HTML CSS Javascript

 Describe how HTML5, CSS, JavaScript, and JQuery all work in web applications. Describe server- and client-side interactions.  

  • APA Format
  • Write 4-5 pages 
  • Include at least three or more references.

Week 11 Assignment

Assignment 1

This a research project and on this week, Choose any one topic and should stick to the same topic for coming weeks. Write a short paragraph (250 words) describing your project and how you intend to research it.

· Cloud Computing

· Computer Forensics

· Data Center Security

· Disaster Recovery

Assignment 2

Do a bit of research on penetration testing techniques. Investigate and document the following:

· Five network penetration testing techniques

· Advantages and disadvantages of each

· One notable social engineering test

· Possible negative implications of penetration testing

Note: Please write between 250 words with intext citations and 2 references needed.

access control, IT securities

Introduction

User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

Scenario

You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.

Tasks

Your goals as the IT architect and IT security specialist are to:

  • Develop solutions to the issues that the specified location of IDI is facing.
  • Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.
  • Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.
  • Analyze the strengths and weaknesses in the current systems of IDI.
  • Address remote user and Web site user’s secure access requirements.
  • Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services.
  • Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.
  • Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.
  • Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location ( DUE ON SUNDAY).

ER Diagram using 3NF

  

Let’s consider the following scenario:

Papa Georgeo (AKA PG) is opening a Pizzeria and he needs a database to capture and maintain the data for the entities Sales, Customers, Products, Purchase, Suppliers, and Employees. 

Business Needs:

PG would like to capture all the sales data with the details of every order. An order could be consisted of multiple items. For example, a customer could order 3 large pizza, 1 bread sticks, and 2 beverages in one order with one order ID. The Sales schema should capt
ure and maintain order date, customer ID, Order Time, Sub Total, Tax Amount, Total Due, Order Item, Qty, Price Charged for each item, Discount Amount for each item etc. PG is going to offer a club card (AKA PG Card) for his customers which they will hand it to the cashier to get points (those points are known as, you guessed it correctly, PG points! ???? ) every time they buy anything from the pizzeria. A customer can get a free pizza when he/she has accumulated enough points.  In addition, PG would like to track who is buying what so he can create different promotions for his customers with that information. The restaurant will accept cash, checks, and all major credit cards as payment method.

Note: Find the complete question in the attached document

Mitigating cloud computing risks

Imagine you are an information security manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online that discuss the security risks related to cloud-based computing and storage. One that stood out was Cloud Computing Risk Assessment: A Case Study. You are asked to summarize the information you can find on the Internet and other available sources. The CIO wants to have a firm grasp on the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems should be monitored to ensure proper usage and data security.

Instructions

Write a 3–4 page paper in which you:

  1. Provide a summary analysis of the latest research available in this area.
  2. Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids. 
    • Include primary examples applicable from the case studies you reviewed.
  3. Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities.
  4. Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls.
  5. Use at least three quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:

  • Assess the risks and vulnerabilities with cloud computing along with controls for mitigating the risks and vulnerabilities.

GO19_AC_CH02_GRADER_2G_HW – Student Scholarships 1.0

GO19_AC_CH02_GRADER_2G_HW – Student Scholarships 1.0

GO19ACCH02GRADER2GHWStudent Scholarships1.0

  

Project Description:

In this project, you will use a database to answer questions about scholarships awarded to students at a college. You will create a relationship between two tables, create a query from an existing query, and create queries using text, numeric, compound, and wildcard criteria based using the fields in one or both tables. You will create calculated fields, group data when calculating statistics, create a crosstab query, and create a parameter query.

     

Start Access. Open the file ‘Student_Access_2G_Student_Scholarships.accdb‘ downloaded with this project.

 

Using   Student ID as the common field, create a one-to-many relationship between the   2G Students table and the 2G Scholarships Awarded table. Enforce referential   integrity and enable both cascade options.

 

Create   a relationship report with normal margins, and save it as 2G Relationships. Close all open objects.

 

In   the last record of the 2G Students table, change the Student ID from 9999999 to 2839403, and then close the table. (The   related records in the Scholarships Awarded table will automatically update.)

 

Create   a query in Query Design view based on the 2G Scholarships Awarded table to   answer the question: What is the   scholarship name, amount, and major for scholarships greater than or equal to   $500, sorted in ascending order by the Scholarship Name field? Display   the fields in the order listed in the question. Run the query. Eight records   match the criteria. Save the query as 2G Amount $500 or   More Query.   Close the query.

 

Copy   the 2G Amount $500 or More Query to create a new query with the name 2G Awards 4th Qtr Query and then redesign the query to answer   the question: Which scholarships   (Scholarship Name) were awarded between 10/1/22 and 12/31/22, for what amount, and for which   student (Student ID), sorted in ascending order by the Award Date field? Display only the fields necessary to answer   the question and in the order listed in the question. Run the query (five   records display). Save the query, and then close the query.

 

Create a query in Query Design view   based on the 2G Scholarships Awarded table to answer the question: Which scholarships (Scholarship Name) were   awarded for either Math or Business majors for amounts of more than $200,   sorted in descending order by the Amount field? Display the fields in the order   listed in the question. Run the query. Four records match the criteria.   (Hint: If six records display, switch to Design view and combine the majors   on one criteria line using OR.) Save the query as 2G Math OR Business Over $200 Query, and then close the query.

 

Create   a query in Query Design view based on the 2G Students table to answer the   question: What is the city, student ID,   first name, and last name of students from cities that begin with the letter   L, sorted in ascending order by the City field and by the Last Name field? Run the query (five records display). Save   the query as 2G L Cities Query,   and then close the query.

 

Create   a query in Query Design view based on the 2G Students table and all of the   fields to answer the question: For   which students is the Postal Code missing? Three records match the   criteria. Run the query (three records display). Save the query as 2G Missing Postal Code Query, and then close the query.

 

Create a query in Query Design view   based on both tables to answer the question: In ascending order by the Scholarship Name field, and including the   first name and last name of the scholarship recipient, what will be the total   value of each scholarship if the Board of Trustees donates an additional 50   percent of each award paid to students? (Hint: First calculate the amount   of the donation, naming the new field Board Donation,   and then run the query to be sure the correct results display (the first   record—Scholarship Name that begins with   Amanda—has a Board Donation of 125).

 

Display   the query in Design view. In the sixth column of the design grid, create a   new field named Total Donation   that will calculate and display the total donation when the amount is added   to the Board’s donation amount. Run the query.

 

Display   the query in Design view. Use the Property Sheet to format the Board Donation   field as Currency with 0 decimal places and the Total Donation field with 0   decimal places, and then close the Property Sheet. Run the query (the first   record—Scholarship Name that begins with   Amanda—has a Total Donation of $375.00), apply Best Fit to the   fields, save the query as 2G Board Donation Query,   and then close the query.

 

Create a query in Query Design view   based on the 2G Scholarships Awarded table and the Sum aggregate function to   answer the question: For each major,   what is the total scholarship amount, sorted in descending order by the   Amount field? Use the Property Sheet to format the Amount field with 0   decimal places, and then close the Property Sheet. Run the query (for the   Major of History, the total scholarship amount is $1,850). Apply Best Fit to the fields, save the query as 2G Amount by Major   Query, and then close the query.

 

Use the Query Wizard to create a crosstab   query based on the 2G Scholarships Awarded table with the Student ID field as   row headings and the Major field as column headings. Sum the Amount field,   and name the query 2G Student ID and Major Crosstab Query. Display the query in Design view. Use   the Property Sheet to format the last two columns with 0 decimal places, and   then close the Property Sheet. Run the query, apply Best Fit to the fields,   save the query, and then close the query.

 

Create a query in Query Design view   based on the 2G Scholarships Awarded table that prompts you to Enter the Major of the student, and then answers the   question: What is the scholarship name   and amount for a major, sorted in ascending order by the Scholarship Name   field? Run the query, and when   prompted, enter history   as the criteria (four records display). Display the query in Design view and   hide the Major field from the results. Run the query again, entering history when prompted. Save the query as 2G Major Parameter   Query, and then close the query.

kywk11its531wk10as

1. Based upon the current state of the art of robotics applications, which industries are most likely to embrace robotics? Why?

2. Watch the following two videos: https://www. youtube.com/watch?v=GHc63Xgc0-8 and https:// www.youtube.com/watch?v=ggN8wCWSIx4 for a different view on impact of AI on future jobs. What are your takeaways from these videos? What is the more likely scenario in your view? How can you prepare for the day when humans indeed may not need to apply for many jobs?

3. Identify applications other than those discussed in this chapter where Pepper is being used for commercial and personal purposes.

4.Conduct research to identify the most recent developments in self-driving cars

Write a PHP script to implement

  

Write a PHP script to implement a function which will display the current date. Also, have the script print out a message stating how many days until your birthday. You can “hardcode” your birth date into the script and have the script calculate the number of days until your birthday any way that you wish.

Programming Fundamentals (48023) – Assignment 2 

Due date: Monday, 4th June 2012, 9:00 am. 

Value: 20% 

Topics: Control flow, Arrays. 

Objectives: This assignment supports objectives 1-5. 

Introduction 

Assignment 2 extends the game of Assignment 1 to support any number of enemies, which are

to be stored as an array. 

Skeleton code 

Download the skeleton code from UTSOnline/Assignments/Assignment 2/Skeleton Code. Your

solution must be based on this skeleton code. 

Minimum requirements 

To receive any marks, your solution must meet the following minimum requirements: 

1. IMPORTANT: In your project, you will find a white document icon with a folded

corner. This is the README file for your project.

In this README file, you must keep a journal of every change that you submit to

plate. Each journal entry should begin on a new line, starting with the date of the

journal entry. In each journal entry, you should give an explanation of the code you

changed. For example:

 

14th of May – My first attempt at Task 2w. I added a method inside EnemyShip

to update the xyz field, and then I modified foo() to loop over all of the

enemy ships and call that method.

15th of May – Fixed the ArrayIndexOutOfBoundsException in method foo() by

making sure the for loop goes only up to position array.length-1.

15th of May – Fixed a few small indentation mistakes. 

You should always submit your progress to PLATE in small increments, and include a

journal entry along with each small increment that you make. For example, after

making your first attempt at task 1a below, add your journal entry immediately to the

README file and then submit your project to PLATE.

If you do not update your journal in this manner for any part of the assignment, then

you will not receive marks for that part of the assignment. 

Programming Fundamentals (48023) Autumn 2012 Assignment 2     

Page 1  

You must regularly submit to PLATE while developing your solution. You should

definitely NOT suddenly submit a completely working solution close to or on the due

date without submitting your progress (journal), because there will be no evidence that

you developed your solution. Any student who submits a substantial solution without

an equally substantial record of previous submissions (journal) during development will

receive ZERO. 

2. Your solution must be based on the given skeleton code. 

3. Your solution output must exactly match the benchmark output that is shown when

submitting to PLATE. 

4. Any existing public methods, fields or classes in the skeleton code must not be

renamed, have their parameters added/removed or return types changed, although you

are free to add additional methods, fields and classes. 

5. Tasks will not be marked unless they are completed in the order specified below. 

6. To receive marks for the HD Task, you must be present to demonstrate your solution in

your final lab (week 14). 

Specification and Tasks 

Before beginning, download and open the skeleton code from UTSOnline. This project

contains a solution to Assignment 1 which must be used as a starting point for Assignment2. 

The skeleton code project may be started by right-clicking on the UI class and selecting the

main() method. 

An alternative graphical user interface has also been provided for students who are curious to

see how graphics could be added to the program. To run this, right-click on the GUI class and

select its main() method. You are not required to make modifications to this class, and you are

free to remove it from your project at any time. 

Task 1: Rewrite the program to use arrays (40 marks) 

It is important to complete the following tasks exactly as specified, and exactly in the same

order. If you do not, PLATE will not be able to mark you. Be sure to submit your progress to

PLATE regularly. 

 1a) Replace the enemy1, enemy2 and enemy3 fields by a single array called enemies.

Throughout your Game, each time you refer to one of the fields enemy1, enemy2 or

enemy3, replace that reference to the field by a reference to a particular position in the

enemies array. For example, whenever you refer to enemy1, you should refer to

enemies[0] instead. In order to avoid a NullPointerException, you must also create the

enemies array in the constructor before you attempt to store enemies into it. 

 1b) Notice that the Game constructor now reads the number of enemies from the user

and stores this into a local variable numEnemies. Modify your constructor so that it no 

Programming Fundamentals (48023) Autumn 2012 Assignment 2     

Page 2  

longer creates 3 enemies, but instead creates however enemies the user requested,

according to the number that is stored in the local variable numEnemies. 

Modify each of the following methods to take into account the true length of the enemies array,

rather than assuming 3 enemies: 

 1c) toString() 

 1d) print() 

 1e) moveEnemies() 

 1f) movePlayer() 

 1g) over() 

Task 2: Add new features (50 marks) 

The following tasks are of varying levels of difficulty. In some cases, you may decide to skip a

task and move on to the next one, unless that task is marked as REQUIRED. Any task marked

as required cannot be skipped, and PLATE will not continue marking the later tasks until that

task is correctly implemented. Be sure to submit your progress to PLATE regularly. 

 2a) If the user types ‘1’ after the “move:” prompt, this will cause all of the enemy ships

to reverse direction. 

 2b) If a gun fires when multiple enemies are lined up in front of the gun, only the

enemy closest to the gun will be hit. Hint: The modify the fire() method in PlayerShip

and Gun to take the entire array of enemies, rather than a single enemy. 

 2c) If the user types ‘2’ after the “move:” prompt, all of the enemies in the array will be

sorted so that the enemy with the smallest x position will be placed into enemies[0], the

next smallest will be placed into enemies[1], and so on. You must implement one of the

sorting algorithms presented in the lectures. 

 2d) (REQUIRED) If an enemy is destroyed, it is resurrected 3*numEnemies moves

later with its initial life intact. 

 2e) If a user inputs a velocity for an enemy greater than 1, or less than -1, the velocity

will indicate how many positions the enemy will move in one step. Care is required

when an enemy hits a boundary and turns in the opposite direction. For example, if an

enemy is at position 2 and it moves at velocity 4, it will end up at position 6. But if the

enemy is at position 3 and it moves at velocity 4, it will end up at position 5, because it

would have hit the boundary and turned around before being able to move a total

distance of 4 positions. After it has turned around, it’s velocity would change to -4 to

indicate that it was moving left. For further clarification, submit your project to PLATE

to see the expected output. 

 2e) If the user types ‘3’ after the “move:” prompt, whichever enemy is directly in front

of the player will be moved back to the farthest row of enemies, and every enemy that

was behind it will be moved forward one row. For example, if there are 5 enemies

e1,e2,e3,e4,e5 and enemy e3 is directly in front of the player when ‘2’ is pressed, the

result will be e1,e2,e4,e5,e3. 

Programming Fundamentals (48023) Autumn 2012 Assignment 2     

Page 3  

 2e) If the user types ‘4’, all dead enemies (i.e. marked with an ‘X’ symbol) are removed

from the array completely. Note that since it is not possible to change the length of an

existing array, you will have to create a new shorter array, and copy all of the remaining

“living” enemies from the old array into the new array. 

Task 3: High Distinction (HD) task (10 marks) 

This task is intended for HD students. If you complete this task, you must demonstrate it at the

week 14 lab session, and it will be marked manually by your tutor. 

Make a copy of your project for Task 3. Your solution to Task 3 will be submitted separately

from your earlier tasks, and a separate submission page has been set up on PLATE for this

purpose under the name “Assignment 2 (HD Task)”. Although this task will not be

automatically marked by PLATE, you must still submit your solution to PLATE by the due

date for it to be marked. 

In your new Task 3 project, modify the game so that each enemy has both an x and y position.

Now, the height of each enemy is not determined by its position in the array but rather by the

value of the y coordinate of that enemy. At the beginning of the game, the enemies should be

placed into different rows (at different y positions), and the enemy on the bottom row should be

at least 5 spaces above the player. You have some degree of freedom as to the exact positions of

your enemies, as this task will be marked manually rather than by PLATE. 

Enemies not only move left and right, but also move down one step whenever they hit a left or

right boundary. If an enemy makes it to the bottom row where the player is, the player dies and

a “You Lose” message is displayed. 

Marking scheme 

Your solution will be marked according to the following scheme: 

Task 1: Rewrite program to use arrays (40%)

Task 2: Add new features 

(50%) 

Task 3: HD task 

(10%) 

Indentation consistency 

1 mark will be subtracted from your task 1 and

task 2 marks for each indentation mistake found.

To indent properly, code should be shifted right

by one tab between { and } and within nested

control structures such as if statements, switch

statements and loop statements. In a switch

statement, the code within each case should also

be indented. 

Tasks 1, 2 and indentation consistency are marked by PLATE. However, if your journal does

not show your progress for any sub-task marked by PLATE (e.g. 1a, 1b, 1c, …) you will not

receive any marks for that sub-task. Hence, the mark awarded by PLATE is not the final mark. 

Programming Fundamentals (48023) Autumn 2012 Assignment 2     

Page 4  

Task 3 will be marked by a tutor at the week 14 lab session while you demonstrate your

program. It will be marked based on the quality of your code, and on the quality of the program

from the user’s perspective. Your program should be easy to use and should gracefully handle

bad inputs by the user. You must also keep a journal for this task, and you must be prepared to

explain your code in person at the demonstration. 

Assignment submission, demonstration and return 

Your assignment must be submitted to PLATE (http://plate.it.uts.edu.au/) after completing each

task, and before the due date. 

There are two parts to your submission: 

1. Your assignment is to be submitted as a JAR file through the PLATE system, online, at

http://plate.it.uts.edu.au/. Tasks 1and 2 should be submitted under the assessment

“Assignment 2”, while Task 3 should be submitted under the assessment “Assignment 2

HD”. You may submit and resubmit as many times as you wish, before the due date.

Please note every time you submit your tasks on plate, the marks you receive are

indicative only. Your final marks for Assignment 2 will be available through PLATE

within 2 weeks after the due date.

2. If you attempted the HD task (Task 3), you must demonstrate your program in

your final lab session in week 14. Failure to demonstrate your HD task will result

in a zero mark for the HD task irrespective of the assignment being submitted to

PLATE. 

If for some reason you are unable to attend on this day, you must arrange with the

subject coordinator via email, before the due date, an alternate demonstration time. You

must bring your student ID card to the demonstration as proof of your identity. 

Late submission 

The assignment is due at 9:00 am on Monday, 4th June 2012. Each 24 hour period after this

time is considered to be an extra day late. For example, a submission at 9:01 am on Monday,

4th June is considered 1 day late, while a submission at 9:01 am on Tuesday, 5th June is

considered 2 days late. 

Your assignment will lose 20% of its original mark per day late, unless permission has been

given by the subject co-ordinator before the due date.

If your performance in an assessment item or items has been affected by extenuating or special

circumstances beyond your control you may apply for Special Consideration. Information on

how to apply can be found at http://www.sau.uts.edu.au/assessment/consideration.html 

Individual assessment 

This assignment must be done by yourself and not with anyone else. Group work is not

allowed and will be considered as academic misconduct. 

Programming Fundamentals (48023) Autumn 2012 Assignment 2     

Page 5  

Academic misconduct 

Working with another person on this assignment is not allowed and is considered as academic

misconduct. Do not show other people your code, or look at other people’s code, or discuss

assignment code with other people; it is an offence to have a copy of someone else’s

assignment (before the submission date). Do not post your assignment on the web. Posting

your assignment on the web and getting help through blogs or other websites is considered to

be an academic misconduct. 

