Java Programming

 You will write a program that recommends treatment for a contagious disease on an alien planet. 

 The file you upload should be named “XYProjectOne.java”, where “X” and “Y” are your first and last initials. 

Mobile Application – Practical connection paper

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

ABSOLUTELY ZERO PLAGIARISM

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Write up on why I'm interested in xxx Company and role Senior Software Development Engineer.

  Bachelor’s degree in Computer Science or other related field OR equivalent work experience.

5 + years of IT work experience completing application development in a distributed multi-tier environment.

Excellent written and verbal communication skills and the ability to create excellent software development lifecycle documentation.

Ability to work on a variety of programming languages. Stays abreast of the development in area of professional competence.

General:

Visual C#

Angular JS 6.0 and above

  • ASP.Net Core

Entity Framework

Web API’s

Team foundation server

  • Telerik controls
  • Visual Studio 2017

SQL server 2016

SharePoint a plus

Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory

 

Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory

 

#Exp19_Excel_Ch12_Cap_Bulldog_Collectibles

 #Exp19_Excel_Ch12_Cap_Inventory 

Project Description:

You are the operations manager for Bulldog collectables, a small  start-up company that deals with sports memorabilia. As you prepare to  document your inventory, you decide to utilize a template to save time.  To complete this task, you will create a worksheet based on an  Office.com template; you will also use the Macro Recorder and Visual  Basic for Application to automate sorting and calculations within the  workbook.

Start   Excel. Download and open the file named EXP19_Excel_Ch12_Cap_Inventory.xlsx. Grader has automatically added   your last name to the beginning of the filename. 

Delete the Inventory Pick List   and Bin Lookup worksheets.

Delete the INVENTORY PICK LIST   and BIN LOOKUP icons located  respectively in cells E2 and F2. Then Clear all   existing Data  Validation in the range A1:K15.

Delete the values in the range   B5:J15.

Record a macro named Sort, be sure to use relative    references. Ensure the macro sorts the data in the table in ascending  order   based on SKU (column A). Stop the Macro Recorder and Save the  workbook as a   Macro-Enabled Template.

Create a form control button   that spans the cell E2:E3. Assign the Sort macro and edit the button text to Sort.

Use the VBA Editor to create a   new module.
 

  Type the following VBA code to create a custom Inventory Value  function then   save and exit the VBA Editor (be sure to leave a blank  line between each line   and before End Function):
 

Function   InventoryValue (QTY, COST)
 

InventoryValue   = QTY * COST
 

Click cell J5 and use the newly   created InventoryValue function to  calculate the value of the inventory for   each item in column I.

Use the VBA Editor to create a   new module named ProtectWorkbook. Type the following VBA statements to create the   sub procedure (leave appropriate line spacing).
 

Sub   ProtectWorkbook()
 

‘Protect   workbook using the password eXploring
Worksheets(“Inventory   List”).Protect Password:=”eXploring”

Insert a new module named UnprotectWorkbook. Type  the following VBA   statements to create the sub procedure and then save  and exit the VBA Editor   (leave appropriate line spacing).
 

Sub   UnprotectWorkbook()
 

‘Unprotect   workbook using the password eXploring
Worksheets(“Inventory   List”).Unprotect Password:=”eXploring”

Insert a Form Control Button   spanning cells F2:F3 named Unprotect. Assign the UnprotectWorkbook macro to the newly   created Control Button.

Insert a Form Control Button   spanning the range G2:H3 named Protect. Assign the macro ProtectWorkbook.

Insert the comment Inventory   based on values in column J. in cell B3 (include the period).

Insert the comment Count of   items in column C.   in cell C3 (include the period).

Inspect the document for private   information and hidden properties.  Save the file when prompted then remove   Document Properties and  Personal Information, and Headers and Footers.
 

  Note: Mac users, from the Excel menu, open your preferences, click  Security,   and then click the check box to Remove personal information  from this file on   save. Delete any headers or footers in the workbook.

Check the document for   accessibility issues. Use the Accessibility  Checker pane to change the cell   styles to Normal in order to repair  the issue.

Check the document for   compatibility with Excel 2010, 2013, and 2016.
 

  Note: Mac users, skip this step.

