Identify the functionality of key code components

Assignment Help Management Information Sys
Reference no: EM131056122

Scenario: A new owner has purchased Swagger Distribution Company, a company that distributes clothing and apparel. She does not have experience with ITrelated problem solving, so she is contracting you, as an IT consultant, to help. For Milestone Two, you will submit a document summarizing the programming components and networking configuration of the distribution company. Take a moment to read the Final Project Guidelines and Rubric to see how the following information applies to the final project, and then proceed to do the following for Milestone Two:

Programming: Every day, when an employee of Swagger Distribution signs on to her computer, a pop-up window opens and gives a greeting to the employee.

The new owner would like to continue to have the pop-up window but would like to change the greeting.

This code is currently displayed on the computer screen at Swagger Distribution every morning when employees log on to their computers. The new owner would like you to:

1. Add a second line that tells employees, "Welcome to Swagger Distribution!"

2. Place the "Welcome" statement above the current date.

3. Change the word "Current" to "Today's" on the date output.
(Hint: To add a second line of output code, simply add a second System.out.println in the statement.)

NOTE: Take a screenshot of the code you adapted and the result at the bottom.

Take this code to https://www.compilejava.net/. Important: Clear all of the code that is already in the compiler so you can begin with a blank editor.

For this area of the assignment:

- Identify the functionality of key code components such as what the functionality of "system.out.println" is along with other code components such as the calendar code and the semicolon.

- Briefly summarize the three changes that were made from the original code for Swagger using terminology you learned in this module.

- Add a screenshot of your code and output and paste into your document.

Networking: There are two possible configurations for Swagger Distribution's network: a wired version and a wireless version.

For this area of the assignment:

- Review the provided visual representation of the wired configuration and summarize it using IT terminology.

- Using the Basic Network Diagram template in Visio, create and describe a diagram that makes it possible for the "warehouse" and "offices" to have a wireless connection. Be sure to label each item. Paste a screenshot of your diagram in your Word document.

Reference no: EM131056122

Questions Cloud

Would you accept that the population was normal : If you randomly sampled a population and obtained ten observations with a mean of zero, would you accept that the population was normal with μ = 2.0 and σ2= 2.0? Why, or why not
Monatomic ideal gas : (a) Find the work done by a monatomic ideal gas as it expands from point A to point C along the path shown in Figure 4. (b) If the temperature of the gas is 220 K at point A, what is its temperature at point C?
Calculate the temperature at the points : Suppose 57.5 moles of an ideal monatomic gas undergo the series of processes shown in Figure 5. (a) Calculate the temperature at the points A, B, and C. (b) For each process and state whether heat enters or leaves the system. Explain in each case...
Which of the cell types is an immature red blood cells : Which of the following cell types is an immature red blood cell?
Identify the functionality of key code components : Identify the functionality of key code components such as what the functionality of "system.out.println" is along with other code components such as the calendar code and the semicolon.
Social media and feminism : Expand and be more specific on the example (on the hashtag example). What the hashtag is about? And how is the hashtag affected
Calculate net profit margin ratios using financial statement : Next, calculate the 12/31/15 and 12/31/14 ratios using the financial statements you printed, including all of the following:
Discuss it strategy that o-reilly media chose to implement : Discuss the IT strategy that O'Reilly Media chose to implement and whether you believe that it successfully addresses the goals of IT governance and business alignment. Has O'Reilly Media considered all of the stakeholders in this scenario? What c..
Create three classes for the linked list : The input file will be in the following format: one word per line followed by either N or V in parenthesis: apple(N) peach(N) eat(V) .

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain how an organization organizes and operates

Explain how an organization organizes and operates to meet the needs of customers

  Who are developing qualifications necessary to succeed

With growing trends toward outsourcing, some economists are pointing to the emergence of "globalized professionals", who are developing qualifications necessary to succeed in the global job market.

  Politics of informationby politics we mean here the

politics of informationby politics we mean here the processes by which scarce resources are allocated and distributed.

  Develop list of five to seven feature of your application

Develop a list of the top five to seven features of your application. Explain how those features pertain to your viral hook. Explain how those features will help increase wedding revenue.

  Evaluate the coefficient of variation

Digital Technology: coefficient of variation, assessment of risk increasing and evaluate the coefficient of variation (V) for each time period.

  Show the importance of managing employees and technology

This solution describes the technological changes that affect the general manager's job in the modern workplace. The human element in comparison to managing technology is also discussed.

  Physical access controls and logical access controls

Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical access controls are related to implementing a security policy

  What software trends are relevant to managers

Management Information Systems - Software Trends and What kinds of software and software trends are relevant to managers?

  Information technology and payroll and order entry

Information Technology - Payroll and Order Entry - It explains if payroll and order entry are types of transaction processing systems. Batch, online, and hybrid systems are also discussed.

  Describe threats that specifically target confidentiality

Describe threats that specifically target confidentiality on a data system. Do not limit yourself to the textbook for answers, and use external resources to support your conclusion.7. What are the components of two-factor authentication ? Provide exa..

  Write analysis of uses of data warehousing and data mining

Write an analysis of uses of data warehousing, data mining and business intelligence, based on a study of recent texts, peer-reviewed conference papers and journal articles.

  Computer security softwareby using computer security

computer security softwareby using computer security software and hacker tools to protect company systems employees

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd