Overview In this assignment, you will create the three CapestraApp Action screen

Overview
In this assignment, you will create the three CapestraApp Action screens. Using the CapestraApp template application from the CapestraApp.zip file linked in Resources, create the layouts, labels, input fields, and buttons for each of the screens. Refer to Loading the Project, linked in Resources, to see how the template file is set up.
Follow the SRS document and your designs to prepare the application for its first release. Only the form GUI elements should be implemented for this assignment. The functional components should not be implemented because they will be created later. This means that the screens should appear in their final form, but they will not do anything. Use a simple layout scheme for your application. This means that if your designs are too complex for you to implement at this point, simplify them so that you can successfully build or update the new screens. It is strongly recommended that you use VBox and HBox for your layout managers, avoiding the more complex layout managers like GridPane, BorderPane, and so on.
Resources
Capestra First Time [DOCX].
Capestra Furniture SRS [PDF].
Software requirements specification walkthrough.Links to an external site. (2020).
Checking Your MySQL Installation and Configuration [DOCX].
The Working of the JavaFX Architecture Walkthrough.
Better Way to Implement Add Customer [DOCX].
Improving the user interface – Implementing the add customer sceneLinks to an external site.. | Transcript (2020).
CapestraApp template walkthrough.Links to an external site. (2020).
CapestraApp.zip [ZIP].
Week 3 Sample Code [ZIP].
Incremental Development [DOCX].
Assignment Instructions
Complete the following steps for this assignment:
Extract the CapestraApp project from the CapestraApp.zip file.
Move the project to a folder named NetBeansProjects.
In NetBeans, go to Open File, Open Project, and locate the Capestra app project within the NetBeansProjects folder.
Click Open Project. All of the files associated with the application will be available.
As you add your code, include inline comments and block comments to explain what the code is doing.
Ensure that the CapestraApp title is correct.
Ensure that the Menu names are correct, and each Menu Item is correct.
Following the requirements given in the SRS and your designs, create the following screens with their labels and input fields:
Login screen.
Add Customer screen.
Place Order screen
9. While your application is running, take screen shots of each screen.
Do not capture your entire desktop—just capture the individual screens.
Paste all three screen shots into a single MS Word document.
Your name should appear at the top of the MS Word document.
Name your document, following this pattern: LastName_Week3.docx.
10. Create a .zip file containing your CapestraApp project.
Before zipping your project, you need to right-click the project and “clean” it. This greatly reduces the file size and speeds up the program’s performance.
Then close NetBeans.
11. Add the MS Word document with your screenshots to your .zip file.
12. Submit your cleaned CapestraApp project in an appropriately constructed and correctly named .zip file.
13. Rename your .zip file, following this pattern: LastName_Week3.zip.
Deliverable
Submit a single zip file with your CapestraApp project files and your MS Word document by 11:59 p.m. on Sunday of this week. Do not submit multiple files.
Competencies Measured
By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:
Competency 2: Implement an engaging user interface using modern technology to connect the interface to a back-end database that supports user requirements.Apply UX best practices to GUI.
Ensure that the app title, menu, and menu items are all correct.
Develop the Login screen using JavaFX.
Develop the Add Customer screen using JavaFX.
Develop the Place Order screen using JavaFX.
Provide screen captures of all screens.
Ensure that the content of all screens meets the requirements given in the SRS.
Package a cleaned project in an appropriately constructed and correctly named .zip file.
View Rubric
Week 3 Assignment: Java: Build GUI: Login, Add Customer, Place Order
Week 3 Assignment: Java: Build GUI: Login, Add Customer, Place Order
CriteriaRatingsPts
Apply UX best practices to GUI.view longer description
12.8 to >10.88 pts
DISTINGUISHED
Applies exceptional UX best practices to GUI.10.88 to >8.96 pts
PROFICIENT
Applies UX best practices to GUI.8.96 to >0 pts
BASIC
Applies some UX best practices to GUI.0 pts
NON_PERFORMANCE
Does not apply UX best practices to GUI./ 12.8 pts
Ensure that the app title, menu, and menu items are all correct.
view longer description
9.6 to >8.16 pts
DISTINGUISHED
Ensures that the app title, menu, and menu items are all correct and without errors.8.16 to >6.72 pts
PROFICIENT
Ensures that the app title, menu, and menu items are all correct.6.72 to >0 pts
BASIC
Ensures that some of these items are correct: the app title, menu, and menu items.0 pts
NON_PERFORMANCE
Does not ensure that the app title, menu, and menu items are all correct./ 9.6 pts
Develop the Login screen using JavaFX.
view longer description
9.6 to >8.16 pts
DISTINGUISHED
Develops the Login screen using JavaFX with a simple, yet elegant, design.8.16 to >6.72 pts
PROFICIENT
Develops the Login screen using JavaFX.6.72 to >0 pts
BASIC
Develops the Login screen using JavaFX, but the screen does not meet all of the requirements.0 pts
NON_PERFORMANCE
Does not develop the Login screen using JavaFX./ 9.6 pts
Develop the Add Customer screen using JavaFX.
view longer description
9.6 to >8.16 pts
DISTINGUISHED
Develops the “Add Customer” screen using JavaFX with a simple, yet elegant design.8.16 to >6.72 pts
PROFICIENT
Develops the “Add Customer” screen using JavaFX.6.72 to >0 pts
BASIC
Develops the “Add Customer” screen using JavaFX but the screen does not meet all of the requirements.0 pts
NON_PERFORMANCE
Does not develop the “Add Customer” screen using JavaFX./ 9.6 pts
Develop the Place Order screen using JavaFX.
view longer description
9.6 to >8.16 pts
DISTINGUISHED
Develops the Place Order screen using JavaFX with a simple, yet elegant, design.8.16 to >6.72 pts
PROFICIENT
Develops the Place Order screen using JavaFX.6.72 to >0 pts
BASIC
Develops the Place Order screen using JavaFX, but the screen does not meet all of the requirements.0 pts
NON_PERFORMANCE
Does not develop the Place Order screen using JavaFX./ 9.6 pts
Provide screen captures of all screens.
view longer description
9.6 to >8.16 pts
DISTINGUISHED
Provides screen captures of all screens that are clearly legible.8.16 to >6.72 pts
PROFICIENT
Provides screen captures of all screens.6.72 to >0 pts
BASIC
Provide screen captures of some of the screens.0 pts
NON_PERFORMANCE
Does not provide screen captures of all screens./ 9.6 pts
Ensure that the content of all screens meets the requirements given in the SRS.
view longer description
9.6 to >8.16 pts
DISTINGUISHED
Ensures the content of all screens concisely meets the requirements given in the SRS.8.16 to >6.72 pts
PROFICIENT
Ensures the content of all screens meets the requirements given in the SRS.6.72 to >0 pts
BASIC
Ensures the content of some of the screens meets the requirements given in the SRS.0 pts
NON_PERFORMANCE
Does not ensure the content of all screens meets the requirements given in the SRS./ 9.6 pts
Package a cleaned project in an appropriately constructed and correctly named .zip file.
view longer description
9.6 to >8.16 pts
DISTINGUISHED
Packages a cleaned project in an appropriately constructed and correctly named .zip file that is error free.8.16 to >6.72 pts
PROFICIENT
Packages a cleaned project in an appropriately constructed and correctly named .zip file.6.72 to >0 pts
BASIC
Packages a cleaned project in a somewhat appropriately constructed and correctly named .zip file.0 pts
NON_PERFORMANCE
Does not package a cleaned project in an appropriately constructed and correctly named .zip file./ 9.6 pts
Total Points: 0
2. By now you should have finished the unit lab and saved your screenshots to a Word document.
Preparation
Follow the steps below to prepare for this assignment.
Choose a presentation software to create your presentation.
Consider the following guidelines as you prepare to create your presentation:It is suggested that you write an outline or script of what you are going to say before you begin recording in addition to having your design and supporting visuals ready. Although many software programs allow you to pause or edit, it is advisable to prepare before you start recording.
Watch your video prior to posting to ensure that the audio volume is appropriate.
Kaltura
For this assignment, you may choose to create your presentation using Kaltura. To learn how to use Kaltura, refer to the second study in this unit.
Note: If you require the use of assistive technology or alternative communication methods to participate in these activities, please contact DisabilityServices@Capella.edu to request accommodations.
Preparation
Refer to the following reading:
Week 3: Microsoft security bulletin MS16-087 – Critical.Links to an external site.
Scenario
Imagine that you are a network security administrator and you receive a critical alert from an intrusion detection system (IDS) regarding the ingress transmission of code execution targeting the exploitation of Windows print spooler components vulnerabilities identified in Microsoft Security Bulletin MS16-087.
Directions
Consider your lab work and other studies to address each of the following in the Word document that contains your lab screenshots. Clearly label each section.
Briefly describe what you learned from or observed in the lab and include it in the section with your screenshots. Be specific.
Prepare and record a 5–7 minute recorded presentation (with voice and supporting visuals) with content and tone appropriate for IT professionals. Do the following in your presentation:Introduce the nature of the intrusion and the systems likely affected.
Outline the steps necessary to effectively assess this security incident.
Create and explain a security incident response plan designed to mitigate the exploitation. Make sure to:Reference relevant security bulletins that exist (perform an Internet search).
Explain key components of your recommended technical solution.
Submission Instructions
Submit your presentation and the Word document with your screenshots.
Resources
DisabilityServices@Capella.edu.
View Rubric
Week 3 Assignment – Intrusion Assessment and Response
Week 3 Assignment – Intrusion Assessment and Response
CriteriaRatingsPts
Investigate and respond to security incidents as specified in a lab and evidenced by screenshots.view longer description
20 to >17 pts
DISTINGUISHED
Investigates and responds to security incidents as specified in a lab and evidenced by screenshots and includes a description of what was learned from or observed in the lab.17 to >14 pts
PROFICIENT
Investigates and responds to security incidents as specified in a lab and evidenced by screenshots.14 to >0 pts
BASIC
Investigates and responds to security incidents in an unspecified manner as evidenced by screenshots.0 pts
NON_PERFORMANCE
Does not attempt to Investigate and respond to security incidents as specified in a lab./ 20 pts
Outline the steps to effectively assess a security incident.
view longer description
20 to >17 pts
DISTINGUISHED
Outlines detailed steps to effectively assess a security incident. The steps show a deep understanding of incident assessment.17 to >14 pts
PROFICIENT
Outlines the steps to effectively assess a security incident.14 to >0 pts
BASIC
Outlines the steps to effectively assess a security incident, but with significant errors or omissions.0 pts
NON_PERFORMANCE
Does not outline the steps to assess a security incident./ 20 pts
Create a security incident response plan with an explanation of how it mitigates an exploitation.
view longer description
20 to >17 pts
DISTINGUISHED
Creates an effective and appropriate security incident response plan with a detailed and insightful explanation of how it mitigates an exploitation.17 to >14 pts
PROFICIENT
Creates a security incident response plan with an explanation of how it mitigates an exploitation.14 to >0 pts
BASIC
Creates a security incident response plan without an explanation of how it mitigates an exploitation, or creates one with significant errors or omissions.0 pts
NON_PERFORMANCE
Does not create a security incident response plan with an explanation of how it mitigates an exploitation./ 20 pts
Present clearly and effectively.
view longer description
20 to >17 pts
DISTINGUISHED
Presents clearly and effectively using style and content that are tailored to a target audience.17 to >14 pts
PROFICIENT
Presents clearly and effectively.14 to >0 pts
BASIC
Presents in an unclear or ineffective manner.0 pts
NON_PERFORMANCE
Does not make a presentation./ 20 pts
Total Points: 0
3.
Assignment Overview
The UTAUT is a model (or theoretical framework) that suggests 4 key constructs (performance expectancy, effort expectancy, social influence, and facilitating conditions) to determine technology acceptance. This acceptance of technology can be for a single user or organizational-wide. The technology can be an emerging technology, but it can also be an existing technology.
By examining technology acceptance through the use of these constructs in a “real world” environment, researchers and practitioners can assess an individual’s intention to use a specific system, thus allowing for the identification of the key influences on acceptance in any given context. This information can be used to inform the development of an implementation plan for the new technology.
Here are some possible emerging technologies to consider (note: feel free to choose an emerging technology from outside this list.
Cryptocurrency or blockchain (i.e. Bitcoin, Litecoin).
FinTech (financial technology).
Cyber analytics – emerging use of analytics to support cybersecurity.
Artificial Intelligence/machine learning applications in present and near future use.
Augmented reality/virtual reality applications.
Biometric advances.
Wearable technology.
Other.
Assignment Instructions
Using the study material provided in week 3 and other resources, choose an emerging technology and submit a 2–3 paper organized around the 4 constructs:
Performance Expectancy (technology performance).
Effort Expectancy (ease of use).
Social Influence (the degree to which an individual perceives that important others believe he or she should use the new system).
Facilitating Conditions (the degree an individual believes that an organizational and technical infrastructure exists to support the use of the system).
These constructs may also have sub-categories based on gender, age, experience, and voluntariness of use (Venkatesh et al, 2003).
Submit your paper to the assignment area by 11:59 on Sunday of this week.
Assignment Criteria
Your assignment must meet this criteria, please refer to the rubric for this assignment.
Conduct a research activity for the selection of an emerging technology.
Demonstrate knowledge of UTAUT as a theoretical framework for the adoption of emerging technology.
Apply the theoretical construct of performance expectancy for emerging technology adoption.
Apply the theoretical construct of effort expectancy for emerging technology adoption.
Apply the theoretical construct of social influence for emerging technology adoption.
Apply the theoretical construct of facilitating conditions for emerging technology adoption.
Communicate key points in a professional tone in a logical, well-organized manner with credit to external sources that meet the expectations of senior IT leaders.
Assignment Requirements
Communication: Communicate in a manner that is scholarly, professional, respectful, and consistent with expectations for professional practice in education. Original work and critical thinking are required regarding your assessment and scholarly writing. Your writing must be free of errors that detract from the overall message.
Paper length: Minimum of 2–3 pages, not including the reference page.
Resources: At least three scholarly resources. Include a reference page at the end of the paper.
APA guidelines: Double-spaced paragraph formatting in the body of the paper. When appropriate, use APA-formatted headings. Resources and citations are formatted according to current Evidence and APA.
Font and font size: Times New Roman, 11 pt.
View Rubric
Week 3 Assignment – Unified Theory of Acceptance and use of Technology (UTAUT) for Emerging Technologies
Week 3 Assignment – Unified Theory of Acceptance and use of Technology (UTAUT) for Emerging Technologies
CriteriaRatingsPts
Conduct a research activity for selection of an emerging technology.view longer description
16 to >13.6 pts
DISTINGUISHED
Conducts a research activity for selection of an emerging technology with an in-depth description of the research findings.13.6 to >11.2 pts
PROFICIENT
Conducts a research activity for selection of an emerging technology.11.2 to >0 pts
BASIC
Conducts a research activity for selection of an emerging technology with only a vague description of the findings.0 pts
NON_PERFORMANCE
Does not conduct a research activity for selection of an emerging technology./ 16 pts
Demonstrate knowledge of UTAUT as a theoretical framework for the adoption of an emerging technology.
view longer description
14 to >11.9 pts
DISTINGUISHED
Demonstrates knowledge of UTAUT as a theoretical framework for the adoption of an emerging technology with an in-depth description of the theory.11.9 to >9.8 pts
PROFICIENT
Demonstrates knowledge of UTAUT as a theoretical framework for the adoption of an emerging technology.9.8 to >0 pts
BASIC
Demonstrates knowledge of UTAUT as a theoretical framework for the adoption of an emerging technology with a description that is missing key elements.0 pts
NON_PERFORMANCE
Does not demonstrate knowledge of UTAUT as a theoretical framework for the adoption of an emerging technology./ 14 pts
Apply the theoretical construct of performance expectancy for emerging technology adoption.
view longer description
14 to >11.9 pts
DISTINGUISHED
Organizes response on 4 theoretical constructs for emerging technology adoption with a variety of supporting examples.11.9 to >9.8 pts
PROFICIENT
Organizes response on 4 theoretical constructs for emerging technology adoption.9.8 to >0 pts
BASIC
Organizes response on 4 theoretical constructs for emerging technology adoption although there are no supporting examples.0 pts
NON_PERFORMANCE
Does not organize response on 4 theoretical constructs for emerging technology adoption./ 14 pts
Apply the theoretical construct of effort expectancy for emerging technology adoption.
view longer description
14 to >11.9 pts
DISTINGUISHED
Applies the theoretical construct of effort expectancy for emerging technology adoption with a variety of supporting examples.11.9 to >9.8 pts
PROFICIENT
Applies the theoretical construct of effort expectancy for emerging technology adoption.9.8 to >0 pts
BASIC
Applies the theoretical construct of effort expectancy for emerging technology adoption, but there are no supporting examples.0 pts
NON_PERFORMANCE
Does not apply the theoretical construct of effort expectancy for emerging technology adoption./ 14 pts
Apply the theoretical construct of social influence for emerging technology adoption.
view longer description
14 to >11.9 pts
DISTINGUISHED
Applies the theoretical construct of social influence for emerging technology adoption with a variety of supporting examples.11.9 to >9.8 pts
PROFICIENT
Applies the theoretical construct of social influence for emerging technology adoption.9.8 to >0 pts
BASIC
Applies the theoretical construct of social influence for emerging technology adoption, but there are no supporting examples.0 pts
NON_PERFORMANCE
Does not apply the theoretical construct of social influence for emerging technology adoption./ 14 pts
Apply the theoretical construct of facilitating conditions for emerging technology adoption.
view longer description
14 to >11.9 pts
DISTINGUISHED
Applies the theoretical construct of facilitating conditions for emerging technology adoption with a variety of supporting examples.11.9 to >9.8 pts
PROFICIENT
Applies the theoretical construct of facilitating conditions for emerging technology adoption.9.8 to >0 pts
BASIC
Applies the theoretical construct of facilitating conditions for emerging technology adoption, but there are no supporting examples.0 pts
NON_PERFORMANCE
Does not apply the theoretical construct of facilitating conditions for emerging technology adoption./ 14 pts
Communicate key points in a professional tone in a logical, well-organized manner with credit to external sources that meets the expectations of senior IT leaders.
view longer description
14 to >11.9 pts
DISTINGUISHED
Communicates key points in a professional tone and a logical, well-organized manner with credit to external sources that meets the expectations of senior IT leaders. Provides a unique perspective through examples.11.9 to >9.8 pts
PROFICIENT
Communicates key points in a professional tone and a logical, well-organized manner with credit to external sources that meets the expectations of senior IT leaders.9.8 to >0 pts
BASIC
Communicates key points in a professional tone, but does not always provide credit to external sources.0 pts
NON_PERFORMANCE
Does not communicate key points in a professional tone and a logical, well-organized manner with credit to external sources that meets the expectations of senior IT leaders./ 14 pts
Total Points: 0

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount