Assignment 1 (JAVA PROGRAMING)

 

Competency

In this project, you will demonstrate your mastery of the following competency:

  • Write programs by applying concepts and principles of object-oriented programming

Scenario

Global Rain logo

You work for Global Rain, a software engineering company that specializes in custom software design and development. As a junior software developer, you are part of a software development team that collaborates to create solutions for entrepreneurs, businesses, and government agencies around the world.

As part of a development team at Global Rain, you will be designing and developing custom software for a local pet boarding and grooming business, Pet Boarding and Grooming (Pet BAG). Pet BAG is seeking a way to modernize its operations by introducing custom software that will help replace inefficient paper-based processes. Your Global Rain team will collaborate to develop an app that will have the following initial functional areas: Check-in pets, Check-out pets, Pet management, and Reports.

As part of this team, you have been tasked with completing some preliminary work that consists of writing a Java class, writing pseudocode, and creating a flowchart. You will provide these deliverables to your supervisor.

Directions

Pet BAG has provided you with a specification document detailing its software needs and design documentation from your supervisor to complete your tasks.

An individual with one hand writing on paper and one hand on a laptop computer keyboard.

  1. Before you begin, it is important to analyze your client’s software requirements and the design documentation from the Supporting Materials section. Specifically, review the Pet BAG specification document and the UML Class diagram, paying close attention to the class hierarchy, attributes, and behaviors.
  2. To begin, open the Virtual Lab by clicking on the link in the Virtual Lab Access module. Then open your integrated development environment (IDE) and create the Pet class based on the UML Class diagram. The Pet class must meet all the specifications from the class diagram including the following: 
    • All attributes with appropriate data structures
    • At least one constructor method
    • Accessors and mutators for all attributes
  3. When you are done implementing the Pet class, refer back to the Pet BAG specification document and select either the pet check-in or check-out method. These methods are detailed in the Functionality section of the specification document. You will develop pseudocode and a flowchart for the method you select.
  4. Based on the method you chose, write pseudocode that lays out a plan for the method, ensuring that you organize each step in a logical manner. Remember, you will not be creating the actual code for the method, and you do not have to write pseudocode for both methods.
  5. Based on the pseudocode you wrote, use the tool of your choice to create a flowchart for the method you selected. Your flowchart will help your team communicate how you are planning to develop the software for your client. In your flowchart, be sure to do the following: 
    • Include start and end points.
    • Include appropriate decision branching.
    • Align the flowchart to the check-in/check-out process.
  6. Based on your software design and development experience, your supervisor has asked you to articulate your programming approach. This will help ensure clarity, consistency, and efficiency among all developers working on this app. Specifically, you have been asked to briefly explain how you applied object-oriented programming principles and concepts (conditional statements, inheritance, and so on) in the your software development work thus far.

What to Submit

To complete this project, you must submit the following:

Pet.java Class File
As part of your tasks for the software development team, create the Pet class in your integrated development environment (IDE). To submit this deliverable, save the Pet class file as Pet.java.

Global Rain Summary Report
As a junior software developer, you will use the Global Rain Summary Report Template to complete the report. Your report must contain your pseudocode, flowchart, and explanation of the object-oriented programming principles you applied.

Supporting Materials

Use the following resources to support your work on this project:

Pet BAG Specification Document
Review this specification document provided by Pet BAG to understand your client’s software requirements. You will use these requirements to create your flowchart and write your pseudocode.

UML Class Diagram
Use this UML class diagram, prepared by the senior developer leading your team, to implement the Pet class. This class diagram demonstrates the Pet class, Dog class, and Cat class and illustrates inheritance. A text version of this image is also available: UML Class Diagram Text Version.

Downloading Files From Eclipse Tutorial
You will write, test, and run your Pet class file using an integrated development environment (IDE). Review this tutorial to learn how to save and export files from your IDE. Important: Do not change the names of any class files.

The following rubric will be used to assess Project One. Familiarize yourself with this document as you work on the project, and return to this rubric before you submit Project One to make sure you’ve included everything you need to be successful. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 4

 Chapter 17 introduced some challenges to policy making in developing countries. If you were an analyst working for the St. Petersburg Informational and Analytical Center, explain how you would use data available to you to prepare a report for the Governor for the State Program “Combating Proliferation of Drugs.” Briefly explain what you would include in your report to detail the problem, and what the forecast results would be for each of several responses to the problem. (You do not have to use actual data from a real model for this discussion.) The idea is to focus on how models can use real data to create forecasts. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Health information system electronic health record week 5

  Health Information System and Electronic Health Record: Assignment Week 5

Administrative and Structural Analysis of an Electronic Health Claim Management: Chapters 9 &10 

Objective: In this assignment you are request to you will describe, analyze and apply process of creating claims, locating specific claim, methods used to submit electronic claims, and the claim determination process used by health plans. 

ASSIGNMENT GUIDELINES (10%):

Students will judgmentally evaluate the readings from Chapter 9 and 10 on your textbook and from the article assigned for week 5. The Purpose of this Administrative and Structural Analysis of an Electronic Health Claim Management is to describes the potential benefits of EHRs that include clinical outcomes (eg, improved quality, reduced medical errors), organizational outcomes (eg, financial and operational benefits), and societal outcomes (eg, improved ability to conduct research, improved population health, reduced costs). Despite these benefits, studies in the literature highlight drawbacks associated with EHRs, which include the high upfront acquisition costs, ongoing maintenance costs, and disruptions to workflows that contribute to temporary losses in productivity that are the result of learning a new system. Moreover, EHRs are associated with potential perceived privacy concerns among patients, which are further addressed legislatively in the HITECH Act. Overall, experts and policymakers believe that significant benefits to patients and society can be realized when EHRs are widely adopted and used in a “meaningful” way.

You need to develop a 4 page paper long including title page and references page reproducing your understanding and capability to relate the readings to claim management. Each paper must be typewritten with 12-point font and double-spaced with standard margins. Follow APA format when referring to the selected articles and include a reference page.

  

EACH PAPER SHOULD INCLUDE THE   FOLLOWING:

1. Introduction (25%) Provide a brief synopsis of the meaning (not a description) of each Chapter and articles you read, in your own words.

2. Your Strategies (50%)

a. Briefly compare the CMS-1500 paper claim and the 837 electronic.

b. Discussion the information contained in the claim management dialog box

c. Analyze the method used to submit electronic claims.

d. Discuss the use of the PM/HER to monitor claims.

3. Conclusion (15%)

Briefly summarize your thoughts & conclusion to this assignment and your appraisal of the articles and Chapter you read. How did these articles and Chapters impact your thoughts about Claim Management? How this Administrative Analysis help you in relation to Claim management in Medisoft.

Evaluation will be based on how clearly you respond to the above, in particular:

a) The clarity with which you present and analyzed the strategies;

b) The depth, scope, and organization of your Administrative Analysis paper; and,

c) Your conclusions, including a description of the impact of these articles and Chapters on any Healthcare Organization.

ASSIGNMENT DUE DATE:

The assignment is to be electronically posted no later than noon on Sunday, December 1, 2019. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment-Adv SQL- DB

Q1:

1. How would you use GROUPING SETS to produce the same results as the following GROUP BY CUBE?

SELECT state, productID, SUM(volume) FROM sales GROUP BY CUBE (state, productID) ORDER BY state, productID

2. How would you show the sub totals for each week, for each state, and for each product? (No other totals or grand totals are required.) Suppose the table structure is

TABLE sales (productID VARCHAR, state CHAR(2), week DATE, volume INT)

3. Discuss the utility of grouping and group_id functions

Q2: Describe below how this code will work:

SELECT dt, region, revenue,
count(*) OVER (twdw) AS moving_count,
avg(revenue) OVER (twdw) AS moving_average
FROM moving_average_data mad
WINDOW twdw AS (PARTITION BY region
ORDER BY dt RANGE BETWEEN
‘7 days’::interval PRECEDING AND
‘0 days’::interval FOLLOWING
ORDER BY region, dt

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Applied Security Architecture And Threat Models By Brook S. E. Schoenfield

Securing Systems: Applied Security Architecture And Threat Models By Brook S. E. Schoenfield 

 

Length:  Minimum of 600 words

No Plagiarism 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

According to the author of this book, there are three key attributes of human attackers, as follows:

• Intelligence

• Adaptivity

• Creativity

What are your thoughts on this topic? Also, please explain the three key attributes related to this subject. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

WK1 D3##21

Assignment Instructions

Please see attachment for Supporting Files 

Assignment 1 Classes

Purpose

The purpose of this assignment is to review the IT Online Training Project Requirements and begin the modeling of the requirements by using the noun analysis technique to identify domain classes, attributes, operations, and requirements.

In this assignment we will begin the analysis for a case study, the IT Online Training Project, which will be used for your assignments throughout the course.  You will need to review the IT Online Training Project Requirements 2018R2 document and become familiar with it. 

For the analysis portion of the project, you will use the Analysis Specification Template 2018R4 and fill in sections as the course progresses each week.  The  Analysis Specification Template is a Word file that has predefined sections and you will need to fill them in each week until the specification is completed.  It has instructions also in the document as to how to use it.  It is common practice in systems development to use templates for various types of documents to standardize the documentation and development practices throughout an organization. 

For this assignment, you will complete Section 1 of the Analysis Specification Template 2018 which will come directly from the IT Online Training Project Requirements.  You will also complete Section 4.3 List of Classes with Definitions, Attributes and Requirement Number by creating a list of classes with definitions,  attributes, operations, and requirement number by analyzing the IT Online Training Project Requirements document.

In the Analysis Specification, complete the following Sections:

Sections: 1, 1.1, 1.2, 1.3, 4.3, and 4.3.1.

Instructions

1.  Review the Quick Resources at the end of this Assignment.

2.  Review the IT Online Training Project Requirements 2018R2  and the Analysis Specification Template 2018R4 .

3.  Open the Analysis Specification Template and save it as Assignment1FirstNameLastname substituting your name.

4.  Sections 1, 1.1., 1.2, 1.3.  Using the Online Training Project Requirements document, complete Section 1 in the Analysis Specification Template.  Use your own words for Sections 1, 1.1, and 1.2.  You can copy and paste the Sponsor requirements from the case study to the Analysis Specification for Section 1.3.  See the template for details.  Make certain that you retain the requirement numbers as you will use these for traceability.

5.   Review the noun analysis technique which is used to identify potential classes for an application. See the links on Finding Classes at the end of this assignment.  The RMB1905 videos use a version of our CASE tool.  The Blaha videos use another CASE tool.  Your focus should be on the technique for analyzing text to discover classes and not the CASE tool at this point.  See the  ITOT Noun Analysis Example 2018 example before you begin your analysis. It provides an example of noun analysis for your case study.

6.  Using the Online Training Project Requirements document identify and create a list of all potential classes,  definition for each each class, attributes, operations (methods),  and requirement number. Place your list in the Classes, Attributes, Operations(Methods), Requirements table below.  Note that it is already included  for you in the specification. The classes, attributes, and operations are in the Requirements document.  If you do the analysis you will find them.  

For example if you look at REQF2.1 you will find the mention of a Class called Customer with attributes customerId, firstName and lastName, address, WorkPhoneNumber f and cellPhoneNumber.  For operations, your system must be able to create and delete Customer as well as get and set each of the attributes values.  Example:  getCustomerID(), setCustomerID(), getCustomerFirstName(), setCustomerFirstName(), etc. This is salos documented in the Customer-SchecudleCourse-User.pdf document below.  Other attributes may be determined later!

The following list provides a starting list of classes which has already been referenced in the course.  You must identify the remaining classes from the Requirements document:

Starting List of Classes

As a result of reading/using the course resources listed below, at least 9 different classes are already identified for you and you should  include them as well as the remaining classes you will discover with  noun analysis of the Requirements document.  

Course Resource

Location in Course

Potential ITOT Classes Identified

ITOT Noun Analysis Example 2018

Assignment 1

Lesson 1

ScheduledCourse, SelfPacedCourse, Course, Product, Video, and Book

Assignment 1

Assignment 1

UserAccount with attributes and operations

Sample UML Class Diagrams for ITOT Classes

Lesson 1

Instructor, Course, and ExpertiseArea classes with detailed attributes and operations.

Assignment 1 Step 6

Assignment 1 Step 6

Customer with attributes and operations.

The following sections provides additional instructions for completing the Classes, Attributes, Operations(Methods), Requirements table.

