This document provides a software requirements specification for Microsoft Word 2016. It includes an introduction, purpose, scope, definitions, and overview. Use cases are defined for signing in, opening, creating new files, saving, saving as, exporting, printing, and changing fonts. Requirements cover performance, usability, supportability, configurability, and recoverability. The 8 use cases are then described in more detail with normal and alternate flows and screenshots.
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxSANSKAR20
Evaluate a Health Website
Name Click here to enter text. Course Click here to enter text.Date Click here to enter text.
Pick one disease disorder or condition. Find two medicine-based websites that discuss it, such as WebMD, MedicineNet, the American Heart Association website, the American Diabetes Association website, and so on. Compare how the two websites you pick treat the subject. Then answer the following questions.
Question 1: What disease or condition did you pick?
Click here to enter text.
Question 2: What are the two websites you looked at?
1.
2.
Question 3: What differences did you find in how the two websites described the disease or condition?
Click here to enter text.
Question 4: Did one of the websites seem to be more reliable? If so, which, and why? If not, why not?
Click here to enter text.
Question 5: After reading the article, what three questions might a patient have about the condition that weren’t addressed?
1.
2.
3.
Page 1
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 20 ...
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxSANSKAR20
Evaluate a Health Website
Name Click here to enter text. Course Click here to enter text.Date Click here to enter text.
Pick one disease disorder or condition. Find two medicine-based websites that discuss it, such as WebMD, MedicineNet, the American Heart Association website, the American Diabetes Association website, and so on. Compare how the two websites you pick treat the subject. Then answer the following questions.
Question 1: What disease or condition did you pick?
Click here to enter text.
Question 2: What are the two websites you looked at?
1.
2.
Question 3: What differences did you find in how the two websites described the disease or condition?
Click here to enter text.
Question 4: Did one of the websites seem to be more reliable? If so, which, and why? If not, why not?
Click here to enter text.
Question 5: After reading the article, what three questions might a patient have about the condition that weren’t addressed?
1.
2.
3.
Page 1
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 20 ...
Control mouse and computer system using voice commandseSAT Journals
and Computer System Using Voice Commands”. It can be used to
operate the entire computer functions on the user’s voice commands. It makes use of the Speech Recognition technology that
allows the computer system to identify and recognize words spoken by a human using a microphone. This Software will be able to
recognize your spoken words and enable user to interact with his computer. This interaction includes user giving commands to his
computer which will then respond by performing several tasks, actions or operations depending on the commands you gave. It can
also help user to dictate and computer would convert their spoken words into text for word processing application or E-mail. For
Example: Opening /closing a file, starting an application, Mouse click or movement.
Keywords: Speech Technology, Voice Response System, Voice Commands, Human-Computer Verbal Interaction
From Use to User Interface- This 3-4 hour tutorial describes a practical approach to translating the goals users would like to achieve and the tasks they wish to accomplish into user interface designs that effectively support those goals and tasks.
What Is Software and Exploring Its Types A Comprehensive GuidePolyxer Systems
Software is a set of instructions, technically referred to as data, programs, procedures, routines, and instructions that tell the computer or electronic device to perform specific tasks and operations.
Assessment item 1 File Systems and Advanced Scripting .docxdavezstarr61655
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 200G.
3. uni2 with mount point /users/deleted& reservation of 100G.
4. uni3 with mount point /users/staff& reservation of 100G.
5. uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for how you will ensure the volumes
outlined above are provisioned whilst ensuring there data protection. Document this accordingly
along with a suitable rationale for your design.
Part 3: Implementing the Filesystem (4 marks)
Given the strategy defined in part two, your job is to implement the storage system.
1. To do this install the latest version of Ubuntu Server on a virtual machine. You will need to
ensure the networking is bridged and the root portioning is managed appropriately. You will
need to add additional virtual disks to meet the storage needs above.
2. Install the ZFS package and configure it such that pools of storage are created to meet the above
requirements including redundan.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Fixed: MS Word the File is Corrupted and Cannot be OpenedItworlds Worlds
Sometimes, some unavoidable problems will appear during using MS Word. Such as the suddenly corrupted or damaged. Why the Word document that has been used normally is suddenly damaged and can’t be opened? Is there any way to solve it? In this article, you can learn about the reasons for Microsoft Word document damage and learn how to solve the problem -- the file is corrupted and cannot be opened.
Milestones Navigating Late Childhood to AdolescenceFrom the m.docxjessiehampson
Milestones: Navigating Late Childhood to Adolescence
From the movie, Lila, Eight to Thirteen in this week's materials, identify 2–3 developmental milestones Lila reaches, and assess whether or not you think she successfully navigates her way through them as she prepares for adolescence. Support your assertions with evidence from your text and this week's materials.
.
Migration and RefugeesMany immigrants in the region flee persecu.docxjessiehampson
Migration and Refugees
Many immigrants in the region flee persecution and then return after they are liberated. For example, 700,000 Jews were allowed to leave the former Soviet Union and enter Israel in the 1990s. There has also been a migration of Palestinian people. Discuss the following:
Why do you think that Israel is such an important place for the Jews?
What is the importance of the area to the Palestinians?
What do you think the impact would be on you and your families if you participated in such long-distance migration?
No references needed, need response within 3 hours!
.
More Related Content
Similar to Microsoft Word Editing Version 1.0Software Requirement Speci.docx
Control mouse and computer system using voice commandseSAT Journals
and Computer System Using Voice Commands”. It can be used to
operate the entire computer functions on the user’s voice commands. It makes use of the Speech Recognition technology that
allows the computer system to identify and recognize words spoken by a human using a microphone. This Software will be able to
recognize your spoken words and enable user to interact with his computer. This interaction includes user giving commands to his
computer which will then respond by performing several tasks, actions or operations depending on the commands you gave. It can
also help user to dictate and computer would convert their spoken words into text for word processing application or E-mail. For
Example: Opening /closing a file, starting an application, Mouse click or movement.
Keywords: Speech Technology, Voice Response System, Voice Commands, Human-Computer Verbal Interaction
From Use to User Interface- This 3-4 hour tutorial describes a practical approach to translating the goals users would like to achieve and the tasks they wish to accomplish into user interface designs that effectively support those goals and tasks.
