Description
the default option in the total row is first, sum, group by, expression.
which of the following is not a total row option count, pmt, where, average.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
option 3 where... is not a total row option..
source : http://www.cs.rtu.lv/PharePub/Microsoft%20Access%2097%20Quick%20Reference/htm/ch05.htm
Completion Status:
100%
Review
Review
Anonymous
This is great! Exactly what I wanted.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Strayer Univeristy Intrusion Detection and Prevention Systems Essay
Network/Host-based Intrusion Detection Systems (IDS) and Network/Host-based Intrusion Preventions Systems (IPS), along wit ...
Strayer Univeristy Intrusion Detection and Prevention Systems Essay
Network/Host-based Intrusion Detection Systems (IDS) and Network/Host-based Intrusion Preventions Systems (IPS), along with firewalls, represent some of the tools available to defend networks and keep them secure. As you progress through the various labs and readings in this course, keep these fundamental security concepts in mind.Examine two advantages and two disadvantages of both the IDS and IPS. Explain which option (IDS or IPS, Host-based or Network) you would select if an organization you worked for could only have one or the other. Provide a rationale for your response. Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend the hardware or software firewall. Provide the rationale for your response.After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.Additional post option: Consider the importance of your home or personal network security. Discuss what steps should be taken to secure a home office. Provide a rationale for your response.
project software: develop a pizza ordering application, computer science homework help
You have been asked to develop a pizza ordering application. Here is the information your manager just shared with you abo ...
project software: develop a pizza ordering application, computer science homework help
You have been asked to develop a pizza ordering application. Here is the information your manager just shared with you about this software development project.The pizza ordering application allows customers with a web browser to order pizza for home delivery. To place an order, a customer would search to find items to purchase (specialty pizzas, sodas, desserts, salads, etc.), and then add items one at a time to a shopping cart. They could also view a page that showed the daily special. The customer could search again for more items if they wanted. They would also have the option to build their own pizza with as many toppings as they liked. When all items were chosen, the customer would see the cost of their order, and also be prompted to provide a delivery address for that specific order. If not paying with cash, the customer would provide credit or debit card information for use on the current order. The system should have an option for customers to register with the pizza shop. They could then save their name, address information and e-mail address, so that they wouldn’t have to enter this information every time they placed an order. If they didn’t want to save their personal details on the site, they could register their e-mail address only, which would let them receive coupons and updates on special promotions.To complete this assignment, make assumptions as needed--just be sure to document any assumptions you make. Remember: "When in doubt sound convincing."1. Identify the following information about the pizza ordering application: a. Purpose or goal of the system b. Primary user(s) of the system2. Generate an Activity UML diagram that starts with the customer connecting with the web site and ends with the driver receiving the address (along with the pizza). I am looking for a very focused and specific UML Activity diagram here. I want the diagram to show me the process of what happens between the time that the customer connects to the website and the driver gets the pizza and address. Note that the cooks will also interact with the process at some point - identify the step or steps where the cook interacts with the system. Number each element of the activity diagram. The activity diagram must contain a minimum of 10 elements.3. Using the activity diagram created for step 2, generate 20 User stories. For each User story, identify the User (customer, cook, or driver), and the element of the activity diagram you are using to generate this user story. The user stories must be of the form "As a <Role> I need to <function> so that <reason or justification>".4. Using the user stories created in step 3, generate 25 System requirements. The requirement must be of the form "The system shall…". Points will be deducted for statements that use should instead or statements that use an alternate format.5. Produce a Use Case UML diagram that contains a minimum of the Customer, the Cook, and the Driver. Review the User stories from step 3 for ideas as to the features to include in the Use Case diagram, but all features need not be included.6. Using the requirements produced for number 4 above, produce 30 system tests. Review assignment 8.3 for an example of what good test step should look like. For each test, identify the Requirement, the User story, and the Activity UML block from which this test derives.7. Identify whether a plan-driven "waterfall" software development approach or an agile framework or methodology might be more suitable for this software development project. Explain your recommendation.8. Identify at least five evolution and maintenance related items that should be considered when planning to develop the pizza ordering software application.9. Identify ten or more risks that could develop with this project. What is the probability or likelihood that each risk might occur, and what would be the effect to your pizza ordering application if it did? What is your plan to avoid, minimize or recover from (i.e., contingency plan) each of these risks if they were to occur? Present your risk analysis as a Risk Register in a tabular format, with the highest impacts/effects listed first.10. Assume that SCRUM is being used for this project. Rank your user stories from number 3 and assign them to four different two week sprints. Identify which user stories should be completed in each sprint.
Chattahoochee Technical College CSI Acceptable Use Policy Paper
Chattahoochee Software Initiative: An inspired company with an uninspired name.CSI is classified as an SMB (Small and Mid ...
Chattahoochee Technical College CSI Acceptable Use Policy Paper
Chattahoochee Software Initiative: An inspired company with an uninspired name.CSI is classified as an SMB (Small and Midsized Businesses; 10 – 500 employees) and specializes in writing security utilities and security educational apps primarily for mobile platforms although apps for the Windows Store are being prototyped. The flagship apps targeted Bluetooth: CSI wrote an Android and IOS (Apple) app that could scan the host phone for critical Bluetooth vulnerabilities. They followed up with an app that enabled phones to scan for Bluetooth-enabled credit card skimmers in ATMs and fuel pumps. CSI also markets educational apps to train non-technical people about mobile security risks. The IT infrastructure is managed in-house, and all equipment is supplied by the company although employees are allowed to use their personal smartphones for email. (CSI does not like BYOB.) Since the company is small, there is not a separate IT security staff so server and network administrators are responsible for security.The network is segmented, meaning that different company functions are separated from each other. The software development environments are protected to prevent code that is not thoroughly tested from entering a production environment. There are policies and procedures in place to move software from development to test and then to production.The company population is primarily developers and testers, with a few executives focused on managing and growing the company. A small help desk manages internal and external customers, and a small IT staff keeps the infrastructure running.One day a manager was reading about security risks due to employee negligence or mistakes. She believes that CSI's current acceptable use policy is fairly awful and does not sufficiently address the proper use of company IT assets. The entire security policy library could use a review. She receives authorization to issue an RFP (request for proposal) for a policy library review contract.Your AssignmentYou submitted a proposal and a password standard sample earlier. You would like to win a contract to evaluate CSI's policy framework, suggest improvements, and update/upgrade their policy library. That should keep you busy and paid for a while. Your proposal got you noticed and through round 1, and now as a finalist you are going to submit a sample Acceptable Use policy based on the sketchy information above. Again, you do not know a whole lot about the company so make some assumptions and outright guesses when writing the policy.1. You do not have to write any proposals. You will write a sample Acceptable Use policy personalized with CSI information (in other words, write a policy, not a template). Since the information you have about the company is incomplete, feel free to make some assumptions to fill in gaps.2. The policy should be usually two to four pages. It could be longer if you feel it's necessary but don't go overboard. We want to communicate the basics of acceptable use but without too much detail. Policies are for rules, details are for Standards documents.3. If some topics need more detail, you may hand them off to another document but you do not have to write that other document. Example: Your AUP may require strong passwords. Rather than take up another page with password requirements, reference a Password Standards document in your policy. ("Please refer to the company's Password Standard" or something along that line.)4. Format your paper like a real policy document, not an academic paper (you know, the double spacing, strict footnote/endnote requirements, etc.), and not a PowerPoint presentation. You want to present a professional looking document. Look at some real-world examples for inspiration.5. Speaking of footnotes/endnotes, remember my admonitions about plagiarism (don't). If you do need or want to quote a source, give that source credit by using footnotes/endnotes. Real policies likely won't have those, but we need to make an exception for this.Tips1. While the assignment grade will concentrate on the message and not so much on the construction, do use a spell checker / grammar checker. Ask someone trusted to read your paper for an opinion, and it's really helpful if that person is not an IT person. You may get suggestions for including a glossary.2. Read some of the samples here in Blackboard and on the Internet via a search engine, and look at the characteristics of what you feel is a good paper - easy to read, introductions, acceptable uses, examples of unacceptable use, and concluding sections (e.g. enforcement, endorsement, education, glossary, signatures, etc.)3. And one last tip buried at the end - remember to include that statement about violation of federal/state/local law in your paper. That covers quite a bit of unacceptable behavior in one statement and is great protection for your client/employer.