To detect plagiarism, the subject uses an online system called PLATE available at

http://plate.it.uts.edu.au 

Students may find it useful to consult The UTS Coursework Assessment Policy & Procedure

Manual, at http://www.gsu.uts.edu.au/policies/assessment-coursework.html 

Expected work load 

It is expected that this assignment will take about 12 to 18 hours of work. A well-designed

solution to task 1 and 2 is expected to use approximately 110 lines of code. Depending on your

design, Task 3 may use anywhere from 50 to 150 lines of code. Some people may complete the

task in 3 hours, and some may need 30 hours or more; there is a huge variation in students’

experience and abilities. 

Frequently asked questions 

A FAQ (Frequently Asked Questions) will be maintained at

UTSOnline/Assignments/Assignment 2/FAQ. FAQs and their answers will be posted there as

they arrive. You should read the FAQ at least once before you hand in your solution, but to be

safe check it every couple of days. Anything posted on the FAQ will be considered as part of

the assignment specification. The FAQ will be frozen (no new entries) two days before the due

date. 

Discussion board 

A discussion board has been set up on UTSOnline to discuss the assignment. You may discuss

any task of the assignment; however you must not share actual code from the assignment on

the board. The FAQ should always be checked before asking questions on the discussion board. 

Rules for use of the discussion board are published on the discussion board itself. Please read

these rules carefully. 

Programming Fundamentals (48023) Autumn 2012 Assignment 2     

Page 6   

Exp19_Excel_Ch10_Cap_Auto_Sales| Exp19 Excel Ch10 Cap Auto Sales

 

Exp19_Excel_Ch10_Cap_Auto_Sales| Exp19 Excel Ch10 Cap Auto Sales

#Start   Excel. Download and open the file named Exp19_Excel_Ch10_Cap-AutoSales.xlsx. Grader has automatically added   your last name to the beginning of the filename.

#Use Get & Transform (Power   Query) to import the file e10c1Agents.csv.   
   Hint: Get Data is located on the Data tab in the Get & Transform Data   group.

Rename the worksheet Agents.
   Hint: Double click the worksheet tab to edit the sheet name.

#Use Get & Transform (Power   Query) to import the Vehicles table from the file e10c1Vehicles.accdb.
   Hint: Get Data is located on the Data tab in the Get & Transform Data   group.

Rename the worksheet Sales.
   Hint: Double click the worksheet tab to edit the sheet name.

#Load the file e10c1Customer_Leads.txt in the Power   Query Editor. Use the Power Query Editor to ensure the first row is used as   Headers. Close and load the table.
   Hint: To open the data in the Power Query Editor click Edit on the Import   window.

Rename the worksheet Customer_Leads.
   Hint: Double click the worksheet tab to edit the sheet name.
 

Add the Vehicles, e10c1Agents,   and e10c1Customer_Leads tables to the data model.
 

  Hint: Manage Data Model is located on the Data tab in the Data Tools group.

#Define the following   relationship:
   Table:
   e10c1Agents
   Field:
   AgentID
   Table:
   Vehicles
   Field:
   AgentID
   Hint: Relationships is located on the Data tab in the Data Tools group.

#Use Power Pivot to create a   PivotTable on Sheet1 starting in cell  B3. Add the Last field from the   e10c1Agents table to the Rows area and  Price from the Vehicles table to the   Values area.
 

  Hint: Power Pivot is an Excel add-in that must be loaded. Power  Pivot can be   loaded by accessing COM add-ins in Excel options. Once  loaded, the Power   Pivot tab is located on the Office ribbon.

Format the range C4:C20 with   Accounting Number Format.
 

  Hint: Accounting Number Format is located on the Home tab in the Number   group.

Insert a Clustered Column Pivot   Chart. Position the chart so the upper left corner is in the center of cell   D3.
 

  Hint: #PivotChart is located on the Analyze tab in the Tools group.

Add the Chart Title Sales.
   Hint: Chart elements can be added or edited on the Design tab in the Chart   Layouts group. 

Rename the worksheet SalesAnalysis.
   Hint: Double-click the worksheet tab to edit the sheet name.