Preview the document

Grist

Grist – SciFi Movies

Printable document for Grist – SciFi Movies: 
Grist – SciFi Movies.docx

Actions

1) Create a new database by Importing the file below: 

Please download the excel import data SciFi Movie – Import.xlsxPreview the document to use as an import for this assignment

Import Document into Grist.

Be sure the following column options are as stated below:

  • Movie Number: Column Type – Text
  • Movie Name:  Column Type – Text
  • Year Made:  Column Type – Numeric   /   Alignment – Centered
  • Studio:  Column Type – Text
  • Rating:  Column Type – Integer   /   Alignment – Centered
  • Awards:  Column Type – Choice:  ADM, RBB, GGA, NOA, GTA
  • Length – Minutes:  Column Type – Numeric   /    Alignment – Centered
  • Director Number:  Column Type – Text

2) Rename the Table – Movies

3) Create another table called Directors by adding an empty table.

Add the following columns:

Director Number – Column Type – Reference:  Movies Table and Director Number

Director Name – Column Type – Text

# of Movies Directed – Column Type – Numeric    /    Alignment – Centered

Fill in the fields and data from the table below:

Director Number

Director Name

# of Movies Directed

CRN

Christopher Nolan

10

GEL

George Lucas

18

AYW

Andy Wachowski

11

JSC

James Cameron

22

RTZ

Robert Zemeckis

25

TYG

Terry Gilliam

19

JJA

J.J. Abrams

12

SNS

Steven Spielberg

52

AOC

Alfonso Cuaron

15

AWN

Andrew Niccol

7

IOH

Ishiro Honda

59

PLV

Paul Verhoeven

28

4)  Create a new page for an overview.  Add a widget to new page and select a table for the Movies table with summary data for the Director Number.  Remove the Count and Rating Columns.   

5) Rename the new page in the navigational bar Movie Overview.

6) Add Widget to page and select the card widget for the Movies table with summary data for the Movie Number.  Change the Theme to Blocks.  Customize the card by hiding the count field and moving Length-Minutes to the second row.  You will have 3 fields going across on the 2nd row.

7) Add widget to page and select the chart widget for the Movies table with a summary of data for the Awards.  Change the chart to a pie chart.  Hide all series except for Awards and count.  Customize layout appropriately. 

*When complete, your Movie Overview page should have a Movie summary of the Movies table, a Movies Card widget and a Movies Chart Widget.

8) In the Movies table create a new field name called Movie Rating. 
Column Type – Choice: R, PG and PG-13

Update the rest of the table to meet the data below.

Movie Names

Movie Rating

Aliens 

R

Back to the Future

PG

E.T.

PG

Gravity

PG-13

Godzilla

PG-13

Inception

PG-13

Gattaca

PG-13

Starship Troopers

R

Star Trek 

PG-13

Star Wars

PG

Terminator 

R

Twelve Monkeys 

R

The Matrix

R

9) Add widget to Movies page and select the chart widget for the Movies table with a summary of data for the Movie Rating.  Change the chart to a pie chart.  Hide all series except for Movie Rating and count.  Customize layout appropriately. 

Strategic Integration and Information technology roles and responsibility

Essay Assignment 1: Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.

Essay Assignment 2: Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

The above assignment should be two pages in length (one page for each question) and adhere to APA formatting standards.

Discussion

 

This assignment should include at least two references.

What is the difference between VA(Vulnerability Assessment) and PT(Penetration Testing)? Per enterprise security assessments?

After reading the article, discuss which case study is interesting and why ERM is necessary?

Article:

 

Do,  H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with  Strategy (p. 35). Retrieved from Poole College of Management, NCSU  website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf

After reading the above week’s article, and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

 A substantive post will do the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

Lab 15 HTML

 

  • Review the Multimedia PDF and the Web Development PPT
  • Download the Word document below and follow the instructions
  • HTML Lab
  • ZIP up your HTML file and your image file into a Lab15.zip file
  • Upload the ZIP file to Canvas for grading

3 pages—Assignment 01–will be submitted to Turnitin

This assignment will be submitted to Turnitin®. Please see  Rubrics attached. 

Instructions

It is a responsibility of the global firm to ascertain the level of importance of various aspects of culture. Companies’ operations need to recognize and adjust to the cultural environment. In this week’s Lesson, you will find eight elements of culture. For this assignment, there are four elements of culture that are most important when marketing products and services internationally: language, religion, manners and customs, and aesthetics. Indicate why each is important and provide examples in your response.

Write a paper of 3 pages, typewritten in double-spaced APA format (Times New Roman, 12 pt. styles), page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances.

In your response, make certain that you include at least two outside references from search engines or scholarly sources from the APUS Online Library.

Your paper will be automatically submitted to Turnitin in the assignment dropbox. Originality reports will be returned to the faculty and student. Multiple submissions are allowed. For full credit, make sure that your Similarity Index does not exceed 20%.

In the Assignment dropbox, please attach your paper as a file, do not copy & paste. I will grade and return your file.

Please see  Rubrics attached. 

Order # 12531

Title: Network Security

Paper type Essay

Paper format APA

Course level Undegraduate

Subject Area Other (Not listed)

# pages 2   ( or 600 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, imagine that you are responsible for creating a security and privacy plan for a small doctors’ office that has 4 doctors and 10 staff. The purpose of your plan is to describe standards that help ensure the privacy and integrity of the many different facets of a network.

To prepare to make recommendations, complete the practice labs provided in the Virtual Resource Portal activity for this assessment.

Include the following in your 5–6-page security and privacy plan:

•Create an enterprise-wide network security plan for an organization.

•Describe the most common vulnerabilities, risks, and issues that your plan will address.

•Describe a plan for standards to protect the users from harming the network and system, both intentionally and accidentally. Discuss how these will be enforced.

•Include policies that protect the hardware and physical aspects of the network.

•Identify hardware areas that need to be secured.

•Describe steps that will be taken to ensure the security of the operating systems and network files.

•Discuss measures that are necessary to protect the transfer of data to and from the network.

•Apply the concepts from the assigned practice lab activity.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.

Discussion: Global Technology

Deadline: 5 hours

Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not?

Books/Reference paper

Textbook, Chapter 1 & 2: Olsen, S., & National Academy of Engineering (U.S.). (2011). Global Technology : Changes and Implications: Summary of a Forum. Washington, D.C.: National Academies Press. (Included through library subscription)

Scherz, C., Hahn, J., & Ladikas, M. (2019). Technology Assessment in a Globalized World. Management Systems in Production Engineering, 27(3), 149.

technology assessment in a globalized world – Sciendo

https://content.sciendo.com › 27 › 3 › article-p149

Lynn, L., & Salzman, H. (2007). The Real Global Technology Challenge. Change, 39(4), 8. 

https://rucore.libraries.rutgers.edu/rutgers-lib/45958/PDF/1/play/

APA Format

https://academicwriter.apa.org/6/ 

“NO PLAGIARISM” 

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.