Northern Virginia Community Forensics Tools IT Security Discussion Query
Forensics ToolsSearch the Internet for websites that advertise computer forensic tools. Locate reviews of four tools. Cr ...
Northern Virginia Community Forensics Tools IT Security Discussion Query
Forensics ToolsSearch the Internet for websites that advertise computer forensic tools. Locate reviews of four tools. Create a chart that lists the tool, the type of data that it searches for, its features, the cost, etc. Which would you recommend if you could purchase only one tool and budget were not a concern?
NTC 320 UP Cisco Certified Design Associate Certification Discussion
Respond to the following in a minimum of 175 words: How could this industry certification benefit you and help you reach y ...
NTC 320 UP Cisco Certified Design Associate Certification Discussion
Respond to the following in a minimum of 175 words: How could this industry certification benefit you and help you reach your goals? How do you think employers view certifications such as this one? If you feel additional studying would help you prepare for the exam, what is your plan to study for the exam? This course is aligned to a portion of the Cisco Certified Design Associate certification exam. Visit the The Cisco Learning Network site for more information about the certification and to determine if pursuing this industry certification is right for you and your career goals.
Similar Content
Strayer Univeristy W4 Telecommunicating and the Mobile Worker Discussion
Week 4 Assignment 2 SubmissionAssignment 2: Telecommuting and the Mobile WorkerDue Week 4 and worth 100 pointsThe number o...
DUCM The Game of Go with Deep Neural Network & Tree Search Article Analysis Discussion
I want to pick any idea from the article and make a brief comment on it. Here is the link for the article https://www.rese...
Prince Georges Community College Stage of Software Development Life Cycle PPT
LinkedIn Learning Assignment- Presentation FundamentalsComplete the Final Presentation AssignmentThis assignment is to sho...
Assignment 2: Massively Multiplayer Online Role-Playing Games
In a virtual world (VW) of massively multiplayer online role-playing games (MMORPGs), collaboration and communication are ...
IT 402 Saudi Electronic University Integrated Enterprise System Questions
I need solving this assignment and avoid the plagiarism the due date in 27/ 9 , submit it before the due date please ...
American University Assembly Language Worksheet
CALL label
Conceptually, call the function. Specifically: Jump to label and push the address of this call site onto
the ca...
The Great Commission And Technology
Technological advancements have changed how institutions in the conventional society operate, considering they have realiz...
Disaster Recovery Plan Drp
Organizations are always exposed to various risks which can render their operations ineffective. Therefore, it is always c...
Os Simulation
* The scheduler is responsible for determining which job should run * Class Scheduler is used to denote the this case * To...
Related Tags
Book Guides
The Elegant Universe
by Brian Greene
Salt To The Sea
by Ruta Sepetys
Pachinko
by Min Jin Lee
We Were Eight Years in Power
by Ta-Nehisi Coates
Rules Of Civility
by Amor Towles
Broke Millennial: Stop Scraping by and Get Your Financial Life Together
by Erin Lowry
Narrative of the Life of Frederick Douglass
by Frederick Douglass
Little Fires Everywhere
by Celeste Ng
The Iliad
by Homer
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Strayer Univeristy Intrusion Detection and Prevention Systems Essay
Network/Host-based Intrusion Detection Systems (IDS) and Network/Host-based Intrusion Preventions Systems (IPS), along wit ...
Strayer Univeristy Intrusion Detection and Prevention Systems Essay
Network/Host-based Intrusion Detection Systems (IDS) and Network/Host-based Intrusion Preventions Systems (IPS), along with firewalls, represent some of the tools available to defend networks and keep them secure. As you progress through the various labs and readings in this course, keep these fundamental security concepts in mind.Examine two advantages and two disadvantages of both the IDS and IPS. Explain which option (IDS or IPS, Host-based or Network) you would select if an organization you worked for could only have one or the other. Provide a rationale for your response. Examine two advantages and two disadvantages for both hardware and software firewalls. Explain whether you recommend the hardware or software firewall. Provide the rationale for your response.After reading a few of your classmate’s postings, reply to the ones from which you learned something new or to which you have something to add. Remember to get in early and post often.Additional post option: Consider the importance of your home or personal network security. Discuss what steps should be taken to secure a home office. Provide a rationale for your response.
