Exp19_Excel_Ch03_ML1_Airports

Exp19_Excel_Ch03_ML1_Airports

  

Project Description:

As an analyst for the airline industry, you track the number of passengers at the top six major U.S. airports: Atlanta (ATL), Chicago (ORD), Los Angeles (LAX), Dallas/Fort Worth (DFW), Denver (DEN), and New York (JFK). You researched passenger data and created a worksheet that lists the number of total yearly passengers at the top six airports. To prepare for an upcoming meeting, you will create a clustered column chart to compare the number of passengers at each airport. Then, you will create a line chart that compares trends over time. Next, you will create a bar chart to compare the passenger count for the latest year of data available and then emphasize the airport with the largest number of passenger traffic. Finally, you want to insert sparklines to visually represent trends in passengers at each airport over the 10-year period.

     

Start   Excel. Download and open the file named Exp19_Excel_Ch03_ML1_Airports.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

 

You want to create a clustered   column chart to depict the passenger counts at the six airports over several   years.
  Use Quick Analysis to create a clustered column chart for the range A4:L10.   Cut the chart and paste it in cell A15.

 

You want to customize the column   chart with a chart title, display the years as a data series, enlarge the chart   to be easier to read, and apply a chart style.
  •Type Passengers   by Top U.S. Airports   as the chart title.
  •Swap the data on the category axis and in the legend.
  •Set a 3.5″ height and 11.4″ width.
  •Apply the Style 7 chart style.

 

The value axis takes up a lot of   space for the numbers. You will adjust the value axis to simplify it.
  •Change the display units to Millions for the value axis.
  •Edit the axis title to display Millions of Passengers.

 

 

You want to focus on the 2016 data   series by adding data labels.
  Display data labels above the columns for the 2016 data series only.

 

Applying a fill color to the   chart area will make the chart visually appealing.
  Apply the Light Gradient – Accent 2 preset gradient fill to the chart area.

 

 

A best practice is to add Alt   Text to a chart for accessibility compliance.
  Add Alt Text: The chart displays the number of passengers in millions   for the top six airports from 2006 to 2016. (including the period).

 

When you change the workbook   theme, Excel applies that theme to the chart styles.
  Change the workbook theme to Slice.

 

 

You want to create a bar chart   to display passenger counts for only one year.
  Create a recommended clustered bar chart for the range A5:A10 and L5:L10 and move   the chart to a chart sheet named Bar Chart.

 

You want to customize the bar   chart.
  •Change the chart color to Colorful Palette 3.
  •Enter Passengers   at Top 6 U.S. Airports in 2016 as the chart title.
  •Apply the Style 5 chart style.
  •Add Alt Text: The bar chart shows passengers at Top 6 U.S. Airports   in 2016. Atlanta had the most passengers. (including the period).

 

 

Modifying the axes will improve   readability of the bar chart.
  •Change the font size to 10 for the category axis and value axis.
  •Change the value axis Maximum Bound to 1.1E8.

 

 

You will format a data point so   that it stands out and then add gridlines to enhance readability in the bar   chart.
  •Format the Atlanta data point with Dark Blue, Text 2 fill color.
  •Add Primary Minor Vertical gridlines.

 

A line chart effectively shows   trends over time for the passenger counts at the different airports.
  Create a line chart using the range A4:L10 in the Passenger worksheet and   move the chart to a chart sheet named Line Chart. Add a chart title Passengers   at U.S. Airports 2006-2016 and bold the title.

 

 

You want to customize the line   chart.
  •Set the Minimum Bound at 4.0E7 for the value axis. The Maximum Bound should change to 1.1E8   automatically.
  •Set the Vertical (Value) Axis Display units to Millions. Delete the Vertical   (Value) Axis Display Units Label from the upper-left corner of the chart. Add   a value axis title In Millions.
  •Change the font size to 10 for the value axis and category axis.
  •Move the legend to the top.
  •Filter the chart by deselecting the odd-numbered years.
  •Add Alt Text: The line chart displays trends for top six U.S.   airports from 2006 to 2016 at two-year intervals. (including the period).

 

Software Engineering

1)  In version control, there has been some debate on how to implement the internal storage of the different versions of an artifact. One argument is to keep the complete copy of each version. Another is to keep only the delta changes from version to version, with the first version being the only complete copy.

a. Give one reason why you may want to keep a complete copy of each version.

b. Give one reason why you may want to keep only the delta. 

c. What would be the drawback of each of these approaches?

2)  Visit the online customer support site of a software product company and compare the list of support functions it offers against your list from Review Question 1.

List three customer support functions that a customer support/service organization performs.

MoleMash – Enhanced

The MoleMash is an important project to work on as it allows you to start working with some of new functions and components that we haven’t explored yet. This includes working through images, random settings, allowing users to have control over timing, labels and other options. Instructions: • If you haven’t already, log into the MIT App Inventor and download the AI2 Companion App if you have an Android device. If you don’t have access to an Android, you can use the online simulator. • Complete the MoleMash app as a starting point in MIT App Inventor and make sure it works correctly. You’ll now focus on customizing it as part of the assignment this week. • Once you have completed the tutorial from Chapter 3, it is now time to customize it by changing and altering the following: o Change the image that is used for the mole. o Add buttons to let the user make the mole move faster or slower. o Add a label to keep track of the number of times that the mole has moved. o Add a second ImageSprite with an image that the user should not hit. If the user touches it, the user should have their score reduced. o Change the color of the background (or use an image). o Change the font and text to make the app look more professional. o Use a new block of your choice to add some unique feature to the game. CIS290 – Mobile Application Development MoleMash – Enhanced Requirements: • Submit a zipped file that contains all your apps that you’ve created. • Include screenshots to demonstrate what your app looks like.

https://www.oreilly.com/library/view/app-inventor-2/9781491907214/ch03.html#molemash

IT214: Computer Science and Engineering

 

Discussion:

WRITE THE PSEUDOCODE for the following…

Write the PSEUDOCODE  (Python program) to convert temperature from Celsius to Fahrenheit and Kelvins; from Fahrenheit to Celsius and Kelvins.

Document your program – to include your name, course, date written, and the formulas used in the conversions.

Instruct the user on how to enter the data requested.

Required output – Date, time, temperature entered, converted temperature, and the exact phrase “This program was written by .”

risk management

 

  1. Compare the ISO/IEC 27001 outline with the NIST documents discussed in this chapter. Which areas, if any, are missing from the NIST documents? Identify the strengths and weaknesses of the NIST programs compared to the ISO standard.
  2. Search the Internet for the term security best practices. Compare your findings to the recommended practices outlined in the NIST documents.
  3. Search the Internet for the term data classification model. Identify two such models and then compare and contrast the categories those models use for the various levels of classification.
  4. Search the Internet for the term Treadway Commission. What was the Treadway Commission, and what is its major legacy in the field of InfoSec?

 5. Download and review “NIST SP 800-55, Rev. 1: Performance Measurement Guide for Information Security.” Using this document, identify five measures you would be interested in finding the results from based on your home computing systems and/or network.

6. Using the template provided in Table 9-1, develop documentation for one of the performance measurements you selected in Exercise 4.

A single server illustration with users going through public internet to access a cloud  virtual server app.

Cloud Provider Evaluation Project 3

Project: Cloud Provider Evaluation Start Here

Since you have become familiar with foundations of cloud computing technologies, along with their risks and the legal and compliance issues, you will now explore cloud offerings of popular cloud providers and evaluate them to recommend one that would be the best fit for BallotOnline.

In this project, you will first learn about networking in the cloud and auxiliary cloud services provided by cloud vendors. Next, you will explore cloud computing trends, best practices, and issues involved in migrating IT deployments to the cloud, as well as typical architectures of cloud deployments. Then, you will apply your findings to propose a general architecture for BallotOnline’s cloud deployment to best address the company’s business requirements.

Once you have selected a deployment architecture, you will research two leading cloud vendors: Amazon Web Services (AWS) and Microsoft Azure. Exploring and comparing the tools available for application migration will enable you to recommend a vendor to the executives in your final report. The final deliverable is a written report to BallotOnline management, describing the results of your research and recommending the cloud deployment architecture and the vendor for its deployment, with justification.

