final project/5630281_f260.jpg
final project/clone_request_application_high_level_pro.docx
Project Objective
Develop a form based application that captures all the relevant information in database tables regarding a clone request. Where feasible, the necessary information will be driven by pick lists and not manual entry. The new application will capture all requests and provided the ability to enter clone dates or reject the request. The application will also provide a mechanism to enter the actual date the clone was completed and capture any reasons for delay. There will be a reporting mechanism in the application that will track SLAs and report on delays by categories. The application must have functionality to copy an existing clone request to a new request and allow the user to modify all data prior to submitting the request. The application must have the ability to search for past clone request by request id, source id, target id, requested by name or date.
Current Clone Request Process
The current request process is to manually fill in a word document template with necessary clone details and email to responsible group. Once these paper requests are reviewed, a clone schedule is developed and a calendar is published and emailed to all interested parties. This is a very manual process that requires additional man-hours and is not conducive to proactive notifications. In addition, a manual form does not validate for correct entries or ensure all necessary data is captured
Definitions
Environments – A working area consisting of the E-Business database and corresponding application software for a particular defined objective. Examples of environments are production, test, development, performance test and project development etc
Clone – A copy of the E-Business database and application software to another environment that eliminates any references from the original environment.
Source – The environment that will be utilized to start a clone
Target – The environment that the source will be copied into and then modified
Masking – Altering or scrambling of data
OAM – Software that integrates with E-Business for Single Sign on
OBIEE – Data Warehouse for E-Business
SLA – Service Level Agreement
final project/CloneDatabaseTables.xlsx
CLONE_REQUESTSCLONE_REQUEST_IDCLONE_STATUS_CODECLONE_BUSINESS_REASONREQUESTING_ACCOUNTCLONE_SUITABLE_STARTCLONE_SUITABLE_ENDPREFERRED_STARTPREFERRED_ENDUSED_OFFSHORESOURCE_ENVIRONMENT_SID_IDSOURCE_BACKUP_DATETARGET_ENVIRONMENT_SID_IDTARGET_REPURPOSEREQUIRE_OBIEE_CLONEASSIGNED_DBA_ACCOUNTSCHEDULED_BACKUP_DATESCHEDULED_RESTORE_DATESCHEDULED_CLONE_START_DATESCHEDULED_CLONE_END_DATEACTUAL_CLONE_START_DATEACTUAL_CLONE_END_DATESERVICE_LEVEL_AGREEMENT_CODERESTORE_USERS_FROM_TARGETREV_DATEREV_SESSION_ID1ITestbok85264/13/154/15/154/12/154/14/15TRUEfuxbs44/10/15fixbs6TRUEFALSEFALSE4/10/151AutoNumberShort Text 5Short Text 255Short Text 8DataDateDateDateYes/NoShort Text 15DateShort Text 15Yes/NoYes/NoShort Text 8 ...
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Cost and benefit analysisWe are doing group presentation.docxvoversbyobersby
Cost and benefit analysis
We are doing group presentation tomorrow but we are struggling to make the
presentation sldies. We need presentation slides.
Could you guys help me? Maximum slides we have to make are 11 pages.
Below are structure of prejesentation we should do.
<>
In your analysis, make sure you take the followings into consideration:
•
the alternative projects ,
•
the groups who benefit and suffer from project,
•
list the physical impact of alternatives,
•
predict monetary value of those impacts (benefit and cost) over the life of project in terms of their present value,
•
conclude which of the alternative project should be selected.
-----------------
Addendum: PT slides
•
1 intro slide that discusses the motivation behind the project and CBA
•
Information about which groups have standing, and how they either benefit or lose from the considered policies
•
Numbers, sources
•
Conclusion
•
1-2 slides on other key information you would need to conduct a thorough analysis
•
1-2 slides at the end with a list of sources
Addendum: PT slides
Do Not Include:
•
Typos and spelling/grammar mistakes.
•
Basic definitions of CBA terms.
•
Too many pictures.
•
Unsubstantiated claims (unless you explicitly states that you had made the judgement call because there was insufficient data)
.
Cosmetics as endocrine disruptors are they a health risk.docxvoversbyobersby
Cosmetics as endocrine disruptors: are they a health risk?
Polyxeni Nicolopoulou-Stamati1 & Luc Hens2 & Annie J. Sasco3
Published online: 29 January 2016
# Springer Science+Business Media New York 2016
Abstract Exposure to chemicals from different sources in
everyday life is widespread; one such source is the wide range
of products listed under the title Bcosmetics^, including the
different types of popular and widely-advertised sunscreens.
Women are encouraged through advertising to buy into the
myth of everlasting youth, and one of the most alarming con-
sequences is in utero exposure to chemicals. The main route of
exposure is the skin, but the main endpoint of exposure is
endocrine disruption. This is due to many substances in cos-
metics and sunscreens that have endocrine active properties
which affect reproductive health but which also have other
endpoints, such as cancer. Reducing the exposure to endocrine
disruptors is framed not only in the context of the reduction of
health risks, but is also significant against the background and
rise of ethical consumerism, and the responsibility of the cos-
metics industry in this respect. Although some plants show
endocrine-disrupting activity, the use of well-selected natural
products might reduce the use of synthetic chemicals.
Instruments dealing with this problem include life-cycle
analysis, eco-design, and green labels; in combination with
the committed use of environmental management systems,
they contribute to Bcorporate social responsibility .̂
Keywords Endocrine active substances . Endocrine
disruptors . Cosmetics . Sunscreens
1 Introduction
Women and men all over the world use large amount of cos-
metic products in pursuit of everlasting youth, ignoring the
probable health risks. The commercial category of Bcosmetic
products^ entails substances or mixtures of substances that are
designed mainly for external use, for instance to improve the
appearance; clean; perfume; and sometimes protect as in the
case of sunscreens [1]. Many cosmetic products such as oils
and lipsticks contain UV filters, even though they are not
marketed under the term Bsunscreens^ or Bsun lotions^.
Cosmetic products contain active substances, preservatives
and also the so-called Bfragrances^ or Bperfumes^, the exact
composition of which remains a secret under the trade secret
standards [2].
Increasing scientific concern exists about the nature and the
safety of the ingredients used by the cosmetics industry re-
garding their endocrine-disrupting effects. Although numer-
ous studies have proved the endocrine-disrupting potential of
many ingredients, such as parabens, phthalates and UV filters,
and also their ability to cause reproductive impairments [3–6],
these substances are still extensively used and characterized as
Bsafe^. The main justification is the fact that manufacturers
keep the concentrations of the suspected chemical substances
low in accordance with the relevant legislation. However, the
possib.
More Related Content
Similar to final project5630281_f260.jpgfinal projectclone_request_ap.docx
Cost and benefit analysisWe are doing group presentation.docxvoversbyobersby
Cost and benefit analysis
We are doing group presentation tomorrow but we are struggling to make the
presentation sldies. We need presentation slides.
Could you guys help me? Maximum slides we have to make are 11 pages.
Below are structure of prejesentation we should do.
<>
In your analysis, make sure you take the followings into consideration:
•
the alternative projects ,
•
the groups who benefit and suffer from project,
•
list the physical impact of alternatives,
•
predict monetary value of those impacts (benefit and cost) over the life of project in terms of their present value,
•
conclude which of the alternative project should be selected.
-----------------
Addendum: PT slides
•
1 intro slide that discusses the motivation behind the project and CBA
•
Information about which groups have standing, and how they either benefit or lose from the considered policies
•
Numbers, sources
•
Conclusion
•
1-2 slides on other key information you would need to conduct a thorough analysis
•
1-2 slides at the end with a list of sources
Addendum: PT slides
Do Not Include:
•
Typos and spelling/grammar mistakes.
•
Basic definitions of CBA terms.
•
Too many pictures.
•
Unsubstantiated claims (unless you explicitly states that you had made the judgement call because there was insufficient data)
.
Cosmetics as endocrine disruptors are they a health risk.docxvoversbyobersby
Cosmetics as endocrine disruptors: are they a health risk?
Polyxeni Nicolopoulou-Stamati1 & Luc Hens2 & Annie J. Sasco3
Published online: 29 January 2016
# Springer Science+Business Media New York 2016
Abstract Exposure to chemicals from different sources in
everyday life is widespread; one such source is the wide range
of products listed under the title Bcosmetics^, including the
different types of popular and widely-advertised sunscreens.
Women are encouraged through advertising to buy into the
myth of everlasting youth, and one of the most alarming con-
sequences is in utero exposure to chemicals. The main route of
exposure is the skin, but the main endpoint of exposure is
endocrine disruption. This is due to many substances in cos-
metics and sunscreens that have endocrine active properties
which affect reproductive health but which also have other
endpoints, such as cancer. Reducing the exposure to endocrine
disruptors is framed not only in the context of the reduction of
health risks, but is also significant against the background and
rise of ethical consumerism, and the responsibility of the cos-
metics industry in this respect. Although some plants show
endocrine-disrupting activity, the use of well-selected natural
products might reduce the use of synthetic chemicals.
Instruments dealing with this problem include life-cycle
analysis, eco-design, and green labels; in combination with
the committed use of environmental management systems,
they contribute to Bcorporate social responsibility .̂
Keywords Endocrine active substances . Endocrine
disruptors . Cosmetics . Sunscreens
1 Introduction
Women and men all over the world use large amount of cos-
metic products in pursuit of everlasting youth, ignoring the
probable health risks. The commercial category of Bcosmetic
products^ entails substances or mixtures of substances that are
designed mainly for external use, for instance to improve the
appearance; clean; perfume; and sometimes protect as in the
case of sunscreens [1]. Many cosmetic products such as oils
and lipsticks contain UV filters, even though they are not
marketed under the term Bsunscreens^ or Bsun lotions^.
Cosmetic products contain active substances, preservatives
and also the so-called Bfragrances^ or Bperfumes^, the exact
composition of which remains a secret under the trade secret
standards [2].
Increasing scientific concern exists about the nature and the
safety of the ingredients used by the cosmetics industry re-
garding their endocrine-disrupting effects. Although numer-
ous studies have proved the endocrine-disrupting potential of
many ingredients, such as parabens, phthalates and UV filters,
and also their ability to cause reproductive impairments [3–6],
these substances are still extensively used and characterized as
Bsafe^. The main justification is the fact that manufacturers
keep the concentrations of the suspected chemical substances
low in accordance with the relevant legislation. However, the
possib.
COSC2737 Assignment 2 IT Infrastructure in the Cloud. .docxvoversbyobersby
COSC2737 Assignment 2: IT Infrastructure in the Cloud.
In this assignment, you will combine 3 different cloud services to build an application of your choice.
Typically, this might include a web-facing component. The focus of the assignment is not this content, but
the infrastructure behind it – the “wiring”, if you will.
As part of the assignment, you will create a presentation video. If this is done well, you will be able to add
these to a portfolio of work that you can demonstrate at job interviews, etc….
NB. This assignment is focused on Amazon products, primarily because that is what we teach in ITIS,
but, you are also allowed to use Google or Microsoft products, or a combination – but only with prior
permission from the Course Coordinator. And we may not be able to help you if problems between
vendor products arises.
For this assignment, you will provide a simple working cloud implementation, and submit the contents in a
ZIP file to Canvas, along with a presentation video, a report, and an initial PDF “pitch” document submitted
some weeks earlier than the deadline.
Note that the web content itself is not evaluated, only how it is set up. So you can use material from
anywhere (as long as you cite it on the web pages).
List of Amazon Services: https://aws.amazon.com/products/
List of Amazon services available to AWS Educate: https://s3.amazonaws.com/awseducate-starter-account-
services/AWS_Educate_Starter_Accounts_and_AWS_Services.pdf also available on Canvas.
Submission Details
1. Build a cloud infrastructure using at least 3 components from the AWS list of products above:
1. This could be a server and storage, or compute, or whatever.
2. One of the components counted could be the use of Alexa services for query.
2. The topic of the website is up to you, but must have a least (say) 5 different pages, and must ideally
be some form of B2B flavour.
3. Submission will be the following:
1. Pitch Document – An initial “pitch” where you describe your proposal in a few paragraphs
(not more than a page)
1. This will be due in week 11
2. Worth 5%, and will provide feedback from your tutor.
2. Report – A PDF report containing the following sections
1. Rationale
- The rationale behind this website or cloud construction. More or less a copy
of the pitch in its final form.
2. Cost Estimates
- both development, fixed and cloud running and how these running cost
scales for LOW (1-1000 transactions/day), MEDIUM (1000-1,000,000), and
HIGH (above 1,000,000+ transactions per day) – hese costs all to be
itemised and justified
- Imagine you are a professional quoting for the job
3. An installation manual that
- contains instructions to recreate the website(s)
- A marker should be able to rebuild it him/herself from this
4. There is no limit on report size, but a guide is about 10-15 pages including figures,
screen dumps, etc.
.
https://aws.amazon.com/prod.
Cortes and the Aztecs Respond in writing to the following questi.docxvoversbyobersby
Cortes and the Aztecs
Respond in writing to the following questions after reading Cortés' letter on page 260 and watching the two videos above.
1. What aspects of Aztec life and culture favorably impressed Cortés? Of what was he critical?
2. With their belief in a pantheon of deities, how might an Aztec have reacted upon visiting a Christian house of worship such as Chartres Cathedral?
3. What is the Colombian Exchange? List the consequences of the exchange.
Make sure to:
· Write a short essay or paragraph of at least 100 words. Do not go over 250 words.
· Use concrete examples/details and avoid generalities.
· Address all questions.
· Use proper grammar and punctuation.
· If you researched your topic and are using information from what you learned, remember to cite your sources.
· Do not plagiarize. Your work will be checked by turnitin.com.
.
Correlation and RegressionForecasting is a critical job for mana.docxvoversbyobersby
Correlation and Regression
Forecasting is a critical job for managers. Correlation and regression are two statistical methods used by managers for forecasting.
Correlation allows you to quantify how closely two variables are related. The correlation values or correlation coefficients have a range between -1.0 and +1.0. The closer the value is to the absolute value of 1, the stronger the correlation. The negative or positive sign indicates if the variables have a negative or positive correlation. A positive correlation exists when both variables increase or decrease. A negative correlation exists when one variable increases while the other variable decreases. If the two variables are independent and have no relationship, then the correlation is 0.
Be careful not to confuse correlation and causality. For instance, you can be reasonably sure that higher distribution and lower prices both cause higher sales; however, there are many things in this world that are correlated mathematically but are not at all related.
Regression is a statistical technique that lets you construct an equation to describe the relationship between the movements of two variables. On a scatter plot, the regression equation would calculate the best-fit line through the points. Regression allows you to forecast and simulate different scenarios by ascertaining the relationship between causes and effects. The causes are known as independent variables or drivers. The effects are known as dependent variables or what is being forecast.
You need to have a sufficient amount of history for the dependent variable and all the independent variables that you might think are useful in predicting the dependent variable to build a regression model. The minimum number of observations required is generally between 20 and 30. A key concept for regression is that it uses the past to predict the future. It assumes that relationships between historical dependent and independent variables will hold true for present of future dependent and independent variables.
There is an extension to the regression model, known as the multiple regression model. Adding another independent variable to a regression model turns it into a multiple regression model. The equation can become quite complex when more than two independent variables are added to the model, but these equations are rarely calculated by hand. Most commercial spreadsheet, accounting, and statistics software include these in their function library.
Counselor Dispositional Expectations
Dispositions are the values, commitments, and professional ethics that influence behaviors toward others, and, if sincerely held, dispositions lead to actions and patterns of professional conduct. The Grand Canyon University Counseling Program’s dispositions adhere to the University’s mission statement, as well as to the established counseling profession codes of ethics.
The Grand Canyon University Counseling Program have adopted the following disposition.
Correlation and Regression StudyBackground During this week .docxvoversbyobersby
Correlation and Regression Study
Background
During this week you will identify a research question created in Week 1 for which correlation or regression would be the best statistical approach to take. If you do not have a research question that indicates correlation or regression, review the research questions posted by your peers last week and select one that is ideal for correlation or regression.
Discussion Assignment Requirements
Initial Posting – In your initial posting for this assignment, include the following:
•Identify an appropriate research question that would require the use of correlation and regression to answer.
•Describe why this question is appropriate for a correlational study.
•Identify the two variables in this study and each of their attributes: discrete or continuous, quantitative or categorical, and scale of measurement (nominal, ordinal, interval, or ratio).
•Do the variables fit the qualifications of a correlational study? Explain.
•What type of correlation would you expect to find for this study (i.e., positive or negative)? Explain.
•What predictions might you be interested in making with these variables if the correlation is found to be significant?
Article Critique: Correlation & Regression
The readings for this week focus on the concepts of correlation and regression. In this discussion we will apply those concepts to the review and critique of Wagenheim & Anderson (2008). For information on how to critique a research article, see the Coughlan et al. (2007) from your resources in Week 1 and UIS (n.d.) from your resources in Week 2.
In the body of your posting, include an overview of the following topics:
•Research question – State the research question for the study.
•Methods and study design – Describe the basic methods used, including the variables, sampling methods, data collection, etc.
•Data analysis – Summarize the statistical tests conducted, the results obtained from each test, and the conclusions regarding the research question.
•Critique – Critique the results of the study, paying specific attention to the appropriateness of the analyses conducted, any biases or assumptions that were made, practical significance of the results, and recommendations for improving upon the study (methods or analyses).
•Summary – Provide a brief summary of the study's findings in 2-3 sentences. Do not use any numbers or statistical terms, but provide a review that would make sense to someone who has not studied research methods or statistics.
Be sure to put information in your own words and to cite appropriately. Respond substantively to at least two of your classmates’ postings. Specifically, focus on their critique of the results and discussion of the analysis. Do you agree with their assessment? What questions did the study leave you with? How might you have done this study differently? What do you see as the limitations of the study as compared to your classmates?
Z, T, or Chi-Square Test Study
Background
During th.
Correlate your job responsibilities with the Disaster recovery c.docxvoversbyobersby
Correlate your job responsibilities with the Disaster recovery course outcomes listed above. Should be Minimum 200 words
Disaster Recovery Course Out-come
• Recognize the need for disaster recovery plans within organizations.
• Develop a complete and accurate disaster recovery plan.
• Assess risks that may impact an organization
• Identify data storage and recovery sites.
• Develop plans, procedures and relationships.
• Develop procedures for special circumstances.
• Test the disaster recovery plan.
• Continue to assess needs, threats, and solutions after testing the disaster recovery
plan.
Job Responsibility:
· Responsible in delivering the complete
Project Plan with total supporting data which included the status Reports, Issues Log, Performance Testing Matrix, detailed Testing Reports, Fine tuning Recommendation reports to both Executive Management & Senior Management
· Responsible to provide Technical and Functional Support to the users, tester and Business System Analysts
· Managing and Preparation of the Test Plan and Test strategy for the various projects
· Liaison with the onsite and offshore teams for testing status and issue resolution
· Tested the data mapping, fixing errors
· Tested staging table for EDI 210 Invoice, Balance Due Invoice, EDI 810 Invoice inbound, 850 Inbound Purchase order
· Tested Web service using SoapUI
· Involved in User acceptance testing (UAT)
· Written standard test scripts for Oracle Financial, Procure to Pay, SOA, web services
· Involved in standard Functionality testing in Phase I Phase II for 3 Instance
· Documented and communicated test results to the test Management and Business Management Team
· Worked closely with Developers team for different issues
· Experience with test automation tools like JIRA
· Worked on the testing of SaaS, Web services, XML and web application.
.
Correctional CounselingRobert HanserScott Mire20111 The .docxvoversbyobersby
Correctional Counseling
Robert Hanser
Scott Mire
2011
1 The Role of the Correctional Counselor
CHAPTER OBJECTIVES
After reading this chapter, you will be able to:
· 1. Identify the functions and parameters of the counseling process.
· 2. Discuss the competing interests between security and counseling in the correctional counseling process.
· 3. Know common terms and concerns associated with custodial corrections.
· 4. Understand the role of the counselor as facilitator.
· 5. Identify the various personal characteristics associated with effective counselors.
· 6. Be aware of the impact that burnout can have on a counselor’s professional performance.
· 7. Identify the various means of training and supervision associated with counseling.
PART ONE: A BRIEF INTRODUCTION TO COUNSELING AND CORRECTIONS
There are many myths concerning the concept of counseling. Although the image of the counseling field has changed dramatically over the past two or three decades, much of society still views counseling and therapy as a mystic process reserved for those who lack the ability to handle life issues effectively. While the concept of counseling is often misunderstood, the problem is exacerbated when attempting to introduce the idea of correctional counseling. Therefore, the primary goal of this chapter is to provide a working definition of correctional counseling that includes descriptions of how and when it is carried out. In order to understand the concept of correctional counseling, however, the two words that derive the concept must first be defined: “corrections” and “counseling.” In addition, a concerted effort is made to identify the myriad of legal and ethical issues that pertain to counselors working with offenders.
It is very difficult to identify a single starting point for the counseling profession. In essence, there were various movements occurring simultaneously that later evolved into what we now describe as counseling. One of the earliest connections to the origins of counseling took place in Europe during the Middle Ages (Brown & Srebalus, 2003). The primary objective was assisting individuals with career choices. This type of counseling service is usually described by the concept of “guidance.” In the late 1800s Wilhelm Wundt and G. Stanley Hall created two of the first known psychological laboratories aimed at studying and treating individuals with psychological and emotional problems (Brown & Srebalus, 2003). Around the same time (1890), Sigmund Freud began treating mental patients with his patented technique of psychoanalysis. As a result, the origins of counseling can be traced to two different but simultaneous movements: (1) guidance and (2) psychotherapy.
Guidance
Guidance has been used as a concept to describe the process of helping individuals identify and choose what they value most (Gladding, 1996). Guidance can occur in any instance where one individual, usually more experienced, helps another to identify choices that best refle.
Correlate health and safety issues at workplace with ideals. Y.docxvoversbyobersby
Correlate health and safety issues at workplace with ideals.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
Hartman, L., DesJardins, J., & MacDonald, C. (2014). 1.
Business ethics: decision making for personal integrity and social responsibility
(3rd ed., pp. 276-283). New York: McGraw-Hill.
No Wiki, Dictionary.com or Plagiarism
.
Correctional Program ShowcaseSubmitted BY Intensive moti.docxvoversbyobersby
Correctional Program Showcase
Submitted BY
Intensive motivational program of alternative correctional treatment (IMPACT)
IMPACT- Two phase program
Mission: to engage and rehabilitate the offenders with sentence of seven years
Goals: To engage the offenders into correction program for their betterment
To help the offenders to live a life with worth with out committing a crime.
Intensive motivational program of alternative correctional treatment (IMPACT) is a program that is based on the two phases, it is continuation shock incarcerations that initially started in the 1987. The mission of the program is to engage the offenders who are sentenced for 7 years into correctional program. Goals of the program is to engage the offender voluntarily in the two phase program and they can quite if they are not willing to continue the program. The offenders ahs to pass through the phases and complete the instructions of the drill instructors. The target population is based on the offender who do not mix in to normal general population. IMPACT is among the top three programs of the state to correct and rehabilitate the offenders (Mackenzie & Shaw, 2006).
2
Intensive motivational program of alternative correctional treatment (IMPACT)
Population : Offenders with sentence of seven years
Effectiveness:
Increased the prosocial behavior in offenders
Decreased the aggression and anxiety
Improvements have been seen in the offenders that lead them towards rehabilitation.
The program is effective for the offenders by send in to the offenders into military boot camps. Offenders who were engage in the IMPACT program were reported as having the high prosocial behaviors anxiety and aggression have been lowered in the offenders who have completed the program. Offender with change are promoted to the next phase of rehabilitation (Mackenzie & Shaw, 2006). It was designed because authorities are aware of that emotional instability is a main reason behind the offenses. Thus this program helped to provide emotional stability and also help in rehabilitation process.
3
Reentry Program
Reentry program is basically developed as a correctional program which is covering different aspects.
Educational paradigm
Health sector
Rehabilitation sector
Job skills and Employment Readiness program
Reentry programs is an effort made by the Louisiana corrections. The mission of the program is to provide the services regarding education, job and employment skills, substance abuse treatment and rehabilitation services are offered by the programs to education the offenders and help them rehabilitate in the society. Reentry program was designed to motivate those offenders who came again after relapse of drugs or crime. This program focus on all areas of life of offenders because it not only provided basic education but also provide job skills to make them productive member of society. Some profit and not for profit organizations help to design and to make it effective by financ.
Corrections in America - please type the answers separateDiscu.docxvoversbyobersby
Corrections in America - please type the answers separate
Discussion Board #2A : Research and discuss the differences between State and Federal Prison Systems. Who goes to Prison in each of these systems? What about Women Offenders? What about Juvenile Offenders?
iscussion Board #2B concerns Racial Issues within Prison Systems. Research and discuss if there is racial disparity as to who is sent to jail/prison. Are all groups sentenced equally? Why is there an issue with fair sentencing? Who is to blame?
.
Correction to be made for my code of ethical plan Inclusion of.docxvoversbyobersby
Correction to be made for my code of ethical plan: Inclusion of a letter from leadership to the reader of the Code of Ethics. This sets the tone and lets the reader know why the Board of Directors and management consider the code of Ethics important.
2. Accetable and unacceptable behavior on the part of employees.
3. Resources for more information and what to do if unethical behavior is seen such as contact information for an Ethics Compliance Officer or if someone needs to report unethical conduct. This includes reporting procedures.
4. Ethics training and awarness program for your company.
5. Consequences of unethical /or illegal behavior
6. The legal regulations of conducting business overseas.
7. The ethical code of conduct for employees and vendors
8. Distingushing between right and wrong in business dealings when the action is legal
9. Identifying the issues surrounding the motivation behind unethical or illegal business operations when the consequences are properly documented.
10. Anything else that you deem important support your ethical code of conduct plan.
11. Your ethical code of conduct plan should demonstrate your understanding of the concepts and ideas covered throughout the course.
1,250--1,500 words and references.
.
Correct the following paragraph. Insert or delete hyphens as nee.docxvoversbyobersby
Correct the following paragraph.
Insert or delete hyphens as needed in the following paragraph:
1
Attending College in New York City can be pretty scary, especially for a small-town girl from Des Moines, Iowa.
2
Since I am studying nursing, I decided to join Scorpions for Smiles, a student-volunteer-group that visits children who spend a-lot of time in the hospital wards for recovery or treatment purposes.
3
It's a great feeling knowing that a sick or hurting child is benefiting from my time and up-beat attitude.
4
The last time I visited, I brought coloring supplies so that Amy, the eight year old patient I usually spend time with, and I could draw pictures for her family.
5
Amy is a very well known patient; she is always playing practical jokes on the nurses and doctors!
6
When I went visited with my student group this past week, Amy wasn't there because she had an X-ray scheduled.
7
I left her a note with some crayons so that she could color after the procedure.
8
Next week is her birth-day.
9
. I won't be visiting that day, but when I do, I'll bring two plain t shirts to decorate with paints and markers.
10
The corner store near my dorm has cake-mix for only ninety nine cents!
11
. I'll bring a cake for Amy and-the-rest of her friends, too!
Step 2
Save and submit your assignment.
.
Correctional AdministratorsPrisons and jails are both clas.docxvoversbyobersby
Correctional Administrators
Prisons and jails are both classified as correctional facilities, however their missions and day-to-day operations can vary significantly. The types of offenders being held and the reasons they are incarcerated are notably different between a state or federal prison and a county jail.
In your initial response,
A)
Compare and contrast the role of a correctional administrator at a prison vs. a jail.
B)
Be sure to highlight the missions of both and how those missions impact the way day-to-day operations are managed by a correctional administrator.
Assignment Instructions:
1) Based on research, and
2) Using professional, scholarly sources, and
3) Submitted in APA 6th ed style, and
4) A minimum of 350 words, excluding the references list.
.
Corporations are making the assumption that everyone uses a sm.docxvoversbyobersby
Corporations are making the assumption that everyone uses a smartphone. How does this perpetuate the negative outcomes created by the “Digital Divide”?
Your rough draft is your work-in-progress version of your final paper (which is due on Sunday). The purpose of the rough draft assignment is to allow me to understand where your team is at, and to be able to provide feedback that you can use for refining your paper.
Your paper should have the following characteristics:
Be in APA format
Have the following sections:
Title page
Abstract (from Friday's assignment - revised according to the feedback that was given (if any).
Rough draft, this should address:
Introduction
Background/Literature Review
Relevant Theory Exploration
Findings/Examples
Lessons Learned
Future Research
References (non-annotated)
Appendix:
.
Corporation M, a calendar year corporation that began doing business.docxvoversbyobersby
Corporation M, a calendar year corporation that began doing business on January 1, 20X1, had accumulated earnings and profits of $30,000 as of January 1, 20X8. On July 2, 20X8, M distributed $22,000 cash to Mrs. C, M's sole shareholder. M had a $20,000 deficit in earnings and profits for 20X8. Mrs. C had an adjusted basis of $14,000 in her stock before the distribution. What is the amount of Mrs. C's basis in the stock after the distribution?
.
CORPORATE TRAINING 1
Running head: APA IS EASY
Paper Title
Student’s Name, Class
University of the Cumberlands
Note the
header &
the page
number.
Also this
the header
is l/2 inch
from the
top (p. 306)
Double spaced,
upper/lower case and
centered on the page.
See pg 41, APA, 6th
edition
Ask your facilitator if
they desire the date/their
name on title page.
APA doesn’t require it.
Running
head is
typically
optional –
ask your
instructor –
used
primarily if
publishing
CORPORATE TRAINING 2
Corporate Training
Today, managers need well-trained employees and are finding they do not exist.
Corporations are, therefore, providing additional training for their employees. One such training
program that is being added to corporate learning environments is an awareness of emotional
intelligence. Business managers are learning that successful managers need high Emotional
Quotient (EQ) or Emotional Intelligence (EI) to work effectively. Emotional intelligence is the
ability to accurately perceive emotions in self and others, to identify different emotional
responses, and to use emotional information to make intelligent decisions (Goleman, 2000). A
leading expert on EQ finds that “people good at managing relationships tend also to be self-
aware, self-regulating, and empathetic” (Goleman, 2000, p. 33). Emotional intelligence is
especially important “at the highest levels of the company, where differences in technical skills
are of little importance. In other words, the higher the rank of the person, the more emotional
intelligence capabilities are needed for decision making effectiveness” (Goleman, 1986, p. 94).
Emotional intelligence is crucial to a successful business career and for effective group
performance (Goleman, 1986). The core competencies required for emotional intelligence are
“the perception of emotions in one’s self and others, the understanding of these emotions, and
the management of emotions” (Feldman, 2001, ¶ 4). Success in the modern workplace requires
teamwork and collaboration. Emotional Intelligence training is essential since most modern
Title of
paper is
centered.
Do not
bold. Do
not cap.
Text is
ragged
edge,
double-
spaced
This is a
direct
quote
complete
with
quotation
marks so
the writer
must
provide
needs to
direct
readers to
direct
This is not
a direct
quote but
para-
phrased
Period after
Citation of
Short
quotes
CORPORATE TRAINING 3
companies rely on teams of employees working together, rather tha.
Corporate TAX homework problems. Need help with solving. email is .docxvoversbyobersby
Corporate TAX homework problems. Need help with solving. email is
[email protected]
Notes
Ch1 corporations
Complete the problems as presented in this document. You may create a new document and/or spreadsheet as needed. Any memo should be no more than 3 pages in length. Please state any assumptions used if problems are not clear.
Problem 1
Your client, a physician, recently purchased a yacht on which he flies a pennant with a medical emblem on it. He recently informed you that he purchased the yacht and flies the pennant to advertise his occupation and thus attract new patients. He has asked you if he may deduct as ordinary and necessary business expenses the costs of insuring and maintaining the yacht. In search of an answer, consult RIA’s CHECKPOINT TAX available on-line through the SNHU Shapiro Library. Explain the steps taken to find your answer.
Problem 2
Stacey Small has a small salon that she has run for a few years as a sole proprietorship. The proprietorship uses the cash method of accounting and the calendar year as its tax year. Stacey needs additional capital for expansion and knows two people who might be interested in investing. One would like to practice hairdressing in the salon. The other would only invest.
Stacey wants to know the tax consequences of incorporating the business. Her business assets include a building, equipment, accounts receivable and cash. Liabilities include a mortgage on the building and a few accounts payable, which are deductible when paid.
Write a memo to Stacey explaining the tax consequences of the incorporation. As part of your memo examine the possibility of having the corporation issue common and preferred stock and debt for the shareholders’ property and money.
Problem 3
Five years ago, Lacey, Kaylee, and Doug organized a software corporation, DLK, which develops and sells Online Meetings software for businesses. DLK is a C corporation. Each individual contributed $10,000 to the company in exchange for 1,000 shares of DLK stock (for a total of 3,000 shares). The corporation also borrowed $250,000 from ACME Venture Capital to finance operating costs and capital expenditures.
Because of intense competition, DLK struggled for the first few years of operation and the corporation sustained chronic losses. This year, Lacey, DLK’s president, decided to seek additional funds to finance DLK’s working capital.
CME declined to extend additional funds because of the money already invested in DLK. High Tech Venture Capital Inc. proposed to lend DLK $100,000, but at a 10% premium over the prime rate. (Other software manufacturers in the same market can borrow at a 3% premium.) First Round Capital proposed to invest $50,000 of equity capital into DLK, but on the condition that the investment firm be granted the right to elect five members to DLK’s board of directors. Discouraged by the “high cost” of external borrowing, Lacey decides to approach Kaylee and Doug.
Lac.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
final project5630281_f260.jpgfinal projectclone_request_ap.docx
1. final project/5630281_f260.jpg
final project/clone_request_application_high_level_pro.docx
Project Objective
Develop a form based application that captures all the relevant
information in database tables regarding a clone request. Where
feasible, the necessary information will be driven by pick lists
and not manual entry. The new application will capture all
requests and provided the ability to enter clone dates or reject
the request. The application will also provide a mechanism to
enter the actual date the clone was completed and capture any
reasons for delay. There will be a reporting mechanism in the
application that will track SLAs and report on delays by
categories. The application must have functionality to copy an
existing clone request to a new request and allow the user to
modify all data prior to submitting the request. The application
must have the ability to search for past clone request by request
id, source id, target id, requested by name or date.
Current Clone Request Process
The current request process is to manually fill in a word
document template with necessary clone details and email to
responsible group. Once these paper requests are reviewed, a
clone schedule is developed and a calendar is published and
emailed to all interested parties. This is a very manual process
that requires additional man-hours and is not conducive to
proactive notifications. In addition, a manual form does not
validate for correct entries or ensure all necessary data is
captured
Definitions
Environments – A working area consisting of the E-Business
database and corresponding application software for a particular
defined objective. Examples of environments are production,
test, development, performance test and project development etc
2. Clone – A copy of the E-Business database and application
software to another environment that eliminates any references
from the original environment.
Source – The environment that will be utilized to start a clone
Target – The environment that the source will be copied into
and then modified
Masking – Altering or scrambling of data
OAM – Software that integrates with E-Business for Single Sign
on
OBIEE – Data Warehouse for E-Business
SLA – Service Level Agreement
final project/CloneDatabaseTables.xlsx
CLONE_REQUESTSCLONE_REQUEST_IDCLONE_STATUS_
CODECLONE_BUSINESS_REASONREQUESTING_ACCOUN
TCLONE_SUITABLE_STARTCLONE_SUITABLE_ENDPREF
ERRED_STARTPREFERRED_ENDUSED_OFFSHORESOURC
E_ENVIRONMENT_SID_IDSOURCE_BACKUP_DATETARGE
T_ENVIRONMENT_SID_IDTARGET_REPURPOSEREQUIRE_
OBIEE_CLONEASSIGNED_DBA_ACCOUNTSCHEDULED_B
ACKUP_DATESCHEDULED_RESTORE_DATESCHEDULED_
CLONE_START_DATESCHEDULED_CLONE_END_DATEAC
TUAL_CLONE_START_DATEACTUAL_CLONE_END_DATE
SERVICE_LEVEL_AGREEMENT_CODERESTORE_USERS_F
ROM_TARGETREV_DATEREV_SESSION_ID1ITestbok85264/
13/154/15/154/12/154/14/15TRUEfuxbs44/10/15fixbs6TRUEFA
LSEFALSE4/10/151AutoNumberShort Text 5Short Text
255Short Text 8DataDateDateDateYes/NoShort Text
15DateShort Text 15Yes/NoYes/NoShort Text
8DateDateDateDateDateDateShort Text 15Yes/NoDateNumber
Long Integer
CLONE_STATUS_REFERENCECLONE_STATUS_CODESHO
RT_DESCLONG_DESCREV_DATEREV_SESSION_IDAAppro
vedApproved4/10/151DDisapprovedDisapproved4/10/151IInitiat
edInitiated4/10/151Short Text 2 Short Text 255Short Test
3. 255DateNumber Long Integer
PERSONACCOUNTPERSON_FNAMEPERSON_LNAMEPERS
ON_EMAILSECURITY_GROUP_CODETEAM_NAME_CODER
EV_DATEREV_SESSION_IDbok8526BarbaraKing[email protec
ted]M1A4/10/151Short Text 8Short Text 25Short Text 25Short
Text 25Short Text 5Short Text 5DateNumber Long Integer
SECURITY_GROUP_REFERENCESECURITY_GROUP_CODE
SHORT_DESCLONG_DESCREV_DATEREV_SESSION_IDL1
LowLow Security4/10/151M1MaximumMaximum
Security4/10/151M2MediumMedium Security4/10/151Short
Text 5Short Text 255Short Text 255DateNumber Long Integer
TEAM_REFERENCETEAM_NAME_CODESHORT_DESCLON
G_DESCREV_DATEREV_SESSION_IDATeam ATeam
A4/10/151BTeam BTeam B4/10/151CTeam CTeam
C4/10/151DTeam DTeam D4/10/151Short Text 5Short Text
255Short Text 255DateNumber Long Integer
ENVIRONMENT_DB_INFOENVIRONMENT_SID_IDSHORT_
DESCLONG_DESCENVIRONMENT_TYPE_CODEENVIRON
MENT_SECUREENVIRONMENT_MASKEDINTEGRATED_W
ITH_OAMRACREV_DATEREV_SESSION_IDfuxbs4Productio
nProduction 15.02
PT3PTRUEFALSETRUEFALSE4/10/151muxbs5StagingStaging
15.10STRUETRUEFALSETRUE4/10/151puxbs4ProductionProd
uction 15.02
PT2PTRUETRUETRUEFALSE4/10/151quxbs4ProductionProdu
ction 13.02 PT3PTRUEFALSETRUEFALSE4/10/151Short Text
8Short Text 255Short Text 255Short Text
5Yes/NoYes/NoYes/NoYes/NoDateNumber Long Integer
ENVIRONMENT_TYPE_REFERENCEENVIRONMENT_TYPE
_CODESHORT_DESCLONG_DESCREV_DATEREV_SESSION
_IDDDevelopmentDevelopment4/10/151PProductionProduction
4/10/151SStagingStaging4/10/151Short Text 5Short Text
255Short Text 255DateNumber Long Integer
TARGET_REPURPOSE_DETAILSREPURPOSE_DATABASE_I
DSERVER_NAMEENVIRONMENT_SHORT_DESCENVIRON
MENT_LONG_DESCENVIRONMENT_TYPE_CODEENVIRON
4. MENT_SECUREENVIRONMENT_MASKEDINTEGRATED_W
ITH_OAMURLRACSOA_REQUIREDOBIEE_REQUIREDTRA
NS_VOL_COMPARE_REF_CODEPROD_SIZE_COMPARE_RE
F_CODEPROD_USER_COMPARE_REF_CODEBACKUPSAPP
_TIERSVIZIYASTRREV_DATEREV_SESSION_IDfixbs6MINI
MiniMiniDTRUEFALSETRUEFALSEFALSETRUEFALSEFAL
SEFALSEFALSE4/10/151pixbs6MAXIMaxiMaxiDFALSETRUE
TRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSE4/10/1
51Short Text 15Short Text 255Short Text 255Short Text
255Short Text 5Yes/NoYes/NoYes/NoShort Text
255Yes/NoYes/noYes/noShort Text 5Short Text 5Short Text
5Yes/NoYes/NoYes/NoYes/NoDateNumber Long Integer
SERVICE_LEVEL_AGREEMENTSERVICE_LEVEL_AGREEM
ENT_CODESHORT_DESCLONG_DESCREV_DATEREV_SES
SION_IDCorpSLAcovers all Service Level Management (SLM)
issuescovers all Service Level Management (SLM)
issues4/10/151CustSLAagreement with an individual
customeragreement with an individual
customer4/10/151ServSLAagreement is for every customer
making use of the services being providedagreement is for every
customer making use of the services being
provided4/10/151Short Text 15Short Text 255Short Text
255DateNumber, Long Integer
RELATIONSHIPS
final
project/Database_ForClass.accdb.accdbCLONE_REQUEST_ID
CLONE_BUSINESS_REASONCLONE_SUITABLE_STARTCL
ONE_SUITABLE_ENDPREFERRED_STARTPREFERRED_EN
DUSED_OFFSHORECLONE_STATUS_CODESOURCE_ENVI
RONMENT_SID_IDSOURCE_BACKUP_DATETARGET_ENVI
RONMENT_SID_IDTARGET_REPURPOSEREQUIRE_OBIEE_
CLONEASSIGNED_DBA_ACCOUNTSCHEDULED_BACKUP_
DATESCHEDULED_RESTORE_DATESCHEDULED_CLONE_
START_DATESCHEDULED_CLONE_END_DATEACTUAL_C
LONE_START_DATEACTUAL_CLONE_END_DATERESTOR
9. Sample Data
final project/FinalProject1.rtf
WRITTEN DOCUMENT
System Definition:
• Introduction – Include Company Name and objective of
company
• Scope and boundaries – Include its major application area
and user groups
Requirements Specifications:
• Data Requirements
List all tables and Relationships
Tables
Person
Field Name Data TypeSize
Account(PK) Short Text 8
Person_FName Short Text 25
Person_LName Short Text 25
Person_Email Short Text 25
Security_Group_Code(FK) Short Text 5
Team_Name_Code(FK) Short Text 5
Rev_Date Date Short Date
Rev_Session_ID Number Long Integer
10. Show the Database Relationships
• Transaction Requirements
Main Form
Introduce the Application
Eliminate Scroll Bars and Record Selectors
Person Form
Create Form called Person which will show current
person data
Use APPROPRIATE CONTROLS
Be sure to use Labels, Text Boxes, Combo Boxes,
CheckBox/Radio Buttons, Option Groups
Make sure users cannot change data in this form
Create a Combo Box that Searches for Records(Make sure the
combo box is synchronized to current record)
Use Conditional Formatting
Eliminate Scroll Bars and Record Selectors
Create Command Buttons First Next Last Previous
Enable/Disable Buttons where appropriate.
Person Add Form
Create an interface to Add new Person and Edit Person Data.
Make sure that the interface works correctly and that it is easy
for the user. Things to consider are: locking and unlocking
fields, cursor placement when tabbing through the fields,
correct inserting/editing data on the tables
Describe all Forms
11. Reports
Scheduled Requests
Describe all Reports
Application:
• Tables Generate tables with the appropriate attributes,
data types and key fields
• Relationships Make sure relationships are described
• Application Design
• User Interface
• Forms
• Reports
• Required in Access Application
• Tables
• Relationships between tables
• Good User Interface(Make sure system is easy to use)
12. • Minimum of 6 Forms
• Minimum of 3 Reports
• Minimum of 3 Queries
• Macros and Visual Basic Code should be used!
Your system will be evaluated from the perspective of the end
user. This means that you must carefully test your system to
ensure that the user cannot store invalid data, that adequate
messages are sent to the user, and that the user doesn’t get
“stuck” navigating through the application.
Design issues you should address:
· Ease of use and attractiveness of forms
· Ensuring accurate and complete data entry
· Avoiding “jargon.”
· Make the forms look and act consistently
· Use a uniform color scheme
Testing is VERY important. Make sure you go through enough
test situations with both valid and invalid data.
Each will be required to :
Hand in a written document with the above
requirements
The Access Application
13. final project/Notes1.docx
Form Design Guidelines
· Use forms to perform all database updates, because forms
provide better readability and control than do table and query
recordsets
· Determine the fields and record source needed for each form.
A form’s Record Source property specifies the table or query
that provides the fields for the form
· Group related fields and position them in a meaningful, logical
order
· If users will refer to a source document while working with
the form, design the form to match the source document closely
· Identify each field value with a label that names the field, and
align field values and labels for readability
· Size the width of each text box to fully display the values it
contains and also to provide a visual clue to users about the
length of those values
· Display calculated fields in a distinctive way, and prevent
users from changing and updating them
· Use default values, list boxes, and other form controls
whenever possible to reduce user errors by minimizing
keystrokes and limiting entries. A control is item, such as a
text box or command button, that you place on a form or report
· Use colors, fonts, and graphics sparingly to keep the form
uncluttered and to keep the focus on the data
· Use a consistent style for all forms in a database
14. Bound Form
Bound Control
Private Sub Command33_Click()
DoCmd.GoToRecord , , acNext
End Sub
Unbound Form Main
ToolBox Controls
Form Properties
F
15. Person_Add Form
Use a Combo Box for Security Group Code
· In the Controls group on the Design tab, make sure the Use
Control Wizards button is selected
· In the Controls group on the Design tab, click the combo box
button
· Place the combo box on the form
· Click I want the combo box to look up the values in a table or
query, click Next, Click the Table Security Code Reference and
then click Next
· Select Security Group Code and Short Desc click Next
· You can choose a sort order
· Click Next
Set the tab order for controls
16. When you use a form, you can switch between controls by
pressing the TAB key. You can specify the order in which the
controls on a form respond to the TAB key. On a well-designed
form, the controls respond to the TAB key in a logical order
· In the Navigation Pane, right-click the form and then click
Design View.
· On the Design tab, in the Tools group, click Tab Order.
The name of the Command Button
may be different. May have a different number
Clone Request Form to add new requests
Combo Box
17. · In the Controls group on the Design tab, make sure the Use
Control Wizards button is selected
· In the Controls group on the Design tab, click the combo box
button
· Place the combo box on the form
· Click I want the combo box to look up the values in a table or
query, click Next, Click the Table Person and then click Next
· Select Account, Person_Fname, Person_Lname and click Next
· You can choose a sort order
· Click Next
·
Click Next
Initialize the Clone_status_code to be set to ‘I’ Initiated by
setting the default property in the table
Clone Request Form For Inserts
Initialize the Clone_status_code to be set to ‘I’ Initiated by
setting the default property in the table
Enviornment_DB_Info
18. If Target Repurpose Is Yes…..Then Target Repurpose Details
form will be opened with the Repurpose_Database_id filled in
the the Target Source ID
Private Sub Command39_Click()
MsgBox
Forms![CLONE_REQUESTS_3]![TARGET_ENVIRONMENT_S
ID_ID]
DoCmd.OpenForm "Target_Repurpose_details", acNormal, , ,
acFormAdd
Forms![Target_Repurpose_details]![REPURPOSE_DATABASE
_ID] =
Forms![CLONE_REQUESTS_3]![TARGET_ENVIRONMENT_S
ID_ID]
Forms![Target_Repurpose_details]![CLONE_REQUEST_ID]
= Forms![CLONE_REQUESTS_3]![CLONE_REQUEST_ID]
End Sub
Target Repurpose Details Form…
Initialize the Repurpose Database Date to Date()
Clone Request Initiate Status to Scheduled Status
Create a Query Clone Status
SELECT CLONE_REQUESTS.CLONE_REQUEST_ID,
21. 1/clone_request_application_high_level_pro.docx
Project Objective
Develop a form based application that captures all the relevant
information in database tables regarding a clone request. Where
feasible, the necessary information will be driven by pick lists
and not manual entry. The new application will capture all
requests and provided the ability to enter clone dates or reject
the request. The application will also provide a mechanism to
enter the actual date the clone was completed and capture any
reasons for delay. There will be a reporting mechanism in the
application that will track SLAs and report on delays by
categories. The application must have functionality to copy an
existing clone request to a new request and allow the user to
modify all data prior to submitting the request. The application
must have the ability to search for past clone request by request
id, source id, target id, requested by name or date.
Current Clone Request Process
The current request process is to manually fill in a word
document template with necessary clone details and email to
responsible group. Once these paper requests are reviewed, a
clone schedule is developed and a calendar is published and
emailed to all interested parties. This is a very manual process
that requires additional man-hours and is not conducive to
proactive notifications. In addition, a manual form does not
validate for correct entries or ensure all necessary data is
captured
Definitions
Environments – A working area consisting of the E-Business
database and corresponding application software for a particular
defined objective. Examples of environments are production,
test, development, performance test and project development etc
Clone – A copy of the E-Business database and application
software to another environment that eliminates any references
from the original environment.
Source – The environment that will be utilized to start a clone
Target – The environment that the source will be copied into
22. and then modified
Masking – Altering or scrambling of data
OAM – Software that integrates with E-Business for Single Sign
on
OBIEE – Data Warehouse for E-Business
SLA – Service Level Agreement
final project/part 1/clone_request_form_examples.docx
Request Form – The main form utilized to enter all necessary
information for a clone. The majority of the entries are table
driven via lookups.
Pending Request Form – This form displays all requests that
have not been approved. It allows you to search for previously
requested clones regardless of the status. If you select on
request id, it will bring up the screen utilized to enter the clone
request. If you click on approve, then you will be prompted for
a password and go to the next screen.
23. Approval Screen – Top portion is the only section that has input
allowed. Enter the date and time the clone will start, the date
and time of the backup, the date and time of the database
restore, the date and time of when the clone should be released
to the application development groups, comments and who will
complete the clone. The other section of the form is display
only and displays data entered in the request form.
Approved Schedule – This form displays all approved clone
requests that have not been completed. It allows you to search
for other requests regardless of the status. The security button
also prompts for a different password and allows the security
team to enter those fields pertinent to security.
If request id is selected, this screen will display
Status Screen – Displays the status of all requests that are not
completed
24. Achieving clones SLA status screen does not currently exist and
is SQL queries into Excel.
final project/part 1/CloneDatabaseTables.xlsx
CLONE_REQUESTSCLONE_REQUEST_IDCLONE_STATUS_
CODECLONE_BUSINESS_REASONREQUESTING_ACCOUN
TCLONE_SUITABLE_STARTCLONE_SUITABLE_ENDPREF
ERRED_STARTPREFERRED_ENDUSED_OFFSHORESOURC
E_ENVIRONMENT_SID_IDSOURCE_BACKUP_DATETARGE
T_ENVIRONMENT_SID_IDTARGET_REPURPOSEREQUIRE_
OBIEE_CLONEASSIGNED_DBA_ACCOUNTSCHEDULED_B
ACKUP_DATESCHEDULED_RESTORE_DATESCHEDULED_
CLONE_START_DATESCHEDULED_CLONE_END_DATEAC
TUAL_CLONE_START_DATEACTUAL_CLONE_END_DATE
SERVICE_LEVEL_AGREEMENT_CODERESTORE_USERS_F
ROM_TARGETREV_DATEREV_SESSION_ID1ITestbok85264/
13/154/15/154/12/154/14/15TRUEfuxbs44/10/15fixbs6TRUEFA
LSEFALSE4/10/151AutoNumberShort Text 5Short Text
255Short Text 8DataDateDateDateYes/NoShort Text
15DateShort Text 15Yes/NoYes/NoShort Text
8DateDateDateDateDateDateShort Text 15Yes/NoDateNumber
Long Integer
CLONE_STATUS_REFERENCECLONE_STATUS_CODESHO
RT_DESCLONG_DESCREV_DATEREV_SESSION_IDAAppro
vedApproved4/10/151DDisapprovedDisapproved4/10/151IInitiat
edInitiated4/10/151Short Text 2 Short Text 255Short Test
255DateNumber Long Integer
PERSONACCOUNTPERSON_FNAMEPERSON_LNAMEPERS
ON_EMAILSECURITY_GROUP_CODETEAM_NAME_CODER
EV_DATEREV_SESSION_IDbok8526BarbaraKing[email protec
ted]M1A4/10/151Short Text 8Short Text 25Short Text 25Short
Text 25Short Text 5Short Text 5DateNumber Long Integer
SECURITY_GROUP_REFERENCESECURITY_GROUP_CODE
SHORT_DESCLONG_DESCREV_DATEREV_SESSION_IDL1
25. LowLow Security4/10/151M1MaximumMaximum
Security4/10/151M2MediumMedium Security4/10/151Short
Text 5Short Text 255Short Text 255DateNumber Long Integer
TEAM_REFERENCETEAM_NAME_CODESHORT_DESCLON
G_DESCREV_DATEREV_SESSION_IDATeam ATeam
A4/10/151BTeam BTeam B4/10/151CTeam CTeam
C4/10/151DTeam DTeam D4/10/151Short Text 5Short Text
255Short Text 255DateNumber Long Integer
ENVIRONMENT_DB_INFOENVIRONMENT_SID_IDSHORT_
DESCLONG_DESCENVIRONMENT_TYPE_CODEENVIRON
MENT_SECUREENVIRONMENT_MASKEDINTEGRATED_W
ITH_OAMRACREV_DATEREV_SESSION_IDfuxbs4Productio
nProduction 15.02
PT3PTRUEFALSETRUEFALSE4/10/151muxbs5StagingStaging
15.10STRUETRUEFALSETRUE4/10/151puxbs4ProductionProd
uction 15.02
PT2PTRUETRUETRUEFALSE4/10/151quxbs4ProductionProdu
ction 13.02 PT3PTRUEFALSETRUEFALSE4/10/151Short Text
8Short Text 255Short Text 255Short Text
5Yes/NoYes/NoYes/NoYes/NoDateNumber Long Integer
ENVIRONMENT_TYPE_REFERENCEENVIRONMENT_TYPE
_CODESHORT_DESCLONG_DESCREV_DATEREV_SESSION
_IDDDevelopmentDevelopment4/10/151PProductionProduction
4/10/151SStagingStaging4/10/151Short Text 5Short Text
255Short Text 255DateNumber Long Integer
TARGET_REPURPOSE_DETAILSREPURPOSE_DATABASE_I
DSERVER_NAMEENVIRONMENT_SHORT_DESCENVIRON
MENT_LONG_DESCENVIRONMENT_TYPE_CODEENVIRON
MENT_SECUREENVIRONMENT_MASKEDINTEGRATED_W
ITH_OAMURLRACSOA_REQUIREDOBIEE_REQUIREDTRA
NS_VOL_COMPARE_REF_CODEPROD_SIZE_COMPARE_RE
F_CODEPROD_USER_COMPARE_REF_CODEBACKUPSAPP
_TIERSVIZIYASTRREV_DATEREV_SESSION_IDfixbs6MINI
MiniMiniDTRUEFALSETRUEFALSEFALSETRUEFALSEFAL
SEFALSEFALSE4/10/151pixbs6MAXIMaxiMaxiDFALSETRUE
TRUEFALSEFALSEFALSEFALSEFALSEFALSEFALSE4/10/1
26. 51Short Text 15Short Text 255Short Text 255Short Text
255Short Text 5Yes/NoYes/NoYes/NoShort Text
255Yes/NoYes/noYes/noShort Text 5Short Text 5Short Text
5Yes/NoYes/NoYes/NoYes/NoDateNumber Long Integer
SERVICE_LEVEL_AGREEMENTSERVICE_LEVEL_AGREEM
ENT_CODESHORT_DESCLONG_DESCREV_DATEREV_SES
SION_IDCorpSLAcovers all Service Level Management (SLM)
issuescovers all Service Level Management (SLM)
issues4/10/151CustSLAagreement with an individual
customeragreement with an individual
customer4/10/151ServSLAagreement is for every customer
making use of the services being providedagreement is for every
customer making use of the services being
provided4/10/151Short Text 15Short Text 255Short Text
255DateNumber, Long Integer
RELATIONSHIPS
final project/part 1/Description.docx
I have received requirements for a Clone Request System for US
Steel. We will be working with the specifications that are given
by the user. I have included 2 documents that were provided by
the user:
· Clone Request High Level Details
· Clone Request Form Examples
I have laid out the tables and relationships that I believe are
accurate and included this in an Excel spreadsheet. The first
part of the project will be building the tables and relationships
in Access. Also I have provided one or two records for the
tables.
This part will be an Access Database for the Clone Request
System. You are required to hand in:
Access Database
Tables built in Design View with Correct Datatypes and
Primary Keys
Relationships Built with correct primary keys and Foreign Keys.
Enforce Referential Integrity.
27. Each Table will have at least 2 sample data records.
final project/part 1/How_To.docx
Create a New Access Database
Create-> Table Design
Enter Field Names and Data Types as Designed in the Excel
Spreadsheet
Make sure to indicate the primary key
This is an example
Put in Data Records as Indicated
To put in relationships
Database Tools -> Relationships
final project/Requirements.docx
Requirements:
28. 1. Show Person in Person Table
2. Add Person into Person Table
3. Start a New Clone Request
If Target Repurpose Answer is No Then Finished…Close From
If Target Repurpose Answer Is Yes Then Open a Target
Repurpose Details Form With the clone request filled in and the
Date filled in with current date
4. Schedule Clone Request-Show Requests that are in Initiated
Status and Allow Status to be set to Scheduled and Allow
Scheduled Start and End Dates to Be entered and Assign DBA
5. Close Clone Request-Show Requests that are in Scheduled
Status and Allows Status to be set to Completed and Allow
Completed Start and End Dates to be entered
6. Develop a Form to Allow Requests to be Voided.
Reports
1. Scheduled Requests
29. 2 and 3. Design Reports that you feel would be beneficial.
final project/US-Steel-Logo.jpg