Exp19_Excel_Ch11_Cap_Donors

Exp19_Excel_Ch11_Cap_Donors

 

You are a development officer for a state university. As an officer, you manage a portfolio of important donors who contribute financially to different areas within the university. You categorize the donors based on the college or school for which they want their donations associated. You recently downloaded the portfolio to an Excel workbook. Based on the way the data downloads from the main database, you want to format the text for readability and to make it easier for you to analyze. In addition, you will create an advanced filter to review a list of donors for a particular college or school. Finally, you want to create a look up area to look up data for a specific donor and create a summary section.

2

The first column displays the   name of the college or school (such as ART   or BUSINESS) associated with each.   You want to assign a three-character code for each college and use that code   to attach to existing donor IDs to create a unique field.
 

  In cell B8, insert the LEFT function to extract the first three characters   from the college name in cell A8. Copy the function to the range B9:B35.

3

You now want to combine the college   ID and donor ID.
 

  In cell D8, insert the CONCAT function to combine the college ID in cell B8   with the donor ID in cell C8 with a hyphen between the two text strings. Copy   the function to the range D9:D35.

4

In cell J8, insert a text   function that displays the college name from cell A8 with just the first   letter capitalized, such as Engineering.   Copy the function to the range J9:J35.

5

The Full Name column displays   last and first names of the donors. You want to display last names only in a   separate column.
 

  In cell F8, type Schneider and use Flash Fill to fill in the last names for   the donors in the range F9:F35.

6

The Address column contains   street addresses, city names, and state abbreviations. To manage the address   list better, you will separate the data into three columns.
 

  Select the addresses in the range G8:G35 and convert the text to columns,   separating the data at commas .

7

The top-left section of the   spreadsheet is designed to be able to enter a donor’s ID, such as ENG-15, and   look up that person’s position in the list, display the donor’s full name,   and display the amount donated this year. The first step is to identify the   position number of the donor ID.
 

  In cell B3, insert the MATCH function to look up the donor ID in cell B2,   compare it to the list in the range D8:D35, and then return the donor’s   position within the list.

8

Now you are ready to use the   position number as an argument within the INDEX function.
 

  In cell B4, insert an INDEX function that uses the range D8:K35, looks up the   row position number from the MATCH function result, and then uses the column   position number for Full Name.

9

In cell B5, insert an INDEX   function that uses the range D8:K35, looks up the row position number
  from the MATCH function result, and then uses the column position number for   Donation.

10

You want to format the results   of the INDEX function.
 

  Format the value in cell B5 as Accounting Number Format with zero decimal   places.

11

To analyze the donor records,   you are ready to create criteria and output ranges. You will enter conditions   to find records for donors to the College of Business who donated $1,000 or   more.
 

  Copy the range A7:K7 to cell A38 to create the column labels for the criteria   range. Type Business in cell J39 and >=1000 in cell K39.

12

You are ready to create the   output area and perform the advanced filter.
 

  Copy the column labels to cell A42. Perform the advanced filter by copying   the records to
  the output area.

13

Now that you created a copy of   the records meeting the conditions, you are ready to enter database functions   in the Summary area.
 

  In cell K2, insert the database function to total the value of the donations   for the records that meet the conditions in the criteria range.

14

In cell K3, insert the database   function to calculate the average donation for the records that meet the   conditions in the criteria range.

15

In cell K4, insert the database   function to count the number of records that meet the conditions in the   criteria range.

16

Format the range K2:K3 with   Accounting Number Format with zero decimal places. Format cell K4 with Comma   Style with zero decimal places.

17

You want to use the FORMULATEXT   function to display the functions.
 

  In cell G2, insert the FORMULATEXT function to display the formula stored in   cell B3.
  In cell G3, insert the FORMULATEXT function to display the formula stored in   cell B4.
  In cell G4, insert the FORMULATEXT function to display the formula stored in   cell D8.
  In cell G5, insert the FORMULATEXT function to display the formula stored in   cell K2.

18

Create a footer with your name   on the left side, the sheet name code in the center, and the file name code   on the right side of the worksheet.

19

Save and close Exp19_Excel_Ch11_Cap_Donors.xlsx. Exit   Excel. Submit the file as directed.

Discussion week 2 – Information Governance

Question:  

In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results. From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

References***

No Plagiarism********* 

Python Scripting

  

Midterm Assessment – Web scraping and reading PDF

Task 1 – Web Scraping

Create a program that will scrape the sayings from: https://quotes.toscrape.com/page/2/

Set up your program to allow the user to input a page number (1-10) which will return the quotes from that page.

Deliverables for Task 1

· Program to pull and display the quotes from the quotes to scrape webpage

· Screenshot of your output from the program

Task 2 – Reading PDF

Create a program that will pull details from the PDF document: USCensus.pdf

Output the information into a text document names: _USCensus.txt

Deliverables for Task 2

· Program to read data from a PDF document

· Screenshot of your output from the program.

It Asset Management

 Identify the article(s) you read about IT asset management and inventory, including a link to the article.

500 words with references needed.

Discussion 250 words

The CIA Triad is a well-known, venerable model for the development of security policies used in identifying problem areas, along with necessary solutions in the arena of information security. It’s important to understand what the CIA Triad is, how it is used to plan and also to implement a quality security policy while understanding the various principles behind it. It’s also important to understand the limitations it presents. When you are informed, you can utilize the CIA Triad for what it has to offer and avoid the consequences that may come along by not understanding it.

Discussion Questions

  1. What are the components of triad of information security?
  2. How does the information security triad help us keep information secure?
  3. What is the importance of CIA triad explain them with examples?

Digital Forensics

 Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing). 

Case Study 1- Strategy applied in Project Management

  1. Due DateSunday, August 28, 202211:59 PMPoints Possible50
  2. Read the Case ” A Day in the Life” at the end of  chapter 1 and response to the following questions:
    Rachel, the project manager of a large information systems project, arrives at her office early to get caught up with work before her co-workers and project team arrive. However, as she enters the office she meets Neil, one of her fellow project managers, who also wants to get an early start on the day. Neil has just completed a project overseas. They spend 10 minutes socializing and catching up on personal news.
    (Rest of case not shown due to length.)

    1. How effectively do you think Rachel spent her day?
    2. What does the case tell you about what it is like to be a project manager?

Text

Title: Project Management: The Managerial Process 

ISBN: 9781260238860 

Authors: Clifford F. Gray, Erik W. Larson 

Publisher: McGraw-Hill Education 

Publication Date: 2020-01-09