6.1  Define each class using the phrase “A classname is a ….”  and then complete the definition.  Note that classes are named as nouns or noun phrases and begin with a capital letter.  Make certain that you create the definitions according to the template! You must use the phrase “is a” in your definition.

6.2  For each class, list  its definition, attributes, operations (methods), and Requirement number.  You will find many of the attributes and operations in the Requirements document.

6.3  Use a table format with the class name and its definition as columns like the table in the Customer-SchecudleCourse-User.pdf document below.  You should use these examples in your own table. Classes will be easier to locate if you put your table in alphabetical order by class name. 

6.3.1 Class names must be singular (not plural) and must be one word.  You can capitalize the first letter of each word in the name like ScheduledCourse.  See Lesson 1 for additional information about naming classes and their properties.

6.3.2 Attributes are properties of a class like for Customer one attribute would be “customerID”.  Attributes begin with a lowercase letter.

6.3.4 Operations are actions that a class can perform and begin with a lower case letter followed by parentheses ().  If an operation needs a parameter like workPhone, we put the name of the parameter (attribute) inside the parentheses. We can create a new instance of a class (Create), delete an instance of a class (remove), get ( read) values of the attribute, or set (change) values of the attribute.  See the examples in the table below.  The examples below include all of the getter/setter methods for the attributes.  You do not need to include them in this assignment, but for Assignment 2 when you create your class diagram, you can use the features of our CASE to so that the getter/setter methods will automatically be added. For now you can use a high level modify() and read() to represent the getter/setter methods.  Later in design changes will be made depending on the technology used.

Classes, Attributes, Operations(Methods), Requirements (Section 4.3 in your Analysis Specification) Example

For an example of completing the table you can view the document Customer-ScheduledCourse-User Analysis Example.pdf . 

It illustrates the result of the analysis of the Customer, ScheduledCourse, and User classes in the requirements document. For each class the attributes, operations (methods), and requirement number were documented.

7.  Section 4.3. Add your completed table of classes, definitions, attributes, and operations.   

8. Section 4.3.1 Discuss your list of classes and why you chose them. You may want to reference the case study document.

 

Submission Instructions

1. Make certain that your name and course number are at the top of your document.

2.  Submit this first version of your Analysis Specification as a Word file and name it as indicated above Assignment1FirstNameLastName. Make certain that all sections are included exactly like the template.

Your assignment will be graded with the following rubric:

 

Rubric for Assignments

Points

Content & Development 50%

50/50

Organization 20%

20/20

Format 10%

10/10

Grammar, Punctuation, & Spelling 15%

15/15

Readability & Style 5%

5/5

Timeliness (late deduction 10 points) Optional

 

Total

100/100

 

Quick Resources

Case Study

1.  IT Online Training Project Requirements 2018R2

2. Analysis Specification Template 2018R4

Finding Classes

1. See this video on how to find classes using the noun technique: RMB1905. (2009, March 9). 4.11_Finding Classes. [Video file]. Retrieved from https://www.youtube.com/watch?v=DYasVJfgyeU&list=PL46FE8B2506D9EE0 C&index=29

2. In your textbook, see the ATM Case Study (see p. 178 Section 11.3.1 in your textbook)  and then read about how to use the noun technique to identify classes for the ATM Case Study on pp. 183-187.

3.  See the  ITOT Noun Analysis Example 2018 example which demonstrates the noun analysis technique for the ITOT case study.

4. See ENTD321 Week 1 Web Resources for videos by one of the authors of your textbook, Michael Blaha on finding classes and class diagrams.  It also contains links to videos on classes and objects using our selected CASE tool.

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure our most precious data? Please explain your answer.

Do you feel the benefits of cloud computing are worth the threats and vulnerabilities? Have we arrived at a point where we can trust external agencies to secure  our most precious data? Please explain your answer.

https://learn-us-east-1-prod-fleet01-xythos.s3.us-east-1.amazonaws.com/5b75a0e7334a9/572498?response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27CEHv9%2520Module%252017%2520Cloud%2520Computing.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200216T035433Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21599&X-Amz-Credential=AKIAZH6WM4PLTYPZRQMY%2F20200216%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=09dd315f7c2da2ac4fada302cec610290897f326bb3aac33beaca2deb732e39a

https://www.youtube.com/watch?v=GmhaFJPAaCM&feature=emb_title

https://www.youtube.com/watch?v=AmjnY_JMRb8&feature=emb_title

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Advance operating system

   

Process Synchronization: Producer-Consumer Problem

The purpose of this programming project is to explore process synchronization. This will be accomplished by writing a program on the Producer / Consumer problem described below. Your simulation will be implemented using Pthreads. This assignment is a modification to the programming project “The Producer – Consumer Problem” found at the end of Chapter 7 of our textbook. 1. Your program must be written using C or C++ and you are required to use the Pthread with mutex and semaphore libraries.

In chapter 3, we discussed how a “bounded buffer” could be used to enable producer and consumer processes to share memory. We described a technique using a circular buffer that can hold BUFFER_SIZE-1 items. By using a shared memory location count, the buffer can hold all BUFFER_SIZE items. This count is initialized to 0 and is incremented every time an item is placed into the buffer and decremented every time an item is removed from the buffer. The count data item can also be implemented as a counting semaphore.

The producer can place items into the buffer only if the buffer has a free memory location to store the item. The producer cannot add items to a full buffer. The consumer can remove items from the buffer if the buffer is not empty. The consumer must wait to consume items if the buffer is empty.

The “items” stored in this buffer will be integers. Your producer process will have to insert random numbers into the buffer. The consumer process will consume a number.

Assignment Specifications

The buffer used between producer and consumer processes will consist of a fixed-size array of type buffer_item. The queue of buffer_item objects will be manipulated using a circular array. The buffer will be manipulated with two functions, buffer_insert_item() and buffer_remove_item(), which are called by the producer and consumer threads, respectively. A skeleton outlining these functions can be found in buffer.h (provided below).

Skeleton outlining (Buffer.h)

#ifndef _BUFFER_H_DEFINED_

#define _BUFFER_H_DEFINED_

typedef int buffer_item;

#define BUFFER_SIZE 5

bool buffer_insert_item( buffer_item item );

bool buffer_remove_item( buffer_item *item );

#endif // _BUFFER_H_DEFINED_

The buffer_insert_item() and buffer_remove_item() functions will synchronize the producer and consumer using the algorithms. The buffer will also require an initialization function (not

   

supplied in buffer.h) that initializes the mutual exclusion object “mutex” along with the “empty” and “full” semaphores.

The producer thread will alternate between sleeping for a random period of time and generating and inserting (trying to) an integer into the buffer. Random numbers will be generated using the rand_r() function. See the text on page 290 for an overview of the producer algorithm.

The consumer thread will alternate between sleeping for a random period of time (thread safe of course) and (trying to) removing a number out of the buffer. See the text on page 290 for an overview of the consumer algorithm.

The main function will initialize the buffer and create the separate producer and consumer threads. Once it has created the producer and consumer threads, the main() function will sleep

for duration of the simulation. Upon awakening, the main thread will signal other threads to quit by setting a simulation flag which is a global variable. The main thread will join with the other threads and then display the simulation statistics. The main() function will be passed two parameters on the command line:

• The length of time the main thread is to sleep before terminating (simulation length in seconds)

• The maximum length of time the producer and consumer threads will sleep prior to producing or consuming a buffer_item

A skeleton for the main function appears as:

#include <buffer.h>

int main( int argc, char *argv[] ){ Get command line arguments Initialize buffer

Create producer thread(s) Create consumer thread(s) Sleep

Join Threads

Display Statistics

Exit

}

Creating Pthreads using the Pthreads API is discussed in Chapter 4 and in Assignment-1. Please refer to those references for specific instructions regarding creation of the producer and

consumer Pthreads.

   

The following code sample illustrates how mutex locks available in the Pthread API can be used to protect a critical section:

#include <pthread.h>

pthread_mutex_t mutex;

/* create the mutex lock */

pthread_mutex_init( &mutex, NULL );

/* aquire the mutex lock */

pthread_mutex_lock( &mutex );

/*** CRITICAL SECTION ***/

/* release the mutex lock */

pthread_mutex_unlock( &mutex );

Pthreads uses the pthread_mutex_t data type for mutex locks. A mutex is created with the pthread_mutex_init() function, with the first parameter being a pointer to the mutex. By passing NULL as a second parameter, we initialize the mutex to its default attributes. The mutex is acquired and released with the pthread_mutex_lock() and pthread_mutex_unlock() functions. If the mutex lock is unavailable when pthread_mutex_lock() is invoked, the calling thread is blocked until the owner invokes pthread_mutex_unlock(). All mutex functions return a value of

0 with correct operation; if an error occurs, these functions return a nonzero error code.

Pthreads provides two types of semaphores: named and unnamed. For this project, we will use unnamed semaphores. The code below illustrates how a semaphore is created:

#include <semaphore.h>

sem_t sem;

/* create the semaphore and initialize it to 5 */

sem_init( &sem, 0, 5 );

The sem_init() function creates and initializes a semaphore. This function is passed three parameters: A pointer to the semaphore, a flag indicating the level of sharing, and the semaphore’s initial value. In this example, by passing the flag 0, we are indicating that this semaphore can only be shared by threads belonging to the same process that created the semaphore. A nonzero value would allow other processes to access the semaphore as well. In this example, we initialize the semaphore to the value 5.

  

In Chapter-6 (Section 6.6), we described the classical wait() and signal() semaphore operations. Pthread names the wait() and signal() operations sem_wait() and sem_post(), respectively. The code example below creates a binary semaphore mutex with an initial value 1 and illustrates it use in protecting a critical section:

#include <semaphore.h>

sem_t mutex;

/* create the semaphore */

sem_init( &mutex, 0, 1 );

/* acquire the semaphore */

sem_wait( &mutex );

/*** CRITICAL SECTION ***/

/* release the semaphore */

sem_post( &mutex );

Program Output

Your simulation should output when various conditions occur: buffer empty/full, location of producer/consumer, etc.

Submission Guidelines and Requirements

1. Your program must be written using C or C++ and you are required to use the Pthread with mutex and semaphore libraries

2. You may use the C/C++ STL (Standard Template Library) in your solution.

3. You should use Netbeans to implement the assignment. You can download Netbeans with C/C++ features from the following link: https://netbeans.org/downloads/8.2/

4. Create project in Netbeans for completing this assignment.

5. Add comments (about the function/variable/class) to your code as much as possible

6. Zip your project including source files and input/output text data files (if any)

7. Upload the zipped project file onto Blackboard

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Write a research paper (750-1250 words) describing how data gets from web browser to webserver and back, what can go wrong, and how to troubleshoot it.

Write a research paper (750-1250 words) describing how data gets from web browser to webserver and back, what can go wrong, and how to troubleshoot it. 

Be sure to incorporate information from assignments and discussions from both Topics 3 and 4. Charts and diagrams are highly encouraged.

Cite your research, as well as the tools you used to perform actions related to the research.

Prepare this assignment according to the guidelines found in the GCU Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

departing flights general case excel

 

Departing Flights (General Case)

You want to research morning flight departures from Tulsa International Airport (TUL) using data obtained from flightstats.com website. Find the airport’s departing flight schedule for yesterday morning and copy the flight information on a worksheet in a new workbook. Name the workbook e05b1Tulsa_LastFirst. Clean up the data after copying it. Name the worksheet Departures. Copy the worksheet and name the duplicate sheet Morning Departures. Sort the data on the Departures sheet by destination and then by airline. Insert subtotals at a change in destination, counting the number of flights. Collapse the subtotals to display the subtotals and grand totals.

Create a blank PivotTable from the Morning Departures sheet. Display the Destination and Airline fields in rows. Display the Status field in columns to display canceled, on-time, and delayed flights. Display the Flight field in the values area and change the field settings to the Count function. Display the Departure Time as a filter and set a filter to include only departure times from 6 to 9 a.m. Name the PivotTable Morning Departure Status. Apply PivotStyle Medium 13 style. Adjust column widths as needed. Name the worksheet PivotTable.

Create a PivotChart from the original dataset. Name the sheet PivotChart. Use the Destination field as the axis and the Flight # as the value. Change the value to the Count function. Change the chart type to a bar chart. Set 3.75″ chart height and 5.75″ chart width. Insert a slicer for the Status field and click the slicer button to display only on-time departures. Add a chart title On-Time Departures. Create a footer with your name, the sheet name code, and the file name code on each worksheet. Save and close the file. Based on your instructor’s directions, submit e05b1Tulsa_LastFirst.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now