project software: develop a pizza ordering application, computer science homework help
You have been asked to develop a pizza ordering application. Here is the information your manager just shared with you abo ...
project software: develop a pizza ordering application, computer science homework help
You have been asked to develop a pizza ordering application. Here is the information your manager just shared with you about this software development project.The pizza ordering application allows customers with a web browser to order pizza for home delivery. To place an order, a customer would search to find items to purchase (specialty pizzas, sodas, desserts, salads, etc.), and then add items one at a time to a shopping cart. They could also view a page that showed the daily special. The customer could search again for more items if they wanted. They would also have the option to build their own pizza with as many toppings as they liked. When all items were chosen, the customer would see the cost of their order, and also be prompted to provide a delivery address for that specific order. If not paying with cash, the customer would provide credit or debit card information for use on the current order. The system should have an option for customers to register with the pizza shop. They could then save their name, address information and e-mail address, so that they wouldn’t have to enter this information every time they placed an order. If they didn’t want to save their personal details on the site, they could register their e-mail address only, which would let them receive coupons and updates on special promotions.To complete this assignment, make assumptions as needed--just be sure to document any assumptions you make. Remember: "When in doubt sound convincing."1. Identify the following information about the pizza ordering application: a. Purpose or goal of the system b. Primary user(s) of the system2. Generate an Activity UML diagram that starts with the customer connecting with the web site and ends with the driver receiving the address (along with the pizza). I am looking for a very focused and specific UML Activity diagram here. I want the diagram to show me the process of what happens between the time that the customer connects to the website and the driver gets the pizza and address. Note that the cooks will also interact with the process at some point - identify the step or steps where the cook interacts with the system. Number each element of the activity diagram. The activity diagram must contain a minimum of 10 elements.3. Using the activity diagram created for step 2, generate 20 User stories. For each User story, identify the User (customer, cook, or driver), and the element of the activity diagram you are using to generate this user story. The user stories must be of the form "As a <Role> I need to <function> so that <reason or justification>".4. Using the user stories created in step 3, generate 25 System requirements. The requirement must be of the form "The system shall…". Points will be deducted for statements that use should instead or statements that use an alternate format.5. Produce a Use Case UML diagram that contains a minimum of the Customer, the Cook, and the Driver. Review the User stories from step 3 for ideas as to the features to include in the Use Case diagram, but all features need not be included.6. Using the requirements produced for number 4 above, produce 30 system tests. Review assignment 8.3 for an example of what good test step should look like. For each test, identify the Requirement, the User story, and the Activity UML block from which this test derives.7. Identify whether a plan-driven "waterfall" software development approach or an agile framework or methodology might be more suitable for this software development project. Explain your recommendation.8. Identify at least five evolution and maintenance related items that should be considered when planning to develop the pizza ordering software application.9. Identify ten or more risks that could develop with this project. What is the probability or likelihood that each risk might occur, and what would be the effect to your pizza ordering application if it did? What is your plan to avoid, minimize or recover from (i.e., contingency plan) each of these risks if they were to occur? Present your risk analysis as a Risk Register in a tabular format, with the highest impacts/effects listed first.10. Assume that SCRUM is being used for this project. Rank your user stories from number 3 and assign them to four different two week sprints. Identify which user stories should be completed in each sprint.
Chattahoochee Technical College CSI Acceptable Use Policy Paper
Chattahoochee Software Initiative: An inspired company with an uninspired name.CSI is classified as an SMB (Small and Mid ...
Chattahoochee Technical College CSI Acceptable Use Policy Paper
Chattahoochee Software Initiative: An inspired company with an uninspired name.CSI is classified as an SMB (Small and Midsized Businesses; 10 – 500 employees) and specializes in writing security utilities and security educational apps primarily for mobile platforms although apps for the Windows Store are being prototyped. The flagship apps targeted Bluetooth: CSI wrote an Android and IOS (Apple) app that could scan the host phone for critical Bluetooth vulnerabilities. They followed up with an app that enabled phones to scan for Bluetooth-enabled credit card skimmers in ATMs and fuel pumps. CSI also markets educational apps to train non-technical people about mobile security risks. The IT infrastructure is managed in-house, and all equipment is supplied by the company although employees are allowed to use their personal smartphones for email. (CSI does not like BYOB.) Since the company is small, there is not a separate IT security staff so server and network administrators are responsible for security.The network is segmented, meaning that different company functions are separated from each other. The software development environments are protected to prevent code that is not thoroughly tested from entering a production environment. There are policies and procedures in place to move software from development to test and then to production.The company population is primarily developers and testers, with a few executives focused on managing and growing the company. A small help desk manages internal and external customers, and a small IT staff keeps the infrastructure running.One day a manager was reading about security risks due to employee negligence or mistakes. She believes that CSI's current acceptable use policy is fairly awful and does not sufficiently address the proper use of company IT assets. The entire security policy library could use a review. She receives authorization to issue an RFP (request for proposal) for a policy library review contract.Your AssignmentYou submitted a proposal and a password standard sample earlier. You would like to win a contract to evaluate CSI's policy framework, suggest improvements, and update/upgrade their policy library. That should keep you busy and paid for a while. Your proposal got you noticed and through round 1, and now as a finalist you are going to submit a sample Acceptable Use policy based on the sketchy information above. Again, you do not know a whole lot about the company so make some assumptions and outright guesses when writing the policy.1. You do not have to write any proposals. You will write a sample Acceptable Use policy personalized with CSI information (in other words, write a policy, not a template). Since the information you have about the company is incomplete, feel free to make some assumptions to fill in gaps.2. The policy should be usually two to four pages. It could be longer if you feel it's necessary but don't go overboard. We want to communicate the basics of acceptable use but without too much detail. Policies are for rules, details are for Standards documents.3. If some topics need more detail, you may hand them off to another document but you do not have to write that other document. Example: Your AUP may require strong passwords. Rather than take up another page with password requirements, reference a Password Standards document in your policy. ("Please refer to the company's Password Standard" or something along that line.)4. Format your paper like a real policy document, not an academic paper (you know, the double spacing, strict footnote/endnote requirements, etc.), and not a PowerPoint presentation. You want to present a professional looking document. Look at some real-world examples for inspiration.5. Speaking of footnotes/endnotes, remember my admonitions about plagiarism (don't). If you do need or want to quote a source, give that source credit by using footnotes/endnotes. Real policies likely won't have those, but we need to make an exception for this.Tips1. While the assignment grade will concentrate on the message and not so much on the construction, do use a spell checker / grammar checker. Ask someone trusted to read your paper for an opinion, and it's really helpful if that person is not an IT person. You may get suggestions for including a glossary.2. Read some of the samples here in Blackboard and on the Internet via a search engine, and look at the characteristics of what you feel is a good paper - easy to read, introductions, acceptable uses, examples of unacceptable use, and concluding sections (e.g. enforcement, endorsement, education, glossary, signatures, etc.)3. And one last tip buried at the end - remember to include that statement about violation of federal/state/local law in your paper. That covers quite a bit of unacceptable behavior in one statement and is great protection for your client/employer.
Northern Virginia Community Forensics Tools IT Security Discussion Query
Forensics ToolsSearch the Internet for websites that advertise computer forensic tools. Locate reviews of four tools. Cr ...
Northern Virginia Community Forensics Tools IT Security Discussion Query
Forensics ToolsSearch the Internet for websites that advertise computer forensic tools. Locate reviews of four tools. Create a chart that lists the tool, the type of data that it searches for, its features, the cost, etc. Which would you recommend if you could purchase only one tool and budget were not a concern?
NTC 320 UP Cisco Certified Design Associate Certification Discussion
Respond to the following in a minimum of 175 words: How could this industry certification benefit you and help you reach y ...
NTC 320 UP Cisco Certified Design Associate Certification Discussion
Respond to the following in a minimum of 175 words: How could this industry certification benefit you and help you reach your goals? How do you think employers view certifications such as this one? If you feel additional studying would help you prepare for the exam, what is your plan to study for the exam? This course is aligned to a portion of the Cisco Certified Design Associate certification exam. Visit the The Cisco Learning Network site for more information about the certification and to determine if pursuing this industry certification is right for you and your career goals.
Earn money selling
your Study Documents