What Is Software and Exploring Its Types A Comprehensive GuidePolyxer Systems
Software is a set of instructions, technically referred to as data, programs, procedures, routines, and instructions that tell the computer or electronic device to perform specific tasks and operations.
Assessment item 1 File Systems and Advanced Scripting .docxdavezstarr61655
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 200G.
3. uni2 with mount point /users/deleted& reservation of 100G.
4. uni3 with mount point /users/staff& reservation of 100G.
5. uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for how you will ensure the volumes
outlined above are provisioned whilst ensuring there data protection. Document this accordingly
along with a suitable rationale for your design.
Part 3: Implementing the Filesystem (4 marks)
Given the strategy defined in part two, your job is to implement the storage system.
1. To do this install the latest version of Ubuntu Server on a virtual machine. You will need to
ensure the networking is bridged and the root portioning is managed appropriately. You will
need to add additional virtual disks to meet the storage needs above.
2. Install the ZFS package and configure it such that pools of storage are created to meet the above
requirements including redundan.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Fixed: MS Word the File is Corrupted and Cannot be OpenedItworlds Worlds
Sometimes, some unavoidable problems will appear during using MS Word. Such as the suddenly corrupted or damaged. Why the Word document that has been used normally is suddenly damaged and can’t be opened? Is there any way to solve it? In this article, you can learn about the reasons for Microsoft Word document damage and learn how to solve the problem -- the file is corrupted and cannot be opened.
Similar to Microsoft Word Editing Version 1.0Software Requirement Speci.docx (20)
Milestones Navigating Late Childhood to AdolescenceFrom the m.docxjessiehampson
Milestones: Navigating Late Childhood to Adolescence
From the movie, Lila, Eight to Thirteen in this week's materials, identify 2–3 developmental milestones Lila reaches, and assess whether or not you think she successfully navigates her way through them as she prepares for adolescence. Support your assertions with evidence from your text and this week's materials.
.
Migration and RefugeesMany immigrants in the region flee persecu.docxjessiehampson
Migration and Refugees
Many immigrants in the region flee persecution and then return after they are liberated. For example, 700,000 Jews were allowed to leave the former Soviet Union and enter Israel in the 1990s. There has also been a migration of Palestinian people. Discuss the following:
Why do you think that Israel is such an important place for the Jews?
What is the importance of the area to the Palestinians?
What do you think the impact would be on you and your families if you participated in such long-distance migration?
No references needed, need response within 3 hours!
.
Min-2 pagesThe goal is to develop a professional document, take .docxjessiehampson
Min-2 pages
The goal is to develop a professional document, take a stake in your company (its a t-shirt and apparel company; see attached) as a business owner, and develop a business plan with the aim of securing financing to expand one’s business for an established firm.
Complete the following: (using the business plan working document)
10.0 Financials Plan
*Annotated plan has additional details if you have questions or need explanation
.
Mingzhi Hu
First Paper
3/5/2020
POLS 203
Application of Realism Theory on Civil war in Syria and International Relations
International relation can be best understood through the various schools of thought or
rather theories. They are significant in giving a comprehensive detail of the constructs that make
international relations. Realism theory still remains one of the most influential tools in
understanding events related to international relations. This is because it provides a pragmatic
approach in examining current events in the sphere of international relations (Maghroori, pg. 17).
Realism is divided into three subdivisions, seeking to explain causes of state conflict. This
include classical realism that argues that the conflict comes from the nature of man, neorealist
which associates conflict the elements of the state, and neoclassical realism which associates it to
both human nature and elements of the state. This school of thought is grounded on some
fundamental principles that make the core of its arguments.
The first assumption in realism is the idea that a country, usually referred to as a state,
serves as the main actor in international relations. It acknowledges the fact that there are other
actors like individuals and organizations, which have limited influence (Maghroori 11).
Secondly, the state is considered a unitary player, which is expected to work harmoniously, with
regard to matters of national interest. In addition, realists believe that the people who make
decisions are rational players, since this rationality is required in pursuing the interest of the
nation. In essence, the leaders are believed to understand these assumptions regardless of their
Laci Hubbard-Mattix
90000004849605
But selfish
Laci Hubbard-Mattix
90000004849605
Laci Hubbard-Mattix
90000004849605
What do you mean by "work harmoniously"
Laci Hubbard-Mattix
90000004849605
It is not clear what this sentence means.
political position, so ensure their sustainability and continuity. Consequently, it is assumed that
states exist in an anarchy context, where there is no single international leader. In this
theorization, the role of nature in influencing human action is not ignored. It asserts that nature
influence people to continue acting in repetitive tendencies. In this assumption, it comes out that
people desire power because of the egoistic nature. The innate selfishness of human beings,
mistrust and their thirst for power explains the unpredicted consequences that can result from
their actions (Maghroori 20). Such human tendencies can explain the unending wars among
nations. Bearing the fact that nations are governed by human beings, their nature contributes
largely to their behavioral tendencies, which in turn influence its security.
Realist therefore assume that leaders have the responsibility to promote the security of
their country in all fronts. This can be realized through consta.
Miller, 1 Sarah Miller Professor Kristen Johnson C.docxjessiehampson
Miller, 1
Sarah Miller
Professor Kristen Johnson
CHID 230
2 April 2019
The Myth of Disability as Isolating in Tim Burton’s Edward Scissorhands
Jay Timothy Dolmage discusses the common disability myths that condition our
understanding of disability in his work Disability Rhetoric. He argues that these myths create the
perception that disabled people are “others”, through the portrayal of them as lesser, surplus, or
improper (Dolmage, 31). One of the myths that Dolmage examines is disability as isolating or
individualizing, which is perpetrated through narratives of disabled people living in isolation,
rarely having romantic relationships or friendships, and often being left alone at the end
(Dolmage, 43). This myth can be seen in the film Edward Scissorhands, directed by Tim Burton.
Edward is a human being created by an inventor, yet the inventor’s death before his completion
leaves him with scissor blades for hands. Edward lives in a gothic mansion atop a hill,
completely in isolation until local Avon saleswoman Peg Boggs visits. She is initially frightened
by his appearance, yet decides to take him home with her upon the realization that he is
harmless. Edward’s disability causes his transition into society to be largely unsuccessful, as he
is objectified and used by other people for their benefit, and at the end of the film he is forced to
return to living in isolation after their perception of him turns to one of fear and scorn.
Edward’s isolation from society is symbolically portrayed through many film design
techniques. The mansion in which he lives at the beginning and the end of the film starkly
contrasts the community in which the able-bodied society lives. The mansion is gothic, dark, and
partially in ruins, whereas the rest of the houses are brightly colored in pinks, yellows, and
Miller, 2
greens, all with perfectly manicured green lawns. His appearance also separates him from the
rest of society, as he has very pale skin, dark under-eyes, black untamed hair, and wears gothic
industrial clothes. The able-bodied individuals often wear colorful or light clothes and appear
quite “ordinary”. The contrast created between Edward and society through set, clothing,
makeup, and hair design work to portray Edward and his disability as unusual, creepy, and
“other”. Peg even attempts to “normalize” his appearance by giving him different clothes to wear
and attempting to cover his scars with makeup, in the hopes that it will ease his transition into the
community. This film phenomenon is discussed by Martin F. Norden in his book The Cinema of
Isolation: A History of Physical Disabilities in the Movies. He argues that filmmakers will
separate disabled characters from their able-bodied peers not only through the storyline, but also
through a number of design elements. He also states that this technique allows filmmakers to
reflect an able-bodied point of view and reduce d.
Migrating to the Cloud Please respond to the following1. .docxjessiehampson
"Migrating to the Cloud" Please respond to the following:
1. Imagine that you are a CIO and you have been tasked to examine the process of moving from one host server or storage location to another. Predict two foreseen challenges of migrating an application to the cloud in a live migration and high- availability setting. Propose a preventative measure or a solution for each of these challenges.
2. Imagine that you are the CIO for a midsized organization in this industry. Determine, in 10 or less steps, the timeline for a live migration to the cloud in your organization. Determine the three greatest risks in this deployment.
.
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get.docxjessiehampson
Mike, Ana, Tiffany, Josh and Annie are heading to the store to get some snacks. Mike has $1, Ana has $2, Tiffany has $3, Josh has $4, and Annie has $5.
What's the average (mean) amount of cash the five kids have? What's the median? A few days later, Annie's family won the lottery, and the kids go together to the store to get some snacks again. This time Mike has $1, Ana has $2, Tiffany has $3, Josh has $4, and Annie has wad of cash totaling $5,000.
What's the average (mean) amount of cash the five kids have this time? What's the median?
From part a, how have the mean and the median changed?
Which one - the mean or the median - is a better reflection of how much money they have together? Take you time before answering.
.
Michelle Wrote; There are several different reasons why an inter.docxjessiehampson
Michelle Wrote;
There are several different reasons why an intervention fails, such as the wrong intervention being selected or trying to solve the wrong problem. It is important that when performing and intervention that every thing have been severely observed and taken into consideration. I worked with an organization that was a travel agency, and they operated off of the commission that was collected from the booking that are processed, but they also provided a discount to the members that was taken out of the commission total. The issue was that when they initially opened the department there was no budget plan done and no guidelines were given, the agents were told to use discretion, and all though the department was a huge success in booking reservations they were still failing, because they were not withholding enough commission for the organization to operate under. Where the intervention process failed is that they never had formal training, which would have been a focus group to define the exact percentage to give to customer and the amount the organization needed to cover their overhead. During the meeting process there should have been definite guidelines to lead employees and managers from the accounting department so that the employees did not need to play the guessing game. Although they had the meeting nothing changed, because the problem was not solved with the employees and managers and was not addressed by the accounting department. The business is now in danger of folding because of the poor communication practices.
William Wrote:
Although what I am going to talk about is not my workplace but the place that I volunteer my time to sit on the board of directors for a non profit agency. As a board member we oversee the agency as a whole but we also break down into small committee groups to address needs as they arise. One of the committees that I am on is the planning committee. A change that was implemented by administration, program staff, and the board was all departments would start entering all their own data. At the time the agency had two data entry personal that was entering all agency data. So the change we made was that instead of hiring another data entry person we would require all programs to enter their own data into the collection software. This ended up being a failure that could have been huge had we not pulled reports the first two quarters of the year. What we found was some programs were right on target with getting their information entered with the first quarter. The Executive Director addressed this with staff. When the second quarter reports were pulled the data did not get any better. As an agency this failed due to program staff just did not have the appropriate time to take on more data entry. The agency ended up where we should have to start off, hiring another data entry staff member. I will say with this failure it actually turned into a very positive experience over all.
.
Midterm Lad Report 7
Midterm Lab Report
Introduction
Cellular respiration refers to all the metabolic processes and chemical reactions that take place in living organisms, particularly at the cellular level. These processes focus on the extraction of energy from nutrients. It is also responsible for converting the biochemical energy into 'adenosine triphosphate' (ATP) by the breakdown of sugars in the cells (Bennet 58). Cellular respiration is also responsible for the process by which cells release chemical energy required for conducting cellular activities. The reactions and processes facilitate the release of waste products from the cells. This experiment seeks to conduct a study of the processes and reactions involved during cellular respiration. The experiment will include several activities, such as having a study on the amount of Carbon dioxide produced during the experiment.
The number of levels of the growth of a yeast medium as a dependent variable will also be monitored during the experiment. There are other several independent variables associated with the experiment. These independent variables include sugar and temperature, among others, and their role in the experiment were also monitored. The experiment design involved the use of airtight balloons capped over reaction chambers that were used to collect the Carbon dioxide produced during the experiment. The reaction chambers contained sugars and yeast medium, which facilitated the reactions. Thermometers and pH scale were used to monitor the changes in temperature and acidity levels during the experiment. The paper involves a lab design that institute steps such as arranging the bottles used on the experiment. Notably, a proper arrangement to make sure that all the carbon dioxide released during the respiration process is well tapped in the bottles for correct lab results
Methodology
The actual procedure for experimenting involved taking measurements and recording of all observations made during the experiment. For accurate results, measures were taken three times, and a mean measurement was calculated and recorded. Winzler asserts that the mean obtained from the measurements should be used to calculate the standard deviation, which in turn facilitated the calculation of uncertainty (276). Below are the steps for conducting the experiment. It is essential to read the instructions carefully safety and accuracy during the experiment. Notably, all the lab and experiment results were well observed and thus making sure that there are limited errors in the whole process.
