Article Summary

– Write a summary on 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to ‘Impact of Big Data on Businesses’

– Should be a minimum of 750 words

– There should be no plagiarism. Attach a turnitin report with 0% similarity index.

Images

Excel 2019 In Practice – Ch 5 Independent Project 5-4

 

Wilson Home Entertainment Systems monitors cash flow at their individual locations separately and consolidates data. After the summary is complete, you insert hyperlinks to each of the supporting worksheets.

[Student Learning Outcomes 5.1, 5.4, 5.6, 5.7, 5.8]

Files Needed: WilsonHome-05.xlsx (Available from the Start File link.) and WHES.png (Available from the Resources link.)

Completed Project File Name: [your name]-WilsonHome-05.xlsx

Skills Covered in This Project

  • Group and format worksheets.
  • Create a static data consolidation with SUM.
  • Insert a picture from a file.
  • Insert a hyperlink.
  • Copy a hyperlink.
  • Encrypt a workbook with a password.
  1. Open the WilsonHome-05 start file. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Group all the worksheets.
  3. Edit and format grouped sheets.
    1. Select cells A1:B2 and click the Launcher in the Alignment group [Home tab]. Choose Center Across Selection from the Horizontal list and click OK.ImagesFigure 5-76 Consolidate dialog box for cash flow
    2. Click the Launcher in the Page Setup group [Page Layout tab] and click the Margins tab.
    3. Choose Horizontally from the Center on page list and click OK.
    4. Edit the contents of cell A10 to read Cash paid for marketing.
    5. Select cell A1 and ungroup the sheets.
  4. Select the CashFlow sheet.ImagesFigure 5-77 Image positioned as title
  5. Build a static data consolidation for the Cash flow from operations section.
    1. Select cells B4:B12.
    2. Use SUM to consolidate the data from the three location sheets without links. (Figure 5-76).
  6. Build a static data consolidation for the Cash flow from banking and investment section in cells B15:B21. Delete the references in the Consolidate dialog box and use SUM as the function.ImagesFigure 5-78 Hyperlink text to switch to Cash Flow sheet
  7. Build a static data consolidation for the Cash balance at the beginning of the quarter amounts in cell B24 with SUM as the function.
  8. Insert a picture from a file.
    1. Delete the contents of cell A1 on the CashFlow sheet.
    2. Click cell D2.
    3. Click the Pictures button [Insert tab, Illustrations group].
    4. Find and select WHES from your student data files.
    5. Click Insert. The picture is placed at a default size.
    6. Click the Height box [Picture Tools Format tab, Size group].
    7. Type 1.2 to replace the default height and press Enter.
    8. Format the height of row 1 to 86.25 (115 pixels).
    9. Point to the logo frame to display a move pointer.
    10. Drag the image to appear in cell A1 as a main label for the worksheet (Figure 5-77).
    11. Click cell D2 to deselect the image.
  9. Insert and copy a hyperlink.
    1. Click cell C3 on the Peoria worksheet.
    2. Create a hyperlink that displays Total Cash Flow and switches to cell A1 on the Cash Flow worksheet (Figure 5-78).
    3. Right-click cell C3 and choose Copy from the menu.
    4. Select the Champaign sheet tab and paste the hyperlink in cell C3.
    5. Select the Rockford sheet tab and paste the hyperlink in cell C3.
    6. Select the Peoria sheet, and press Esc to remove the copy marquee if it is still visible.
    7. Select cell C5 and then click the cell with the hyperlink to test it.
  10. Save and close the workbook (Figure 5-79).
  11. Upload and save your project file.
  12. Submit project for grading.

Blockchain IT Assignment

 Please read the Alibaba case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. How does blockchain-based remittance fit into Alibaba’s cloud offerings?

2. What unique value does blockchain technology provide in Alibaba’s remittance offering?

3. What are other areas of application for blockchain in Alibaba’s cloud business?

4. What is Alibaba’s strategy to overcome the “chicken and egg” problem of insufficient transaction liquidity and eventually achieve network effects with its remittance service?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page. Click the assignment link to compare your work to the rubric before submitting it. Click the same link to submit your assignment.

python programing

Assignment 5

Submit Assignment

  • Due Dec 11 by 11:59pm
  • Points 110
  • Submitting a file upload
  • File Types py
  • Available Nov 21 at 12am – Dec 11 at 11:59pm 21 days

Programming Assignment #5: Graph Solution to the Water Container Problem

What is the assignment?

