Question 3

please answer below questions(Plagiarism applies) 

  1. What is a data model?
  2. What is a high-level conceptual data model?
  3. What is an entity? An attribute? A relationship?
  4. List and briefly describe the common record-based logical data models.

prototypins

https://www.youtube.com/watch?v=ppnRQD06ggY   https://www.nngroup.com/articles/ux-prototype-hi-lo-fidelity/. https://www.nngroup.com/articles/mozilla-paper-prototype/.

https://neiu.desire2learn.com/d2l/common/dialogs/quickLink/quickLink.d2l?ou=2982504&type=content&rcode=NEIU-656756

https://neiu.desire2learn.com/d2l/common/dialogs/quickLink/quickLink.d2l?ou=2982504&type=content&rcode=NEIU-656274

Assignment

 
The recent advances in information and communication technology (ICT) has promoted the evolution of conventional computer-aided manufacturing industry to smart data-driven manufacturing. Data analytics in massive manufacturing data can extract huge business values while it can also result in research challenges due to the heterogeneous data types, enormous volume and real-time velocity of manufacturing data. 

Exp19_Excel_Ch02_CapAssessment_Inland_Jewelers

  

Exp19_Excel_Ch02_CapAssessment_Inland_Jewelers

 Exp19 Excel Ch02 CapAssessment Inland Jewelers 

  

Project Description:

You are an account manager for Inland Jewelers, a regional company that makes custom class rings for graduating seniors. Your supervisor requested a workbook to report on new accounts created on payment plans. The report should provide details on total costs to the student as well as payment information. Each ring financed has a base price that can fluctuate based on ring personalization.

     

Start   Excel. Download and open the file named Exp19_Excel_Ch02_Cap_InlandJewelers.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

Insert a function in cell B2 to   display the current date from your system.

 

With cell B2 selected, set the   width of column B to AutoFit.

 

Insert a VLOOKUP function in   cell C5 to display the ring cost for the first student. The cost of the ring   type should be an exact match. Use appropriate relative and absolute cell   references.

 

Copy the formula from cell C5 to   the range C6:C11.

 

Apply Accounting number format   to the range C5:C11.

 

Insert an IF function in cell E5 to calculate the total   due. If the student has chosen to personalize the ring, there is an   additional charge of 5% located in cell B21 that must be added to the cost of   the ring; if not, the student only pays the base price. Use appropriate   relative and absolute cell references.

 

Copy the formula from cell E5 to   the range E6:E11.

 

Apply Accounting number format   to the range E5:E11.

 

Insert a function in cell G5 to   calculate the first student’s monthly payment, using appropriate relative and   absolute cell references. Ensure the result is a positive number.

 

Copy the formula from cell G5 to   the range G6:G11.

 

Apply Accounting number format   to the range G5:G11.

 

Calculate totals in cells C12,   E12, and G12.

 

Apply Accounting number format   to the cells C12, E12, and G12.

 

Set 0.3″ left and right   margins and ensure the page prints on only one page.

 

Insert a footer with your name   on the left side, the sheet name in the center, and the file name on the   right side.

 

Save and close Exp19_Excel_Ch02_Cap_InlandJewelers.xlsx.   Exit Excel. Submit the file as directed

Cybersecurity Program Maintenance

  

Create an actionable plan including executive level support and budget allocation to ensure security controls can be rapidly updated and expanded as the threat environment increases.

The actionable plan should include (but is not limited to):

  1. Procedures      to track performance
  2. Procedures      to monitor and measure performance for areas of improvement
  3. Procedures      to identify new threats, vulnerabilities, or any countermeasures
  4. Procedures      to obtain feedback on the effectiveness of policies
  5. Procedures      and technical tools to monitor the internal and external environment
  6. Procedures      for budget allocation
  7. Procedures      to catch any oversights

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Cybersecurity Program Maintenance Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

Two Articles

 Find at least two articles (one journal article and one white paper) that talk about storytelling, especially within the context of analytics (i.e., data-driven storytelling). Read and critically analyze the article – reflect on your understanding and opinions about the importance of storytelling in BI and business analytics. Share a ‘link’ to each article at the end of your reflection 

Length:300 words

citations Required