Exp19_Access_Ch2_Cap – Metropolitan Zoo 1.0 | Access Chapter 2

 

Exp19_Access_Ch2_Cap – Metropolitan Zoo 1.0 | Access Chapter 2

 

 The Metropolitan Zoo tracks its animal data in Excel. The organization decides to use a database to organize the data about the animals, their trainers, and the animal exhibits. In this project, you will open an existing database and create a new table. You will import an Excel file containing information about the animals, and query the database to determine which animals need a checkup. You will also create a query to obtain a listing of the animals in each exhibit.

Discussion Reply!!! About 50 words

 

  • What suggestions do you have for your classmates on their network cabling? 
  • Are there any other suggestions for what they should consider for their equipment setup? 

 

  • Where are you moving to for your new work-from-home  position? Which ISPs are available at this location? Which do you pick  and why? 
  • I will be moving to Smithfield, VA, to work for Smithfield Foods but  working from home as a cyber security analyst. The town of Smithfield  resides within the county of Isle of Wight. Due to the rural area, only 3  ISP are available: Spectrum Internet, HughesNet Internet, and T-Mobile  Home Internet. Of these three options, I would only choose Spectrum  Internet for two reasons. The first, the others use mobile hotspots, and  the second spectrum offers a Home Business option to have a hard line  installed along with wi-fi, so you have better coverage.
  • What equipment do you need for your  work-from-home position? What does your ISP provide? What does your  employer provide? What do you need to provide?
  • My home office will require a computer, modem, router, and all the  necessary power cords and cables to connect the devices. My company  would provide my Desktop with two-factor authentication. My ISP would  provide the modem and routers and the necessary coax and ethernet cables  for my wi-fi and wired internet. I would need to provide additional  IoT, such as a printer and tablet.
  • What network cabling will you be using, and which devices?
  • I will use coax and ethernet cables. The coax cable will be  connected from the wall to the back of the modem, the ethernet will  connect from the computer to the modem, and the ethernet will connect  the modem to the router for other wi-fi access.
  • How do you determine the IP addresses on your devices?
  • Since I have been using Windows 10 for my work computer, I could use  a few different ways to ascertain my IP addresses. First, you can use  the command prompt, type “cmd” in the search bar, right-click on the  command prompt and “run as administrator,” then, on the command line,  type “arp – a”  This will display all the IP addresses within the  network. Second, I could open the “My spectrum” app and go to my  internet option; select display connects to all connected IP addresses.
  • How will you set up equipment in your  office in your new home? Will you be using wireless or hard wire for  your network connection? What else should be considered?
  • I will be setting up all my equipment in my allocated office space. I  will have the modem and router on the desk with the computer, and my  printer will be next to the desk on the stand. Having all my equipment  close will allow easy access and minimum cables. I will have two sources  of the internet for work, the primary being wi-fi, but given that I  live in a rural area, the wi-fi can sometimes be spotty. For this  reason, my backup internet connection will be my wired coax line into my  modem, fed into my computer via ethernet Cat5 wire. My IoT devices will  be connected via wireless; if all else should fail (unlikely), I could  always use my cell phone as a mobile hotspot for emergencies.

References:

Internet Providers In My Area | Compare Plans by Address. (n.d.). Allconnect. https://www.allconnect.com/internetLinks to an external site.

Matters, C. (2021, July 23). How to Set up a Home Network: A Complete Guide. Cablematters.com; Cable Matters Blog. https://www.cablematters.com/blog/Networking/set-up-home-networkLinks to an external site.

Pratik. (2019, March 6). How to Find IP Address of Any Device On Your Network. TechWiser. https://techwiser.com/find-ip-address-of-any-device/Links to an external site.

Charter Communications. (2017). Business Internet Services – High-Speed Internet | Spectrum Business. Spectrum.com. https://www.spectrum.com/business/internetLinks to an external site.

Exp19_Access_Ch03_ML1 – Small Business Loans 1.0

 

Exp19_Access_Ch03_ML1 – Small Business Loans 1.0

 

Exp19_Access_Ch03_ML1 – Small Business Loans 1.0

You are the manager of a regional  business loan department for the U.S. Small Business Administration  office. You have decided to evaluate whether Access could be used in  place of the Excel worksheet you are currently using. You will create a  table, add some sample customers, and import some recent data from an  Excel spreadsheet. You will calculate the payments for the loans that  are currently on the books by creating a query using the Pmt function.  You will also summarize each loan by the type of loan (M=Mortgage,  C=Car, and O=Other).

In   Design view, create a new table. Add the first field named CustomerID with   AutoNumber Data Type. Add Company as the second field name, and FirstName as   the third field name. Accept the default data types.
 

  Save the Table with name as Customers. Click Yes, when prompted for defining Primary   Key.

Add the following fields to the   Customers table (in this order), accepting the default data type of Short   Text:
 

LastName
   City
   State
   Zip
 

  Verify that CustomerID is the primary field.

Save the table and switch to   Datasheet view. Add the following records to the table:
 

Company FirstName LastName City State Zip
Jones   and Co Robert Paterson Greensboro NC 27401
   Elements, Inc. Merve Kana Paterson NJ 07505
   Godshall Meats, LLC Francisco De La Cruz Beverly Hills CA 90210

Import the spreadsheet using the   downloaded Excel file a03_h2_Loans.xlsx   into a new table. Choose LoanID as the primary key and accept all other   defaults in the Import Wizard.

Open the Loans table in Design   view. Change the InterestRate field format to
   Percent. Change the field size for the CustomerID field to Long  Integer. Save   and close the table. Click Yes when prompted that some  data may be lost. 

Create a relationship between   the CustomerID fields in the  Customers and Loans tables. Enforce referential   integrity. Save and  close the Relationships window.

Create a query using the two   tables that will calculate the payment  amount for each loan. Add the   following fields: Company, LoanID,  Amount, InterestRate, Term, and LoanClass,   in that order. Sort the  query by LoanID in ascending order. Save the query as   Loan   Payments.

Use the Expression Builder to   add a calculated field named Payment  in the first blank column to   calculate the loan payment for each loan  using the Pmt function. Insert the   appropriate field names in place  of the placeholder arguments. Assume the   loans have monthly payments  (12 payments per year). Ensure the payment   displays as a positive  number. Run the query.

Switch to Design view and change   the format for the Payment  calculated field to Currency. Run the query again   to verify your  change.

In Datasheet view, add a Totals   row. Use it to calculate the sum of  the Amount column, the average   InterestRate, and the average Term.  Save and close the query.

Create a copy of Loan Payments.   Save the new query as Loan Payments Summary. Open the Loan Payments Summary   query in Design view and rearrange the columns as follows:
   LoanClass, LoanID, Amount, and InterestRate. Delete columns Company, Term,   and Payment.

Group the Loan Payments Summary   query by the LoanClass field.  Display the number of loans in the LoanID   column, the sum in the  Amount column, and the average in the InterestRate   column. Run the  query.

Switch to Design view and   display the Property Sheet. For the LoanID field, change the caption to Loans. For the Amount field, change   the caption to Total Amount and change the format to   Currency. For the InterestRate field, change the caption to Avg Interest   Rate and change the format to Percent. Run the query.   Save and close the query.

Close all database objects.   Close the database and then exit Access. Submit the database as directed.

Questions

 

  • 11.1 List and briefly define three classes of intruders.
  • 11.2 What are two common techniques used to protect a password file?
  • 11.3 What are three benefits that can be provided by an intrusion detection system?
  • 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
  • 11.5 What metrics are useful for profile-based intrusion detection?
  • 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
  • 11.7 What is a honeypot?
  • 11.8 What is a salt in the context of UNIX password management?
  • 11.9 List and briefly define four techniques used to avoid guessable passwords.

Complete your answers on a WORD Document

Statistics Power Point Presentation – Please have an in-depth background in Statistics Introduction You have learned lots about doing statistical analyses. It is time to work without a net. For the course project, you will address some questions that in

 Statistics Power Point Presentation – Please have an in-depth background in Statistics

Introduction

You have learned lots about doing statistical analyses. It is time to work without a net.

For the course project, you will address some questions that interest you with the statistical methodology learned in this course. You choose the question; you decide how to collect data; you do the analyses. Please select a topic that aligns with your degree, so that the knowledge that you gain is practical and helpful in your future career. The questions can address almost any topic (although I have veto power), including topics in psychology, sociology, natural science, medicine, public policy, sports, law, etc. Please see the project ideas in the course documents, if you need help. However, the data that you collect should be quantitative in nature.

The project requires you to synthesize all the material from the course. Hence, it is one of the best ways to solidify your understanding of statistical methods. Plus, you get answers to issues that pique your intellectual curiosity.

Activity Instructions
Create a PowerPoint presentation detailing your research.

  • Begin with very clear and well-defined hypotheses. You should think of questions that interest you first, and then worry about how to collect and analyze data to address those questions. Generally, vague topics lead to uninteresting projects.
  • The most important aspects of any statistical analysis are stating questions and collecting data. Hence, to get the full experience of running your own study, the project requires you to analyze data that you collect. It is not permissible to use data sets that have been put together by others. You are permitted to collect data off the web; however, you must be the one who decides on the analyses and who puts the data set together. Keep in mind that by the end of lectures, you will have learned many inferential statistical techniques, such as hypothesis testing with t, chi square tests for goodness of fit and independence, independent and dependent t tests, ANOVA, correlation, and regression. These techniques will help you address your question of interest.
  • Provide an adequate description of the methods and design of the study. Report on the possible biases associated with your data collection.
  • Be realistic in planning your research design: can you carry out what you have planned within a reasonable time period and investment of your own energy? The quality of the final product is what counts, not just the amount of perspiration that went into it!
  • Make use of the concepts and methods learned in this course, and not just general knowledge, in planning and completing this type of project.

Presentation Format
An effective presentation communicates your project in a clear and concise fashion. The slides should address the following six points:

  • Statement of the problem: Describe the questions you address and any key issues surrounding the questions.
  • Data collection: Explain how you collected the data. Include the sample type, sample size, and any questions you asked. Also, include response rates.
  • Analyses: Describe which inferential statistical test analysis that you did. Be ready to explain why you believe this method is justified.
  • Results: Present the six step hypothesis test. Include the EXCEL printout, and any tables or graphs that support your analyses (be judicious here–too many tables and graphs hurt the clarity of your message).
  • Conclusions: State your p-value and then the answer your question of interest, based upon the data that you collected.
  • Discussion: What implications do your results have for the population you sampled from? What could be done to improve the study if it was done again? What types of biases might exist?

Presentation Requirements

  • Length varies
  • Title slide
  • References slide

===============================================================================================================

Please note, this presentation should be focus on international import or merchandise if possible.

attached is the example provided by the instructor and the grading rubric

disction

– need one page

 

odule 11 question about Identify Threats

The increasing pace of digital transformation requires network administrators, technicians, engineers, architects, executives, and even users to consistently monitor shifting vulnerabilities and new threats. While you can never identify every threat to a network, it’s important to regularly identify the greatest threats and develop strategies to protect against them. After working through this module and building on all you’ve learned earlier in this course, you’re developing a solid understanding of the types of threats faced by today’s networks. Do some research online to find what today’s network admins are most concerned about. Then, respond to the following question:

  • In your opinion at this point in your career, what do you believe is the greatest threat network admins should work to mitigate on their networks?

Risk management

 

Risk management frameworks have a common set of core components. They are:

  • Program scope
  • Information risk objectives
  • Information risk policy 
  • Risk appetite/tolerance
  • Roles and responsibilities
  • Risk management life-cycle process
  • Risk management documentation
  • Management review

For each component, discuss:

  • A description of what it is
  • The different elements that comprise the component
  • How it used to manage risk

 

  • Assignment Format: APA format
  • Submission Format: MS Word
  • Length: 7 pages (not including cover & references pages)
  • Citations Required: minimum 5 citations (At least 2 Scholarly and 3 from other reliable sources)