What to hand in?

  • One (and only one) *.py file should be handed in. All your checks, unit tests should be inside of this file.
  • The name of the function in your program should be findWaterContainerPath, and it should except three integer arguments. 
  • Note that your program should be able to run at the console/terminal (e.g. $ python your_file.py). If it does not, then the execution portion of the assignment will be 0. 

What needs to be done?

  • Ultimately, all that needs to be done is to have a function, named findWaterContainerPath, return a list of states that represents a solution to the water container problem. 
  • Note that each state can be thought of a vertex on a graph, and the transitions between the states can be thought of as the edges. 
  • To successfully implement the function you will need to figure out what all of the possible state transitions (i.e. edges). You’ll then perform a BFS across all of these states; adding a state to your final solution path when it is used (and being sure to not add, or to remove, states that are not on the solution path).

Be careful… 

  • As with all assignments, do not copy code from the internet, and do not share/copy code directly from others. There are lots of poor implementations of this problem online, so even if you look at some to better understand the problem, be sure that you implement your own so that you can be confident that you understand what each step is doing. 
  • Remember, copying/sharing code is a violation of the Student Code of Conduct. If you are found to have been doing this, then the grade for this assignment may be a zero, and a report with the Dean of Students may be filed. 

Getting Started

  • Use the following code to get started if you like. If, however, you decide not to, be sure that you still name your function “findWaterContainerPath”, and that it accepts the three given arguments. 
import math
import unittest

def findWaterContainerPath(a, b, c):
    """ DOCUMENTATION FOR THIS FUNCTION """
    starting_state = (0, 0)
    final_path = list()
    final_path.append(starting_state)

    """ THIS IS WHERE THE REAL WORK FOR THIS ASSIGNMENT WILL BE """

    return final_path

""" ADD ANY OTHER (HELPER) FUNCTIONS THAT ARE NEEDED HERE """


class TestWaterContainerGraphSearch(unittest.TestCase):

    def testFindWaterContainerPath(self):
        """ INSERT DESCRIPTION OF WHAT THIS TEST IS CHECKING """
        """ IMPLEMENT YOUR FIRST TEST HERE """
        pass

    """ ADD MORE TESTS TO CHECK YOUR FUNCTIONS WORKS FOR OTHER VALUES """


def main():
    capacity_a = input("Enter the capacity of container A: ")
    capacity_b = input("Enter the capacity of container B: ")
    goal_amount = input("Enter the goal quantity: ")

    # ADD SOME TYPE/VALUE CHECKING FOR THE INPUTS (OR INSIDE YOUR FUNCTION)

    if int(goal_amount) % math.gcd(int(capacity_a), int(capacity_b)) == 0:
        path = findWaterContainerPath(int(capacity_a), int(capacity_b), int(goal_amount))
    else:
        print("No solution for containers with these sizes and with this final goal amount")

    print(path)


# unittest_main() - run all of TestWaterContainerGraphSearch's methods (i.e. test cases)
def unittest_main():
    unittest.main()

# evaluates to true if run as standalone program
if __name__ == '__main__':
    main()
    unittest_main()

Good luck!

Rubric

Assignment 5 RubricAssignment 5 RubricCriteriaRatingsPtsThis criterion is linked to a Learning OutcomeProgram Execution and Output30.0 to >25.0 ptsGoodProgram executes with no syntax or runtime errors and produces nearly all of the appropriate output when run through the test script (26pts – 30pts).25.0 to >10.0 ptsFairProgram executes with via the test script but does not produce all of the desired/correct output (11pts – 25pts).10.0 to >0 ptsPoorProgram does not execute via the test script without some modification and/or produces none or very little of the desired output in the test script (0pts – 10 pts).30.0 pts
This criterion is linked to a Learning OutcomeCode Logic and Design40.0 to >30.0 ptsGoodProgram has all required classes, variables, and methods defined (31pts – 40pts).30.0 to >10.0 ptsFairProgram has at least some but not all requisite classes, methods, or variables (11pts – 30pts).10.0 to >0 ptsPoorProgram has few or none of the classes, variables, or methods that were required (0pts – 10pts).40.0 pts
This criterion is linked to a Learning OutcomeCoding Standards and Documentation30.0 to >20.0 ptsGoodProgram has documentation for each class, method, function and this is displayed when using Python’s help function, “help()”. Documentation should clearly explain how and why methods are implemented as is (e.g. when and how does HashTable choose to resize itself). In addition to this, for full points the code should be consistently formatted, with consistency in how methods and variables are named (21pts – 30pts).20.0 to >10.0 ptsFairProgram has some documentation and is somewhat consistent in formatting, variable/method naming, etc. However, at least one of those is missing/incorrect (11pts – 20pts).10.0 to >0 ptsPoorProgram has little to no documentation, is not structured/formatted well, and does follow a consistent approach towards naming variables/method (0pts – 5pts).30.0 pts
This criterion is linked to a Learning OutcomeTesting10.0 to >5.0 ptsGoodProgram tests edge cases, or scenarios that would produce unexpected results using Python’s unittest (4pts – 5pts).5.0 to >2.0 ptsFairProgram tests for some edge cases but is missing important/obvious edge cases and may not be using unittest (3pts – 4pts).2.0 to >0 ptsPoorProgram has very few or no checks for edge cases, and does not make use of unittest (0pts – 2pts).10.0 pts
Total Points: 110.0PreviousNext

