Activity 5- Exe Proj

 Case Study 5.2: California’s High-Speed Rail Project

A goal of the Obama administration has been to promote high-speed rail across the most populous and geographically-dispersed states in the United States. The idea is to adopt more energy-saving initiatives while also helping to improve state’s infrastructure.  It is with this in mind that the Federal Government made billions available to various states in the 2008–2010 budget cycles.  After the Fall, 2010 elections, several states that had elected Republican governors refused the grants, suspicious that this seed money would not be sufficient to pay for what they viewed as unnecessary construction based on over-optimistic expectations of the need for and use of high-speed rail.  One of the states that accepted the money and has moved forward strongly into high-speed rail has been California, which has already begun work on a 65-mile section in the middle of the state, earning the derisive nickname, the “train to nowhere.”  This case details the state’s projections regarding the need for high-speed rail, against the views of infrastructure experts and critics who charge that for a state that is already in a severe budget crisis, this is just the sort of project that makes no sense economically or demographically.

Questions

  1. Assess the benefits and drawbacks of the high-speed rail project. In your opinion, do benefits outweigh drawbacks, or vice versa? Why? Justify your answer.
  2. What are the implications of starting a project based on tenuous projections that may or may not come true 10 years from now?
  3. Could you justify the California high-speed rail project from the perspective of a massive public works initiative? In other words, what other factors enter into the decision of whether to pursue a high-speed rail project? Why are they important?

 Text-

Title: Project Management

ISBN: 9780134730332

Authors: Pinto

Publisher: Pearson

Edition: 5TH 19

It472 week 4 assignment

  • Describe how Unified Modelling Language (UML) is used in systems design.
  • Give two examples of UML diagrams and explain in words the sequencing shown in the diagrams.

Submit a one to two-page paper in APA format. Include a cover page, abstract statement, in-text citations and more than one reference.

2 Sets of Customer Service Questions

Save each chapter 5 and 6 questions separately in a word document

Chapter 5

1. List three characteristics skilled professionals must display when facing difficult

customer situations.

2. What is empathy?

3. What are four preparatory steps you can take prior to each customer interaction in

order to get focused?

4. Why is it important to let an angry customer vent?

5. How do customers want their incidents and complaints to be handled?

6. What do you need to do if you are a predominantly left-brained service provider?

7. What do you need to do if you are a predominantly right-brained service provider??

8. List four techniques a person can use to stay calm when facing a difficult situation.

9. What physical benefits do you derive from taking a deep breath when under

pressure?

10. What is positive imagery?

————————————————————

Chapter 6

1. Define the term root cause.

2. Explain the relationship that exists between processes and procedures.

3. A(n) __________ is a sign or an indication that an incident has occurred.

4. List two types of data you must gather before you can begin diagnosing an incident.

5. What are two ways that a short incident description is used?

6. List three benefits that are derived by asking questions.

7. Why is incident management referred to as a “closed loop process”?

8. When can incident notification occur?

9. What are the goals of customer notification?

10. What does an Ishikawa diagram display?

Discussion Board, Programming Logic

For this Discussion Board, please complete the following:

A computer program may need to accomplish multiple tasks. For example, an automated teller machine (ATM) program can accomplish the following tasks:

  • Verifying user’s credential
  • Displaying the current balance
  • Depositing money
  • Withdrawing money

A function is a block of organized and reusable code that can be used to accomplish a specific task. Assume that you are the programmer hired by a bank to write a program for its automated teller machines (ATM). Give an example of a task that you want to use a function to accomplish in the program, and answer the following questions:

  • What are the benefits to using a function to accomplish that task?
  • Does the function need parameters or return value? Why or why not?
Alternate Instruction for Microsoft 365 Apps icon

How to work on a spreed sheet document using the information given

 

Eller Software Services has received contract revenue information in a text file. You import, sort, and filter the data. You also create a PivotTable, prepare a worksheet with subtotals, and format related data as an Excel table.

[Student Learning Outcomes 4.1, 4.3, 4.4, 4.5, 4.6, 4.8]

Files Needed: EllerSoftware-04.xlsx (Available from the Start File link.) and EllerSoftwareText-04.txt (Available from the Resources link.)

Completed Project File Name: [your name]-EllerSoftware-04.xlsx

Skills Covered in This Project

  • Import a text file.
  • Use AutoFilters.
  • Sort data by multiple columns.
  • Create a PivotTable.
  • Format fields in a PivotTable.
  • Use the Subtotal command.
  • Format data in an Excel table.
  • Sort data in an Excel table.

Alternate Instruction for Microsoft 365 Apps icon This image appears when a project instruction has changed to accommodate an update to Microsoft 365 Apps. If the instruction does not match your version of Office, try using the alternate instruction instead.

  1. Open the EllerSoftware-04.xlsx start file. Click the Enable Editing button. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Import the EllerSoftwareText-04.txt file downloaded from the Resources link and load it to begin in cell A4. The text file is tab-delimited.
  3. Format the values in column H as Currency with zero decimal places.
  4. Click cell G4 and use the AutoFilter arrow to sort by date oldest to newest.
  5. Click cell F4 and use the AutoFilter arrow to sort by product/service name in ascending order.
  6. Filter the Date column to show only contracts for September using the All Dates in the Period option.
  7. Edit the label in cell A2 to display Contract Amounts for September.
  8. Select cells A1:H2 and press Ctrl+1 to open the Format Cells dialog box. On the Alignment tab, choose Center Across Selection.
  9. Change the font size for cells A1:H2 to 20 pt (Figure 4-102) and close the Queries & Connections pane.Date header displays filter icon.Figure 4-102 Imported data sorted and filtered
  10. Copy the Contracts sheet to the end and name the copy Data.
  11. Clear the date filter.
  12. Select cell A5 and click the PivotTable button [Insert tab, Tables group]. The range is identified as the EllerSoftwareText file.
  13. Verify that New Worksheet is selected, deselect the Add this data to the Data Model button, and click OK.
  14. Name the sheet PivotTable. Close the Queries & Connections pane.
  15. Show the Product/Service and Contract fields in the PivotTable.
  16. Drag the Contract field from the Choose fields to add to report area below the Sum of Contract field in the Values area so that it appears twice in the report layout and the pane (Figure 4-103).Values are identical.Figure 4-103 “Contract” field appears twice in the report
  17. Select cell C4 and click the Field Settings button [PivotTable Analyze tab, Active Field group]. Type Average Contract as the Custom Name, choose Average as the calculation, and set the Number Format to Currency with zero decimal places.
    Alternate Instruction for Microsoft 365 Apps icon Select cell C4 and click the Field Settings button [PivotTable Tools Analyze tab, Active Field group]. Type Average Contract as the Custom Name, choose Average as the calculation, and set the Number Format to Currency with zero decimal places.
  18. Select cell B4 and set its Custom Name to Total Contracts and the number format to Currency with zero decimal places.
  19. Apply Brown, Pivot Style Dark 3.
  20. Select the Data sheet tab and copy cells A1:A2. Paste them in cell A1 on the PivotTable sheet.
  21. Select Align Left for cells A1:A2 and 16 pt. as the font size. Edit the label in cell A2 to display Contract Amounts, September through December (Figure 4-104).Completed PivotTableFigure 4-104 Completed PivotTable
  22. Copy the Data sheet to the end and name the copy Subtotals.
  23. Select cell D5 and sort by City in A to Z order.
  24. Select cell A5 and convert the table to a range. Select cells A5:H31 and apply No Fill [Home tab, Font group].
  25. Use the Subtotal command to show a SUM for the contract amounts for each city.
  26. Edit the label in cell A2 to display Contract Amounts by City.
  27. Format the sheet to Landscape orientation, center the page vertically, and scale it to fit one page.
  28. Click the Billable Hours sheet tab and select cell A4.
  29. Click the Format as Table button [Home tab, Styles group], use Orange, Table Style Medium 10, and remove the data connections.
  30. Type 5% Add On in cell E4 and press Enter.
  31. Build a formula in cell E5 to multiply cell D5 by 105% and press Enter to copy the formula.
  32. Select cells A1:A2 and left align them. Then select cells A1:E2, click the Launcher for the Alignment group [Home tab], and select Center Across Selection from the Horizontal list.
  33. Use the AutoFilter arrows to sort by date in oldest to newest order.
  34. Save and close the workbook (Figure 4-105).Excel 4-4 completedFigure 4-105 Excel 4-4 completed
  35. Upload and save your project file.

Benchmark – Cybersecurity Program

 Using all of the previous assignment information, students will present a comprehensive Cybersecurity Program that reports on the final state of their enterprise.

Refer to the “Cybersecurity Program Template,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

OSI Characteristics

Write a 2 to 3-page paper on the seven layers of the OSI model.

Identify the 7 layers of the OSI model.

Describe 2 or 3 characteristics, protocols, or functions of each layer (i.e., what happens in each layer or what it does) in 1 or 2 paragraphs each.

Cite at least 2 sources, such as video, library articles, or websites, other than your textbook in your assignment.

Format your references according to APA guidelines.

NIST Cybersecurity Framework (CSF) & ISO 27001 Certification Process

 Assessment Description

In this assignment, students will review the NIST cybersecurity framework and ISO 270001 certification process. In a visual format (such as table, diagram, or graphic) briefly explain the differences, similarities, and intersections between the two. Then, present the following in 750-1,000 words:

  1. A brief description of the NIST Cybersecurity framework
  2. A brief description of the ISO 270001 certification process
  3. The number of controls/sub-controls used in the NIST CSF and ISO 270001 certification process framework to support the protections around computer and cyber forensics
  4. An explanation as to why organizations should seek this framework and/or certification to base their security program strategy and decisions upon
  5. An explanation as to why ISO 270001 has rapidly become an industry best practice/standard against which organizations are basing their cybersecurity programs (including value-add, cost, and pros/cons)

Make sure to reference academic or NIST official publications (most current year available via the Internet) or other relevant sources published within the last 5 years.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

Blockchain Initiatives Literature Review

 While most applications of blockchain technology have emerged in the financial sector (for example, Zcash, Circle, and Abra), its practical applications go beyond finance, because essentially any type of digital asset can be tracked and traded through a blockchain. Many different industries are experimenting in the blockchain space, even though this experimentation is still in its early stages. Examples range from medical records (MedRec, PokitDok), to digital rights and micropayments (Brave Browser, Ascribe, Open Music Initiative), identity systems (uPort), and supply chains (Everledger, Hyperledger).

For your literature review this week, you are required to choose a blockchain initiative that interests you. It could be an existing application that you have come across in your own research, one of the examples listed above, or an idea that you may have for blockchain technology as a solution to a business problem.

You are to review the literature on your blockchain initiative and discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection.

Paper Layout:

  1. Title Page
  2. Table of contents:
    1. Use a Microsoft Enabled Table of Contents feature.
  3. Background:
    1. Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue. Be sure to discuss similar blockchain initiatives here.
  4. Research Questions:
    1. In the identified problem area that you are discussing, what were the research questions that were asked? Be sure to include main research questions from all the literature you are reviewing.
  5. Methodology:
    1. What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen. You will discuss the methodology for all the literature you are reviewing.
  6. Data Analysis:
    1. What were some of the findings, for example, if there were any hypotheses asked, were they supported?
  7. Conclusions:
    1. What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported? Be sure to also include the similarities and differences between the literature. Also discuss here the future of this blockchain initiative and if it is a viable initiative.

Paper requirements:

  • Be a minimum of 7 pages in length, not including the required cover page and reference pages.
  • Follow APA 7 guidelines. Be sure to conduct research on formatting literature reviews.
  • Your literature review should include a minimum of 8 scholarly peer-reviewed journal articles. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. You can use Grammarly for help with your grammar and spelling.

Assignment 300 words

 

1). Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.

2). Send a brief message (ten words minimum) using the Caesar Cypher.

Note your safe assign score. Score should be less than 25