Description
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
option 3 will allow the unit to connect without the router broadcasting. option 1 and 3 are your corrective configurations.
Completion Status:
100%
Review
Review
Anonymous
Just what I needed. Studypool is a lifesaver!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Southern New Hampshire University Client Server Development Computer Coding Task
In this project, you will demonstrate your mastery of the following competencies:Apply database systems concepts and princ ...
Southern New Hampshire University Client Server Development Computer Coding Task
In this project, you will demonstrate your mastery of the following competencies:Apply database systems concepts and principles in the development of a client/server applicationCreate a database that can interface with client-side codeScenarioYou work for Global Rain, a software engineering company that specializes in custom software design and development. Your team has been assigned to work on a project for an innovative international rescue-animal training company, Grazioso Salvare. You have been made the lead developer on this project.As part of its work, Grazioso Salvare identifies dogs that are good candidates for search-and-rescue training. When trained, these dogs are able to find and help to rescue humans or other animals, often in life-threatening conditions. To help identify dogs for training, Grazioso Salvare has reached an agreement with a non-profit agency that operates five animal shelters in the region around Austin, Texas. This non-profit agency will provide Grazioso Salvare with data from their shelters.In meeting with the client, Grazioso Salvare, you have discovered that they look for certain profiles in dogs to train. For instance, search-and-rescue training is generally more effective for dogs that are no more than two years old. Additionally, certain breeds of dogs are proficient at different types of rescue, such as water rescue, mountain or wilderness rescue, locating humans after a disaster, or finding a specific human by tracking their scent.Grazioso Salvare is seeking a software application that can work with existing data from the animal shelters to identify and categorize available dogs. Global Rain has contracted for a full stack development of this application that will include a database and a client-facing web application dashboard, through which users at Grazioso Salvare will access the database. The full stack development will be fully completed in Projects One and Two.Grazioso Salvare has also requested that the code for this project be open source and accessible on GitHub, so that it may be used and adapted by similar organizations. To that end, they have asked that you also create a README file to accompany your work.In Project One, you will complete the first phase of this development by creating a database in MongoDB that can interact with client-side code. You will also create an initial README file to accompany your code. In Project Two, later in this course, you will complete the second phase of development by updating the database, producing the dashboard, and updating the README file to explain the full stack development.DirectionsDatabase Commands and CRUD Python ModuleFor your work on Project One, you will incorporate two previously completed milestones. First is the indexing for optimizing queries and authentication for database security, which you completed in the Module Three Milestone. Second is the CRUD (Create, Update, Read, and Delete) functionality for the animal database, which you began in the Module Four Milestone and will complete in this project.You have been asked to create a database for the Grazioso Salvare project that is able to interface with client-side code. In order to do so, you must complete the following:Upload the Austin Animal Center Outcomes data set into MongoDB by inserting a CSV file using the appropriate MongoDB import tool. The data set is located in the Supporting Materials section. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution. These screenshots will later be included in your README file.Note: If you completed the Module Three Milestone, you have already completed this step. Be sure to include your screenshots from the Module Three Milestone in your README file.Create an administrator account and a user account in the mongo shell to ensure user authentication to the database and collection that was created. Be sure to take a screenshot of the mongo shell execution command screen that shows your login process with both accounts. This screenshot will later be included in your README file.Note: If you completed the Module Three Milestone, you have already completed this step. Be sure to include your screenshots from the Module Three Milestone in your README file.Next, you must develop a Python module in a PY file, using object-oriented programming methodology, to enable CRUD functionality for the database. To support code reusability, your Python code needs to be importable as a module by other Python scripts.Develop a CRUD class that, when instantiated, provides the following functionality:A Create method that inserts a document into a specified MongoDB database and collectionInput -> argument to function will be a set of key/value pairs in the data type acceptable to the MongoDB driver insert API call.Return -> “True” if successful insert, else “False”.A Read method that queries for document(s) from a specified MongoDB database and specified collectionInput -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API call.Return -> result in cursor if successful, else MongoDB returned error message.An Update method that queries for and changes document(s) from a specified MongoDB database and specified collectionInput -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API call. Last argument to function will be a set of key/value pairs in the data type acceptable to the MongoDB driver