I have a spreadsheet that I need revised. I need to add columns and rows. I don’t want the the formulas changed.
project
Project – Part 5 – Modules
Modify the pseudocode design that you created in ITP 100 Project – Part 4 to include at least the following modules.
• studentID – to Enter the Student ID
• calcBill – to Calculate the Bill
• prtBill – to Print the Bill
After the student has finished entering the course titles, the system will calculate and print the bill.
Create a hierarchy chart for the modules. Save the hierarchy chart as ITP100Project-Part4-Hierarchy-LastName.doc
Save the pseudocode design using the filename ITP100Project-Part4-LastName.doc
Submit for a Grade:
• Upload the files ITP100Project-Part4-Hierarchy-LastName.doc and ITP100Project-Part4-LastName.doc file to the ITP100_Project_Part4 file upload area.
Module 2 – SLP, SYSTEM DESIGN AND PROJECT PLANNING
This assignment consists of two parts:
Part 1: SLP Assignment Overview
When the requirements and design are completed for a project, the coding can begin. A good first step in development is to use the design to create a prototype, or proof of concept for the system. The prototype helps ensure the validity of the design and demonstrates that the basic concepts in the design will provide the desired solution. For this SLP assignment you will use your Design Document from the Case Study to guide the creation of a prototype for your integrated system.
Part 1 SLP Assignment Expectations
The Prototype should address the following requirements:
- The prototype should match the overall design created in the Case Study assignment and should provide evidence that the intended design will work.
- A basic visual interface to support navigation of the program and identify the future functionality of the application.
- No subsystem functionality is required but stubs to connectivity points for subsystems should be identified and have the ability to perform basic functionality tests.
- All code should be well-documented with comments.
- The program should run without significant errors.
- Include a document called operation.docxthat describes how to operate the application.
- This document should provide sufficient information to allow the instructor to set up and operate the application.
- Identify any external system requirements
- Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application).
- This document should also provide a summary of how the prototype shows proof-of-concept for the project.
- Include a section called STATUS with a summary of the current status of your project including problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.
Part 2: SLP Assignment Overview
For this SLP assignment you will submit the Alpha version of your project. An alpha version of an application will have the major functionality operational but not fully completed. The purpose of the Alpha version is to ensure the major functional components of the application will work as intended. Your alpha version should have connections established to all outside components and internally developed functionality should be operational at a least a fundamental level.
Part 2 SLP Assignment Expectations
The Alpha version should address the following requirements:
- The application should match the design created earlier in the course with the exception of any changes required to address problems or conform to a revised timeline.
- All major functionality should be operational at least at a minimal level.
- Connections to outside components should be functioning at a basic level to prove they will work for the final version of the application.
- The visual interface should provide access to all major functions of the application.
- There should be a demonstrable, functional connection to the required database for the project.
- All code should be well-documented with comments.
- The program should run without significant errors.
- Include a document called operation.docx that describes how to operate the application.
- This document should provide sufficient information to allow the instructor to set up and operate the application.
- Identify any external system requirements
- Key parts of the application should be identified (i.e., tell the instructor where to find the important parts of the application and changes that have been made since the last submission).
- Include a section called STATUS with a summary of the current status of your project including work performed since the last submission, problems encountered and how they will be addressed. Be sure to contact your instructor if you need help addressing any issues.
Please submit all required project files and documents for grading. Do not zip the files together, you might experience problems submitting the assignment
Emerging Threats _ Discussion
What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
- Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Project Assignment:
Write a 6-8 page paper (deliverable length does not include the title and reference pages)
- What are the key elements of a multilayer process for managing security vulnerabilities based on the concept of reasonable assurance?
- What actions must be taken in response to a security incident?
- What is computer forensics, and what role does it play in responding to a computer incident?
Provide three articles to substantiate the above three questions.
Using the APA format provide a citation for each of the articles you read
Suggestion: Use a search engine (Google) and keywords
Short research paper for PHD. Please read below before bidding. APA 7th edition format, 3 pages excluding title and references page, 5 References must
Journal article link: https://www.researchgate.net/publication/334701620_Why_are_we_having_this_innovation_Employee_attributions_of_innovation_and_implementation_behavior
This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies. Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:
Provide a high-level overview/ summary of the case study
Note how constructive intentionality impacts innovation implementations
Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations. Please be explicit and detailed in answering this question.
The paper should meet the following requirements:
3-5 pages in length (not including title page or references)
APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
A minimum of five peer-reviewed journal articles.
cloud computing and cyber security research paper and presentation
Looking for a research paper related to Cybersecurity, cloud computing and networking covering about 10-12 pages followed by a presentation with minimum of 15 slides. Pattern and procedure to write the research paper is provided in the attached doc.
Network Assignment
Assignment Details
Part 1
For many thousands of years, the primary method of communication was for people to physically gather together to share ideas and discuss concerns. In today’s technology driven world, huge numbers of people gather together without ever directly seeing each other. This is done through social media. Social media is known to produce great changes on how individuals and communities communicate and perceive each other.
Complete the following in a minimum 1-page response:
- Briefly, define social media such as Google+®, Twitter®, Pinterest®, LinkedIn®, and Facebook® and how it differs from traditional media. In addition, how has social media impacted the workplace?
- Given the increased prevalence of social media, how has your personal perspective of multiculturalism and diversity been impacted?
- Select an organization you belong to. How do you think your perspective has impacted that organization? How do you feel that others in the organization have been impacted?
Part 2
As an information technology professional, you are faced with opposing perspectives on ethical issues in your daily work. Research opposing perspectives on ethical issues faced in the Information Technology field as it pertains to networking. An example might be the difference in perspectives of utilizing biometrics for authentication.
Take into consideration the opposing perspectives of different technologies, as it relates to ethics and complete the following in a minimum 1-page essay.
- Identify the opposing perspective you have chosen.
- Explain the ethical implications that are inherent with both sides of the issue.
- Given the ethical implications on both sides of the issue, evaluate the ethical implications on both sides.
- Provide your perspective on how you might apply the issue in a work situation.
Article Summary
– Find 2-3 recent peer-reviewed articles (within the past 3 years) that ‘closely relate to Impact of Mobile Computing on Businesses’
– Should be a minimum of 750 words
– There should be no plagiarism. Attach a Turnitin report with a 0% similarity index.
