Category: Programming

  • Matematika SMA kelas 11 bab 3 turunan fungsi aljabar

    Berikut contoh isi kolom “Detail Pertanyaan” untuk contoh judul yang diberikan:

    “Bagaimana cara menghitung turunan fungsi aljabar dan aplikasinya dalam soal matematika?”

    (atau jika ingin lebih spesifik: “Butuh penjelasan cara menyelesaikan soal turunan fungsi aljabar bab 3 kelas 11”)

    Requirements:

  • Programming Language for Databases

    Discussion Programming Language for Databases Electronic health record specialists are not computer programmers; however, the EHR you are responsible for is programmed in computer language. Basic skills in understanding the major types of programming languages are important for your success. Review the blog: The 9 Most In-Demand Programming Languages of 2016. Explore one of the listed programming languages. Include the following aspects in the discussion: Choose one of the programming languages (avoid those peers have chosen). Find a secondary source and provide a summary about the language. Include the full name of the abbreviation. Discuss if this is a language found in healthcare EHRs. Determine which of these languages provides for entering and retrieving data and is a special programming language for databases.
  • Programming Question

    Please complete the assignment

    Requirements: Complete Assignment

  • Propulsion Fundamentals – AERO-3030 Annotated Bibliographie…

    Annotated Bibliographies Guidelines

    Format

    Title: Include your name and the title of the article top of each paper.

    Margins: 1″ top, bottom, right, and left. Only flush left margins are acceptable.

    Font: Times New Roman size 12 pt.

    Line Spacing: Double Spaced

    Minimum Length: Five complete lines of text for both the Abstract and Comment sections

    Annotated bibliographies that do not meet all of the format criteria will receive 0 points.

    Sources

    List the title of the article at the top of each annotated bibliography along with your name.

    Topic

    The annotated bibliographies must be completed and submitted to the Dropbox by 11:59 PM Central time on the due date.

    Content

    The annotated bibliography should not be more than 1 page and must consist of three parts; the title, an abstract, and your comments. You may not directly quote any material in your analysis. Each part will begin with the appropriate heading.

    1. Title: The first line of the document must include the title of the article you are reviewing.

    2. Abstract: The first paragraph will consist of a descriptive abstract of the article. In other words, summarize the content of the article. This section must be a minimum of five complete lines. Not five sentences but five full lines of text.

    3. Comment: After the abstract, provide an evaluative comment on the article’s content. Explain your thoughts about the article. How does it apply to what we have learned in class? Do you see any future potential for the material or process you read about, other than that discussed by the author? This section must be a minimum of five complete lines. Not five sentences but five full lines of text.

    An article review that does not have each of the three headings and/or does not cover all three areas will receive 0 points. You must have a minimum of five lines for the abstract section and five lines for the comment section.

    Plagiarism Detection

    Papers submitted to the D2L Dropbox are automatically analyzed using the Turnitin plagiarism detection software. The software generates an originality report showing the percentage of copied material in each paper submitted. Typically, the percentage of plagiarized material detected is between 0% to 5%. If it is over 20% you can not earn credit for the assignment. Submitting a paper and receiving a more than 20% on the originality and the resubmitting the paper again with only a few words changed is still plagiarism. I suggest that you always check the report after your paper is submitted. It takes a little time for the software to analyze the paper so the report will not be available for about 15 minutes after the paper is uploaded. You are allowed three resubmission attempts where the Similarity Report will generate immediately. After three attempts, you’ll have to wait 24 hours before a new Similarity Report can be generated.

    Due Date

    Annotated bibliographies are due no later than 11:59 pm on the scheduled test day. They must be submitted to this course’s D2L Dropbox before the deadline. You can submit them early but they will not be accepted after the due date under any circumstances. An excused absence for a test or a rescheduling of a test time does not extend to the annotated bibliographies. The D2L Dropbox and I will not accept late submissions.

    Grade Rubric

    Failure to follow the criteria in the Format section will receive 0 credit

    Bibliographies that score 20% or higher on the Turnitin originality report will receive 0 credit. This applies to the final version submitted. However, submitting a paper and receiving a more than 20% on the originality and the resubmitting the paper again with only a few words changed is still plagiarism. These will also receive 0 credit. You are allowed unlimited submission before the deadline.

    Each error (spelling or grammatical) more than 2 per bibliography will result in a 5% reduction in the score on the assignment.

    If the abstract section is less than 5 full lines of text the score on the bibliography will be reduced by 10% for each line less than a full line.

    If the comment section is less than 5 full lines of text the score on the bibliography will be reduced by 10% for each line less than a full line.

    The abstract and comment must be coherent and relevant to the assigned article. These sections must demonstrate that you have read the article and grasp the key concepts. In the past, students have attempted to use AI to generate work that lacked depth and did not demonstrate relevant information. Points will be deducted from this assignment if they do not demonstrate a grasp of the key concepts of the article.

    Directly quoting material from the article is not allowed. Any directly quoted material will not count towards the minimum text required for either the comment or abstract section.

    Late submissions are not accepted.

    You actually can choose any topic that easy and fast to do do

    Requirements:

  • Stripe button

    Our firm currently operates a well-performing website with PayPal integrated as the primary payment gateway. To improve payment flexibility and business scalability, there is a need to integrate additional payment processorsspecifically Square and Stripeusing HTML-based payment buttons. How can these additional merchant payment options be professionally implemented on the existing website, and what step-by-step processes are required to securely configure, test, and deploy these payment buttons for a stabilizer business?


    Step-by-Step To-Do List for Integrating Square and Stripe Payment Buttons

    1. Assess Current Website and Payment Setup

    • Review the existing PayPal integration (HTML buttons, SDKs, or hosted checkout).
    • Identify where payment buttons are placed (product pages, checkout page, invoice page).
    • Confirm whether the site is static (HTML/CSS/JS) or dynamic (PHP, Node.js, etc.).

    2. Create and Verify Merchant Accounts

    • Open a Square Business Account and complete identity verification.
    • Open a Stripe Business Account and complete compliance onboarding.
    • Ensure the business category (stabilizer/electronics) is correctly defined.

    3. Decide on Integration Method

    Choose the most suitable approach:

    • Simple HTML / Checkout Link Buttons (fastest, minimal coding)
    • Hosted Checkout Pages (Stripe Checkout, Square Checkout)
    • API-based Integration (recommended for scalability and automation)

    For a stabilizer business, hosted checkout is often the best balance between security and simplicity.


    4. Generate Payment Credentials

    • From Stripe Dashboard:
      • Obtain Publishable Key and Secret Key
    • From Square Developer Dashboard:
      • Create an application
      • Obtain Application ID, Location ID, and Access Token
    • Store all keys securely (never expose secret keys in HTML).

    5. Create HTML Payment Buttons

    • Design branded HTML buttons (Square, Stripe, PayPal) for consistency.
    • Link each button to its respective checkout session or payment URL.
    • Label buttons clearly (e.g., Pay with Stripe, Pay with Square).

    6. Configure Payment Details

    • Set product name (e.g., Voltage Stabilizer Model X).
    • Define currency, price, taxes, and shipping fees.
    • Configure success and cancel redirect URLs.

    7. Enable Security and Compliance

    • Ensure SSL (HTTPS) is active on the website.
    • Use PCI-compliant hosted payment pages (Stripe/Square).
    • Do not collect or store card details on your server.

    8. Test in Sandbox / Test Mode

    • Use Stripe test keys and Square sandbox environment.
    • Simulate successful and failed transactions.
    • Verify email receipts and payment confirmations.

    9. Deploy to Production

    • Switch API keys from test to live mode.
    • Publish updated HTML pages to the live server.
    • Confirm payments reflect correctly in merchant dashboards.

    10. Optimize User Experience

    • Place payment buttons logically on product and checkout pages.
    • Allow customers to choose their preferred payment provider.
    • Ensure mobile responsiveness for all buttons.

    11. Set Up Monitoring and Reporting

    • Enable transaction alerts and notifications.
    • Regularly review payment logs and failed transactions.
    • Reconcile payments with accounting records.

    12. Document and Maintain

    • Document integration steps and credentials (securely).
    • Schedule periodic reviews for API updates.

    Requirements:

  • abcdefghij

    klmnopqrstuvwxyzjsjks

    Requirements:

  • Pizza Ordering program

    Before you attempt the Programming assignment, create a flowchart using correct symbol notation and corresponding pseudocode with proper indentation for the algorithm that will be used to solve the following programming problem: In this assignment, you will be creating a Pizza Ordering program. The Pizza Ordering program should allows customers to order a pizza by selecting from a menu, choosing toppings, quantity and calculate and display the total cost of their order. Design a program that Displays a menu with three pizza options for the user to choose from (Small cheese pizza, Medium cheese pizza and Large cheese pizza) Prompts the user to select available toppings: pepperoni, sausage, or olives. The user should be able to select a topping by entering 1 to indicate they want the topping and 0 to indicate they do not want the topping. Prompts the user for the quantity/number of pizza they would like to order. Uses a function to calculate the total price of the order based on pizza size, number of toppings and quantity. A small cheese pizza costs $12.00, medium $14.00 and large $16.00. Each topping costs an additional $1.50. Displays the order summary, including the pizza size, toppings, and total cost. Submit your flowchart as a PNG file and your pseudocode as a TXT file. Please remember that when you use functions in your program, each function needs to be separately represented in flowchart and pseudocode. Please review and follow the directions in the Submission Requirements Document, located in “Course Resources” for your submission. Below are some additional resources to help with flowcharting: Flowcharts – ADA Computer Science What is a Flowchart and its Types? – GeeksforGeeks Introduction to Flowcharting – 1st Maker Space (PDF)
  • Data Masyarakat yang bocor akibat oknum yang tidak bertanggu…

    Kebocoran Data Masyarakat oleh Oknum Tidak Bertanggung Jawab

    Di era digital, banyak aktivitas masyarakat menggunakan data pribadi seperti nama, alamat, dan nomor identitas. Namun, data tersebut berisiko bocor akibat peretasan atau penyalahgunaan oleh oknum yang tidak bertanggung jawab. Kebocoran data dapat menyebabkan penipuan, pencurian identitas, dan kerugian finansial, serta menurunkan rasa aman dan kepercayaan masyarakat.

    Untuk mencegahnya, pemerintah perlu memperketat aturan, perusahaan harus meningkatkan keamanan sistem, dan masyarakat harus lebih berhati-hati dalam menjaga informasi pribadi. Dengan kerja sama semua pihak, keamanan data dapat lebih terlindungi.

    Requirements: