Microsoft Excel

Open the instruction file and perform the task in excel file, make sure we cant simply copy and paste we have to use formula and function as per the question. 

It is due with in 12 hours. 

which is by 12 midnight today. 

java programming

1>
Discuss the concept of parameters. What are parameters for? What is the difference between formal parameters and actual parameters? Give an example in Java code that illustrates formal parameters and actual parameters.

2>

attached programming file

Information Security and Risk Management – Practical Connection

 

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Information Security and Risk Management have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Exp19_Access_Ch04_ML1 – Hotel Chain 1.0

 

Exp19_Access_Ch04_ML1 – Hotel Chain 1.0 

Project Description:

You are the general manager of a large hotel chain. You track revenue  by categories, such as conference room rentals and weddings. You want  to create a report that shows which locations are earning the most  revenue in each category. You will also create a report to show you  details of your three newest areas: St. Paul, St. Louis, and Seattle.

Start Access. Open the downloaded   Access file named Exp19_Access_Ch4_ML1_Rewards.  Grader has automatically added   your last name to the beginning of the  filename. Save the file to the   location where you are storing your  files.

Select   the Members table, and create a   Multiple Items form. Save the form as Maintain Members.

In   Layout view, change the MemNumber label to MemID   and use the Property Sheet to reduce the MemNumber column width to 0.6″.

Change   the widths of the LastName, FirstName, City, and Phone fields to 1.25″; change the width of the State and Zip   fields to 0.75″;   and change the width of the Address field to 1.75″.   Delete the form icon (the picture next to the title of the form) in the Form   Header.

Change   the sorting order of the MemberSince control so that the members who joined   most recently are displayed first.

Click   the LastName field and change the   control padding to Wide. (Hint:   Search Control Padding in the Tell me box). Save and close the form.

Select   the Revenue query, and create a   report using the Report Wizard. Include all fields in the report and add   grouping first by City and then by   ServiceName. Add a Sum to the Revenue field and select   the Summary Only option. Select Outline Layout and name the report Revenue by City and Service.

Scroll   through all the pages to check the layout of the report  while in Print   Preview mode. Close Print Preview. Switch to Layout  view, and delete the NumInParty and PerPersonCharge controls.

Select   the result of the aggregate sum function for the city’s revenue. Change the   font size to 12; change the font   color to Dark Blue, Text 2; and   change the background color of the control to Yellow.

Change   the sort on the report, so that it sorts by city in  descending order—that   is, so that the last city alphabetically (St.  Paul) is displayed first.

Examine   the data in the report to determine which city (of these  three: St. Paul, St.   Louis, or Seattle) has the highest Sum of event  revenue. You will use this   information to modify a query. Save and  close the report. Modify the Totals   by Service query so the criteria  for the City field is the city you   determined had the highest sum of  event revenue (St. Paul, St. Louis, or   Seattle). Run, save, and close  the query.

Create   a report using the Report tool based on the Totals by Service query. Name the   report Targeted City. Close the report.

Close   all database objects. Close the database and then exit Access. Submit the   database as directed.

Paper analysis

 Read the attach paper and write a comprehensive summary/review of the paper as follows: 

  • Make sure to identify strength and weakness this research paper
  • Minimum of 500 words 
  • Plagiarism free & Quoting Free
  • Upload your response as pdf/word file 
  • This assignment should be in APA format and have to include at least two references ( from the paper reference as needed to support your review/summary) 

paper 4 pages

TIM 172A MOT I: Homework 2 

(Problem Solving, Functional Maps, Strategy)

Reading: Ulrich & Eppinger, “PDD”, Chapters 1-4; three class handouts on Canvas:  “Intel”; “Disk Drive Industry”; and “Competitive Strategy”. (Work on the homework problems and do the readings concurrently.)

———————————————————————————————————————

Homework Problems (Due Thursday, 07 October 2021):

Before working on the readings and problems develop, and submit a plan and time-schedule for producing “high-quality” homework (your product) in efficiently and on time. 

For each problem use the structured problem-solving process: define the problem; plan the treatment of the problem; execute the plan; check your work; learn and generalize. 

1. Disk Drive Industry: Read the disk drive industry handout. Carefully study the functional maps in Fig 1.3, 1.4, 1.5, and 1.7. For each map answer the following: (1) what is the meaning and significance (value) of the map? (2) how would a disk drive company use this map? and (3) what high-level conclusions can be drawn from the map?

Using the appropriate functional map attempt to predict the nominal price that a disk drive manufacturer would charge (in “1982 dollars”) for 1MB of memory in the year 2016? Convert the “1982 dollars” price to an equivalent “2016 dollars” price, and attempt to compare your result against some actual manufacturer’s price.

2. Intel: Read the Intel Case Study and then work on the following problems. 

a) Perform a competitive analysis of Intel’s industry/market landscape using Porter’s five (six) forces model. Be sure to clearly explain your approach and results. Draw appropriate conclusions. 

b) What are the key relationships between (the players involved in) each “force” of the business landscape? (E.g., how did Intel deal with competitors, etc.) 

c) Using the appropriate (clearly stated) framework, assess Intel’s competitive, technology, and product/market strategy from the company’s inception (in 1968) to 1997. How have Intel’s technology strategy, product market strategy, and developmental goals changed from its inception in 1968 to 1997? What were the key driving forces that triggered these changes? 

Suggestion: Use the three-stage process on Pages 17-19 of the “Lecture Notes for Competitive Strategies in Technology Management” handout. Stage 3 of the process will require the creation of the appropriate functional maps for the evolution of technology, product, manufacturing, market, etc.

Problem 10 – Org Behavior

1. What are some of the cautions to be aware of when using teams? What tests should be applied to see if a team fits the situation?

2. The team effectiveness model identifies three categories of key components making up effective teams. What are these three categories? Give examples of each category.

at least 1.5 – 2 pages in length, Times New Roman 12-pt font, double-spaced, 1 inch margins and utilizing at least one outside scholarly or professional source related to organizational behavior. This does not mean blogs or websites. This source should be a published article in a scholarly journal. This source should provide substance and not just be mentioned briefly to fulfill this criteria. The textbook should also be utilized. Do not use quotes. Do not insert excess line spacing. APA formatting and citation should be used.

Text-

Title: Essentials of Organizational Behavior, Student Value Edition 

ISBN: ISBN-13: 9780135468890 

Authors: Stephen P. Robbins, Timothy A. Judge 

Publisher: Pearson 

Edition: 15TH

Part B: Policies, Plans, and Risks

Now that you have seen all the elements contributing to the Devil’s Canyon enterprise architecture, Justin wants to move forward with developing privacy policies to ensure videos are not distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devil’s Canyon is also in need of a complete security plan, as well as risk assessments.

In a 2- to 3-page rationale and table, prepare the following information to present to the Devil’s Canyon team:

  • Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin’s privacy policy, in relation to the Devil’s Canyon enterprise structure.
  • Outline the importance of a security plan in relation to security roles and safeguards.
  • Analyze at least 5 security-related risks/threats that Devil’s Canyon may face.
  • Assess the probability and impact to the Devil’s Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a      risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk.
  • Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, web cam systems, and smartphones.

Note: The title page and reference page do not count toward the assignment length requirement.

Discussion

How is the implementation of network security similar and different between on-prem and cloud environments? Give some examples.

Your initial discussion should be 250-300 words. There must be at least two APA formatted references (and APA in-text citation) to support your thoughts in the discussion. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.