insert API call.Return -> result in JSON format if successful, else MongoDB returned error message.A Delete method that queries for and removes document(s) from a specified MongoDB database and specified collectionInput -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API call.Return -> result in JSON format if successful, else MongoDB returned error message.As you develop your code, be sure to use industry standard best practices such as proper naming conventions, exception handling, and in-line comments. This will ensure that your code is easy to read and reusable for future projects. Refer to the Python Style Guide, located in the Supporting Materials section, to help with these industry standard best practices.Note: If you completed the Module Four Milestone, you have already developed the Create and Read functionality.Finally, you must test your Python module to make sure that it works. To do this, create a Python script that imports your CRUD Python module to call and test all instances of CRUD functionality. This script should be created in a separate Jupyter Notebook (IPYNB) file, and should import and instantiate an object from your CRUD library to effect changes in MongoDB. Be sure to use the username and password for the “aacuser” account for authentication when instantiating the class. After creating your script, execute it in Jupyter Notebook and take screenshots of the commands and their execution. These screenshots will later be included in your README file.Note: If you completed the Module Four Milestone, you have already begun this work. Expand your script to call and test the Update and Delete functionality.README FileGrazioso Salvare has requested documentation to accompany the CRUD Python module. This will ensure that they are able to understand the work that was completed. It will also help them maintain the code for the database.To document this project, you must create a README file that includes the following:An explanation of the purpose of the CRUD Python moduleAn explanation of how the module should be used, including:A description of the Python driver for Mongo that was used and why it was chosenAn explanation of the attributes and working functionality of the CRUD operationsA demonstration of the module’s functional operations, including:Screenshots of the MongoDB import execution. You took these screenshots in Step 1.Screenshots of the user authentication execution. You took these screenshots in Step 2.Screenshots of the CRUD functionality test execution. You took these screenshots in Step 4.Note: If you completed the Module Four Milestone, you have already begun work on your README file. You will need to add more information to complete your README file and fully document your work in Project One.What to SubmitTo complete this project, you must submit the following:Database Commands and CRUD Python ModuleSubmit the IPYNB and PY files containing your code for the project. This includes the Python module that you developed to enable all CRUD functionality and the Python script that calls that functionality. All code files should follow industry standard best practices, including well-commented code.README FileYour submission should be a Word (DOC or DOCX) file containing an explanation of the Python module that you developed to enable CRUD functionality. In your README file, be sure to include all required screenshots.Supporting MaterialsThe following resource(s) may help support your work on the project:Data Set: Austin Animal Center OutcomesGrazioso Salvare has provided you with this sample data set (CSV file) of animal center outcomes. This will become the basis of your database and can be used to test the functionality of your code. This data set has been modified for the purposes of this project. Specifically, the following columns have been added: location_lat (latitude), location_long (longitude), and age_upon_outcome_in_weeks (the age of the animal, given in weeks).Reference: Austin Animal Center. (2020). Austin animal center outcomes [Data set]. City of Austin, Texas Open Data Portal. https://doi.org/10.26000/025.000001
SNHU Functional Mobile Application Project Paper
Competency
In this project, you will demonstrate your mastery of the following competency:
Develop and launch a fully f ...
SNHU Functional Mobile Application Project Paper
Competency
In this project, you will demonstrate your mastery of the following competency:
Develop and launch a fully functional mobile application
Scenario
Your app UI design has been received positively by the client, which means you are now ready to proceed to the final stages of the development process. The client is eager to see the completed product ready for launch. To make this happen, you know that most of your time will need to be spent creating functional, error-free code that will run the app.
However, you also know there are further steps that must be completed after the coding in order for the app to be made widely available. To support your client with this part of the process, you will need to create a recommended launch plan that details how to successfully reach the client’s intended users.
Directions
Begin by reviewing any feedback you received on your previous Project One and Project Two work. Next, open the Android Studio project where you developed the UI for your app in Project Two. Before you begin coding, be sure you have incorporated necessary changes to your UI design as this will help enable your success moving forward. You will be using the Android Studio Editor Window to view and write your Java code.
App Code Design
Develop code that allows a user to log in. As you develop your code, use the Android Emulator feature of Android Studio to test your code. Your app should work for users that both do and do not have accounts. This means you should focus on the following functionality:
The app should check the username and password against the database when the user attempts to log in.
