End User Application Assignment
End User Application Assignment
ASSIGNMENT
STUDENT NAME : W.G. Isuru Vishwajith Jayasingha
INTERNAL VERIFIER :
PLAGIARISM:
While research and discussion are an essential part of an assignment, the deliberate copying of someone else’s
work or unacknowledged copying from printed or electronic sources is NOT permitted. You may be subject to
disciplinary procedure if you do this. You should sign this sheet to show that you comply with these regulations.
0 - 29 0.0 E
30 - 39 1.0 D
50 - 54 2.0 C
55 - 59 2.3 B-
60 - 64 2.7 B
65 - 69 3.0 B+
70 - 74 3.3 A-
75 - 79 3.7 A
Assessor Comments:
Assessor:
Signature: Date:_____/_____/ ___________
Internal Verifier:
Signature: Date:_____/_____/ ___________
Money Matters is a well-known finance company. You are employed as an IT Staff Trainer at the company. The
company is expanding as a result of increased business and has employed new staff for all departments. The
Managing Director wants you to help new IT apprentices and has asked you to provide the following information
for them:
Identify FOUR (4) features of bespoke software and FOUR (4) features of
commercial off-the-shelf software. Recommend which you think is the
T 1.2 most appropriate type of software for Money Matters to use and briefly 25
explain your choice
Total 100
Allocated Given
TASK 2 : Advanced features and Functions of Microsoft Word Marks Marks
You want to send the IT apprentices a letter that welcomes them to the
company. Word process the following letter. Ensure that the letter displays
that you have set up the mail merge feature (Reference working 1.0).
Create the names and the addresses of THREE (3) IT apprentices. Link
each IT apprentice’s details to the letter. Produce THREE (3) copies of the
letter to be sent to each apprentice. To complete this task, you must submit
an Excel document that contains the information for the mail merge. You
T 2.1 must also submit all copies of all THREE (3) letters created by the mail 40
merge. You should save your files using the following naming convention:
EUA_Assessment_Q21_YourName_StudentNumber_Date Save THREE
(3) copies for three different recipients using the same naming convention
above but add 1, 2 or 3 at the end of the file name.
Write a macro to automate a spell check on the letter that you have
produced for the IT apprentices. Save your work as:
T 2.2 EUA_Assessment_Q22_YourName_StudentNumber. 40
Allocated Given
TASK 3: Advanced features and functions of Microsoft Excel Marks Marks
The names of the new IT apprentices, their unique identification numbers,
and the date of their first training course are stored on a spreadsheet.
Produce an interactive user form that can be used by the IT apprentices
to enable them to enter their details. Create the above interactive form and
T 3.1 save it as a spreadsheet file. Save your work as: 50
EUA_Assessment_Q31_YourName_StudentNumber
Modify the macro that you produced for Task 4 (a), so that the following
message is displayed after an apprentice has entered his or her details
using the interactive form: Welcome to Money Matters and your first
T 3.2 training session. Save your work as: 50
EUA_Assessment_Q31_YourName_StudentNumber
Total 100
Allocated Given
TASK 4 : Using Multimedia in working environment
Marks Marks
Assume you are one of a team member who is working for United Nations
Environmental protection project. Take one of a following topic and build
Power point presentation within the limit of 15 slides.
• Eco Tourism
T 4.1 • Soil Erosion 30
• Bio diversity protection
• Endangered species
Total 100
Total 100
Allocated Given
TASK 6: Creating a Personal blog Marks Marks
Total 100
Working 01:
END OF ASSIGNMENT
Table of Contents.
Introduction............................................................................................................... 13
TASK 1 ..................................................................................................................... 14
Task 1.1........................................................................................................ 14
Task 1.2........................................................................................................ 17
Task 1.3........................................................................................................ 19
TASK 2 ..................................................................................................................... 20
Task 2.1........................................................................................................ 20
Task 2.2........................................................................................................ 22
Task 2.3........................................................................................................ 23
TASK 3 ..................................................................................................................... 24
Task 3.1........................................................................................................ 24
Task 3.2........................................................................................................ 25
TASK 4 ..................................................................................................................... 26
Task 4.1........................................................................................................ 26
Task 4.2........................................................................................................ 27
TASK 5 ..................................................................................................................... 28
Task 5.1........................................................................................................ 28
Task 5.2........................................................................................................ 29
Task 5.3........................................................................................................ 31
Task 5.4........................................................................................................ 32
TASK 6 ..................................................................................................................... 34
Task 6.1........................................................................................................ 34
Task 6.2........................................................................................................ 36
Conclusion................................................................................................................ 37
Gantt Chart. .............................................................................................................. 38
Declaration of Academic Honesty Instructions ................................................... 39
Introduction.
This assignment about end user applications. We must complete these tasks using MS
word, MS excel, MS PowerPoint, MS access and create blog page using weebly.com. First,
we have to explain about end user applications. After, create mail merge using MS word
software and create spreadsheet and macro using MS excel software. We need to create
presentation using MS PowerPoint software and also, we need to create database using MS
access software. At last we must create blog site using weebly.com.
• Desktop publishing software can save companies money, time and hassle by
eliminating the use of third-party print shops and online vendors.
Data Mining Software.
Data mining can be defined as a process of exploring and analysis for large amounts of data
with a specific target on discovering significantly important patterns and rules. Data mining
techniques have been used to extract hidden patterns and predict future trends and
behaviors in financial markets.
Advanced statistical, mathematical and artificial intelligence techniques are typically required
for mining such data, especially the high frequency financial data. Solving complex financial
problems using wavelets, neural networks, genetic algorithms and statistical computational
techniques is thus an active area of research for researchers and practitioners. Data mining
software’s gets lots of benefits to company,
• An important role in helping organizations to understand their customers and their
behavior.
• Keeping clients, stocks anticipation, sale policies optimization as well as other
benefits which bring a considerable competitive advantage to the organization.
• Finding patterns and hidden (but relevant) relations that might lead to revenue
increase in company.
Multimedia Software.
Multimedia software was developed to create new multimedia content and enhance the
visual and auditory features of already existing material. As its name implies, multimedia
software always involves several types of media that are interlinked with each other.
Other online platforms like blogs, websites, social media sites such as Facebook and
Twitter, among others, are available and accessible. These multimedia tools and platforms,
if used suitably, can help entrepreneurs and startup founders in growing their business.
there are some benefits of multimedia software’s,
• Using multimedia any business can sell their product anywhere in the world on
internet.
• By placing advertisement in millions of online websites business can be increased
effectively.
• PowerPoint presentation is also an effective way to give details of their product.
• Advertising industry uses multimedia for marketing various products.
Logistics Software.
Logistics software essentially is a program designed to help businesses manage the
multitude of elements that go into the production process. Logistics software manages the
supply chain of products from their point of origin to the point of consumption via
transportation, inventory, warehousing, material-handling and packaging features. There are
important features to us,
• Logistics software manage orders like Track the status of orders, manage invoicing,
manage recurring orders.
• Keeps track and manage of all information about the items that your company builds,
buys, stores or sells.
• Manage and coordinate inventory and actions throughout a warehouse or distribution
center.
• Plan, execute, and optimize the physical movement of goods.
• Anticipate customer demand and plan resources or production appropriately by
coordinating data from separate units of the business.
Enterprise Software.
Enterprise software is computer software that supports a large number of users and user
roles and supports many of the goals of the enterprise. These systems handle a chunk of
operations in an organization with the aim of enhancing the business and management
reporting tasks. Services provided by enterprise software’s are,
• Online and offline payment processing in the business.
• Automated billing systems.
• IT Service Management.
• Customer relationship management.
• Human resource management.
Task 1.2: Identify FOUR (4) features of bespoke software and FOUR (4)
features of commercial off-the-shelf software. Recommend which you
think is the most appropriate type of software for Money Matters to use
and briefly explain your choice.
Bespoke software.
Bespoke software is software customized for a specific purpose. Bespoke software can be
beneficial for every company because of:
01. Control.
• When you creating bespoke software, you are the one who decides
what the solution will look like and how it will work in general.
Therefore, developers gather your requirements and then develop
what you need. Also, you can add or remove features in your opinion.
So, you can get full control of this software’s.
03. Security
• Another major benefit of bespoke software development is security.
As you are the only one using that software and you have complete
control over it, a hacker attack is less likely to take place. bespoke
software’s protects your business from external threats. Breaching a
tailor-made system is much more difficult and gives hackers much
less data in return.
02. You can try the software and reviewing it before you buy.
• Most solutions offer some form of trial, either free or discounted, making it
easy to testing the product for yourself and can see how it fits in with your
work process.
And while the software is being used by other people, it
means that you can get an understanding of how they are using the product
and how quality of this product.
After considering all these points, my recommendation is the bespoke software’s are good
for this company.
Because, Money Matters is a well-known finance company. so, many of people
are do transactions with this company. and also, this company handle lots of money their
clients. therefore, in terms of security, the bespoke software’s are very high. also, this
software unique to the company and also company has complete ownership for this
software. therefore, I am highly recommended the bespoke solution for this company.
Task 1.3: Some of the new IT apprentices have been selected to learn
how to develop application software features. Identify SIX (6) problems
can occur in end user development.
01. While end user development the developers must know multiple coding languages.
but most of trainee developers are specialized in few coding languages. Therefore,
they need to learn some languages while coding.
02. Sometime development often takes more time than project managers are decide
before.
03. The end-users are not specialists in the development field so issues such as bad
design, incorrect logic, inadequate testing and not adhering to development
standards occur.
04. End user development may have lack of security, backup and recovery features.
05. End user developers don't have big idea about what client need and their
recommendation.
06. Some end user developers are don't check errors in their final product. therefore,
clients are using faulted software’s or it can cause applications to crash or hang.
Figure 1
Figure 2
Figure 2.1
Figure 2.2
Figure 2.3
Task 2.2: Write a macro to automate a spell check on the letter that you
have produced for the IT apprentices. Save your work as:
EUA_Assessment_Q22_YourName_StudentNumber.
The pictures shown below, show to some of screenshots about created macro.
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Task 3.2: Modify the macro that you produced for Task 4 (a), so that the
following message is displayed after an apprentice has entered his or
her details using the interactive form: Welcome to Money Matters and
your first training session. Save your work as:
EUA_Assessment_Q31_YourName_StudentNumber.
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13
Figure 14
Figure 15
Figure 16
Figure 17
Figure 18
Figure 19
Figure 20
Figure 21
Task 5.4: Create a form for the Customers table. Include all fields in the
form. Use the Form Wizard to create a form. Using the New Customers
form, enter two additional customers:
Marion Morrison New Paltz NY 3 $150.00 March 12, 2010
Adam Jones Kingston RI 2 $250.00 March 17, 2010
Figure 22
Figure 23
Figure 24
Link: https://isuruvishwajith.weebly.com/
Figure 25
Figure 26
Figure 27
Figure 28
Content
Dear Sir,
I am writing this email to inquire if you have, or are likely to have, any job opportunities in
Alphabet Inc. I am really interested in working for your company, because,
• I am following a cyber security engineer degree.
• Industry professional with one years of experience.
• I was working as a long-time employee of a network related company.
Also, I would be prepared to commit to any training that might be required.
Please take a moment and go through my website for my personal details. (The link is:
https://isuruvishwajith.weebly.com/ ) that would be effective for you to find my
information and Also you can get an idea about me and my career life.
Isuru Vishwajith
Figure 29
Conclusion.
This assignment is providing a lot of information about end user applications. We can get
good knowledge about MS word, MS excel, MS PowerPoint, MS access and also how to
create a simple blog site. I explained above about the many activities we can do using these
end-user applications. I was completed these tasks within 2 weeks and all of tasks are
explain completely. Also, I provide MS excel worksheet, MS PowerPoint presentation, MS
access database and blog site I was created. therefore, who read this assignment can get
great knowledge about end user applications.
2021.05.03
2021.04.20
2021.04.21
2021.04.22
2021.04.23
2021.04.24
2021.04.25
2021.04.26
2021.04.27
2021.04.28
2021.04.29
2021.04.30
2021.05.01
2021.05.02
DATES
3. If you do not submit this declaration, your work will not be assessed.
4. If any student is found to have been dishonest, then the student may face disciplinary
action as stated in the IDM Nations Campus Plagiarism Policy.
2. I confirm that where ever I have used someone else’s words, concepts, graphics or data
in my work, I have clearly indicated exactly where I have done so, using the Harvard
referencing system.
(insert yes or no here):
3. I confirm that I have indicated by referencing, where I have used someone else’s words,
concepts, graphics or data, irrespective of whether I have quoted verbatim or I have
paraphrased in my own words.
4. I have clearly indicated in my assignment any work that has been contributed by another
student.
5. I have clearly indicated in my assignment any work that has been carried out
collaboratively with another student.
……………………………………………..
Student Signature