, and copy the code. Paste the code in the Code worksheet starting in cell A28.
In the VBA Editor, open the UnprotectWorkbook module, and copy the code. Paste the code in the Code worksheet starting in cell A35.
Close the VBA Editor and save the workbook as an xlsx file (not Macro-Enabled).
Close EXP19_Excel_Ch12_CAP_Inventory.xlsx. Exit Excel. Submit the file as directed.
Effects of Surveillance on Consumers
Submit your final project topic here.
Topic: Effects of Surveillance on Consumers
Your Research Project on the surveillance state consists of two parts:
1 a Powerpoint presentation consisting of at least 12 slides not including title and references.
2. 750 word research paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.
you can include below in the paper:
– Introduction of Effects of surveillance on consumer
– Benefits of Surveillance
– Disadvantages
– The Faced challenges
– Conclusion
Do not double space.
You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line.
MSIT CLA
you are currently working with a team of software developers. Ask
them if the users are satisfied with the enterprise travel system. List and investigate the pain points users are experiencing with the system Some common problems to similar systems in many organizations are the integration with the airline’s service providers as it is always provided outdated fares at least by 24 hours, the system being slow especially when you try to access it from a remote location or through a VPN connection. Investigate the issues that are facing the travel system in the company you are interning for and provide them a report list and explaining the issues experienced by its users, provide three (3)
alternate solutions to how you can mitigate those issues and provide a plan of action to execute the plan.
Please make sure you address the following:
● Address what documentations you need such as the Software requirements specification,
conceptual and physical design, the development document, the testing plan, and the
implementation plan.
● Create a schedule of the implementation plan along with costs and resources associated with
software and labor.
● What performance, disaster recovery, security, and privacy requirements have been considered?
Rewrite the attached paper or topic related to that (10 Pages including Reference page and cover page)
This Individual Project is a continuation of your final research paper.
For this Phase, you will submit a draft of your research paper. The draft of your paper should take you from your sentence outline submitted in the previous Individual Project in Phase 3 to a draft that focuses on content and information flow. Your submission should include a minimum of a draft of your introduction, a draft of key body paragraphs, and a draft of the conclusion. You should also include your reference list, which should be 80% complete at this point in the writing process.
The first draft should include the introduction, conclusion, transitions, main sections and paragraphs, and the main points and subpoints.
PC Security Essay
. Your word processing project will be to write an essay about a topic related to PC Security. Read this all through to the end once before you try it.
2. Do some research on the Internet (Google, Wikipedia, etc.) and find out some information about ONE security issue, security problem or crime relating to use of a computer on the Internet. There are literally hundreds of issues that can include hacking, theft of information, theft of money, personal attacks, or vulnerabilities overall. If it can get you “hurt” in some way, it counts. Get information about the problem so you can describe it in detail and offer strategies for what a user could do to protect themselves. Be sure you have at least 2 URLs with good web sources, and also get 2 images. You will discuss 1 image now, and later at the end of the course you will turn this essay into a presentation where you will use both images.
3. Write 400-500 words about your topic. It must be all original writing, no copying at all, and will provide the following:
* An introductory paragraph
* A middle, several paragraphs with explanation, description and detail so the reader has the basic idea of what the essay is all about.
* A concluding paragraph
4. Use the following formatting requirements and create a Microsoft Word document with the filename PC Security Essay
* Margins 1″
* Any font you like as long as it’s clear and readable, 10 point
* Title at the top, centered
* Your name under the title, centered
* Paragraphs single spaced, 1 blank line between paragraphs, no indent, left justified
* 1 image, relevant to the topic and explained in the text
* Footer with page number
* References cited at the end on a separate Works Cited page
* Spelling and grammar checked
5. Your project will be graded according to the following rubric:
Requirements
Max Points Possible
400-500 word count
10
Covers the topic in appropriate detail
20
Formatting correct
10
1 Image included, relevant and discussed
10
Spelling and grammar checked
10
Total
60