If the user has never logged into the application before, the user should be able to create a new login and password. The application needs to save these to a table in the database.
Develop code to create a database shell and display that database’s information on a user’s screen using a grid. The SQLLite database you create will depend on the option you selected in Project One and will store either inventory items, event details, or daily weight. Any information needed for your application to function correctly should be held in the database, but remember you are only creating the shell for the database so its contents can later be populated by a user. Note that you will need tables in the database to store user information when it is not being displayed in the grid. This database will be persistent so no user information is lost when the app is closed. Be sure to test your code often with the Android Emulator. Your completed database should allow a user to accomplish the following:
Create: The user should be able to add items to a database.
Delete: The user should be able to remove items from a database.
Update: The user should be able to change the value associated with individual database items (e.g. the number of a specific item in an inventory or the date of an event).
Read: The user should be able to view all of the database items displayed as a grid.
Develop code that prompts users for permission to send SMS messaging notifications and makes the app function based on the individual user's response. Keep in mind that the user of your application might deny access to the permissions needed for sending text messages via SMS. If they do, your application should still continue to function, just without this feature. Test both possible options for user response by using the Android Emulator. When you do, you will be looking for the following outcomes:
If the user grants permissions, the application should send alerts to the user as SMS messages. The alerts correspond to the specific notification trigger of the application you chose (low inventory, an upcoming event, or reaching a goal weight).
If the user denies permission, then the rest of the application should still continue to function without the SMS messaging notification feature.
Employ industry standard best practices such as in-line comments and appropriate naming conventions to enhance readability of code. This should be evident throughout all of the code you create for this project and will be assessed comprehensively. Some things to ask yourself as you code are:
Have I kept my classes concise?
Is my style consistent throughout the code?
Would my naming conventions make sense to anyone else who looked at my code?
Do my in-line comments contain enough useful information?
App Launch Plan
Determine a plan for launch of the application that outlines all necessary components to support your app. Once you have completed the code for your app, there are a few more steps required to bring your app to the market. In this project you will not actually have to launch your app in the app store but you will need to outline a comprehensive plan for launch that will prepare you to bring your app to market. Later in this course you will have the opportunity to officially launch your app, if you choose, since it will be an excellent accomplishment to share as you progress along your professional pathway. For now, address the following questions as you write your plan:
What will be included in your app’s description and what kind of icon will best represent your app once it is made available in the app store?
Which version(s) of Android will your app successfully run on? Have you included the most current version? Note that with each version of Android, new components are introduced that add considerations and challenges in the development.
What permissions will your app ask for? Be sure these are only permissions that are necessary for your app to run. For example, does your manifest ask for permission to record phone audio when your app does not use it?
What is your plan for monetization of the app? Consider whether your app will include ads, require a one-time payment, both, or neither.
CMGT 410 Phoenix Cyber Security Recreation & Wellness Intranet Project
Assignment Content Measuring progress and requirements in a project can be completed through performance testing. As you r ...
CMGT 410 Phoenix Cyber Security Recreation & Wellness Intranet Project
Assignment Content Measuring progress and requirements in a project can be completed through performance testing. As you review the results, it leads to ways to maintain the project progress. In this week’s assignment you will develop requirements that need measurable results through performance testing. Review the scenario and complete the activity below.The Recreation and Wellness Intranet Project team is working hard to ensure that the new system they develop meets expectations. The team has a detailed scope statement, but the project manager, Tony Prince, wants to make sure they’re not forgetting requirements that might affect how people view the quality of the project. He knows that the project’s sponsor and other senior managers are most concerned with getting people to use the system, improve their health, and reduce healthcare costs. Users want the system to be user-friendly, informative, fun to use, and fast.Complete the following in a Microsoft Word document.Develop a list of 6 quality standards or requirements related to meeting the stakeholder expectations described in the Running Case. Write a 45- to 90-word brief description of each requirement. For example, a requirement might be that 90 percent of employees have logged into the system within 2 weeks after the system rolls out.Write a 175-word explanation based on the list of standards and requirements on how you will measure progress on meeting the requirements. For example, you might have employees log into the system as part of the training program and track who attends the training. You could also build a feature into the system to track usage by username, department, and other criteria. Support your answer with 1 credible source outside of the course materials.Submit your assignment. Resources
CCJS 321 University of Maryland Cyber Criminals Set Their Sights on Drones Questions
What crimes would specifically impact the data stored within the drone, or in other storage locations connected to drone a ...
