Saturday, December 28, 2019

Role of Project Management Information Systems in Project...

ROLE OF PROJECT MANAGEMENT INFORMATION SYSTEMS IN PROJECT MANAGEMENT. INTRODUCTION 1. Background of Management Information Systems The concept of Management information system (MIS) has been in existence as early as the 19th Century. Works of majorly were in the form of tabulated cards which could be counted and sorted commonly referred to us punch – cards. The punch-cards still remembered by many, could capture elements of information keyed in on punch-card machines; the cards were then processed by other machines some of which could print out results of tallies. Each card was the equivalent of what today would be called a database record, with different areas on the card treated as fields. The initial idea of MIS was to†¦show more content†¦It’s used to support all aspects of project management cycle, from initiating to closing and can include both manual and automated systems. ii. Project management software which involves wide alterations, configurations’, or customization before it’s applied. ROLE OF PROJECT MANAGEMENT INFORMATION SYSTEMS IN PROJECT MANAGEMENT. Collaboration software: centralized stores of intergraded information with rules for access that serve the project team. Or a tool used in project management to deliver information. ROLE OF PMIS a) Guiding collaboration with policies and work flow diagrams. PMIS is a control tool and therefore owners can prime it with policy or regulatory requirement that govern workflow and institutionalize best practices specifically designed for their organization. Policies: If team members were to collaborate they need to know the rules of engagement i.e. how to work together. They must understand policies that govern interaction workflow and decision making. Passing of information from one person to another, organization to organization properly honed, clearly documented but flexible procedures improve efficient and effectiveness of a team. Individuals are more productive when they have a clear idea of what to do. Therefore, when these policy and procedure manuals are electronic. They can use allShow MoreRelatedImplementing A New ERP System Into The Enterprise: Best Practices In Project And Change Management1396 Words   |  6 PagesImplementing A New ERP System Into The Enterprise: Best Practices in Project and Change Management Introduction The role of Enterprise Resource Planning (ERP) systems in companies today is rapidly changing from just providing after-the-fact reporting of results to delivering analytics and intelligence on how to succeed with new products and services. ERP has in the past been relegated to just managing the interactions and interconnections between supplier, manufacturing operations and to aRead MoreProject Risk Management Of Information Technology1492 Words   |  6 Pages PROJECT RISK MANAGEMENT IN INFORMATION TECHNOLOGY By POURUSPA ANKLESARIA 18154704 Executive Summary This report revolves around the risks in Information Systems Project and also gives a brief idea on Information technology project management. The project also shows and discusses the importance and the role of project manager in making the project a success. Risk and how to deal with it, risk management using Work Breakdown Structure Read MoreCase Study Management Principles Of Palm Trees Spa964 Words   |  4 PagesIntroduction: Project is the organized way of achieving organizational goals and objectives by employing different tools and techniques, involve planning, organization, management of different resources of organization and is initiated to achieve specific goals and objectives. In order to understand the project management principles, case study of Palm Trees Spa is selected and project of implementing and installing Management Information System was planned and designed. Historical Perspective ofRead MoreImplementing Project Management Techniques Essay1275 Words   |  6 Pages There are many methods and techniques for a project manager (PM) can use to run a successful project. Some of these include: identifying the stakeholder’s roles and responsibilities, tracking measureable business outcomes, apply project controls and view monitoring the dynamics of a working project. These project management techniques are used in order to improve the project model in a baseline project plan. As a PM employs these techniques it can help keep track and account for items more efficientlyRead MoreRoles And Responsibilities Of A Project1174 Words   |  5 Pages1.0 Introduction The role-holding actors of a project determine its eventual success. While projects are regarded as information processing systems, the actors shape the outcome of the project mainly because they are involved in the intricacies of planning, assessing and implementing (Winch, 2012). This is despite any technical automotive system used since the controller is responsible for configuring the system. Consequently, the delegation of roles and responsibilities is crucial to attaining theRead MoreDenver Airport Communication Plan Essay1328 Words   |  6 PagesDenver International Airport Project Communication Plan Prepared by: Date: 6/15/12 Version: Master Plan Document Purpose Communication is a critical component in project delivery. It must be delivered in a timely and effective manner to all project stakeholders in order to meet objectives and achieve project goals. This document will detail the execution of all communication regarding the Denver Airport Project. This includes, but is not limited to, communication to and from executivesRead MoreStages Of The Software Development Life Cycle Essay1519 Words   |  7 Pagesthe initial step where both system requirements and user requirements are analyzed. Problem to be solved by the system is identified and the steps to be followed are put in place. It is one of the most critical step because failure to understand user requirements may lead to delivery of a totally different project. 2. Software design – after identifying the problem and verifying all the necessary requirements design phase involves defining elements of the proposed system, security levels to be usedRead MoreThe Denver International Airport Project1281 Words   |  6 PagesDocument Purpose Communication is a critical component in project delivery. It must be delivered in a timely and effective manner to all project stakeholders in order to meet objectives and achieve project goals. This document will detail the execution of all communication regarding the Denver Airport Project. This includes, but is not limited to, communication to and from executives, managers, and the project team. It will also discuss the means and frequency by which communication will be deliveredRead MoreThe Responsibilities Involved With The Project Management1371 Words   |  6 Pagesdescribes in brief the responsibilities involved with the project management. It also states the minimum educational qualification, skills, certifications needed and the salaries given to people in this role in today’s world. Keywords: [Click here to add keywords.] University of Houston Clear Lake A project is basically an assignment which has a definitive start and end times. It is a task undertaken to create a product or a service. Every project usually performs a unique set of operations which is performedRead MoreProject Charter Example1602 Words   |  7 PagesProject Charter Example Project Name: LMT/PEL LIMS Deployment Project Prepared by John Doe and Mary Smith Date: 8/22/06 |Initiation: | | | |LABORATORY INFORMATION MANAGEMENT SYSTEMS (LIMS) DEPLOYMENT | | |February 6, 2006 (Supersedes

Friday, December 20, 2019

The E Commerce Companys Strategy - 1724 Words

The e-commerce company’s strategy focus allowed it to differentiate itself by providing better services to its customers. The company put an innovative business model in which customers would try out the company’s services without any cost. As time progressed, the company was able to generate revenue from alternative means. In addition, the company began to generate revenue from an increase in the willingness of its users to pay for additional services. First mover advantage is referred to as a competitive advantage because it allows the first company to acquire superior brand recognition and customer loyalty, while allowing the company to perfect its product or service. Alibaba’s operations stated when e-commerce was at infancy stage in†¦show more content†¦Credit cards may have been used in China, but they had yet to be trusted by the community, the Chinese were not comfortable with them and preferred different mediums of transaction. Thus, Alibaba est ablished the payment system to provide the Chinese with a sense of safety, contributing to the Chinese willingness to participate in online transactions. Regulations can pose a challenge for businesses operating in emerging markets like China. For example, the internet was highly regulated and was a reason why some foreign companies struggled to succeed in China. Alibaba navigate the posed challenges well and took advantage of the opportunities while at the same time mitigating the risks of operating. The popularity of Alibaba and the growth of e-commerce in China attracted foreign e-commerce companies. In 2002, eBay entered the Chinese e-commerce market through an acquisition of 33% of EachNet, creating eBay EachNet. That same year eBay EachNet merged as the leader in online auctions, leading to the capture of 79% of the online auction market by 2003. In consideration of the growth in the online auction market, Alibaba launched Taobao.com as a rival to eBay EachNet. Taobao.com was launched to capture the opportunities in C2C e-commerce market in China. Having already established a dominance in B2B e-commerce, Alibaba was hoping its local knowledge would help it dominate the C2C e-commerce market, toppling the newcomer eBay

Thursday, December 12, 2019

Law of Business Organization Productivity Commission

Question: Discuss about the Law of Business Organization for Productivity Commission. Answer: When a company has to get registered, the person planned for the registration must primarily apply with the ASIC. The ASIC is one of the most important key and rather aspect when a new business is going to take its form. The ASIC is the unique number provided to the applicant so that they can protect their business from violation of privacy and it also helps to protect some important business news (Rahman 2013). The explanation of the ASIC is mentioned under the section of 117 of the corporation act. After the registration under Sec 117 of the Act, the question comes in about the formation and type of business set up as mentioned under Sec 112. So, in this matter, the type of company: Proprietary Limited Company. The next factor explained here is the limited form of company mainly limited by the shares explained under 601CW of the corporation act which can be summed up as: The mentioned section applies to the registered body subjecting to the Subclause(2). When the registrable body is same as the Australian registrable body, then the application of the section will have no validity concerning to the place of origin. Clause 9- all the other body except the Australian ADI, there must be an affix of the name in front of the corporating outlet whether in the painted form or in any other form which is legible to all. The name of the company is compulsory to have the display in front of all other corporating offices including the registered office. Along with the other mentioned criteria, the company must also put the suffix sign of Limited or Ltd. And proprietary or pty. The actual liability of the entity must be well understood to the newly registered organizations (australia.gov.au 2016). The next step that follows after the determination of the type of company is done concerning the sec 117(2) in this Act. In this step, the following things must cover up to complete the registration: The new business entity must indicate the liability of all the person within the corporation: The set up of the company to mentioned in suffix form, Suggestive names of the company (not registered under the name of business), Names must be in such form to get the sanction from ASIC since it will not approve the name of any corporation existing in the era of business, The consent of the members involved with such entity since it is mandatory to keep a record of all the valid consents. The consent must be made from the following persons: The director of the registered company expected to be over the age of 18 years. All the members of the company acting with the present set up. The necessity of the consent from the from the secretary is not neede for the proprietary form of the business. Once the step gets over with undertaking of the valid consents from the part of the company, the fulfillment of the registration comes in after the following details provided: The registration of the application must contain the following: details of the applicant: Name: Company name: Position: Address (residential and proposed registered office): Contact details ( residential and official): Details of the company: Company name (proposed in preference): Suffixed name: State of incorporation: Registered address of office: Business address: Superannuation acting trustee: Seal: Company presentation: Seal: Bank kit: Verification made prior that the same name is not registered elsewhere: Actual role of the applicant whether he will act as an agent or with the compliance of the ASIC: Shareholder: Type: Name: A.C.N or A.B.N.: Address: Personal details: Position in the company: number of shares: Whether beneficially owned or trustee: The pattern to be followed for all the other shareholders and must have a record of such submission. Apart from that any additional notes: Next step is to deal with the payment: General fees are $738 GST: Pattern of payment: After the completion of the registration, some internal procedures governing constitution constructed which includes the procedure for governing the same. The clause of the internal management is mentioned under section 134 of the corporation act (legislation.gov.au 2016). There are replaceable rules as mentioned under the sec of 135 of the act which is essential for the include in the making of the constitution and the members are expected to work with the concern to the mentioned regulations. Although it is not mandatory for the proprietary company to form a constitution, yet it is advisable for the same so that the effective regulation of the members can get maintained and the directors can work with good faith. Constitutions are mainly based on the redeemable with the option of the shareholders (Anderson et al. 2015). The legal authority of the members ensures that the company was acting in the good faith with all the important necessity. Sec 124 defines about the legal capacity that the members or the directors acting get the control to carry on with some activities for which may not need any forum and the act based on the situation. This section has a critical role in the formation of the business (Bakan 2012). It is paramount for the members acting members since such legal authority given the concern of the situation as well as for the purpose of the security policy (abr.gov.au 2016). Sec 129(1): the essential of the company constitution with the replaceable rules compiled together is mandatory since there must be scope for the amendment made as there are some of the situation which may not comply with the situation that takes place in the business. The combining of the replaceable rules with the actual constitutions helps the company to make the essential changes during the time of the situation when such changes become an absolute necessity (austlii.edu.au 2016). Section 588(M) (3): the clause arises some necessity to the act after the introduction of this section. Here there is an explanation of the creditor who is not liable to get the damage in means of compensation from the directors of the company. The creditors are also known as the investors of the company. Hence, they are liable to get the compensation to the loss occurred to them due to the insolvency of the company as mentioned under the subdivision B. Concerning the section of the act, and the amount is equal to the amount of loss occurred (Dobson 2014). Also, the liquidator of the company is also liable for the compensation provided that the director has been proved for his insolvency (Wright 2014). So, all the three sections mentioned here hold a major role in the carrying out of the business. References: Abr.gov.au. 2016. For Business, Super funds Charities | Australian Business Register. [online] Available at: https://abr.gov.au/For-Business,-Super-funds---Charities/ [Accessed 23 May 2016]. Anderson, C., Howell, N. and Mason, R.F., 2015. Submission to the Productivity Commission issues paper business set-Up, transfer and closure. Asic.gov.au. 2016. Lodging paper forms | ASIC - Australian Securities and Investments Commission. [online] Available at: https://asic.gov.au/online-services/lodging-paper-forms/ [Accessed 23 May 2016]. Austlii.edu.au. 2016. CORPORATIONS ACT 2001 - SECT 129Assumptions that can be made under section 128. [online] Available at: https://www.austlii.edu.au/au/legis/cth/consol_act/ca2001172/s129.html [Accessed 23 May 2016]. Australia.gov.au. 2016. ABN, ACN, business management | australia.gov.au. [online] Available at: https://www.australia.gov.au/information-and-services/business-and-industry/abn-acn-business-management [Accessed 23 May 2016]. Bakan, J., 2012.The corporation: The pathological pursuit of profit and power. Hachette UK. Dobson, R., 2014. Liquidation Winding up a company.Busidate,22(4), p.5. Human, S.E., Clark, T., Baucus, M.S. and Eustis, A.C.S., 2015. Idea or Prime Opportunity? A Framework for Evaluating Business Ideas for New and Small Ventures.Journal of Small Business Strategy,15(1), pp.59-80. Legislation.gov.au. 2016. Corporations Act 2001. [online] Available at: https://www.legislation.gov.au/Details/C2014C00519 [Accessed 23 May 2016]. Rahman, A.R., 2013.The Australian Accounting Standards Review Board (RLE Accounting): The Establishment of Its Participative Review Process. Routledge. Wright, C.J., 2014.A critical enquiry into the need for avoidance provisions in business rescue proceedings.

Wednesday, December 4, 2019

VBScript IP File Lab Essay Sample free essay sample

AimIn this lab. pupils will finish the undermentioned aims. * Create a VBScript plan utilizing NotePad++ .* Write a planar array of IP addresses to a text file. * Read the IP Addresses text file into a book.* Append new Room/PC/IP reference informations to the text file.* Use the object Scripting. FileSystemObject. Element K Network Connections For this lab. we will merely necessitate to link to vlab-PC1. The computing machine vlab-PC1 is the computing machine on the left side while vlab-PC2 is on the right. If you leave the pointer on the Personal computer icon for a few seconds. a tool-tip message will look bespeaking the hostname of the Personal computer. Open vlab-PC1 and log in as Administrator with the watchword watchword. Lab OverviewWe are traveling to get down our lab with the same planar array of IP references. Rather than accessing this array of IP reference utilizing the room and computing machine index values. We will write a custom essay sample on VBScript IP File Lab Essay Sample or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page we are traveling to compose the array of IP addresses to a Text file named IP_Addresses. csv where each line of the file will incorporate the Comma Separated Values ( CSV ) for room # . computing machine # . IP_Address. We will so compose a separate VBScript plan that will add on four new lines of informations that will stand for the four computing machines in the new room 106 to the IP_Addresses. csv file. Last. we will open and read the freshly appended IP_Addresses. csv and expose it contents in a meaningful manner. Note: All gaining controls must be text only—DO NOT capture the NotePad++ application window or the bid prompt window. Use transcript and paste of text merely. Undertaking 1: Download and Open IP_ArrayFile_start. vbs in NotePad++ * Open NotePad++ and from the bill of fare. choice File/Open. Open the fileIP_File_start. vbs in the C: Scripts directory. If you do non see this file. you can download it and pull out it from the eCollege Doc Sharing file IP_File_start. nothing. * Modify the Programmer Header as needed and Save As the VBScript file as IP_FileWrite. vbs. * The line dim ipAddress ( 5. 3 ) declare 6?4 planar array. The 5 and 3 give the maximal index value. Since indices ever start at 0. this is a 6?4 array. * The lines that follow initialise the array locations with IP references. The first index ( 0. . 5 ) represents the suites 100 through 105. The 2nd index ( 0. . 3 ) represent the four computing machines in each room. * The IP reference of the 3rd computing machine in room 104 can be found in the array component or constituent ipAddress ( 4. 2 ) . This value is â€Å"192. 168. 10. 45† . Look at the array carefully to find the significance of the index values. Note: If you need to upload a file into the C: Scripts directory on vlab-PC1 or download a file from the vlab-PC1 C: Scripts file. unfastened Windows Explorer ( E ) . As you can see on the right. your local computing machine thrusts ( in this instance. the C: and D: ) are mapped to register transcript and paste ( or retarding force and bead ) easy to carry through. Undertaking 2: Add the Code to Write the Array Data to a FilePseudocode| Comments|Specify the undermentioned constantsREAD = 1. WRITE = 2. APPEND = 8. ASCII = 0Define the variable filename and initialise it to â€Å"IP_Addresses. csv† Define the variable ipAddrStr and initialise it to â€Å"†Set fso to the â€Å"ScriptingFileSystemObject† utilizing CreateObject Set ipFileObj = fso. CreateTextFile ( file name. True. ASCII ) For room = 0 to 5 For computing machine = 0 to 3 ipAddrStr = CStr ( room+100 ) A ; â€Å" . † A ; CStr ( computer+1 ) A ; â€Å" . † A ; ipAddress ( room. computing machine ) A ; vbCrLf Use ipFileObj to Write ( IpAddrStr ) NextNext Close the fileSet ipFileObj = fso. OpenTextFile ( filename. READ. ASCII ) WScript. Echo ipFileObj. ReadAllipFileObj. Close | Named invariables should be all caps and the Const prefix should be used to distinguish it from a variable whose value can alter. filename is a variable that contains the nam e of the file we will compose. ipAddrStr will be used subsequently to hive away single records that we will compose to the file â€Å"C: ScriptsIP_Addresses. csv† . You ever need to utilize â€Å"ScriptingFileSystemObject† to read. compose. or append files. The CreateTextFile method has one required statement and two optional statements. The first statement value is the file name as twine invariable or variable. The statement set to True agencies we will over-write the file if it exists. The 3rd statement specifies the textfile format -1=Unicode. 0=ASCII. 1= system default format. Note the usage of the variable file name. Once ipFileObj is linked to a file. it can be used merely like WScript. StdOut. You can utilize the Write ( ) . WriteLine ( ) . and WriteBlankLines ( ) methods. Nested For cringles are used to entree the planar array of IP references. The outside cringle specifies the room 0. . 5 ( stand foring suites 100. . 105 ) and the inside cringle specifies the computing machine 0. . 3 ( stand foring computing machines 1. . 4 ) . In the first base on balls through the cringle when room = 0 and computing machine = 0. ipAddrStr is set to the value†100. 1. 192. 168. 10. 11† . Close the IP_Addresses. csv file utilizing ip FileObj. Near Here we are opening the IP_Addresses. csv file and exposing its contents to verify the File Creation and data format. . | Add the codification indicated by the pseudocode shown below to compose the Array to a text file. Actual codification and identifiers for variables and methods within the pseudocode will be in bold fount. Carefully read the remarks to the right of the pseudocodewill be in italics. * Save your plan with S. * Press and enter cscript FileWrite. vbs. Click OK to get down your book run. Your book will run in a docked Console window in NotePad++ as shown below. * Another option for running this plan is to open a Windows Command Prompt ( CLI ) . alteration directory to the C: Scripts folder and run the plan by come ining the bid cscript IP_FileWrite. vbs. * Execute the dir * . csv bid to verify the being of the IP_Addresses. csv file. * If your tally has any mistakes or your file does non incorporate the informations shown above. debug your plan and re-run it until you have the right consequences. When you have achieved the right consequences. transcript and glue your IP_FileWrite. vbs plan from NotePad++ into the specified textbox in your lab-report papers. Besides copy the Windows bid prompt tally and file confirmation into the specified textbox into your lab-report papers. | Undertaking 3: Make the IP_AppendRead. vbs Plan The IP_AppendRead. vbs plan will make informations for a new room with four computing machines with assigned IP references. The plan will add on these four records ( one for each IP reference ) to the IP_Addresses. csv file. Then the plan will open the IP_Addresses. csv file and expose the contents of the file in a 1 record per line descriptive format. The new room records that were appended should be displayed. * Open NotePad++ and make a new file called IP_AppendRead. vbs. Salvage this new book file in the C: Scripts directory. Do non copy and glue any codification from your IP_WriteFile. vbs plan. This plan should be written from abrasion. * Add the codification indicated by the pseudocode shown below to add on the new room informations to IP_Addresses. csv. Actual codification and identifiers for variables and methods within the pseudocode will be in bold fount. Carefully read the remarks to the right of the pseudocode ; they will be in italics. Pseudocode| Comments|Add an appropriate coder heading Specify the undermentioned constantsREAD = 1. WRITE = 2. APPEND = 8. ASCII =0Define the variable filename and initialise it to â€Å"IP_Addresses. csv†Define the variable ipAddrStr and initialise it to â€Å"†Define newRoom and initial it to â€Å"106†Define comp1_IP and initialise it to â€Å"192. 168. 10. 59†Define comp2_IP and initialise it to â€Å"192. 168. 10. 60†Define comp3_IP and initialise it to â€Å"192. 168. 10. 61†Define comp4_IP and initialise it to â€Å"192. 168. 10. 62†Set fso to the object â€Å"Scripting. FileSystemObject† | Named invariables should be all caps and the const prefix should be used to distinguish it from a variable whose value can alter. filename is a variable that contains the name of the file we will compose. ipAddrStr will be used to construct the record twine that will be written to the file â€Å"C: ScriptsIP_Addresses. csv† . The variables newRoom. comp1_IP. comp2_IP. comp3_IP. and comp4_IP are set to values that represent a new room ( 106 ) that contains four computing machines with specific IP references. Use the CreateObject ( ) method to Set fso as an object of type: â€Å"Scripting. FileSystemObject† . | Pseudocode| Comments| ipAddrStr = _ newRoom A ; â€Å" . 1. † A ; comp1_IP A ; vbCrLf A ; _ newRoom A ; â€Å" . 2. † A ; comp2_IP A ; vbCrLf A ; _ newRoom A ; â€Å" . 3. † A ; comp3_IP A ; vbCrLf A ; _ newRoom A ; â€Å" . 4. † A ; comp4_IP A ; vbCrLfIf file identified by filename does non be Then Beep Speaker Twice Display Message:â€Å"File Does Not Exist! ! ! † A ; newline A ; â€Å"You Must Create the File Before You can Read the File! ! † Quit ProgramEnd IfSet File object ipFileObj utilizing fso. OpenTextFile ( ) make certain file is set APPEND and ASCII format Use ipFileObj object to add on ipAddrStr to stop of the file identified by fileNameClose the file| ipAddrStr is set to a value that represents the four Personal computers in the new room 106. Note the usage of the Line continuance character _ . Files can be checked for being utilizing the fso method FileExists ( ) . The NOT Boolean operator may be utile here. If C: ScriptsIP_Addresses. csv does non be. Beep talker twice and expose mistake message. Exit the plan with WScript. Quit. Set ipAddrFile to register filename for APPEND and ASCII. Set ipFileObj =fso. OpenTextFile ( filename. APPEND. ASCII ) Once ipFileObj is linked to a file. it can be used merely like WScript. StdOut. You can utilize the Write ( ) . WriteLine ( ) . and WriteBlankLines ( ) methods. Use the Close method of ipFileObj| * At this point. Salvage your IP_AppendRead. vbs book utilizing S. Run your plan in NotePad++ with come ining cscript IP_AppendRead. vbs or from the Windows Command Prompt in the C: Scripts directory. * After running your plan. utilize the type IP_Addresses. csv bid from the Windows Command Prompt in C: Script or open the file in NotePad++ to verify that the new informations for room 106 has been written. Degree centigrades: Scripts gt ; type IP_Addresses. csv100. 1. 192. 168. 10. 11100. 2. 192. 168. 10. 12 Important Note: After you have verified that the room 106 information has been 100. 3. 192. 168. 10. 13sucessfully written to IP_Addresses. csv. re-run your antecedently written 100. 4. 192. 168. 10. 14IP_FileWrite. vbs plan to reconstruct the original informations. 101. 1. 192. 168. 10. 19 101. 2. 192. 168. 10. 20101. 3. 192. 168. 10. 21101. 4. 192. 168. 10. 22102. 1. 192. 168. 10. 27102. 2. 192. 168. 10. 28102. 3. 192. 168. 10. 29102. 4. 192. 168. 10. 30103. 1. 192. 168. 10. 35103. 2. 192. 168. 10. 36103. 3. 192. 168. 10. 37103. 4. 192. 168. 10. 38104. 1. 192. 168. 10. 43104. 2. 192. 168. 10. 44104. 3. 192. 168. 10. 45104. 4. 192. 168. 10. 46105. 1. 192. 168. 10. 51105. 2. 192. 168. 10. 52105. 3. 192. 168. 10. 53105. 4. 192. 168. 10. 54106. 1. 192. 168. 10. 59Return to your plan in NotePad++ and finish composing the balance of your plan 106. 2. 192. 168. 10. 60using the pseudocode found on the following page. 106. 3. 192. 168. 10. 61106. 4. 192. 168. 10. 62 The pseudocode shown below will the stairss needed to open and read the appended file IP_Addresses. curriculum vitae and expose the information in the format †The IP Address in Room † room # † for Computer † computing machine # † is † ipAddress Pseudocode| Comments|Using fso. OpenTextFile ( ) . make the ipFileObj object that has opened file name for Reading in ASCII format. Make Until ipFileObj is at EndOfStream room = ipFileObject. Read 3 characters ipFileObj. Skip 1 character computing machine = ipFileObj. Read 1 character ipFileObj. Skip 1 character ipAddress = ipFileObj. Read 13 characters ipAddrFile. Skip newline Display Message: â€Å"The IP Address in Room † A ; room A ; † for Computer â€Å" A ; computing machine A ; † is † A ; ipAddressEnd LoopClose File| Set ipFileObj to open filename for Reading in ASCII format. Set ipFileObj = fso. OpenTextFile ( filename. READ. ASCII ) Once ipFileObj is linked to a file. it can be used merely like WScript. StdIn. You can utilize the Read ( ) . ReadLine ( ) . Skip ( ) and SkipLine methods. The Do/Until cringle will expose all of the IP_Addresses. csv records including the room 106 records that were added. Use the Close method of ipFileObj where room # . computing machine # and ipAddress are values read from the IP_Addresses. csv file. Undertaking 4: Finish Program and Run it Showing Error-Handling * Finish composing your plan and salvage it. Run your plan utilizing in NotePad++ or open a Windows Command Prompt and run it from the C: Scripts directory. Your tally should look like the undermentioned. Note the highlighted records in the tally. These are the appended records for room 106. * If you did non acquire the consequences shown on the right. you will necessitate to debug your plan and run it once more until you get these consequences. To take duplcate records or reconstruct the original informations in the IP_Addresses. csv file. re-run the IP_FileWrite. vbs plan. When you have achieved the right consequences transcript and glue your IP_AppendRead. vbs plan from NotePad++ into the specified textbox in your lab-report papers. Besides copy the Run run into the specified textbox in your lab-report papers. | The. csv extension that we used on our IP_Addresses file indicates a Comma Separated Value format. This sort of file can be opened by Microsoft Excel and Microsoft Access. The file could be easy edited utilizing Excel or even made into a database in Access by adding some field names. Below is our IP_Addresses. csv file opened in Excel ( left ) and Access ( right ) .