300 words discussion

One of the hardest tasks you may face in Web Analytics is to convince persons outside of your team or department of the importance of the reports and KPI’s that tell the story of how well or bad you are doing with your website. Communicating your information effectively to Management and the Board of Directors, whom we will call the stakeholders, can be a daunting task, they just do not have the time to understand the details of the reports you offer. Therefore, to communicate your information, you will have to learn how to summarize and format your reports in abridged versions.

Please explain the following:
300 Words Minimum 

Explain what KPIs are they designed to accomplish.
Describe how to prepare a KPI.
Explain how you would present your KPI to the Stakeholders, in brief. 

bidis1

 Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.

Cryptography 9 Discussion

Question:  describe a cryptographic hash function and how it is used as a security application.  

 -You must use at least one scholarly resource. 

 -Every discussion posting must be properly APA formatted. 

-400 words

-References

-No Plagiarism. 

Project: Risk Management Plan

 

Purpose

This project provides an opportunity to apply the competencies gained in the lessons of this course to develop a risk management plan for a fictitious organization to replace its outdated plan.

Learning Objectives and Outcomes

You will gain an overall understanding of risk management, its importance, and critical processes required when developing a formal risk management plan for an organization.

Required Source Information and Tools

The following tools and resources that will be needed to complete this project:

  • Course textbook
  • Internet access for research

Deliverables

As discussed in this course, risk management is an important process for all organizations. This is particularly true in information systems, which provide critical support for organizational missions. The heart of risk management is a formal risk management plan. The project activities described in this document allow you to fulfill the role of an employee participating in the risk management process in a specific business situation.

The project is structured as follows:

Project Part

Deliverable

Project  Part 1

Task  1: Risk Management Plan

Task  2: Risk Assessment Plan

Task  3: Risk Mitigation Plan 

Submission Requirements

All project submissions should follow this format:

  • Format:     Microsoft Word or compatible
  • Font:     Arial, 10-point, double-space
  • Citation     Style: Your school’s preferred style guide
  • Minimum 2     pages per task

Scenario

You are an information technology (IT) intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products 

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. The service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a Web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay Web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations much like a Web commerce shopping cart.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and are able to update the information in their profile. Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients are able to make payments and update their profiles using Internet-accessible HTTPS Web sites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

· Loss of company data due to hardware being removed from production systems

· Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

· Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

· Internet threats due to company products being accessible on the Internet

· Insider threats

· Changes in regulatory landscape that may impact operations 

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project Part 1 Task 2: Risk Assessment Plan

After creating an initial draft of the risk management plan, the second part of the assigned project requires you to create a draft of the risk assessment (RA) plan. To do so, you must:

  1. Develop an introduction to the plan explaining its purpose and importance.
  2. Create an outline for the RA plan.
  3. Define the scope and boundaries for the RA plan.
  4. Research and summarize RA approaches.
  5. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk assessment.
  6. Develop a proposed schedule for the RA process.
  7. Create a professional report detailing the information above as an initial draft of the RA plan.

Evaluation Criteria and Rubrics

  • Did the student demonstrate an understanding of the competencies covered in the course relating to risk assessments?
  • Did the student include all important components of a RA plan in the outline?
  • Did the student demonstrate good research, reasoning, and decision-making skills in identifying key components and methodologies?
  • Did the student create a professional, well-developed draft with proper grammar, spelling, and punctuation?

InfoTech in a Global Economy 1

 Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not? 

 

  • Explain, define, or analyze the topic in detail