Your final report should demonstrate that you understand the IT needs of the organization as you evaluate and select cloud providers. The report should include your insights on the appropriate direction to take to handle the company’s IT business needs. You will also be assessed on the ability to integrate relevant risk, policy, and compliance consideration into the recommendations, as well as the clarity of your writing and a demonstration of logical, step-by-step decision making to formulate and justify your ideas.

Take Note

This project has a hands-on lab that you need to complete. Instructions for the lab are included in the steps of this project. If you have technical difficulties in completing the lab, we have technology support assistants available to help.

Competencies

Your work will be evaluated using the competencies listed below.

· 2.2: Locate and access sufficient information to investigate the issue or problem.

· 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

· 2.4: Consider and analyze information in context to the issue or problem.

· 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.

· 5.4: Articulate insights to leadership on the appropriate course of direction on the identified IT business needs.

· 6.1: Articulate the systems architecture of the cloud – cloud infrastructure, cloud service, cloud platform, and cloud storage.

· 6.6: Evaluate and select cloud providers (AWS, Azure, VMware, Google Cloud, IBM).

· 6.8: Review, evaluate, and utilize emerging technologies related to cloud to support business needs.

Step 1: Research Networking and Auxiliary Services in the Cloud

The executives at BallotOnline have been impressed with your research on cloud computing thus far. While there are a variety of cloud providers, BallotOnline is considering using Amazon Web Services (AWS) and Microsoft Azure, two of the top providers in the market. BallotOnline’s executives want you to help determine which would be the best provider for the organization.

You will start with learning about internet networking basics and cloud networking. You will also research many cloud services that cloud providers make available to their customers to help them take full advantage of cloud service and deployment models.

Step 2: Research Cloud Trends, Best Practices, and Migration Issues

The cloud computing revolution is redefining ways that companies of all sizes use information technology. The cloud landscape shifts rapidly, and current trends reflect this rapid pace of change. You likely got an idea about this in the last step when you conducted research on cloud architecture. Now, continue gathering information for your final report by assessing:

· issues outside the company, such as emerging issues in the industry, regulatory changes, and general trends in cloud computing to gain an understanding of how these issues may influence BallotOnline’s decisions;

· best practices for cloud implementation and assess whether BallotOnline can benefit from these;

· cloud migration strategies for the application and data, since BallotOnline is moving an existing web application to the cloud, making sure that the application is configured properly for the system architecture of your cloud deployment; and

· IT change management techniques that could help BallotOnline make this transition.

Step 3: Research Typical Architectures of Cloud Deployments

In the previous step, you considered best practices and trends in the cloud industry. Next, you will have to look at the kinds of architectures needed for cloud.

Because most elements of cloud deployments are implemented in a virtualized environment controlled by software, the degree of freedom in defining your deployment of cloud reference models is unprecedented. You can define the number of virtual servers required and the configuration, and even change them dynamically as needed. You can also define your virtual local area networks (LANs) and subnets, and place servers in them to implement network security requirements.

The basic cloud deployment components are cloud consumer, cloud provider, and cloud carrier, with cloud brokers and auditor as possible additions.

Typical cloud architectures of cloud deployments vary from single server (suitable for proof-of-concept engagements) and multiserver architectures with various servers carrying different software components and occupying different security zones, to geographically dispersed deployments to achieve high availability, resilience, and speed of delivery. There are several issues to consider when selecting a server architecture, including cost, scalability, performance, and use of management.

For this step, research the typical architectures of cloud deployments and begin to consider what might be a good fit for BallotOnline. Discuss your findings and thoughts with your colleagues in the Discussion: Cloud Architectures forum.

In the next step, you will continue research, this time on trends in cloud computing as well as issues that can arise during data migration.

Step 4: Propose Cloud Architecture for BallotOnline Deployment

Now that you have looked into cloud architectures, in this step, you will propose the cloud deployment architecture for BallotOnline, applying the knowledge of typical architectural elements of cloud deployment from the project’s initial step. You will also consider trends and migration issues from a previous step. Your recommendation should consider the company’s business requirements.

Recall that the company has an existing web application that it wants to move to the cloud, and also that the company wants to expand its business to other parts of the world. In earlier projects, you learned about and analyzed the IT business requirements for BallotOnline. Among them were demands for application and data security, data encryption, and separation for deployments overseas. Also, the application should handle load peaks during election times in different regions.

Specific technical requirements state that BallotOnline is a web application, written using the popular open-source LAMP (Linux, Apache, MySQL, PHP) software suite and the PHP application.

Take Action

Describe your proposed architecture by submitting a report with a drawing of the architecture (hand-drawn or computer-created) diagram and explaining its elements in the dropbox below.

Here are some sample drawings of typical cloud architectures to give you an idea.

Typical Cloud Architectures

Single Server

The most basic use of the cloud is to provision a single virtual server, running your application along with supporting service applications such as a database. Although a single server is not much of an architecture, it can be used in a proof of concept project to get your first experience with a particular cloud provider and see how easy and how fast the provisioning process is.

A single server illustration with users going through public internet to access a cloud  virtual server app.

Single Server with Services

Instead of packing everything into a single server, a cloud consumer can advantage of services available from the cloud provider. Here, we illustrate the use of a firewall service and a database service. The provider will be responsible for provisioning the services and keeping them running. The cloud consumer needs to populate and administer the data in the database service. To accomplish that, the cloud consumer’s database administrator will access the database using a virtual private network (VPN) connection over the Internet to ensure security. The virtual server will run the business application and will connect to the database service via a private network within the cloud provider’s data center.

A single server with services illustration with users going through public internet through a firewall to access a cloud  virtual server app and a database administrator going through a VPN to a cloud database service and connecting to the virtual server through a private network connection.

Application with Security Zones and On-Premise IT Connectivity

For large databases, proprietary data storage solutions, or databases unsupported by the cloud provider, the data can be stored in a separate database virtual server. The cloud provider will maintain the server but not the database. Because businesses value their data as their most precious commodity, they will want to secure it by isolating it from public Internet.

This can be accomplished by placing the database server in a separate private virtual local area network (VLAN) than the application server, or a separate subnet in the same VLAN as the application server. These VLANs (or subnets) will enforce security zones for their devices. They will be made available to the outside by using network gateways: an Internet gateway for the application server and a VPN gateway for the database server. In addition, a network address translation (NAT) gateway between the security zones will make sure that only trusted traffic can pass between them. These gateways are often offered as a service by the cloud providers.

The VPN gateway for the database server can connect it to the on-premises enterprise network of the cloud consumer, for taking on-premise backups, or integrating the cloud solution with on-premises systems, enabling hybrid cloud deployments.

A illustration with users going through public internet and internet gateway through a a virtual LAN and application server to access NAT gateway  to a virtual LAN database server. The on premise IT systems access this through a VPN gateway.

Load Balancing, Auto-Scaling, Database Replication

User loads placed on web applications can differ significantly depending on the time of the day, week, year, or any other circumstances. To remedy that, cloud providers offer auto-scaling services. The cloud consumer can define an auto-scale group, specifying a lower and upper limit on the number of servers in the group, the machine images from which the servers are provisioned, and circumstances leading to up-and down-scaling in the group. These can be based on calendar, or use of network bandwidth, CPU, or memory on the servers.

In order to split the incoming requests among the servers, a load-balancing service directs the requests to the members of the group based on server use, or various queuing algorithms (round-robin being the simplest).

With the database server, duplication requires keeping copies of the database in sync. A preferred solution is to have one master database server, with a slave database server — one using the database provider’s replication and synchronization capability. It ensures the fault tolerance with respect to the database.

A illustration with users going through public internet to a load balance, into a auto-scale group. Inside the cloud is master database server, virtual LAN, and a slave database server all going out through a VPN.

Fault Tolerance and High Availability

The concept of replication can be extended to the application server, providing for a cloud deployment that is fault-tolerant with respect to servers, and ensuring availability in situations such as natural disasters or other circumstances that cause the whole data center to go offline.

In addition, the application and databases can be replicated to different geographical regions, ensuring fast access from remote geographical locations. And, replication can help satisfy local government regulations regarding data privacy, which may require the user’s data to reside within specific regions.

A North American users and European Union users going through an LB to access both the North America Data Center and the Europe Data Center application servers and database servers.

Fast Delivery of Static Content – Object Storage, Content Delivery Network

While dynamic application data has to reside within the database server or service, static content such as text, graphics, video, or audio files that don’t change that often can reside in a slower but less expensive media. For that purpose, cloud providers offer object storage, which can be thought of as an Internet-based file system, allowing for storage of files organized into containers in a geographically distributed, replicated, secured storage. While not at the speeds of local storage, object storage offers fault tolerance, resilience, and virtually unlimited capacity at the cost of data consistency being “eventual” rather that immediate.

Data stored in object storage can be often served by content delivery networks (CDNs) – a service allowing for geographically distributing data and serving it from the closest geographical location to the place from which the data request originates.

A North American users and European Union users using application access and static data (CDN) access to North American and European Union application servers, database servers, and objects storage.

Architecture Components Can Be Mixed and Matched

Bear in mind that cloud providers may allow some of the architectural components illustrated here to be mixed and matched. For example, the auto-scale groups and replicated databases could be placed in security zones, and VPN gateways could be linked to different servers to corporate on-premises networks.

In the next step, you will begin researching the specific providers, starting with Amazon.

Step 5: Research AWS

You’ve described your proposed architecture and included a diagram to provide leadership a way to envision the system. Now, it’s time to look closely at the leading cloud providers to see if their services will fit BallotOnline’s needs.

Each cloud provider provides a unique profile of services, so it is good practice to compare cloud vendors and evaluate their reliability, performance, ease of use, cost, security and compliance measures. As more providers enter the marketplace, many will specialize on specific needs and use cases, making this evaluation even more critical.

In this step, you will explore AWS and assess the feasibility of this platform for deploying the architecture proposed in the previous step. You should also consider issues related to AWS Pricing.

Based on your research, determine to what degree AWS supports the elements of the BallotOnline business and technical requirements.

Share your thoughts with your colleagues in the Discussion: Amazon Web Services Feasibility forum. In the following step, you will do the same for Microsoft Azure.

Step 6: Research Microsoft Azure

Now that you have had a chance to research AWS, it’s time to explore Microsoft Azure, another cloud provider that could be used to deploy the proposed architecture. You should also consider issues related to Microsoft Azure pricing.

Based on your research, determine to what degree Microsoft Azure supports the elements of the BallotOnline business and technical requirements. Share your thoughts with your colleagues in the Discussion: Microsoft Azure Feasibility forum.

Now that you have completed research on the cloud providers, in the next steps you will work on proof of concepts for each provider.

Step 7: Generate AWS Proof of Concept (POC)

With your research complete, you will now deploy a simple one-page PHP application to the AWS cloud. It will allow you to explore deployment methods, ease of use, provisioning speed, etc., for the Amazon cloud.

Take Action

As you may have already discovered in your research on AWS, it makes a cloud migration tool called Elastic Beanstalk available for customers to migrate their existing applications into the AWS cloud. We will use this tool to deploy your AWS proof of concept (POC).

Follow the steps in the AWS lab instructions to complete your AWS POC.

In the dropbox below, upload the URL linking to your application running in the AWS portal.

Step 8: Generate Azure Proof of Concept (POC)

Now that your AWS POC is complete, you can proceed with a similar POC deployment for the Microsoft Azure cloud.

Take Action

Follow the steps in the Azure lab instructions to complete your Azure POC.

In the dropbox below, upload the URL linking to your application running in the Azure portal.

You are ready for the last step: writing the final report with recommendations on the cloud providers for the BallotOnline executives.

Step 9: Write the Final Report Evaluating AWS and Azure Providers

Now that you have completed your research, shared your ideas with colleagues, and explored the two vendors, it is time to compile your findings and recommendations for the BallotOnline executives. You may find these considerations for cloud provider selection helpful in making your decisions.

Use the Final Report Evaluating AWS and Azure Providers Template to write your report and submit your work to the dropbox below.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

· 2.2: Locate and access sufficient information to investigate the issue or problem.

· 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

· 2.4: Consider and analyze information in context to the issue or problem.

· 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.

· 5.4: Articulate insights to leadership on the appropriate course of direction on the identified IT business needs.

· 6.1: Articulate the systems architecture of the cloud – cloud infrastructure, cloud service, cloud platform, and cloud storage.

· 6.6: Evaluate and select cloud providers (AWS, Azure, VMware, Google Cloud, IBM).

· 6.8: Review, evaluate, and utilize emerging technologies related to cloud to support business needs.