Create an order menu as following.

Assignment 2 

Create an order menu as following. 

1. Filet-O-Fish…………………………………$2.00

2. McDouble……………………………………$3.50

3. Big Mac…………………………………….…$3.99

4. Cheeseburger……………………………….$2.99

5. McChicken…………………………………..$3.00

6. Soft Drinks…………………………………..$1.00

7. 1% Milk…………………………………….…$1.50

8. Premium Tea……………………………..…$1.00 

————————————————— 

Prompt a user to choose an item from the order menu, also ask the user how many of

the chosen item he/she wants. Then the program will generate a receipt. 

 

e.g. Filet-O-Fish x 2……………………………..$4.00 (@$2.00) 

       Sub-total………………………………………$4.00 

       HST 13%………………………………………….$0.52 

       Total…………………………………………….$4.52 

         

 

 

 

Write a C# program to help a local restaurant

  

Write a C# program to help a local restaurant automate its breakfast billing system. The program should do the following: a. Show the customer the different breakfast items offered by the restaurant. b. allow the customer to select more than one item from the menu. c. calculate and print the bill. Assume that the restaurant offers the following breakfast items (the price of each item is shown to the right of the item): Plain Egg $1.45 Bacon and Egg $2.45 Muffin $$0.99 French Toast $1.99 Fruit Basket $2.49 Cereal $0.69 Coffee $0.50 Tea $0.75 Use an array, of the struct menuItemType and include the following methods: showMenu, priceCheck – which calculates and prints the check. (the billing amount should include a 5% tax). You may assume that the customer can select multiple items of a particular type.

Presentation on responsibilities of cloud provider and consumer in security controls

 For this assignment’s scenario your management is considering deploying several VMs for the next project to the cloud in an IaaS service model to replace your current on-prem data center. They have asked you how hosting the workload in the cloud will change responsibility for security controls. Develop a PowerPoint presentation of no more than ten slides and provide guidance on who will be responsible (the cloud provider or your organization) for various security controls. Give specific examples using the VM you deployed in the previous module as a guide. Consider patching, intrusion response, software updates, network access, security monitoring, system redundancy, and physical security. 

Instructions:

 

  • This PowerPoint can include pictures, animation, whatever will professionally allow you to get your message across. 
  • Make sure to use your Speaker Notes (under the bottom of slides) to narrate your presentation materials, topics, images, etc. Remember that the slides are used to organize the topics you are presenting, while the speaker notes are used to narrate (explain, elaborate, etc.) your presentation. 
  • Review the directions carefully, consider all of your options, and provide details with explanations. Defend your work with examples and references.
  • All assignments are expected to adhere to APA formatting standards (references and citations), reflect a high level of scholarship, use correct grammar, and reflect critical thinking and problem-solving skills.

Windows Hardening Recommendations Scenario

 As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

§ Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

§ Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

§ Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

§ To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages

Self-Assessment Checklist

§ I addressed all issues required for the summary report.

§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines.

Human Computer Interaction

 

  1. For the Usability Journal assignment, you are to write three (3) journal entries.
    • Each entry shall be approximately 300 words each.
    • Each entry shall focus on an object that contains a bad usability design.(NO WEBSITES OR APPS!!!)
    • Example objects includes doors, faucets, light switches, doors, ovens, microwaves, pianos. Real objects!!!!
    • Explain why the object being described does not maintain good usability practices.
    • The deliverable shall include citable examples of best practices from academic literature explaining why the product/object does not follow best practices.    

Example: A remote control.

  • What about the remote control makes the device both a good and bad example for the usability perspective?
  • Each deliverable will contain:
    • Three entries with 300 words for EACH entry
    • APA citation with examples from scholars explaining best practices that should be followed
    • An example image of the bad design practice followed
    • An example of good potential practices to follow

Exp19_Excel_Ch11_Cap_Donors

Exp19_Excel_Ch11_Cap_Donors

 

You are a development officer for a state university. As an officer, you manage a portfolio of important donors who contribute financially to different areas within the university. You categorize the donors based on the college or school for which they want their donations associated. You recently downloaded the portfolio to an Excel workbook. Based on the way the data downloads from the main database, you want to format the text for readability and to make it easier for you to analyze. In addition, you will create an advanced filter to review a list of donors for a particular college or school. Finally, you want to create a look up area to look up data for a specific donor and create a summary section.

2

The first column displays the   name of the college or school (such as ART   or BUSINESS) associated with each.   You want to assign a three-character code for each college and use that code   to attach to existing donor IDs to create a unique field.
 

  In cell B8, insert the LEFT function to extract the first three characters   from the college name in cell A8. Copy the function to the range B9:B35.

3

You now want to combine the college   ID and donor ID.
 

  In cell D8, insert the CONCAT function to combine the college ID in cell B8   with the donor ID in cell C8 with a hyphen between the two text strings. Copy   the function to the range D9:D35.

4

In cell J8, insert a text   function that displays the college name from cell A8 with just the first   letter capitalized, such as Engineering.   Copy the function to the range J9:J35.

5

The Full Name column displays   last and first names of the donors. You want to display last names only in a   separate column.
 

  In cell F8, type Schneider and use Flash Fill to fill in the last names for   the donors in the range F9:F35.

6

The Address column contains   street addresses, city names, and state abbreviations. To manage the address   list better, you will separate the data into three columns.
 

  Select the addresses in the range G8:G35 and convert the text to columns,   separating the data at commas .

7

The top-left section of the   spreadsheet is designed to be able to enter a donor’s ID, such as ENG-15, and   look up that person’s position in the list, display the donor’s full name,   and display the amount donated this year. The first step is to identify the   position number of the donor ID.
 

  In cell B3, insert the MATCH function to look up the donor ID in cell B2,   compare it to the list in the range D8:D35, and then return the donor’s   position within the list.

8

Now you are ready to use the   position number as an argument within the INDEX function.
 

  In cell B4, insert an INDEX function that uses the range D8:K35, looks up the   row position number from the MATCH function result, and then uses the column   position number for Full Name.

9

In cell B5, insert an INDEX   function that uses the range D8:K35, looks up the row position number
  from the MATCH function result, and then uses the column position number for   Donation.

10

You want to format the results   of the INDEX function.
 

  Format the value in cell B5 as Accounting Number Format with zero decimal   places.

11

To analyze the donor records,   you are ready to create criteria and output ranges. You will enter conditions   to find records for donors to the College of Business who donated $1,000 or   more.
 

  Copy the range A7:K7 to cell A38 to create the column labels for the criteria   range. Type Business in cell J39 and >=1000 in cell K39.

12

You are ready to create the   output area and perform the advanced filter.
 

  Copy the column labels to cell A42. Perform the advanced filter by copying   the records to
  the output area.

13

Now that you created a copy of   the records meeting the conditions, you are ready to enter database functions   in the Summary area.
 

  In cell K2, insert the database function to total the value of the donations   for the records that meet the conditions in the criteria range.

14

In cell K3, insert the database   function to calculate the average donation for the records that meet the   conditions in the criteria range.

15

In cell K4, insert the database   function to count the number of records that meet the conditions in the   criteria range.

16

Format the range K2:K3 with   Accounting Number Format with zero decimal places. Format cell K4 with Comma   Style with zero decimal places.

17

You want to use the FORMULATEXT   function to display the functions.
 

  In cell G2, insert the FORMULATEXT function to display the formula stored in   cell B3.
  In cell G3, insert the FORMULATEXT function to display the formula stored in   cell B4.
  In cell G4, insert the FORMULATEXT function to display the formula stored in   cell D8.
  In cell G5, insert the FORMULATEXT function to display the formula stored in   cell K2.

18

Create a footer with your name   on the left side, the sheet name code in the center, and the file name code   on the right side of the worksheet.

19

Save and close Exp19_Excel_Ch11_Cap_Donors.xlsx. Exit   Excel. Submit the file as directed.

Python Scripting

  

Midterm Assessment – Web scraping and reading PDF

Task 1 – Web Scraping

Create a program that will scrape the sayings from: https://quotes.toscrape.com/page/2/

Set up your program to allow the user to input a page number (1-10) which will return the quotes from that page.

Deliverables for Task 1

· Program to pull and display the quotes from the quotes to scrape webpage

· Screenshot of your output from the program

Task 2 – Reading PDF

Create a program that will pull details from the PDF document: USCensus.pdf

Output the information into a text document names: _USCensus.txt

Deliverables for Task 2

· Program to read data from a PDF document

· Screenshot of your output from the program.