Prior to beginning work on this assignment, read Chapter 3: Introduction to HTML and Chapter 5: HTML Tables and Forms in your course textbook. Next, review the presentation Bootstrap: Tutorial 7Links to an external site., and read XAMPP Tutorial: How to Use XAMPP to Run Your Own Web ServerLinks to an external site.. In each week of this course, you will build a component of your employee portal website, which is your final project for the course due in Week 5. For this assignment, you will complete the first task of developing the employee portal website layout. Review the Week 1—Website Template Download Week 1—Website Templatezip file to assist you throughout the designing process.
In your paper,
Provide screenshots of the HTML5 layout you created for the employee portal website. The layout should include the landing page (index.php) which contains the following links:
Home (/Home)
Contact Us (/ContactUs)
Login (/Login)
Registration (/Registration)
Explain how to run a PHP file in XAMPP.
Explain the main use of the following HTML5 tags: head, title, meta, link, script, div, nav, h1, ul, ui.
Once you have completed Task 1 of the employee portal website, you must provide the following in a Word document and submit it through the Waypoint grading system:
Screenshots of the HTML5 layout you created.
Category: Technology
-
Title: Employee Portal Website Layout Development
-
Title: “Developing a Solution for Integrating Robotics in Career and Technical Education (CTE)”
Your research has helped you understand how your area of focus relates to society and trends; now identify a specific need/ issue for this area and work to develop a working solution or prototype using a design process. You should not be creating lesson plans for this project. Your process should be presented as a portfolio in PDF form or in a Web-based format. The portfolio/website should be laid out in the following format:
Cover (Main) page with name and title (5 points)
Identification of the need/problem (5 points)
Rationale and research to support the need (can be pulled from PART ONE) (10 points)
Brainstorm possible solutions as possible via journals, drawings, etc. ( Use Google to search for various Brainstorming Templates) (10 points)
Discuss the implications of each possible solution: direct/indirect; intended/unintended (10 points)
Select the best solution and work to create that solution.
Create an activity log that includes Pictures/narrative to show the ideation/construction of the prototype/solution. Be sure to include troubleshooting, feedback from peers/instructors (if you connected with others to talk through things), etc. (10 points)
Submit the final resource website, artifact, or article (must be approved) of the proposed solution. (50 points)
Remember THE PROCESS. Ask me questions before Friday so I can help you if you are struggling to wrap your head around this one.
Upload as one pdf file.
Attached is the research done for last week′s assignment part one. This is a follow-up part two assignment. My area of focus is Robotics in CTE
Important Info
The order was placed through a short procedure (customer skipped some order details).
Please clarify some paper details before starting to work on the order.
Type of paper and subject
Number of sources and formatting style
Type of service (writing, rewriting, etc) -
“Ensuring DoD Compliance: Developing IT Infrastructure Policies for Blue Stripe Tech’s DoD Contract”
Submit a draft of your research of DOD-specific requirements for an organization’s IT infrastructure and U.S. compliance laws that may affect the firm.
Scenario
You are a security professional for Blue Stripe Tech, an IT services provider with approximately 400 employees. Blue Stripe Tech partners with industry leaders to provide storage, networking, virtualization, and cybersecurity to clients.
Blue Stripe Tech recently won a large DoD contract, which will add 30 percent to the revenue of the organization. It is a high-priority, high-visibility project. Blue Stripe Tech will be allowed to make its own budget, project timeline, and tollgate decisions.
As a security professional for Blue Stripe Tech, you are responsible for developing security policies for this project. These policies are required to meet DoD standards for delivery of IT technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.
To do this, you must develop DoD-approved policies, standards, and control desсrіptions for your IT infrastructure (see the “Tasks” section in this document). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies, standards, or controls in place.
Blue Stripe Tech′s computing environment includes the following:
12 servers running the latest edition of Microsoft Server, providing the following:
Active Directory (AD)
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Enterprise resource planning (ERP) application (Oracle)
A research and development (R&D) engineering network segment for testing, separate from the production environment
Microsoft Exchange Server for email
Email filter
Cloud-based secure web gateway (web security, data loss protection, next-generation firewall, cloud application security, advanced threat protection)
Two Linux servers running Apache Server to host your website
400 PCs/laptops running Microsoft Windows 10, Microsoft 365 office applications, and other productivity tools -
Title: The Impact of Innovation Activities and DevOps Integration on Firm Performance Innovation is crucial for the success and survival of any business, regardless of its size. However, the impact of innovation activities on firm performance may differ for large and small
Respond to the following in a minimum of 175 words:
Do certain types of innovation activities make it more likely for large firms to outperform small firms and vice versa?
How can integrating DevOps practices influence these activities? Provide an example of where this occurred in the marketplace and what may have contributed to the organization’s success. -
Choosing Control Structures for a Program with Multiple Tasks
I. Imagine that you wish to write program code to accomplish three tasks: output a user’s fortune based on which color they input as their favorite; end or continue to run the program depending on a user’s input; and greet a user with “Good morning!” or “Good afternoon!” depending on the time of day option they input. Which control structure would you choose for each of these tasks? Justify your choice. APA style…
-
Implementation and Maintenance Plan for Healthy Harvest App
the Healthy Harvest Implementation and Maintenance Plan Template to prepare a 5- to 6-page APA formatted Word document for implementation and maintenance activities (integration, testing, and verification processes) for the new Healthy Harvest app. Strive for 750 to 1000 words for the body of the assignment with the title page and reference page being additional verbiage. It is okay to go longer than this recommendation.
The template includes sections for you to document the following information:
Recommend an implementation strategy for the app, including testing and verification processes. The implementation strategy must describe which delivery method will be used: direct, parallel, single-location, or phased. Support your recommendation by explaining the advantages of the process.
Outline the documentation requirements, which include instructions on using the system, training the users, and technology support for the users.
Outline the maintenance and support recommendations of the store app. Include:
Required changes
Enhancements
Scaling
Optimization
The title page includes the name of the assignment, your name, and the date the assignment is due. Add the references to the bottom of the template using a separate page. To insert a new page in Word, place your cursor where the new page is to go, then go to Insert, Pages, Page Break. -
“Organ Allocation: Data Considerations and Decision-Making in Medical Facilities”
I. Medical facilities often have more patients waiting for organ transplants than there are available organs. Suppose you have been asked to write a computer program that selects which of several candidates should receive an available organ. What data would you want on file to be able to use in your program, and what decisions would you make based on the data? What data do you think others might use that you would choose not to use? APA Style…
-
Title: Designing Secure Workloads and Applications: Insights from Virtual Machine Labs
In the Week 1 and Week 2 labs, you used a virtual machine to practice creating instances, groups, a virtual private cloud (VPC), and other related components. These design tasks replicate tasks you may be asked to complete in your future career as an information systems manager.
Preparation
This summative assessment consists of completing lab exercises from Weeks 1 and 2 followed by reflecting and connecting to the lab experience.
Assessment Details
Write a 350- to 700-word summary on your experience completing these tasks. Include the following in your summary:
Using specific examples from this week’s labs, explain what it means to design secure workloads and applications.
Analyze why scalability is an important part of this design.
Explain how the labs provided insights for understanding the importance of scalability and how it can be used in your current or future career. -
Title: The Benefits of Social Engineering Exploits Knowledge in My Life and Career Path
Prior to beginning this assignment, complete the following labs in Chapter 10 of the TestOut IT Fundamentals Pro course:
10.2.13 Recognize Social Engineering Exploits 1
10.2.15 Recognize Social Engineering Exploits 2
For this assignment, consider how you can benefit from the knowledge gained from working through these labs. This assignment is worth 4% of your course grade.
In this assignment,
Include screenshots of the “Score Lab” screen for the labs this week.
Discuss how these skills are relevant and useful in your life and in your potential career path.
The Programming and Cybersecurity Labs assignment
must be 150 words in length.
must utilize academic voice. Review the Academic VoiceLinks to an external site. resource for additional guidance.
Review resources from the Writing CenterLinks to an external site. for help on your written assignment.
Carefully review the Grading RubricLinks to an external site. for the criteria that will be used to evaluate your assignment. -
Exploring the World of Databases: A Reflection on TestOut IT Fundamentals Pro Labs The two labs that interested me the most from Chapter 7 of the TestOut IT Fundamentals Pro course were “Explore an Access Database” and “
Prior to beginning this assignment, complete the following labs in Chapter 7 of the TestOut IT Fundamentals Pro course:
7.2.7 Explore an Access Database
7.3.9 Database Design in Microsoft Access
7.3.11 Tables and Relationships
7.4.5 Microsoft Access Queries
7.4.7 Create Queries for a School Database
7.4.11 SQL: Select All Records in a Table
7.4.12 SQL: Select Records with a Single Condition
7.4.13 SQL: Select Records with Multiple Conditions
7.4.14 SQL: Add a New Record to a Table
7.4.15 SQL: Delete a Record from a Table
For this assignment, consider at least 2 labs from this week that interested you the most, and how you can benefit from the knowledge gained from working through these labs. This assignment is worth 4% of your course grade.
In this assignment,
Identify at least 2 labs from this week that interested you most. Include screenshots of the “Score Lab” screen for each lab. (Choose whatever)
Explain why you chose these labs for this assignment.
Discuss how these skills are relevant and useful in your life and in your potential career path.
The Database Fundamentals Labs assignment
must be 150 words in length.
must utilize academic voice. Review the Academic VoiceLinks to an external site. resource for additional guidance.
Review resources from the Writing CenterLinks to an external site. for help on your written assignment.