Line of developmental training and inspirational materials

Assignment Help Basic Computer Science
Reference no: EM13166797

Scenario

The Becoming Company is a full service provider for a line of developmental training and inspirational materials including videos, music, and books called Drive Change.

The idea grew out Ann Roger's personal interest after years of struggling against generalized anxiety disorder and depression. Years of counseling and pharmacological treatment had little effect on her outlook, until one day she read a research study on biofeedback that described a therapy for changing thought patterns and habits which ultimately leads to "rewiring" in the brain allowing new positive patterns of thought to emerge and become habituated. Ann created her own therapy out of an eclectic collection of materials -videos, music, dietary information, exercise programs, and books, along with a schedule for her daily treatment and a mantra filled with affirmations to use each time negative thoughts would intrude. Over time she mitigated her condition and found fulfillment and happiness in her life. Ann decided to share her experience, materials, and therapy with others. She incorporated as a Woman-Owned S-Corporation, got a Small Business Administration (SBA) loan for $350,000 and opened a shop with an office in her hometown of Burlington near Boston. Burlington is the location of many high-technology companies and upper-middle class well-educated hardworking and stressed-out people.

To run her business, she purchased a computer (she calls the back office computer) and the necessary peripherals for faxing, printing and so on, and a Point of Sales computer. She hired a staff of three people, Larry, Curly and Moe, to work the counter and cash register, and handle various other tasks, including accessing the back office computer when needed for things like creating invoices or letters to mail. Moe is the supervisor in charge when Ann is not in the store. Moe has a Master's degree in horticulture from Northeastern University, but likes to tinker with computers. Larry and Curly like to tinker too, and Curly sometimes uses the back office computer for surfing the Internet for fishing gear and other such items. The following describes her systems and configuration.Ann purchased a Dell OptiPlex 390 computer (visit www.dell.com for more information) for keeping the accounting books and records, such as sales transactions, and performing basic office functions such as word processing and spreadsheets.

 

 

The software on this system consists of Microsoft Windows 7 professional edition with the canned software including the Microsoft Office, along with an 8x5 support and maintenance contract that allows her to upgrade her software at a reduced rate.

For accounting and keeping track of sales transactions, she uses a custom program written by her nephew, Bob, who is a sophomore computer science student at Boston University. The program is written in Microsoft Visual Basic .NET and uses Microsoft Access as the database.

She stores her business records and invoices as plain files (e.g. text and Microsoft Word documents) in various directories. She does not use an encrypted file system. She relies on conventional firewall and virus scanner for security. For that, she uses the free version of ZoneAlarm for a firewall, and the free version of AVG for virus scanning. She also does backups to flash drives weekly, which she keeps at home in a desk drawer.

Ann uses the basic Windows login password for Administrator using her pet cat's name, "Fluffy", as the password. Only she knows the administrator password. She has a user account, called "Assistant" to enable her staff of three (Larry, Curly, and Moe) to login and work on the computer to do basic things -use the Internet, create files, etc. The system is connected to the Internet through a local service provider using a wireless network connection. The wireless connection is Wired Equivalent Privacy (WEP) encrypted, but she has chosen her store's phone number as her WEP password.

For the storefront, Ann purchased a small Point of Sales (POS) computer from InitiaTek, a company that specializes in POS computers and installation. The POS software runs Windows 7 in the Microsoft Virtual PC virtual machine. The configuration of the POS system consists of a self-contained cash drawer and sales register and tabulation and transaction software, written in C#.NET. This system is networked over the wireless network to the back office computer, also using WEP.

InitiaTek configured a software and network interface from the POS system tabulation and transaction software to the custom accounting application running on the back office computer so that when a transaction is "rung up" on the POS, it records it both in the POS and simultaneously passes the sales transaction to the accounting application, which records it in the Microsoft Access database.

 

 

Reference no: EM13166797

Questions Cloud

Threat, risk and vulnerability : Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.
Generalize the program below to allow negative integers : Using SML: Generalize the program below to allow negative integers on the input. We assume that negative integers are preceded by the minus sign(-) rather than the tilde (~). Note that we not only have to recognize negative integers but we can no lon..
Table of hurricane categories and associated wind speeds : Review the following table of Hurricane categories and associated wind speeds (miles per hour) and storm surge levels (feet above normal).
Explain the ph of the solution is found : A saturated solution of Mg(OH)2 in contact with undissolved Mg(OH)2(s) is prepared at 25 degrees C. The pH of the solution is found to be 10.17.
Line of developmental training and inspirational materials : The Becoming Company is a full service provider for a line of developmental training and inspirational materials including videos, music, and books called Drive Change.
What fraction of thiocyanate ion is converted in complex ion : What fraction of thiocyanate ion is accually converted into the complex ion?
State carbon monoxide and water vapor : An equilibrium mixture contains 0.750 mol of each of the products (carbon dioxide and hydrogen gas) and 0.200 mol of each of the reactants (carbon monoxide and water vapor) in a 1.00-L container.
A solution is made by mixing what is the ph of the mixture : A solution is made by mixing 50.0 ml of a HCl (aq) solution which has a pH of 3.00 with 50.0 ml of a KOH solution which has a pH of 12.00.
Data entities of this enterprise : Consider a student club or organization in which you are a member. What are the data entities of this enterprise? List and define each entity.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Minimum number of edits required to convert string

Given two strings of size m, n and set of operations replace (R), insert (I) and delete (D) all at equal cost. Find minimum number of edits (operations) required to convert one string into another.

  Flight availability request application

Define a simple Web Service in WSDL that returns flight information regarding flights of a particular flight operator, see the first question

  Explain implications of copyrights on usage of web site

Study and explain copyright implications associated to Web site development. Write down minimum of 350 words explaining the implications of copyrights on usage of content on Web site.

  Effective-protecting intellectual property in digital media

Which is more likely to be effective in protecting intellectual property in digital media such as CDs and DVDs: tougher copyright laws or new technologies incorporating.

  Kind of information monitor check to see if it sanitize

Which kind of information should the monitor check to see if it must sanitize the data to conceal the names of the users and the names and addresses of the computers involved?

  How can laser be tipped before light no longer continues

If a laser is to be pointed into the end of the fibre, but is "tipped" to one side by θ degrees, how much can the laser be "tipped" before the light no longer continues down the fibre?

  Procedure to charge lower rate for ongoing support services

Create complete, written procedure for New Century Health Clinic maintenance change requests. Include suitable forms with procedure.

  Significant questions software installed by cable personnel

Interesting post on the computer discussion site (Slashdot) raises some significant questions about software installed by cable personnel.

  Create memo for management-accounting information systems

Create a memo to your management in which you address significance of accounting information systems. Give some main features of accounting information system.

  Discussion on computer future

After reading about programming languages and their capabilities, consider all of the devices in your home that have a computer. Where will computer programming and the use of computers go in the future?

  The lisp function length counts

The Lisp function LENGTH counts the number of elements in the top level of a list. Write a function ALL-LENGTH of one argument that counts the number of atoms that occur in a list at all levels.  Thus, the following lists will have the following A..

  Your manager has decided that the throughput

Your manager has decided that the throughput of your file server can be improved by replacing your old SCSI-2 host adapter with a "fast and wide" SCSI-3 adapter. It has also been decided that the old SCSI-2 drives will be replaced with "fast and w..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd