For this assignment you will prepare the second section of your report in which you will analyze a given business process, explain how IT could be used to support it, and assess the benefits of applying information technology to improve the process. The paper should not exceed three double-spaced pages and must include at least two references. Prior to beginning this assignment, be sure you have read all of the materials, completed the quizzes, participated in the discussions provided in weeks 3 and 4, and completed the Stage 1 Assignment. They will prepare you to be successful in writing your paper. Be sure to read and follow the assignment instructions carefully and use this week’s reading, Analyzing Process Improvements Supported by IT, to guide your work.
PRST5770R50: Computer-Based Decision Modeling
I need assistance with developing a study guide that identify an example where ethics should be considered when developing applications in artificial intelligence, data management or technology. Explain in significant detail and elaborate on possible outcomes.
Excel_Comprehensive_Capstone2_Summer_Revenue
Excel_Comprehensive_Capstone2_Summer_Revenue
Excel_Comprehensive_Capstone2_Summer_Revenue
Project Description:
In this project, you will apply skills you practiced from the objectives in Excel Chapters 4 through 10. You will develop a workbook for Frank Osei, the Vice President of Finance, that includes financial information and analysis regarding summer product revenue.
Open the Excel file Student_Excel_Comp_Cap2_Summer_Revenue.xlsx downloaded with this project.
On the Maine Store worksheet, in the range B9:B16, use the Fill Series feature to enter interest rates beginning with 8.00%. Decrease the amounts by .50% ending with 4.50%. Format the rates as Percent Style with two decimal places and apply bold and center.
In cell B8, enter a PMT function using the information in the range B2:B4 to calculate a monthly payment. Be sure that the result displays as a positive number.
In cells B8:H16, create a Data Table using the information in cells B2:B4 where the row input cell is the Period and the column input cell is the rate. Apply the format in B8 to the results in the data table, and then AutoFit columns C:H. Format the payment option closest to and less than $10,000 per month with the Note cell style. Change the Orientation to Landscape.
On the Quarterly Apparel Costs worksheet, apply the Currency [0] cell style to the range B6:E6. Apply the Comma [0] cell style to the range B7:E17. To the range B18:E18, apply the Currency [0] and Total cell styles.
Name the ranges B6:E10 Swim_Costs; B11:E14 Shirt_Costs; B15:E16 Jacket_Costs; and B17:E17 Hats_Costs.
Insert a new row 15. In cell A15, type Go Explore Shirts. In cell B15, type 9500. In cell C15, type 9695. In cell D15, type 8315. In cell E15, type 9275. Display the Name Manager, and then edit the Shirt_Costs name to include row 15. Select Hats_Costs, and edit the name to Headwear_Costs. (Mac users, click Define Name and make edits using the Define Name dialog box.)
Click cell B19. On the Formulas tab, in the Formula Auditing group, click Error Checking, and then select Update Formula to Include Cells. Use the fill handle to copy the corrected formula from cell B19 across through cell E19.
On the Quarterly Apparel Costs worksheet, in cell B25, insert a SUM function to sum the Swim_Costs named range, using the name in the formula. Create similar formulas in the range B26:B28, being sure to use the range name in each formula. In B29, calculate a total, and then apply the apply Currency [0] and Total cell style. Apply the Currency [0] style to cell B25 and apply the Comma [0] style to the range B26:B28. Save the workbook.
On the Quarterly Apparel Costs worksheet, record a Macro using the name Sheet_Title and the Shortcut key CTRL+j. (Mac users, use Option+Command+j). Store the Macro in the workbook, and as the Description, type Report heading. Click cell A1, type Front Range Action Sports and then press CTRL+ENTER. Merge and center the text across the range A1:E1, and then apply the Title cell style. In cell A2, type Apparel Costs, and then press CTRL+ENTER. Merge and Center the text across the range A2:E2, and then apply the Heading 1 cell style. Click cell A1, and then stop recording the macro. Delete the text in A1:A2, and then test the macro.
Edit the Sheet_Title macro to display the Visual Basic Editor. Select and copy all of the code, close the Visual Basic Editor window, and then paste the code in cell A32. Display the worksheet in Page Break Preview. Move the page break to position it between rows 30 and 31 so that the VBA code displays on Page 2. Return to Normal View and save the file as a macro-free workbook.
On the Product Information worksheet, select the range A4:C9, and then sort the data by Style Code in ascending order. Select the range A5:C9 and then name the selection Lookup_Table.
On the Phone Order worksheet, in cell A9, type C-SW and then press TAB. In cell B9, use a VLOOKUP function to lookup the Item in cell A9 and insert the description from the Product Information worksheet using the Lookup_Table range as the table array. The description is in column 2 of the table array. Fill the formula down through B18. In cell C9, type 12 and in cell D9, type Blue and then press TAB.
In cell E9, use the VLOOKUP function to insert the unit price of the item in cell A9 using the Lookup_Table range as the table array. The unit price is in column 3 of the table array. Fill the formula down through E18.
In cell A10, type W-RR and in C10 type 12. In cell D10 type Yellow and then delete rows 11:18. Sum the Order Amount and apply the Total cell style.
On the Summer Attendance worksheet, in the range G4:G8, insert Line Sparklines to show the attendance trend for each event over the five-year period. Show the High Point and Low Point.
Insert a Line with Markers Chart using the ranges A3:F3 and A6:F6. Reposition the chart so that its upper left corner is in A11 and the lower right corner is in F25. Edit the Chart Title to Attendance at Event Live Arizona. Edit the Vertical (Value) Axis to set the Minimum to 6000 and then format the chart using Style 4.
On the Expense Report worksheet, in the range H15:H21, create formulas to sum the data in each row, not including Date and Description. In cell H22, enter a formula to sum the total expenses. Apply Accounting Number Format to the ranges C15:H15 and C21:H21. Apply Comma Style to the range C16:H20. In cell H22 apply Accounting Number Format and the Total cell style.
Select the ranges D8:F12 and A15:G21 and format the cells so that when the sheet is protected, the selected ranges are not locked. Protect the sheet and be sure the top check box to protect the worksheet and the first two check boxes in the list are selected. Enter the password go.
On the Summer Program Revenue sheet, in cell B4, create a DAVERAGE function to calculate the average of the Amount field for the Lessons category. The Criteria range has been set up for you in the range A3:A4. In cell C4, create a DSUM to calculate the total of the Amount field for the Lessons category. Format the range B4:C4 using Accounting Number Format.
In the Summer Program Revenue sheet, click cell A9, and then insert the Recommended PivotTable Sum of Amount by Location in a new worksheet. Rename the worksheet PivotTable and Chart. Use the Month field as the report filter. Use the Location field as the row labels and the Item field as the column labels. Format the values in the PivotTable using the Number category with zero decimal places and the 1000 separator.
On the PivotTable and Chart worksheet, insert a footer with the file name in the left section and the sheet name in the right section. Change the Orientation to Landscape and center the worksheet Horizontally. Fit the Width to 1 page.
On the PivotTable and Chart worksheet, insert a PivotChart using the Stacked Column chart type. Move the chart so that its upper left corner is positioned in cell A13, and then drag the lower right sizing handle so that the lower right corner of the chart is positioned in cell H35. Apply the Layout 3 chart layout, and Chart Style 9. Add and center Data Labels to the chart. Replace the text in the Chart Title with Summer Program Revenue and then hide all of the field buttons on the chart. Save the workbook.
Note, Mac users, select the range A4:G10 in the PivotTable, and then insert a stacked column chart. Follow the instructions to complete the chart, and ensure that the column headings of the PivotTable display in the legend. The row headings should display on the horizontal axis.
Display the Maine Store sheet—the first worksheet. Select cell B33, type 3, and then press ENTER. Use Solver to predict breaking even after 3 months. The Set Objective box, should be set to $B$38. Edit the To option to a Value of 0 and the By Changing Variable Cells box should display $B$34, $B$36. Keep the Solver solution.
Save and close the file and submit for grading.
Data security while migrating to cloud for healthcare organizations- Research paper
I am going to use the qualitative method for research work. Please see the attached doc for details. i will need to work with all the requirements.
syc1
- What key characteristics distinguish a professional from other kinds of workers, and is an IT worker considered a professional?
- What factors are transforming the professional services industry?
- What relationships must an IT worker manage, and what key ethical issues can arise in each?
Computer Security Project
Part 1: Current Security Threats
Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.
Scenario
It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College.
The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.
Tasks
You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis:
Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)
Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html)
Security organizations, such as Secunia (http://secunia.com/)
Your supervisor has also asked you to consider the following questions as you shortlist the threats:
What threats are new this year, and which have become more prevalent?
Why are these threats more common and why are they important?
What threats remain constant from year to year? Why?
What threats do you believe will become more critical in the next 12 months? Why?
What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s) does it target?
With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.
Part 2: Identify Vulnerabilities in IT Security
Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.
Scenario
Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.
Required Resources
Access to the Internet
Text sheet: Zenmap Intense Scan Results pdf file (hacking_ts_zenmapscan.pdf Download hacking_ts_zenmapscan.pdf)
Tasks
1. Analyze the results of the Zenmap scan. Your report must answer the following questions:
What are the first five open ports as identified by the Zenmap scan?
Include the port number
Include the service name
Include a brief description of how each is used
2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.
Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database .
Include the name and a brief description of each vulnerability.
3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.
4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.
Submission Requirements for both parts of the project:
- Format: Microsoft Word
- Font: Arial, 12-Point, Double-Space
- Citation Style: APA
- Length: Each part should have a minimum of 3 pages. So overall report size should be a minimum of 6 pages (excluding title page and bibliography).
Digital Forensics
A 3 page paper using 4-8 sources, with title page and reference page. The focus of the paper should be on the crime, policy, and cybersecurity aspects and concepts.
Creating a Virtual Image
Overview:
In this assignment, you will compare and contrast components of an operating system and general application concepts and uses.
Instructions:
Chapter 4 of your textbook includes a lab. You are not required to complete the lab but evaluate your computer environment to determine whether you can complete the lab.
In step 1 of the lab, you are directed to a website for the Virtual Box application. Open the End-user documentation, which defines what hardware and host OS environments are supported.
• Use the OS utilities discussed in the chapter to determine whether your system can support Virtual Box. o Show your system’s CPU and whether it supports virtualization. If your OS utilities do not show your CPU’s virtualization capabilities, go to the manufacturer’s website, and find the technical specs. o Show your system’s memory. o Show your system’s Hard Drive space available.
• Include screenshots and narrative to support your conclusion regarding your system: does it support virtualization/can you run Virtual Box? Explain why or why not. If your system can support Virtual Box, try installing it and completing the lab. Requirements:
• Submit a Word document in APA format.
• Two-three pages in length, excluding the Title and Reference pages.
• At least two resources. Be sure to read the criteria below by which your work will be evaluated before you write and again after you write.
IT (Electronic documents and record
You are designing an electronic document and record management system to facilitate the student advising process for undergraduate students such as yourself. You need to create a list of metadata items for one of the following documents (including some business-specific metadata) based on the Metadata Guidance from the National Archive website ( https://www.archives.gov/records-mgmt/bulletins/2015/2015-04.html ).
- Student Transcript;
- Graduation Petition Form
- Change of Program Form
- Degree Plan
- Transcript Request Form
- Add/Drop Form
Feel free to pick one of the form listed above. Describe the usage of the form selected. What are some most important metadata that should be created? List at least 10 of them. Do you think Social Security Number (SSN)should be one of the metadata entry in the form you picked? Why or why not?
Read the Green Computing Research
Read the Green Computing Research Project, Part 2 in Appendix C. Document the requirements and develop a scope statement.
Write a 2-3 page paper in which you:
1. Document the requirements based on the information provided and assumptions that you have made, including a requirements traceability matrix.
2. Include a list of questions to ask the sponsor about the project scope. Include at least six (6) questions for full credit.
3. Develop a scope statement for the project.
4. Describe product characteristics and deliverables
5. Use at least two quality resources in this assignment