Consequently, all the steps required in the lab report were also clearly followed to help in getting the correct data and even not to affect the whole experiment process. The experiment involved setting the apparatus as per the set standard and the requirement. As per this concept, all the apparatus were set in a proper way to avoid vague results. Notably, to get the correct measurement and results, it is import.
MicroEssay Identify a behavioral tendency that you believe.docxjessiehampson
MicroEssay
Identify a behavioral tendency that you believe you have inherited (one that is determined, at least in part, by your genetic make-up). Explain the ways you think this trait has been affected by your environment by applying the different types of gene x environment correlations to your example (passive, evocative, and active)? What does this suggest about the nature-nurture debate?
.
MILNETVisionMILNETs vision is to leverage the diverse mili.docxjessiehampson
MILNET
Vision
MILNETs vision is to leverage the diverse military experience of Crawford employees to create awareness opportunities that help forester an appreciation, understand, and respect for the military culture and members we serve
Benefits
· Know our Members
· Support recruiting and retention
· Facilitate transition from military to Crawford
· Centralized source to connect with peer veterans
· Provide Member Experience, Marketing, and other Crawford initiatives and expert knowledge base.
MILNET Leadership Team (Volunteer position)
· Event & Volunteer Lead- Plan and execute mandatory enterprise events
· Technology Lead- Maintain MILNET budget throughout the year and reports overview or expenses monthly
· MILNET Spouse Lead- Ensures connect of sites are up to date/accurate, to include Veteran/Military Spouse Registration
· Secretary-Manages relationships by identifying opportunism for partnership
· Communications/Marketing Lead- Communicates to the MILNET community regularly via multiple channels (Email, Internal Social) regarding upcoming events, announcement, and other communications.
Background
Grandfather Air force
Parents- Army
Myself- Army
Spouse Army
Skills
Knowledgeable
Passionate
Qualified
Education
-Associates Accounting
-Bachelor’s in business and HR
-MRA w/ HR concentration
1 – Paragraph for each question (Professional answers)
Question 1- What is your visions of MILNET?
Question 2-How would your selection impact the Leadership Team?
.
midtermAnswer all question with proper number atleast 1 and half.docxjessiehampson
midterm
Answer all question with proper number atleast 1 and half page
APA FORMAT SIZE 12
1. Why is culture important to political scientists?
2. How is political science an interdisciplinary major?
3. How can politics be treated as a science?
4. Describe how modern liberalism differs from classical liberalism and explain how modern conservatism related to classical liberalism?
5. Explain how nationalism can be dangerous to a nation. Use both theoretical ideas and concrete examples to support your claims
6.
Evaluate the "end of ideology" argument by considering the facts that fit and contradict this view on today's world
7. What are the means by which power is institutionalized? What makes for good institutions? Provide examples from the United States and one other country
8. Identify the purposes of constitutions and explain why they are necessary
9. Describe how the principle of separation of powers is manifested in the U.S. Constitution and explain how this principle has evolved over time in the United States.
10. Bonus Question: What are the 10 Bill of Rights
.
Midterm QuestionIs the movement towards human security a true .docxjessiehampson
Midterm Question
Is the movement towards human security a true paradigm shift? In answering this question make sure to consider which of the authors whom you have read in Weeks one to four of the course support your view and which do not. *The sole use of attached readings is required for the midterm*
Midterm Assignment – Instructions (Read Carefully)
In university courses, assignments (or assessments) are meant to give students the opportunity to demonstrate what they have been learning in the course – and give instructors evidence that such learning is occurring within the classroom. Because of these objectives, it is imperative to incorporate the specifics of what you’ve been studying in the course into your writing assignments. You accomplish this by answering the Midterm question in the assessment via the course objectives and readings from the course. The midterm will cover the following objectives:
1. Describe the role of rapid globalization in changing perceptions of security
2. Identify key threats to human security (food security, personal security, environmental security)
3. Apply the concepts of human security
4. Compare and contrast traditional international relations approaches to security with the doctrine of human security.
Additional Instructions
To answer the Midterm question you will write an analytical essay. The analytical essay is a practical approach to solving a problem. So think of this essay question as you would an assignment from your boss: “I need you to take a look at this problem and solve it for me using things from your IR toolkit (what you have learned, or know). Present a well-written, concise answer to me in four pages. I need it by tomorrow morning.” This is how it happens in the real world, and this is what we want to prepare you to do. To achieve this structure of the essay please keep the following tips in mind:
1. Remember that the analytical essay is highly-structured. Each paragraph should look like the others in terms of style and substance. Writing to the limit of four pages is an art and something you need to learn to do. So, don’t write fewer than four pages and don’t write more. You may need to write over just a little and then edit away the extra parts of the essay to reach the concise four pages.
2. Review your submission and make sure that you have covered the requirements of the assignment using only material from the lessons and readings.
Format for the Essay:
1. Do not use a cover page. Instead, create a header with your name, assignment name, and date. To do this in Word, go to “insert” and then “header.” Do the same thing to insert a ‘footer’ and include page numbers. If you need help, use the ‘help’ function to learn more within Word.
2. Your submission should be four pages (no more, no less) and look like this:
a. Introduction: Introduce your topic & include a thesis. To help you set up your analytical essay include three reasons why you agree or disagree with the midterm quest.
MGT/526 v1
Wk 2 – Apply: Organizational Analysis
MGT/526 v1
Page 2 of 2
Wk 2 – Apply: Organizational AnalysisInstructions
Complete the worksheet based on your chosen organization. Use Business Source Complete and your selected company’s website, annual report, and other available sources. Part 1: Organization Information
Organization
Define your chosen company and its industry.
Mission and Vision
Identify the mission and vision of the organization.
Mission
Vision
Organizational Initiatives
Outline 1-2 major initiative for this organization. What are they currently doing to support these initiatives?
Organizational Plans
Describe the plans employed by the organization. Determine which types of managers create each type of plan.
Type of Plan
Description
Type of Manager
SWOT Analysis
There are various factors within the external environment of an organization that impacts its strategy.
Analyze the organization’s SWOT analysis. Identify the internal and external factors. Include a link to the SWOT analysis in the Reference section of this worksheet.
Internal Factors
External Factors
Part 2: Evaluation
Evaluate if the mission, vision, planning process, and SWOT analysis meets the current needs of the organization. Include the following in your evaluation:
· Describe the unmet need, (not limited to product or service, can be new demographic, new mode of delivery, etc.).
· Analyze your competitive advantages.
· Based upon the SWOT analysis, is there another business that is doing something similar that can be referred to? Provide examples.
· If there is not another business, describe how what you’re doing is a unique product or service offering.
· Propose a competitive business initiative to address the unmet need.
· Create a high-level timeline and operational steps necessary to implement your solution. References
Include a link to theSWOT analysis.
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
COUN 6785: Social Change in Action:
Prevention, Consultation, and Advocacy
Social Change Portfolio
M. Negrón
Contents
Introduction
Scope and Consequences
Social-ecological Model
Theories of Prevention
Diversity and Ethical Considerations
Advocacy
INTRODUCTIONAdressing Teen Pregnancy in Pittsburg, California
In more recent years, there has been an effort in my community to address teen pregnancy due to its growing rates. Over the years teen pregnancy rates have continued to rise in Contra Costa County as well as surrounding counties. Unfortanately, the town I come from is a small town within Contra Costa County so resources are limited. In order to address teen pregnancy there needs to be easier access to resources to prevent teen pregnancy from occurring. Teen pregnancy can lead to a number of different problems such as low socioeconomic status, greater chance of contracting a sexually transmitted infec.
Microsoft Windows implements access controls by allowing organiz.docxjessiehampson
Microsoft Windows implements access controls by allowing organizations to define users, groups, and object DACLs that support their environment. Organizations define the rules, and Windows enables those rules to be enforced.
Answer the following question(s):
Do you think access controls are implemented differently in a government agency versus a typical information technology company? Why or why not?
2. Do you think access controls differ among private industries, such as retail, banking, and manufacturing? Why or why not?
.
MGT520
Critical Thinking Writing Rubric - Module 10
Exceeds
Expectation
Meets Expectation Below Expectation Limited Evidence
Content, Research, and Analysis
21-25 Points 16-20 Points 11-15 Points 6-10 Points
Requirements Exceeds
Expectation -
Includes all of the
required
components as
specified in the
assignment.
Meets Expectation-
Includes most of
the required
components as
specified in the
assignment.
Below Expectation-
Includes some of
the required
components as
specified in the
assignment.
Limited Evidence -
Includes few of the
required
components as
specified in the
assignment.
21-25 Points 16-20 Points 11-15 Points 6-10 Points
Content Exceeds
Expectation -
Demonstrates
substantial and
extensive
knowledge of the
materials, with no
errors or major
omissions.
Meets Expectation-
Demonstrates
adequate
knowledge of the
materials; may
include some
minor errors or
omissions.
Below Expectation-
Demonstrates fair
knowledge of the
materials and/or
includes some
major errors or
omissions.
Limited Evidence -
Fails to
demonstrate
knowledge of the
materials and/or
includes many
major errors or
omissions.
25-30 Points 19-24 Points 13-18 Points 7-12 Points
Analysis Exceeds
Expectation -
Provides strong
thought, insight,
and analysis of
performance
management
system, concepts
and applications.
Meets Expectation-
Provides adequate
thought, insight,
and analysis of
performance
management
system, concepts
and applications.
Below Expectation-
Provides poor
thought, insight,
and analysis of
performance
management
system, concepts
and applications.
Limited Evidence -
Provides little or no
thought, insight,
and analysis of
performance
management
system, concepts
and applications.
13-15 Points 10-12 Points 7-9 Points 4-6 Points
Sources Exceeds
Expectation -
Sources go above
and beyond
required criteria,
and are well
chosen to provide
effective
substance and
perspectives on
the issue under
examination.
Meets Expectation-
Sources meet
required criteria
and are adequately
chosen to provide
substance and
perspectives on the
issue under
examination.
Below Expectation-
Sources meet
required criteria,
but are poorly
chosen to provide
substance and
perspectives on the
issue under
examination.
Limited Evidence -
Source selection
and integration of
knowledge from
the course is
clearly deficient.
Mechanics and Writing
5 Points 4 Points 3 Points 1-2 Points
Demonstrates Exceeds Meets Expectation- Below Expectation- Limited Evidence -
MGT520
Critical Thinking Writing Rubric - Module 10
college-level
proficiency in
organization,
grammar and
style.
Expectation -
Project is clearly
organized, well
written, and in
proper format as
outlined in the
assignment. Strong
sentence and
paragraph
structure; contains
no errors in
grammar, spelling,
APA style, or APA
citations and
references..
Midterm PaperThe Midterm Paper is worth 100 points. It will .docxjessiehampson
Midterm Paper
The Midterm Paper is worth 100 points. It will consist of a 500 word written description and analysis of a work of art using terminology from Chapters 2-5.
For this assignment, you are to discuss the form, content, and subject matter of a work of art chosen from the list provided. This is an exercise in recognizing visual elements and principles of design in works of art and demonstrating an understanding of how they relate to each other to create meaning. This paper is about looking and seeing. This is not a research paper; you will not need to do additional research. Please follow the outline provided below.
First: Select a work of art
Select one of the following listed works of art:
Circle of Diego Quispe Tito.
The Virgin of Carmel Saving Souls in Purgatory
. Late 17th century. Fig. 1.22, pg. 17.
Henri Matisse.
Large Reclining Nude
. 1935. Fig. 4.24, pg. 85.
Faith Ringgold.
Tar Beach
. 1988. Fig. 13.18, pg. 219.
Henry Ossawa Tanner.
The Banjo Lesson
. 1893. Fig. 21.15, pg. 373
Andy Warhol.
Marilyn Diptych
. 1962. Fig. 24.23, pg. 447.
Format
Describe the use of each visual element and principle of design in the order they are listed in the outline. You can simply list each term and address how it is used in the painting. If you write in paragraph form be sure to identify each term clearly. Any term not addressed will receive 0 points. Provide specific examples. For example, don’t just say “there are lines,” give specific examples of how line is used in the piece you’ve selected.
Papers should be 500 words minimum (not including images), double-spaced, 10 or 12 point, with 1" margins. The preferred format is Microsoft Word (.doc or .docx). If these formats are not available, other acceptable formats are ASCII (.txt), rich text format (.rtf), Open Office (.odt), and PDF. Make sure you proofread your papers for incorrect grammar, spelling, punctuation, and other errors.
The Midterm Paper is due at 11:59 pm CT Sunday of Week 4.
Midterm Paper Outline
Introduction (First Paragraph)
In the first paragraph, called the introduction, you will include:
An identification of the work of art you selected: The name of the artist, title (which is underlined or italicized every time you use the title in your paper), date, and medium.
Your initial interpretation of the subject based on your initial observations.
Description
Describe how each of the following is used in the piece you selected.
Visual Elements
:
Line: what types of lines do you see in the piece? Provide examples.
Shape: what types of shapes do you see? Provide examples.
Mass: How is mass implied?
Space: How is the illusion of space created in the piece?
Time and Motion: Are time and motion evident in tis piece? How so?
Light: How is light used here?
Color: How does the artist use color?
Texture: How does the artist create the illusion of texture, or incorporate actual texture
Principles of Design
Unity and Variety: In what way is this pi.
Miami Florida is considered ground zero for climate change, in parti.docxjessiehampson
Miami Florida is considered ground zero for climate change, in particular rising seas will not only drown coastal sections of the city but will disrupt our local supply of drinking water.
Based on what you have learned so far from this class, discuss the following:
Explain where the drinking water from South Florida primarily comes from and why would rising sea levels disrupt this supply?
What efforts can be made and are being made to mitigate the effects of rising seas on our drinking water?
If you were a local politician, what advice would you give to state and federal officials on the best way to ensure residents in South Florida had a steady supply of drinking water for many years to come?
.
MGT230 v6Nordstrom Case Study AnalysisMGT230 v6Page 2 of 2.docxjessiehampson
MGT/230 v6
Nordstrom Case Study Analysis
MGT/230 v6
Page 2 of 2
Nordstrom Case Study Analysis
Nordstrom—“High Touch” with “High Tech”
How does Nordstrom stay profitable despite dips in consumer spending, changing fashion trends, and intense competition among retailers? One answer: Acute attention to detail and well-laid plans.
All in the Family
The fourth generation of family members that runs Nordstrom has brought the store’s time-honored and successful retail practices into a new era. “Nordstrom, it seems, is that rarity in American business: an enterprise run by a founding family that hasn’t wrecked it,” says one business writer. The company provides a quality customer experience via personalized service, a compelling merchandise offering, a pleasant shopping environment, and increasingly better management of its inventory.
Secret of Success
The secret of this company’s success lies in its strategic planning efforts and the ability of its management team to set broad, comprehensive, and longer-term action directions, all of which are focused on the customer experience. The current generation of Nordstrom family members was quick to spearhead an ultramodern multimillion-dollar, Web-based inventory management system. This upgrade helped the company meet two key goals: (1) correlate purchasing with demand to keep inventory as lean as possible, and (2) give customers and sales associates a comprehensive view of Nordstrom’s entire inventory, including every store and warehouse.
Demand Planning
Instead of relying on one-day sales, coupon blitzes, or marking down entire lines of product, Nordstrom discounts only certain items. “Markdown optimization” software assists in planning more profitable sale prices. According to retail analyst, Patricia Edwards, this helps Nordstrom calculate what will sell better at different discounts and forecast which single items should be marked down. If a style is no longer in demand, the company can ship it off to its Nordstrom Rack outlet stores. It’s all part of Nordstrom’s long-term investment in efficiency. “If we can identify what is not performing and move it out to bring in fresh merchandise,” says Pete Nordstrom, “that’s a decision we want to make.”
Inventory Planning
Although inventory naturally fluctuates, Nordstrom associates can easily locate any item in another store or verify when it will return to stock. Customers on their smart phones and associates behind sales counters see the same thing—the entire inventory of Nordstrom’s stores is presented as one selection, which the company refers to as perpetual inventory. “Customer service is not just a friendly, helpful, knowledgeable salesperson helping you buy something,” says Robert Spector, retail expert and author of The Nordstrom Way. “Part of customer service is having the right item at the right size at the right price at the right time. And that’s something perpetual inventory will help with.”
The upgraded inventory management system was an .
MGT 550 Final Project Guidelines and Rubric Overview .docxjessiehampson
MGT 550 Final Project Guidelines and Rubric
Overview
The final project for this course is the creation of a strategic communication case study.
Effective communication skills are critical to success in almost all managerial positions. Several challenges exist surrounding the creation and implementation of
effective communications both internally (inside organizations between individuals and groups) and externally (outside organizations with markets, partners,
and other third parties). Technology, change, and the various needs of stakeholders are just a few of the concerns that impact business communications. This
course is designed to help you communicate effectively in a variety of business settings with both internal and external stakeholders. Effective communication is
a necessary tool for managing people and organizations.
In this project, you will enhance your skills and knowledge of techniques in various communications to lead change, develop and maintain relationships, and
address sources of conflict through effective communications tied to organizational goals and core visions. Through the development of a strategic
communication case study, you will gain comprehensive, hands-on experience in evaluating and constructing communications that inform, persuade, and
influence intended audiences in order to achieve strategic goals. Using the provided case study, you will identify issues that must be addressed from an
organizational perspective. Additionally, you will make informed decisions regarding what actions to take, paying particular attention to appropriateness of
communications and mediums, as well as evaluating effectiveness. To access the final project case study, “Research in Motion: Sincerely, a RIM Employee (A),”
refer to the MGT-550 Textbook/Case Study Bundle mentioned in the syllabus.
The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final
submissions. These milestones will be submitted in Modules Three, Five, and Seven. The final product will be submitted in Module Nine.
In this assignment, you will demonstrate your mastery of the following course outcomes:
Differentiate appropriate communication strategies that address a variety of audiences
Generate clear communication materials that promote strategic goals
Develop communications using change management principles for supporting employee development
Determine strategies to assess the reception of communication for informing appropriate next steps
Analyze sources of conflict for determining appropriate communication response techniques for internal and external stakeholders
Prompt
Your strategic communication case study should answer the following prompt: What messages should be communicated in response to the presented issue,
who are the target audiences of the messages, and how will the messages be delivered? Additi.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Overview on Edible Vaccine: Pros & Cons with Mechanism
Microsoft Word Editing Version 1.0Software Requirement Speci.docx
1. Microsoft Word Editing
Version: 1.0
Software Requirement Specification
Date: 7/3/2020
YLLC-001
Yohammed LLCSoftware Requirements SpecificationFor
Microsoft WORD
Version 2016
3. 1.2 Scope 5
1.3 Definitions, Acronyms, Abbreviations 5
1.4 References 5
1.5 Overview 6
2. Overall Description 6
2.1 Use-Case Model Survey 6
2.1.1Sign in 6
2.1.2Open 6
2.1.3New 7
2.1.4Save 7
2.1.5Save As 7
2.1.6Export 7
2.1.7Print 7
2.1.8Change Font 7
2.1.9Use case Diagram: 7
2.2 Assumptions and Dependencies 7
3. Specific Requirements 7
3.1 Use-Case Reports 8
3.1.1Sign in 8
3.1.2Open: 9
3.1.3New: 10
3.1.4Save: 11
3.1.5Save As: 12
3.1.6Export: 13
3.1.7Print: 14
3.1.8Change Font: 15
3.2 Supplementary Requirements 16
3.2.1Performance: 16
3.2.2Usability: 16
3.2.3Supportability: 16
3.2.4Configurability: 16
3.2.5Recoverability:16
Software Requirements SpecificationIntroduction
Microsoft Word is a word processor created by Microsoft. It
4. was first discharged on October 25, 1983, under the name
Multi-Tool Word for Xenix frameworks. Microsoft Word 2016
was released in the year 2016. The Microsoft Word application
location was made to facilitate its users in ways where they
could document things, save them on their hard drives or online,
and even print them. With a wide range of scopes, any type of
document such as assignments, reports, proposals, brochures,
memorandums, etc. can be made on created through MS Word.
When the file is saved, a .docx extension file is made and saved
on the system. Even though MS Word is a very helpful
application location, it still has its drawbacks. One of them is
due to the presence of too many options. A novice user may feel
overwhelmed with the number of features that can be executed
through this software.Purpose
The purpose of the Microsoft Word application location is to
document i.e. write any type of document such as assignments,
quizzes, reports, etc. This does not mean that you can only write
something on the word. You can also use tools to make your
document look better such as using different layouts, different
shapes, adding pictures and tables, etc. Thus, word lets you
make a document and edit it. There are no critical bugs and the
defect rate of MS Word is zero. The learning time for an
average user is 30 to 60 minutes. Scope
The project aims to efficiently document your need for both,
your professional or personal life. The focus of this application
location is to provide help for the user to inscribe a document in
a multitude of formats. This will provide more options and
facilitate the user with different modules so the document can
always look professional. Definitions, Acronyms, Abbreviations
Following are the abbreviations in the document:
· MS: Microsoft
· SRS: Software Requirement Specification
· RAM: Random Access MemoryReferences
Reference for this document:
https://en.wikipedia.org/wiki/Microsoft_Word(Wikipedia, n.d.)
5. “SRS Use Case Template”. (n.d.). UMGC. Retrieved on March
10, 2020, from
https://learn.umuc.edu/d2l/le/content/444081/viewContent/1697
1639/View
Wyatt, A. (n.d.). Scope of Word Options. Retrieved March 10,
2020, from
https://word.tips.net/T000326_Scope_of_Word_Options.html
Microsoft Word 2016 Features, Tips, and Tricks: Microsoft
Office 2016. (2018, February 14). Retrieved March 10, 2020,
from https://www.spadetechnology.com/microsoft-word-2016/
Microsoft Word. (2020, February 27). Retrieved March 10,
2020, from
https://en.wikipedia.org/wiki/Microsoft_WordOverview
The remaining SRS document has the description, the use cases
model survey, and requirements related to the application
location.Overall Description
One of the factors affecting the product is the operating system
on your system. Even though word runs on almost every
operating system it still has some features minus or added when
used in operating systems like Linux or Unix. MS Word is an
application used for documentation. The key ability of the
product is to enter and format text. It can save and print
documents. It has themes and styles for making your document
look professional. It also provides an automatic table of
contents function, so now you do not have to type each content
yourself. Similarly, there are many other features of the
product. Use-Case Model Survey
There will be 8 Use cases presented in this document. There’ll
be one actor using this product;
· Non-corporate User: A novice user who does not go through
any incorporation process.
The list of use cases is as follows:
Sign in
The Sign-in use case allows you to sign in to your Microsoft
6. account and obtain the privileges that Microsoft provides a
registered account
Open
The Open use case allows you to open a file already saved on
your hard drive. The file should be a Microsoft Word “.dox”
extension file. Otherwise, Microsoft Word won’t read it.
New
The New use case allows you to create a new file. You can then
work and save the file on your system.
Save
The Save use case will allow you to save your edited or new
files. Upon saving the file will be updated, if already present
and saved if not, in the system.
Save As
The Save As use case will allow your previously saved
document to save again with a new name or a new extension i.e.
.txt, .csv etc.
Export
The Export use case will allow the user to export the document
either in PDF or XPS format. Through the export option, you
can also change the document type.
Print
The Print use case will allow the user to print the document,
provided a printer is connected to your system.
Change Font
The Change Font use case allows you to change the font of the
document.
7. Use case Diagram:
Assumptions and Dependencies
For the successful usage of the product, the assumptions taken
is that it runs on all operating systems. The user knows the
basics of writing documents i.e. he knows how to read and
write.
Specific Requirements
· The user should have an operating system installed on his
system.
· The processor speed of your system should at least be 1 GHz.
· Microsoft word can run on basic 1 GB RAM easily.
· The system should also have a storage unit to save the
documented word file.
· The document should be named before it is saved.
· To save a file. It should at least have a character on it. An
empty word file cannot be saved.
8. Use-Case Reports
Sign in
Use Case ID:
UC-1
Use Case Name:
Sign in
Actor:
Non-Corporate User
Description:
Users are allowed to sign in to their Microsoft account.
Level:
Medium
Trigger:
When the user opens the word application.
Normal Flow:
1- The user is going to open the application present on the
desktop.
2- The application will open and provide the user with a menu.
Comment by Sheldon Linker: Throughout, this is not a
proper name, so it should not be capitalized. Comment by
Allibalogun, Mohammed (ctr): Modified all application to not
be capitalized
3- The user will select a new document or an existing document.