CCJS 321 University of Maryland Cyber Criminals Set Their Sights on Drones Questions
What crimes would specifically impact the data stored within the drone, or in other storage locations connected to drone activityWhat would be the most advantageous way to extract data that is considered evidence of those crimes,What digital tools could you use to help search for the dataExplain in detail how illegally obtaining data created by the drone could effect national security and the threats posed
Access Control
Risk exists in virtually everything we do, especially when it comes to computing. Businesses must constantly assess their ...
Access Control
Risk exists in virtually everything we do, especially when it comes to computing. Businesses must constantly assess their risks and take appropriate actions to either prevent them, mitigate them, or or otherwise have a plan to respond in case they occur. Breaches of data security appear to be happening with greater frequency each year. Using information from the course text or external sources, discuss a current risk companies face regarding access control security, and what actions may be taken to address them.* Discussion requirements: Your primary discussion response must be at least 250+ words in length, address the question(s) described in the discussion instructions, and contain at least two (2) external citations and references following correct APA format. Your primary post must be submitted by Wednesday night at midnight each week. Your primary post must then be followed by at least two (2) responses to other students or the instructor. Each response must be at least 50+ words in length, be substantive (more than "great post" and/or "I agree" statements), and add to the conversation. Student responses must be made by Sunday night at midnight to receive credit.
Similar Content
South University MIS 6995 Information Systems Paper
What is change control and why does it need to be managed? Give two examples of the impact of mismanagement.
Why does a ne...
What will happen if a network administrator leaves? , Discussion Question help
In addition to key executives, there are other positions in a company that may be considered critical, or whose loss will ...
IT 207 George Mason University Applied IT Programming Project
IT 207
Applied IT Programming
Lab Assignment 2 | Control Structures, Web Forms
Office Hour Booking Form
In this assignmen...
UC System Analysis and Design Essay
Details on the Paper: Professional Paper on Emerging Technologies vs22.pdf (Attached)When references and citations are inc...
University of Missouri Kansas City Mobile Platform Vulnerabilities Discussion
There are many mobile platform vulnerabilities listed in attached word document. Which do you feel is the greatest threat ...
a Key Concept in Information Systems (4-5 pages), computer science homework help
Research one (1) concept in information systems that you have studied in this course. You may select a topic of your choic...
Cloud 20computing
Over the years have worked in Microsoft Company, the organization has aimed at reducing computing costs. To achieve this o...
Security Report
Technology is giving an advantage to the security of the businesses and also to the relevant unwanted individuals, the hac...
Policy Legal Ethics And Compliance.
Safa N.S., Solms R.V., Furnell S. (2016). Information Security Policy Compliance Model in According to the article, inform...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Southern New Hampshire University Client Server Development Computer Coding Task
In this project, you will demonstrate your mastery of the following competencies:Apply database systems concepts and princ ...
Southern New Hampshire University Client Server Development Computer Coding Task
In this project, you will demonstrate your mastery of the following competencies:Apply database systems concepts and principles in the development of a client/server applicationCreate a database that can interface with client-side codeScenarioYou work for Global Rain, a software engineering company that specializes in custom software design and development. Your team has been assigned to work on a project for an innovative international rescue-animal training company, Grazioso Salvare. You have been made the lead developer on this project.As part of its work, Grazioso Salvare identifies dogs that are good candidates for search-and-rescue training. When trained, these dogs are able to find and help to rescue humans or other animals, often in life-threatening conditions. To help identify dogs for training, Grazioso Salvare has reached an agreement with a non-profit agency that operates five animal shelters in the region around Austin, Texas. This non-profit agency will provide Grazioso Salvare with data from their shelters.In meeting with the client, Grazioso Salvare, you have discovered that they look for certain profiles in dogs to train. For instance, search-and-rescue training is generally more effective for dogs that are no more than two years old. Additionally, certain breeds of dogs are proficient at different types of rescue, such as water rescue, mountain or wilderness rescue, locating humans after a disaster, or finding a specific human by tracking their scent.Grazioso Salvare is seeking a software application that can work with existing data from the animal shelters to identify and categorize available dogs. Global Rain has contracted for a full stack development of this application that will include a database and a client-facing web application dashboard, through which users at Grazioso Salvare will access the database. The full stack development will be fully completed in Projects One and Two.Grazioso Salvare has also requested that the code for this project be open source and accessible on GitHub, so that it may be used and adapted by similar organizations. To that end, they have asked that you also create a README file to accompany your work.In Project One, you will complete the first phase of this development by creating a database in MongoDB that can interact with client-side code. You will also create an initial README file to accompany your code. In Project Two, later in this course, you will complete the second phase of development by updating the database, producing the dashboard, and updating the README file to explain the full stack development.DirectionsDatabase Commands and CRUD Python ModuleFor your work on Project One, you will incorporate two previously completed milestones. First is the indexing for optimizing queries and authentication for database security, which you completed in the Module Three Milestone. Second is the CRUD (Create, Update, Read, and Delete) functionality for the animal database, which you began in the Module Four Milestone and will complete in this project.You have been asked to create a database for the Grazioso Salvare project that is able to interface with client-side code. In order to do so, you must complete the following:Upload the Austin Animal Center Outcomes data set into MongoDB by inserting a CSV file using the appropriate MongoDB import tool. The data set is located in the Supporting Materials section. Complete the import using the mongoimport tool and take screenshots of both the import command and its execution. These screenshots will later be included in your README file.Note: If you completed the Module Three Milestone, you have already completed this step. Be sure to include your screenshots from the Module Three Milestone in your README file.Create an administrator account and a user account in the mongo shell to ensure user authentication to the database and collection that was created. Be sure to take a screenshot of the mongo shell execution command screen that shows your login process with both accounts. This screenshot will later be included in your README file.Note: If you completed the Module Three Milestone, you have already completed this step. Be sure to include your screenshots from the Module Three Milestone in your README file.Next, you must develop a Python module in a PY file, using object-oriented programming methodology, to enable CRUD functionality for the database. To support code reusability, your Python code needs to be importable as a module by other Python scripts.Develop a CRUD class that, when instantiated, provides the following functionality:A Create method that inserts a document into a specified MongoDB database and collectionInput -> argument to function will be a set of key/value pairs in the data type acceptable to the MongoDB driver insert API call.Return -> “True” if successful insert, else “False”.A Read method that queries for document(s) from a specified MongoDB database and specified collectionInput -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API call.Return -> result in cursor if successful, else MongoDB returned error message.An Update method that queries for and changes document(s) from a specified MongoDB database and specified collectionInput -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API call. Last argument to function will be a set of key/value pairs in the data type acceptable to the MongoDB driver insert API call.Return -> result in JSON format if successful, else MongoDB returned error message.A Delete method that queries for and removes document(s) from a specified MongoDB database and specified collectionInput -> arguments to function should be the key/value lookup pair to use with the MongoDB driver find API call.Return -> result in JSON format if successful, else MongoDB returned error message.As you develop your code, be sure to use industry standard best practices such as proper naming conventions, exception handling, and in-line comments. This will ensure that your code is easy to read and reusable for future projects. Refer to the Python Style Guide, located in the Supporting Materials section, to help with these industry standard best practices.Note: If you completed the Module Four Milestone, you have already developed the Create and Read functionality.Finally, you must test your Python module to make sure that it works. To do this, create a Python script that imports your CRUD Python module to call and test all instances of CRUD functionality. This script should be created in a separate Jupyter Notebook (IPYNB) file, and should import and instantiate an object from your CRUD library to effect changes in MongoDB. Be sure to use the username and password for the “aacuser” account for authentication when instantiating the class. After creating your script, execute it in Jupyter Notebook and take screenshots of the commands and their execution. These screenshots will later be included in your README file.Note: If you completed the Module Four Milestone, you have already begun this work. Expand your script to call and test the Update and Delete functionality.README FileGrazioso Salvare has requested documentation to accompany the CRUD Python module. This will ensure that they are able to understand the work that was completed. It will also help them maintain the code for the database.To document this project, you must create a README file that includes the following:An explanation of the purpose of the CRUD Python moduleAn explanation of how the module should be used, including:A description of the Python driver for Mongo that was used and why it was chosenAn explanation of the attributes and working functionality of the CRUD operationsA demonstration of the module’s functional operations, including:Screenshots of the MongoDB import execution. You took these screenshots in Step 1.Screenshots of the user authentication execution. You took these screenshots in Step 2.Screenshots of the CRUD functionality test execution. You took these screenshots in Step 4.Note: If you completed the Module Four Milestone, you have already begun work on your README file. You will need to add more information to complete your README file and fully document your work in Project One.What to SubmitTo complete this project, you must submit the following:Database Commands and CRUD Python ModuleSubmit the IPYNB and PY files containing your code for the project. This includes the Python module that you developed to enable all CRUD functionality and the Python script that calls that functionality. All code files should follow industry standard best practices, including well-commented code.README FileYour submission should be a Word (DOC or DOCX) file containing an explanation of the Python module that you developed to enable CRUD functionality. In your README file, be sure to include all required screenshots.Supporting MaterialsThe following resource(s) may help support your work on the project:Data Set: Austin Animal Center OutcomesGrazioso Salvare has provided you with this sample data set (CSV file) of animal center outcomes. This will become the basis of your database and can be used to test the functionality of your code. This data set has been modified for the purposes of this project. Specifically, the following columns have been added: location_lat (latitude), location_long (longitude), and age_upon_outcome_in_weeks (the age of the animal, given in weeks).Reference: Austin Animal Center. (2020). Austin animal center outcomes [Data set]. City of Austin, Texas Open Data Portal. https://doi.org/10.26000/025.000001
SNHU Functional Mobile Application Project Paper
Competency
In this project, you will demonstrate your mastery of the following competency:
Develop and launch a fully f ...
SNHU Functional Mobile Application Project Paper
Competency
In this project, you will demonstrate your mastery of the following competency:
Develop and launch a fully functional mobile application
Scenario
Your app UI design has been received positively by the client, which means you are now ready to proceed to the final stages of the development process. The client is eager to see the completed product ready for launch. To make this happen, you know that most of your time will need to be spent creating functional, error-free code that will run the app.
However, you also know there are further steps that must be completed after the coding in order for the app to be made widely available. To support your client with this part of the process, you will need to create a recommended launch plan that details how to successfully reach the client’s intended users.
Directions
Begin by reviewing any feedback you received on your previous Project One and Project Two work. Next, open the Android Studio project where you developed the UI for your app in Project Two. Before you begin coding, be sure you have incorporated necessary changes to your UI design as this will help enable your success moving forward. You will be using the Android Studio Editor Window to view and write your Java code.
App Code Design
Develop code that allows a user to log in. As you develop your code, use the Android Emulator feature of Android Studio to test your code. Your app should work for users that both do and do not have accounts. This means you should focus on the following functionality:
The app should check the username and password against the database when the user attempts to log in.
If the user has never logged into the application before, the user should be able to create a new login and password. The application needs to save these to a table in the database.
Develop code to create a database shell and display that database’s information on a user’s screen using a grid. The SQLLite database you create will depend on the option you selected in Project One and will store either inventory items, event details, or daily weight. Any information needed for your application to function correctly should be held in the database, but remember you are only creating the shell for the database so its contents can later be populated by a user. Note that you will need tables in the database to store user information when it is not being displayed in the grid. This database will be persistent so no user information is lost when the app is closed. Be sure to test your code often with the Android Emulator. Your completed database should allow a user to accomplish the following:
Create: The user should be able to add items to a database.
Delete: The user should be able to remove items from a database.
Update: The user should be able to change the value associated with individual database items (e.g. the number of a specific item in an inventory or the date of an event).
Read: The user should be able to view all of the database items displayed as a grid.
Develop code that prompts users for permission to send SMS messaging notifications and makes the app function based on the individual user's response. Keep in mind that the user of your application might deny access to the permissions needed for sending text messages via SMS. If they do, your application should still continue to function, just without this feature. Test both possible options for user response by using the Android Emulator. When you do, you will be looking for the following outcomes:
If the user grants permissions, the application should send alerts to the user as SMS messages. The alerts correspond to the specific notification trigger of the application you chose (low inventory, an upcoming event, or reaching a goal weight).
If the user denies permission, then the rest of the application should still continue to function without the SMS messaging notification feature.
Employ industry standard best practices such as in-line comments and appropriate naming conventions to enhance readability of code. This should be evident throughout all of the code you create for this project and will be assessed comprehensively. Some things to ask yourself as you code are:
Have I kept my classes concise?
Is my style consistent throughout the code?
Would my naming conventions make sense to anyone else who looked at my code?
Do my in-line comments contain enough useful information?
App Launch Plan
Determine a plan for launch of the application that outlines all necessary components to support your app. Once you have completed the code for your app, there are a few more steps required to bring your app to the market. In this project you will not actually have to launch your app in the app store but you will need to outline a comprehensive plan for launch that will prepare you to bring your app to market. Later in this course you will have the opportunity to officially launch your app, if you choose, since it will be an excellent accomplishment to share as you progress along your professional pathway. For now, address the following questions as you write your plan:
What will be included in your app’s description and what kind of icon will best represent your app once it is made available in the app store?
Which version(s) of Android will your app successfully run on? Have you included the most current version? Note that with each version of Android, new components are introduced that add considerations and challenges in the development.
What permissions will your app ask for? Be sure these are only permissions that are necessary for your app to run. For example, does your manifest ask for permission to record phone audio when your app does not use it?
What is your plan for monetization of the app? Consider whether your app will include ads, require a one-time payment, both, or neither.
CMGT 410 Phoenix Cyber Security Recreation & Wellness Intranet Project
Assignment Content Measuring progress and requirements in a project can be completed through performance testing. As you r ...
CMGT 410 Phoenix Cyber Security Recreation & Wellness Intranet Project
Assignment Content Measuring progress and requirements in a project can be completed through performance testing. As you review the results, it leads to ways to maintain the project progress. In this week’s assignment you will develop requirements that need measurable results through performance testing. Review the scenario and complete the activity below.The Recreation and Wellness Intranet Project team is working hard to ensure that the new system they develop meets expectations. The team has a detailed scope statement, but the project manager, Tony Prince, wants to make sure they’re not forgetting requirements that might affect how people view the quality of the project. He knows that the project’s sponsor and other senior managers are most concerned with getting people to use the system, improve their health, and reduce healthcare costs. Users want the system to be user-friendly, informative, fun to use, and fast.Complete the following in a Microsoft Word document.Develop a list of 6 quality standards or requirements related to meeting the stakeholder expectations described in the Running Case. Write a 45- to 90-word brief description of each requirement. For example, a requirement might be that 90 percent of employees have logged into the system within 2 weeks after the system rolls out.Write a 175-word explanation based on the list of standards and requirements on how you will measure progress on meeting the requirements. For example, you might have employees log into the system as part of the training program and track who attends the training. You could also build a feature into the system to track usage by username, department, and other criteria. Support your answer with 1 credible source outside of the course materials.Submit your assignment. Resources
CCJS 321 University of Maryland Cyber Criminals Set Their Sights on Drones Questions
What crimes would specifically impact the data stored within the drone, or in other storage locations connected to drone a ...
CCJS 321 University of Maryland Cyber Criminals Set Their Sights on Drones Questions
What crimes would specifically impact the data stored within the drone, or in other storage locations connected to drone activityWhat would be the most advantageous way to extract data that is considered evidence of those crimes,What digital tools could you use to help search for the dataExplain in detail how illegally obtaining data created by the drone could effect national security and the threats posed
Access Control
Risk exists in virtually everything we do, especially when it comes to computing. Businesses must constantly assess their ...
Access Control
Risk exists in virtually everything we do, especially when it comes to computing. Businesses must constantly assess their risks and take appropriate actions to either prevent them, mitigate them, or or otherwise have a plan to respond in case they occur. Breaches of data security appear to be happening with greater frequency each year. Using information from the course text or external sources, discuss a current risk companies face regarding access control security, and what actions may be taken to address them.* Discussion requirements: Your primary discussion response must be at least 250+ words in length, address the question(s) described in the discussion instructions, and contain at least two (2) external citations and references following correct APA format. Your primary post must be submitted by Wednesday night at midnight each week. Your primary post must then be followed by at least two (2) responses to other students or the instructor. Each response must be at least 50+ words in length, be substantive (more than "great post" and/or "I agree" statements), and add to the conversation. Student responses must be made by Sunday night at midnight to receive credit.
Earn money selling
your Study Documents