Exp19_Excel_Ch12_CapAssessment_Teaching_Schedule

 

#Exp19_Excel_Ch12_CapAssessment_Teaching_Schedule 

#Excelch12CapAssessmentTeachingSchedule

#You have just started your first career as a high school teacher. To  jump start your planning process, you would like to create a teaching  schedule template to help plan your weekly tasks. You will create a  template, create custom macros to automatically insert dates, and  inspect the document for issues.

#     

Clear   all data validation in the range A1:G19.

Delete the sample text in cell   B2

Type Teaching Schedule in cell B1.

Type prepared by: in cell F1.

Delete the value in cell G1.

Add the following comment in   cell G1 Enter Name.

#Type Monday in cell C4 and use the fill handle to fill the   range D4:G4 with the remaining days of the week. 

#Use the document inspector to   inspect the document. Remove  document properties and personal information and   then click close.
 

  Note: Mac users, from the Excel menu, open your preferences, click  Security,   and then click the check box to Remove personal information  from this file on   save.

#Use the accessibility checker to   check the document for issues.  Accept the recommended actions for merged   cells and use the  recommended action to select Rose, Table Style Medium 23.   Close the  accessibility checker pane.

#Record a macro named ClearSchedule using the shortcut   CTRL+SHIFT+J. Add the description When run, this macro clears the values in the schedule  (no period). When run, the   macro should delete the values in cell G1  and in the ranges C3:G3, C5:G6,   C8:G9, C11:G12, C14:G15, C17:G19, in  that order.

Create a form control button   that fills cell F2. Assign the ClearSchedule macro and edit the button text   to Clear.

Create a form control button   that fills cell G2 and edit the button text to Insert Dates.

Open the VBA editor and create a   new module named DateStamp. Create a procedure named InsertDate. Insert the comment Inserts   weekly dates,   then enter the following code Range(“C3:G3”) = Array(Date, Date + 1, Date +   2, Date + 3, Date + 4)   and exit the VBA editor.

Assign the InsertDate macro to   the Insert Dates form control button.

Test both macros and then open   the VBA editor. Locate the module  containing the ClearSchedule macro. Copy   the code and paste it  starting in cell B2 in the Code worksheet. 

Locate the module containing the   InsertDate macro. Copy the code and paste it starting in cell D2.

Check the document for   compatibility with Excel 2010, 2013, and 2016.
 

  Note: Mac users, skip this step.

3/2 Discussion

  1. Post any question(s) you may have regarding the project. 
  2. If you have no questions for the instructor, provide a short sentence or paragraph commenting on your progress on the capstone project. 
  3. Word limit 250 

Your Ethical Framework

Please read pgs 67-95 in Ethics for the Information Age

Concerning your ethical framework, please answer the following two questions: 

1) When you have to address moral questions, please rank order from 1 (Highest) to 5 (Lowest) the five ethical frameworks (eg Kantianism, Act Utilitarianism, Rule Utilitarianism, Social Contract Theory, & Virtue Ethics) in terms of their meaning and usefulness to you.  What is the rationale for your rank ordering? 

2) In addition to your preferred ethical framework(s) above, what other factors do you generally consider when addressing moral questions?

please answer 2 separate questions

Presentation on roles and responsibilies of cloud consumer and provider in security controls

For this assignment’s scenario your management is considering deploying several VMs for the next project to the cloud in an IaaS service model to replace your current on-prem data center. They have asked you how hosting the workload in the cloud will change responsibility for security controls. Develop a PowerPoint presentation of no more than ten slides and provide guidance on who will be responsible (the cloud provider or your organization) for various security controls. Give specific examples using the VM you deployed in the previous module as a guide. Consider patching, intrusion response, software updates, network access, security monitoring, system redundancy, and physical security. 

Discuss confrontation and negotiation.

Discuss confrontation and negotiation.

This posting should be at least 250 words. Your primary posting can end with a “tag-line” or a related question of your own. 

Attached student posting either answer student’s questions or comment on their answering my question. Secondary responses should be substantial and well-meaning, between 100-125 words. Initial postings should comply with APA format. For secondary responses, APA is optional (but good practice).

Unit 6 Discussion: How You See Me

Unit 6 Discussion: How You See Me

Unit 6 Discussion: How You See MeAfter viewing the “How You See Me” short film series, discuss the intersection of culture and interpersonal communication.  More specifically, how does culture impact the way you communicate with individuals from diverse communities.  What is the biggest contributing factor in your perception of cultural groups which are different from yours (family, upbringing, media)?  What steps can be taken to communicate more effectively and personally with these groups?

ITSD325U21P

 

Assignment Details

Organizations must manage and administer an e-commerce site with attention to vulnerabilities to both organizational assets and client data. E-commerce creates potential vulnerabilities for the loss of personal information. Click the following article, which explores this topic:

Does E-Commerce Have a Digital Privacy Problem?

Search for and examine a case of an e-commerce site that has been compromised within the last 6 years. In your own words, summarize (2–3 paragraphs) what happened, addressing the following information in detail:

  • How many customers were affected and what kind of data was lost? If the organization was not sure (or did not say) what was lost, state this in your post and discuss any potential consequences for customers.
  • What steps did the organization take to address concerns? Alternatively, what lessons does this example offer?

Provide a reference (with link) for your case example.

When replying to fellow students, look for opportunities to connect their responses to other topics in the current unit, including points that you may have made in your own posts. You may also spot an opportunity to connect the discussion to an article or news story that you have read about, which you can link in your reply. In addition, you can share how your experience with the course content has shaped your opinions and ideas about e-commerce requirements and how participating in this discussion has done so.

Grammar, spelling, punctuation, and format should be correct and professional. Begin contributing to the discussion by Friday.

Reference

McKnight, P. (2019, July 12). Does e-commerce have a digital privacy problem? American Bar Association. https://www.americanbar.org/groups/business_law/publications/committee_newsletters/cyberspace/2019/201907/privacy/

COMP 3051 Algorithm Design and Analysis

  

Assignment 2

Instructions

According to our suggested 16 week “Course Schedule,” you should complete and submit Assignment 2 by the Sunday at the end of Week 6. This assignment is worth 10% of your final grade. To receive full marks, answer each of the following questions in a clear and comprehensive manner. You can find the assignment marking criteria at the end of this document.

Questions

1.  Show that if f(n) is O(h(n)) and g(n) is O(i(n)), then f(n) + g(n) is O(h(n) + i(n)).

[2 marks]

2. Show that 3(n + 1)7 + 2n log n is O(n7). Hint: Try applying the rules of Theorem 1.7. You will have to use the insert equations to answer this question. [2 marks]

3. Give an O(n)-time algorithm for computing the depth of each node of a tree T, where n is the number of nodes of T. Assume the existence of methods setDepth (v,d) and getDepth(v) that run in O(1) time.  [2 marks]

4. What does the following algorithm do? Analyze its worst-case running time and express it using “Big-Oh” notation. [2 marks] 

Algorithm Foo (a,n):

Input: two integers, a and n

Output: ?

k ß 0

b ß 1

while k < n do

k ßk + 1

b  ß b *a

return b

  

5. a. Describe (in pseudo-code) a findAll Elements (k) method of an AVL tree T. It should run in O(logn + s) time where n is the size of T and s is the number of elements returned (i.e., the number of nodes in T whose key is k).

b. Analyze the running time of your algorithm.

[2 marks]

  

Marking Criteria for Assignments

 

You will be awarded full marks if your   answer adequately answers the question addressed.

Total marks = 10

You will be awarded partial marks if your   answer demonstrates:

· Application of the major and   alternative approaches, methods, or algorithms to solve the problem.

· Evidence of appropriate   logic.

· Evidence of correct   computational skills and data structures.

· Inclusion of appropriate   comments or explanations.

For details about how to submit this assignment, refer to the “Assignment Submission Instructions” under the Assignments Overview tab of your course.