Description
Unformatted Attachment Preview
Styles
h2 {
color: green
}
h1 {
text-align: center;
color: red;
background-color: #90EE90
}
body {
background-color: #FFFFE0;
background-image: url(swirl.gif);
margin: .5in
}
li {
font-size: 14pt
}
hr {
height: 10px;
width: 70%;
background-color:#90EE90
}
Orange Coast College
CIS 111
Pam Barvarz
Topics:
Computer Concepts
Excel
HTML
Access
Topics:
Computer Concepts
Excel
HTML
Access
Create a Web page with the following features:
o A centered heading 1 in green color and silver background formatted with inline styles.
Two h2 tags in red color and yellow background.
o One of the h2 tags should be centered.
o A graphical background formatted with inline style.
o Two images of flowers at the top and bottom of the page. Both images should be centered.
o Two hr tags in green which cover 70% of the screen. One of the hr tags should be 10 pixels tall and
the second one 15 pixels.
o A bullet list containing links to OCC and GWC Web sites.
• One of the links should display in red, and the other one in black.
Both links should display in 16pt fonts.
o Name the assignment hassign3.htm.
o Turn in the Web pages and all the images you have used in this assignment.
Example:
hassign3
x +
've set aside
file:///C:/Users/pbar
heading 1
heading 2
• OCC
• GWC
heading 2
Purchase answer to see full attachment
Purchase answer to see full attachment
Explanation & Answer:
1 Page
Tags:
Html CSS

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer

View attached ex...

Completion Status:
100%
Review
Review

Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7

Trustpilot
4.5

Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content

Java Code Financial Aid Office Project
I have attached the full question, you just have to complete steps 1-4. Should be short and easy!- dont use any method oth ...
Java Code Financial Aid Office Project
I have attached the full question, you just have to complete steps 1-4. Should be short and easy!- dont use any method other than main- use JOptionPane

ITS3105 SUS Programming Automation through Technology Discussion
Fifty or sixty years ago, most people's paychecks were produced by hand; now it is most likely that yours is produced by a ...
ITS3105 SUS Programming Automation through Technology Discussion
Fifty or sixty years ago, most people's paychecks were produced by hand; now it is most likely that yours is produced by a computer or not printed at all but deposited into an account electronically. Forty years ago, most grocery store checkers keyed item prices into the cash register; now it is most likely your items are scanned. Police officers used to direct traffic at many major urban intersections; now the traffic flow is often computer controlled. Are there any tasks now that are mostly done by people that you think would be better handled by a computer? Are there any tasks you hope never become computerized?
On a separate document answer these Learning Journal questions (a minimum of 250 words):
Use the following questions as guides to self-reflection during this week:
Briefly describe what programming you did this week.
Describe any problems you have had and how you solved your problems.
What skills and knowledge do you recognize that you are gaining, and how will these skills and knowledge be useful in school and as a professional after school?

INTL 434 American Military University Cyber Security Threat to the UK Essay
InstructionsAssignment Instructions:
Please answer the question below with an essay answer. Should be 4 pages total (not ...
INTL 434 American Military University Cyber Security Threat to the UK Essay
InstructionsAssignment Instructions:
Please answer the question below with an essay answer. Should be 4 pages total (not including title page and bibliography),
typed double-spaced in Times New Roman, 12-pont font. Remember to us the
Chicago Style Manual for all citations and bibliography. A minimum of
five (5) scholarly sources are required for this assignment.This
assignment will provide the foundation for your final research paper.
As a result, it is highly recommended that additional sources for future
reference are included in the bibliography in addition to the minimum
five required for this assignment.Select a foreign
nation-state (not the United States) and describe a threat to that
nation. The threat can be any of those discussed in this course
(conventional threats, non-state actors, terrorism, insurgency, emerging
threats, cyber, etc). Briefly provide a background of the threat, what
it is, how the nation perceives the threat and how your chosen
nation-state has responded to the threat. The
opportunities are endless here since there are many nations and, of
course, each has numerous, often shared threats. This paper is designed
for you to begin your research and introduce your chosen case-study that
you will then provide much more extensive detail about in your final
paper. Furthermore, your final paper will include your analytical
opinion (thesis) regarding this case-study and be written in the form of
a typical threat assessment. Be sure to select a case study that you
can research deeper than a 4-page paper.

Can someone help with this assignment?
One of the challenges in programs is to store data in a structure that allows fast and efficient searching. Hash tables pr ...
Can someone help with this assignment?
One of the challenges in programs is to store data in a structure that allows fast and efficient searching. Hash tables provide this type of performance by storing data in buckets based on a value called a hash key. The bucket containing a specific data entry is identified by a hash key, which is generated by a hash function. Finding a data entry is then a simple matter of taking a hash key, determining which hash table bucket contains that key value, and then sequentially searching a relatively small linked list in the appropriate hash table bucket. Think of the entire hash table as a list full of small linked lists that are each identified by a value calculated by a hash function that takes a key value as input and returns a bucket identifier.For this assignment, you will complete the following: Create a flowchart to demonstrate the operation of a hash structure. This flowchart should include operations to insert and remove entries in the hash structure. Create a flowchart to demonstrate the operation of the hash function (the hash key generator). Write a complete Java program to implement a hash table data structure for String data. Your program should demonstrate insertion and removal of data. A linked list must be used in the hash buckets to resolve duplicate data collisions. Note: You may not use the Java HashTable or HashMap or other similar built-in Java data structures for your solution. The intention of this assignment is for you to demonstrate your ability to write the code for your own hash table functionality. Submit your flowcharts and Java source code in a single MS Word document for grading.

Park University 1928 to 2011 Infectious Diseases Lab 9 Assignment
Below is what I need assistance with:Download the following all to the same folder:
The program Lab9-start.py
The dat ...
Park University 1928 to 2011 Infectious Diseases Lab 9 Assignment
Below is what I need assistance with:Download the following all to the same folder:
The program Lab9-start.py
The data files health-no-head-sample.csv and health-no-head.csv The big data file contains records of some infectious diseases from 1928 to 2011. The small one only includes data from 3 years from 5 states. Run the python program. It should print something like this
MEASLES,206.98,COLORADO,2099,1014000,1928
['MEASLES', '206.98', 'COLORADO', '2099', '1014000', '1928\n']
MEASLES,634.95,CONNECTICUT,10014,1577000,1928
['MEASLES', '634.95', 'CONNECTICUT', '10014', '1577000', '1928\n']
MEASLES,256.02,DELAWARE,597,233000,1928
['MEASLES', '256.02', 'DELAWARE', '597', '233000', '1928\n']
...
Make sure that you get output like this before starting the assignment or writing any additional code.Directions Modify the program in the following ways:
Write each line as part of a table, include a header before the table, and a summary line at the end. Use a fixed width for each column (don’t try to find the largest width like you did in the previous unit). You should end up with something like
State Disease Number Year
COLORADO MEASLES 2,099 1928
CONNECTICUT MEASLES 10,014 1928
DELAWARE MEASLES 597 1928
…
DELAWARE SMALLPOX 0 1930
DISTRICT OF COLUMBIA SMALLPOX 0 1930
FLORIDA SMALLPOX 28 1930
Total 52,307
Not every field of the original line is used in the output. You will have to do some research about the .format() function to print the number of cases with a comma. If you can’t get the comma in the number column, move on and come back to that once you have more of the program written. The key is to have all the columns line up.
Use some if statements to add three filters to your program that let the user select exactly one state, disease and year to include in the report. Prompt the user to enter these values.
Enter state: Colorado
Enter disease: smallpox
Enter year: 1928
State Disease Number Year
COLORADO SMALLPOX 340 1928
Total 340
Unfortunately, this isn’t very flexible.
Change your program so that if the user just hits return for a prompt, the program includes all the data for that field. For example:
Enter state (Empty means all): Colorado
Enter disease (Empty means all):
Enter year (Empty means all): 1928
State Disease Number Year
COLORADO MEASLES 2,099 1928
COLORADO POLIO 71 1928
COLORADO SMALLPOX 340 1928
Total 2,510
Your program should run as expected using this small data set
Change the open statement in the program to use the full data set, health-no-head.csv.
Write down the answers to the following queries:
How many cases of Hepatitis A were reported in Utah in 2001?
How many cases of polio have been reported in California?
How many cases of all diseases were reported in 1956?
Add another feature to your program. This could be something like printing the highest and lowest numbers for each query, or allowing the user to just type the first part of value, so that entering 20 for the year generates a table for years 2000, 2001, 2002, … 2011, or entering D for a state gives information on Delaware and the District of Columbia. Or maybe leverage your previous assignment and make the column only as wide as they need to be for the data. Try to make it something useful.
Comment your code.Be sure to add a header comment to your program and any functions, and appropriate comments before other blocks of code.
Similar Content
Mercy College Programing Project
Assignment – Stream Cipher
Cryptography
1. Suppose an LFSR of degree 5 is used as a stream cipher and the following plai...
UCF Binary Search Tree in C++ Project
Binary Trees
Binary Trees
by Nick Parlante
This article introduces the basic concepts of binary trees, and then works thr...
West Virginia University Pseucode and Code Project
pseucode and code ...
Oxford University Static Analysis with Infer Software Analysis
paper instructions
The static analyzer Infer can be run on any of the assignments given in the instructions pdf which has ...
java project help
hi, i have a java project.i need this within 20 hours. please check attached filesThanks....
CUS Javascript Game Puzzle Question
Eight Puzzle
For your first project, you will develop the 8-puzzle game using JavaScript.
To turn in this assignment, you ...
Q5.txt
import xlrd from matplotlib import pyplot as py # Give the location of the file wb = xlrd.open_workbook(loc) sheet = wb.sh...
Task Arrows
I used an online drawing platform because Visio couldn’t open for me for some reason. I hope it’s okay....
Matlab Solution
J(i,j)=(1/delta)*(f{i}(X)-f{i}(x)); Aug(j,:)=Aug(j,:)-(Aug(j,i)/Aug(i,i))*Aug(i,:);...
Related Tags
Book Guides
The House of the Seven Gables
by Nathaniel Hawthorne
We Were Eight Years in Power
by Ta-Nehisi Coates
Broke Millennial: Stop Scraping by and Get Your Financial Life Together
by Erin Lowry
Tess of the DUrbervilles
by Thomas Hardy
The Jade Peony
by Wayson Choy
Big Little Lies
by Liane Moriarty
Fences
by August Wilson
Ethan Frome
by Edith Wharton
Fahrenheit 451
by Ray Bradbury

Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content

Java Code Financial Aid Office Project
I have attached the full question, you just have to complete steps 1-4. Should be short and easy!- dont use any method oth ...
Java Code Financial Aid Office Project
I have attached the full question, you just have to complete steps 1-4. Should be short and easy!- dont use any method other than main- use JOptionPane

ITS3105 SUS Programming Automation through Technology Discussion
Fifty or sixty years ago, most people's paychecks were produced by hand; now it is most likely that yours is produced by a ...
ITS3105 SUS Programming Automation through Technology Discussion
Fifty or sixty years ago, most people's paychecks were produced by hand; now it is most likely that yours is produced by a computer or not printed at all but deposited into an account electronically. Forty years ago, most grocery store checkers keyed item prices into the cash register; now it is most likely your items are scanned. Police officers used to direct traffic at many major urban intersections; now the traffic flow is often computer controlled. Are there any tasks now that are mostly done by people that you think would be better handled by a computer? Are there any tasks you hope never become computerized?
On a separate document answer these Learning Journal questions (a minimum of 250 words):
Use the following questions as guides to self-reflection during this week:
Briefly describe what programming you did this week.
Describe any problems you have had and how you solved your problems.
What skills and knowledge do you recognize that you are gaining, and how will these skills and knowledge be useful in school and as a professional after school?

INTL 434 American Military University Cyber Security Threat to the UK Essay
InstructionsAssignment Instructions:
Please answer the question below with an essay answer. Should be 4 pages total (not ...
INTL 434 American Military University Cyber Security Threat to the UK Essay
InstructionsAssignment Instructions:
Please answer the question below with an essay answer. Should be 4 pages total (not including title page and bibliography),
typed double-spaced in Times New Roman, 12-pont font. Remember to us the
Chicago Style Manual for all citations and bibliography. A minimum of
five (5) scholarly sources are required for this assignment.This
assignment will provide the foundation for your final research paper.
As a result, it is highly recommended that additional sources for future
reference are included in the bibliography in addition to the minimum
five required for this assignment.Select a foreign
nation-state (not the United States) and describe a threat to that
nation. The threat can be any of those discussed in this course
(conventional threats, non-state actors, terrorism, insurgency, emerging
threats, cyber, etc). Briefly provide a background of the threat, what
it is, how the nation perceives the threat and how your chosen
nation-state has responded to the threat. The
opportunities are endless here since there are many nations and, of
course, each has numerous, often shared threats. This paper is designed
for you to begin your research and introduce your chosen case-study that
you will then provide much more extensive detail about in your final
paper. Furthermore, your final paper will include your analytical
opinion (thesis) regarding this case-study and be written in the form of
a typical threat assessment. Be sure to select a case study that you
can research deeper than a 4-page paper.

Can someone help with this assignment?
One of the challenges in programs is to store data in a structure that allows fast and efficient searching. Hash tables pr ...
Can someone help with this assignment?
One of the challenges in programs is to store data in a structure that allows fast and efficient searching. Hash tables provide this type of performance by storing data in buckets based on a value called a hash key. The bucket containing a specific data entry is identified by a hash key, which is generated by a hash function. Finding a data entry is then a simple matter of taking a hash key, determining which hash table bucket contains that key value, and then sequentially searching a relatively small linked list in the appropriate hash table bucket. Think of the entire hash table as a list full of small linked lists that are each identified by a value calculated by a hash function that takes a key value as input and returns a bucket identifier.For this assignment, you will complete the following: Create a flowchart to demonstrate the operation of a hash structure. This flowchart should include operations to insert and remove entries in the hash structure. Create a flowchart to demonstrate the operation of the hash function (the hash key generator). Write a complete Java program to implement a hash table data structure for String data. Your program should demonstrate insertion and removal of data. A linked list must be used in the hash buckets to resolve duplicate data collisions. Note: You may not use the Java HashTable or HashMap or other similar built-in Java data structures for your solution. The intention of this assignment is for you to demonstrate your ability to write the code for your own hash table functionality. Submit your flowcharts and Java source code in a single MS Word document for grading.

Park University 1928 to 2011 Infectious Diseases Lab 9 Assignment
Below is what I need assistance with:Download the following all to the same folder:
The program Lab9-start.py
The dat ...
Park University 1928 to 2011 Infectious Diseases Lab 9 Assignment
Below is what I need assistance with:Download the following all to the same folder:
The program Lab9-start.py
The data files health-no-head-sample.csv and health-no-head.csv The big data file contains records of some infectious diseases from 1928 to 2011. The small one only includes data from 3 years from 5 states. Run the python program. It should print something like this
MEASLES,206.98,COLORADO,2099,1014000,1928
['MEASLES', '206.98', 'COLORADO', '2099', '1014000', '1928\n']
MEASLES,634.95,CONNECTICUT,10014,1577000,1928
['MEASLES', '634.95', 'CONNECTICUT', '10014', '1577000', '1928\n']
MEASLES,256.02,DELAWARE,597,233000,1928
['MEASLES', '256.02', 'DELAWARE', '597', '233000', '1928\n']
...
Make sure that you get output like this before starting the assignment or writing any additional code.Directions Modify the program in the following ways:
Write each line as part of a table, include a header before the table, and a summary line at the end. Use a fixed width for each column (don’t try to find the largest width like you did in the previous unit). You should end up with something like
State Disease Number Year
COLORADO MEASLES 2,099 1928
CONNECTICUT MEASLES 10,014 1928
DELAWARE MEASLES 597 1928
…
DELAWARE SMALLPOX 0 1930
DISTRICT OF COLUMBIA SMALLPOX 0 1930
FLORIDA SMALLPOX 28 1930
Total 52,307
Not every field of the original line is used in the output. You will have to do some research about the .format() function to print the number of cases with a comma. If you can’t get the comma in the number column, move on and come back to that once you have more of the program written. The key is to have all the columns line up.
Use some if statements to add three filters to your program that let the user select exactly one state, disease and year to include in the report. Prompt the user to enter these values.
Enter state: Colorado
Enter disease: smallpox
Enter year: 1928
State Disease Number Year
COLORADO SMALLPOX 340 1928
Total 340
Unfortunately, this isn’t very flexible.
Change your program so that if the user just hits return for a prompt, the program includes all the data for that field. For example:
Enter state (Empty means all): Colorado
Enter disease (Empty means all):
Enter year (Empty means all): 1928
State Disease Number Year
COLORADO MEASLES 2,099 1928
COLORADO POLIO 71 1928
COLORADO SMALLPOX 340 1928
Total 2,510
Your program should run as expected using this small data set
Change the open statement in the program to use the full data set, health-no-head.csv.
Write down the answers to the following queries:
How many cases of Hepatitis A were reported in Utah in 2001?
How many cases of polio have been reported in California?
How many cases of all diseases were reported in 1956?
Add another feature to your program. This could be something like printing the highest and lowest numbers for each query, or allowing the user to just type the first part of value, so that entering 20 for the year generates a table for years 2000, 2001, 2002, … 2011, or entering D for a state gives information on Delaware and the District of Columbia. Or maybe leverage your previous assignment and make the column only as wide as they need to be for the data. Try to make it something useful.
Comment your code.Be sure to add a header comment to your program and any functions, and appropriate comments before other blocks of code.
Earn money selling
your Study Documents