Comment by Sheldon Linker: Note that #1 is a descriptive
sentence in the 3rd person, and #3 is an imperative in the
9. implied 2nd person. All of these should be descriptive
sentences, from here on down. Comment by Allibalogun,
Mohammed (ctr) [2]: Corrected the issue
4- At the top right of your screen, there is a “Sign in” label.
5- Click that label.
6- A small window will open which will ask the user about your
information to log in.
7- User will enter an email in the text field asking the email.
8- User enters password in the text field asking the password.
9- User click the “Sign in” button to sign in to his/her Microsoft
account.
10- The system will log the user into the Microsoft account.
Exception:
The system will go back to the “home” menu. Comment by
Sheldon Linker: Why and how is this an exception? That's not
at all clear. Rather than list "Exception", when required, show
an alternate flow. Make this change from here to the end of the
document.Comment by Allibalogun, Mohammed (ctr): I don’t
quite understand what other option could there be.
Postconditions:
The user is logged in.
Screenshot
Open:
Use Case ID:
UC-2
Use Case Name:
Open
Actor:
Non-Corporate User
Description:
10. Users are allowed to open an existing file.
Level:
Medium
Trigger:
When the user clicks the “Open” label.
Pre-conditions:
User should have opened MS Word.
Normal Flow:
1- The user is going to open the application present on the
desktop.
2- The application will open and provide the user with a menu.
3- One of the labels on the menu will be the “Open” label.
4- User will click that label.
5- The system will ask the user to select the file the user wants
to open.
6- The user selects the file.
7- User clicks the “open” button.
8- The system will open the file on Microsoft Word.
Postconditions:
The file is opened.
Assumptions:
The file already exists on the system.
Screen capture
New:
11. Use Case ID:
UC-3
Use Case Name:
New
Actor:
Non-Corporate User
Description:
Users are allowed to open a new file.
Level:
High
Trigger:
When the user clicks the “New” label.
Pre-conditions:
User should have opened MS Word.
Normal Flow:
1- The user is going to open the application present on the
desktop.
2- The application will open and provide the user with a menu.
3- One of the labels on the menu will be the “New” label.
4- User clicks that label.
5- The system will make a new file for the user.
Postconditions:
A new file is opened. Comment by Sheldon Linker: These
blocks are short enough that they should not be spanning page
boundaries. Have the new page start at §3.1.3. Do this
throughout the document. Comment by Allibalogun, Mohammed
(ctr): Ensure all Use cases start in a new page
Screen Capture
12. Save:
Use Case ID:
UC-4
Use Case Name:
Save
Actor:
Non-Corporate User
Description:
Users are allowed to save a file.
Level:
High
Trigger:
When the user clicks the “Save” label.
Pre-conditions:
User should have opened MS Word.
Assumptions:
A document is opened.
Normal Flow:
1- User clicks the “File” label.
2- The system will show the user a Menu.
3- One of the labels on the menu will be the “Save” label
4- User clicks that label.
5- The application will ask the user where to save the file.
6- User specifies the location.
7- User clicks the “save” button.
Post conditions:
13. The file is saved.
Screenshot
Save As:
Use Case ID:
UC-5
Use Case Name:
Save As
Actor:
Non-Corporate User
Description:
Users are allowed to save a pre-existing file as a new file.
Level:
Medium
Trigger:
When the user clicks the “Save As” label.
Pre-conditions:
User should have opened MS Word.
Includes:
Save
Assumptions:
The file is already saved.
Normal Flow:
1- User edits the document.
2- User clicks the “File” label and open the menu.
3- One of the labels on the menu will be the “Save As” label.
4- User clicks that label.
5- The application will ask the user where to save the file and
14. what name it should have.
6- User specifies the location and name.
7- User clicks the “save” button.
Postconditions:
The file is saved as a new file.
Screen Capture
Export:
Use Case ID:
UC-6
Use Case Name:
Export
Actor:
Non-Corporate User
Description:
Users are allowed to export the document.
Level:
Medium
Trigger:
When the user clicks the “Export” label
Pre-conditions:
1- User should have opened MS Word.
2- A file should be saved before it is exported.
Includes:
Save
Assumptions:
1- User is on the “Home” menu.
2- File is already saved.
Normal Flow:
1- User clicks the “File” label and open the menu.
2- One of the labels on the menu will be the “Export” label.
3- User clicks that label.
4- The user will have the option to either export the file as PDF
15. or XPS.
5- User chooses one format.
6- User clicks the “export” button.
Postconditions:
The file is exported.
Screen Capture
Print:
Use Case ID:
UC-7
Use Case Name:
Print
Actor:
Non-Corporate User
Description:
Users are allowed to print the document.
Level:
Medium
Trigger:
When the user clicks the “Print” label.
Pre-conditions:
1- User should have opened MS Word
2- A file should be saved before it is printed
Includes:
Save
Assumptions:
1- The printer is attached to the system.
2- Document is already saved.
3- The user is on the “Home” menu.
Normal Flow:
1- User clicks the “File” label and open the menu.
2- One of the labels on the menu will be the “Print” label.
3- User clicks that label.
16. 4- The user will have the option to select the way he wants to
print the file.
5- User selects those options.
6- User clicks the “print” button.
Postconditions:
The file is printed.
Screen Capture
Change Font:
Use Case ID:
UC-8
Use Case Name:
Change Font
Actor:
Non-Corporate User
Description:
Users are allowed to change the font of the text in the
document.
Level:
Low
Trigger:
When the user selects the change font area in the “home” panel.
Pre-conditions:
User should have opened MS Word.
Includes:
New
Assumptions:
A document is already opened.
Normal Flow:
1- User selects the home panel from the navigation bar.
2- The user will see a font changing drop-down menu.
3- User selects it and choose a font of his/her liking.
Postconditions:
17. The font is changed.
Screen Capture
Supplementary Requirements
Performance:
· The product will sustain one user at a time.
· The product will be able to store at least 20000 characters.
Usability:
· A normal user can learn to use the product in 30-60 minutes
Supportability:
· Supported on both application MAC OS and Windows OS.
Configurability:
· The product will not allow the user to configure itself to fulfill
the personal needs of the user.
Recoverability:
· To recover any local error, a normal user should take at least
30 minutes to recover the product
pg. 16