Insert a new worksheet named Code.

Open the VBA Editor, open Module   1, and copy the code. Paste the code in the Code worksheet starting in cell   A1. 

In the VBA Editor, open Module   2, and copy the code. Paste the code in the Code worksheet starting in cell   A22. 

In the VBA Editor, open the   ProtectWorkbook, and copy the code. Paste the code in the Code worksheet   starting in cell A28. 

In the VBA Editor, open the   UnprotectWorkbook module, and copy the  code. Paste the code in the Code   worksheet starting in cell A35. 

Close the VBA Editor and save   the workbook as an xlsx file (not Macro-Enabled).

Close EXP19_Excel_Ch12_CAP_Inventory.xlsx. Exit Excel. Submit the file   as directed.

Effects of Surveillance on Consumers

Submit your final project topic here. 

Topic: Effects of Surveillance on Consumers

Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

you can include below in the paper:

 – Introduction of Effects of surveillance on consumer

– Benefits of Surveillance

– Disadvantages

– The Faced challenges 

– Conclusion

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

 

MSIT CLA

  

you are currently working with a team of software developers. Ask

them if the users are satisfied with the enterprise travel system. List and investigate the pain points users are experiencing with the system Some common problems to similar systems in many organizations are the integration with the airline’s service providers as it is always provided outdated fares at least by 24 hours, the system being slow especially when you try to access it from a remote location or through a VPN connection. Investigate the issues that are facing the travel system in the company you are interning for and provide them a report list and explaining the issues experienced by its users, provide three (3)

alternate solutions to how you can mitigate those issues and provide a plan of action to execute the plan.

Please make sure you address the following:

● Address what documentations you need such as the Software requirements specification,

conceptual and physical design, the development document, the testing plan, and the

implementation plan.

● Create a schedule of the implementation plan along with costs and resources associated with

software and labor.

● What performance, disaster recovery, security, and privacy requirements have been considered?

Rewrite the attached paper or topic related to that (10 Pages including Reference page and cover page)

 

This Individual Project is a continuation of your final research paper.

For this Phase, you will submit a draft of your research paper. The draft of your paper should take you from your sentence outline submitted in the previous Individual Project in Phase 3 to a draft that focuses on content and information flow. Your submission should include a minimum of a draft of your introduction, a draft of key body paragraphs, and a draft of the conclusion. You should also include your reference list, which should be 80% complete at this point in the writing process.

The first draft should include the introduction, conclusion, transitions, main sections and paragraphs, and the main points and subpoints.

PC Security Essay

. Your word processing project will be to write an essay about a topic related to PC Security. Read this all through to the end once before you try it.

2. Do some research on the Internet (Google, Wikipedia, etc.) and find out some information about ONE security issue, security problem or crime relating to use of a computer on the Internet. There are literally hundreds of issues that can include hacking, theft of information, theft of money, personal attacks, or vulnerabilities overall. If it can get you “hurt” in some way, it counts. Get information about the problem so you can describe it in detail and offer strategies for what a user could do to protect themselves. Be sure you have at least 2 URLs with good web sources, and also get 2 images. You will discuss 1 image now, and later at the end of the course you will turn this essay into a presentation where you will use both images.

3. Write 400-500 words about your topic. It must be all original writing, no copying at all, and will provide the following:
    * An introductory paragraph
    * A middle, several paragraphs with explanation, description and detail so the reader has the basic idea of what the essay is all about.
    * A concluding paragraph

4. Use the following formatting requirements and create a Microsoft Word document with the filename PC Security Essay
    * Margins 1″
    * Any font you like as long as it’s clear and readable, 10 point
    * Title at the top, centered
    * Your name under the title, centered
    * Paragraphs single spaced, 1 blank line between paragraphs, no indent, left justified
    * 1 image, relevant to the topic and explained in the text
    * Footer with page number
    * References cited at the end on a separate Works Cited page
    * Spelling and grammar checked

5. Your project will be graded according to the following rubric:

Requirements
Max Points Possible
400-500 word count
10
Covers the topic in appropriate detail
20
Formatting correct
10
1 Image included, relevant and discussed
10
Spelling and grammar checked
10
Total
60