Exp19_Excel_Ch04_ML2_Riverwood_Realty

Exp19_Excel_Ch04_ML2_Riverwood_Realty

  

Exp19_Excel_Ch04_ML2_Riverwood_Realty

Project Description:

You work as a real estate agent for Riverwood Realty, an independent real estate agency in Utah. As part of your end of year reports, you compile a list of homes that have sold in your sales region. To complete your report you will create an Excel table, apply Filters, Sort, perform basic calculations using unqualified structured references, and prepare the document to print.

     

Start Excel. Download and open   the file named Exp19_Excel_Ch04_Assessment_Homes.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Freeze the panes so that the   column labels do not scroll offscreen.

 

Convert the data to a table and   name the table Sales.

 

Apply Purple, Table Style Dark   10 to the table.

 

Remove duplicate records from   the table. Excel should find and remove eight duplicate records.

 

Add a new column in column I   named Days   on Market. Use   unqualified structured references to calculate the days on market (Sale Date   – Listing Date) in column I. Set column I’s width to 14.

 

Apply a Total Row to the Sales   table. Set the Selling Price and Days on Market totals to Average.

 

Use Quick Analysis to apply the   default Top 10% conditional formatting to column F. 

 

Apply 3 Traffic Lights (Unrimmed)   conditional formatting icon set to column I. Set the icon to display green   for homes that sold within 45 days, yellow for 46 to 90, and red to homes   that took more than 90 days to sell.

 

Filter the data to only display   sales by the Selling Agent Hernandez.

 

Sort the table in Ascending   order by City (Column C). 

 

Set the range A1:I83 as the print area.

 

Save and close Exp19_Excel_Ch04_Assessment_Homes.xlsx.   Exit Excel. Submit the file as directed.

Java

1>>The assignment will be assessed using the following criteria:

  • Does the submission include the file “SuperPower.java”?
  • Does the file include a public class called “SuperPower”?
  • Does the class include a public method called “main”?
  • Is the “main” method static?
  • Does the main method have a String assignment statement that uses “JOptionPane.showInputDialog”?
  • Does the main method have a statement that uses “JOptionPane.showMessageDialog”?
  • Does the program convert the String from “JOptionPane.showInputDialog” using the “toUpperCase” method?
  • Does the submission include a screenshot that shows an Input dialog that asks, “What is your superpower?”
  • Does the submission include a screenshot that shows a Message dialog stating “ TO THE RESCUE!”, where “” is the input converted to upper case?

2>>

The Learning Journal is a tool for self-reflection on the learning process. The Learning Journal will be assessed by your instructor as part of your Final Grade.

Your learning journal entry must be a reflective statement that considers the following questions:

  • Describe what you did. This does not mean that you copy and paste from what you have posted or the assignments you have prepared. You need to describe what you did and how you did it.
  • Describe your reactions to what you did.
  • Describe any feedback you received or any specific interactions you had. Discuss how they were helpful.
  • Describe your feelings and attitudes.
  • Describe what you learned.

Another set of questions to consider in your learning journal statement include:

  • What surprised me or caused me to wonder?
  • What happened that felt particularly challenging? Why was it challenging to me?
  • What skills and knowledge do I recognize that I am gaining?
  • What am I realizing about myself as a learner?
  • In what ways am I able to apply the ideas and concepts gained to my own experience?

Finally, describe one important thing that you are thinking about in relation to the activity.

The Learning Journal entry should be a minimum of 400 words and not more than 750 words. Use APA citations and references if you use ideas from the readings or other sources.

Strategic plan Enterprise IT

 

Take assignment 2 as an initial plan and incorporate organisation’s values and objectives into a comprehensive IT strategic plan which will also include other existing applications, the factors such as budget, Return on Investment (ROI), Critical Success Factors (CSF) and Key Performance Indicator (KPI) as well as the overall security and ethical issues surrounding the organisation’s IT infrastructure.

https://www.techtarget.com/searchcio/tip/Free-IT-strategic-planning-templates-for-CIOs

Discussion

-need one page

 please explain in your own words the difference between Defense in Depth and Depth in Defense. Which do you think is more effective and why?  

Project 2

  • What are the key elements of a multilayer process for managing security vulnerabilities based on the concept of reasonable assurance?
  • What actions must be taken in response to a security incident?
  • What is computer forensics, and what role does it play in responding to a computer incident?

Usability Business Case Study

Case Study: http://www.id-book.com/downloads/casestudy_n_1.pdf

 

1. Summarize the case study (http://www.id-book.com/downloads/casestudy_n_1.pdf)

2. Identify the study method used and why it was appropriate (http://www.id-book.com/downloads/casestudy_n_1.pdf)

3. Explore some of the qualitative or quantitative methods gathered. (http://www.id-book.com/downloads/casestudy_n_1.pdf)

4. How would you conduct the study any differently? (from peer reviewed journal articles with references)

5. Given the nature in the advance of technology, how do you foresee technology changing the way studies such as these are conducted in the future? (from peer reviewed journal articles with references)

DAT/305

Respond to the following required content in a minimum of 175 words:

  1. Discuss the Boyer-Moore string search algorithm bad character and good suffix rule.
  2. Discuss how you would implement the Boyer-Moore string search algorithm to carry out a string search in literature or provide and thoroughly discuss a real-life example where a Boyer-Moore string search could be used.

Database Security Top Proposal

12. 

Propose and defend a topic for your final Text.  Write  450 words or more explaining why this topic is important for your peers to understand. Be focused and specific.  You should do a deep dive into a topic. Do not do a survey. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources. 

Write in format not in bulleted, numbered or other list format.