Exp19_Excel_Ch02_CapAssessment_Inland_Jewelers

 

Exp19_Excel_Ch02_CapAssessment_Inland_Jewelers

 Exp19 Excel Ch02 CapAssessment Inland Jewelers 

Project Description:

You are an account manager for Inland Jewelers, a regional company  that makes custom class rings for graduating seniors. Your supervisor  requested a workbook to report on new accounts created on payment plans.  The report should provide details on total costs to the student as well  as payment information. Each ring financed has a base price that can  fluctuate based on ring personalization.

Start   Excel. Download and open the file named Exp19_Excel_Ch02_Cap_InlandJewelers.xlsx. Grader has automatically added   your last name to the beginning of the filename.

Insert a function in cell B2 to   display the current date from your system.

With cell B2 selected, set the   width of column B to AutoFit.

Insert a VLOOKUP function in   cell C5 to display the ring cost for  the first student. The cost of the ring   type should be an exact match.  Use appropriate relative and absolute cell   references.

Copy the formula from cell C5 to   the range C6:C11.

Apply Accounting number format   to the range C5:C11.

Insert an IF function in cell E5 to calculate the total   due. If the  student has chosen to personalize the ring, there is an   additional  charge of 5% located in cell B21 that must be added to the cost of   the  ring; if not, the student only pays the base price. Use appropriate    relative and absolute cell references.

Copy the formula from cell E5 to   the range E6:E11.

Apply Accounting number format   to the range E5:E11.

Insert a function in cell G5 to   calculate the first student’s  monthly payment, using appropriate relative and   absolute cell  references. Ensure the result is a positive number.

Copy the formula from cell G5 to   the range G6:G11.

Apply Accounting number format   to the range G5:G11.

Calculate totals in cells C12,   E12, and G12.

Apply Accounting number format   to the cells C12, E12, and G12.

Set 0.3″ left and right   margins and ensure the page prints on only one page.

Insert a footer with your name   on the left side, the sheet name in the center, and the file name on the   right side.

Save and close Exp19_Excel_Ch02_Cap_InlandJewelers.xlsx.   Exit Excel. Submit the file as directed

Assignment 3

1. Please define the obfuscation process in detail.

2. Using http://www.dependencywalker.com please explain the components involved within the .dll GetCurrentProcess.dll along with how the process works. Please provide a snapshot of your findings.

3. Answer the questions relating to Lab1-2:

Q: 1. Upload the Lab01-02.exe file to http://www.VirusTotal.com/ . Does it match any existing antivirus

definitions? 

Q: 2. Are there any indications that this file is packed or obfuscated? If so, what are these

indicators? If the file is packed, unpack it if possible. 

Q: 3. Do any imports hint at this program’s functionality? If so, which imports are they

and what do they tell you? 

Q: 4. What host-or network-based indicators could be used to identify this malware on infected

machines? 

________________________________________

In this assignment, you will need to setup a virtualized environment. See the following:

https://www.osboxes.org

http://www.heaventools.com/download.html

https://www.fireeye.com/mandiant.html

https://www.wireshark.org/download.html

https://regshot.en.softonic.com

Please provide a complete writeup on how this malware could be installed on your machine. NOTE: You will need to disable any anti-virus protection as this contains live malware. It will not install onto your system. 

Analyze the malware found in the file Lab03-02.dll using basic dynamic

analysis tools. 

How can you get this malware to install itself?

How would you get this malware to run after installation? 

How can you find the process under which this malware is running?

Which filters could you set in order to use procmon to glean information? 

What are the malware’s host-based indicators? 

Are there any useful network-based signatures for this malware? 

How could you prevent this type of malware from installing on your machine?

PLEASE COPY AND PASTE QUESTIONS IN DOCUMENT AND ANSER THEM ACCORDINGLY.

Paper on Software Engineering

 

Assignment 3

Objective:

To understand the impacts of IT Infrastructure or the emphasis of adept Security measures that leads to growth and sustainability of Information Technology industry.

Task:

Each student is expected to choose a relevant, current trend topic related to IT Infrastructure & Operations (For example: Growth trends in IT Infrastructure, Skills aiding IT Infrastructure development, etc.) or Importance of Security (For Example: Security measures for Internet of Things, Cloud Security, etc.) from a relevant web source (Gartner, Fortune Technology, Medium.com, etc.) or books and relevant academic journals can be considered as the source. Also you are expected to find information relevant to the chosen topic from two other sources.

Write a short report (not more than 2 pages) describing the chosen topic mentioning the relevant sources from which the information is summarized.

The report is expected to follow the format as given below.

  • The report should contain four sections.
    • First Section (Preamble) – A brief introduction to the identified topic and the importance of the specific topic in the Software Industry.
    • Second Section (Project author View) – A complete discussion and analysis of the information stated by the author of the topic in your Preliminary Source.
    • Third Section (Potential generalized View) – You are expected to refer the other two decided sources and bring out the argument either supporting or contrasting the information from preliminary source.
    • Fourth Section (Position Your Viewpoint) – Having gained an understanding with respect to the topic, this sections expects you to pen down key points about the topic from your perspective on the impacts of the topic in the software industry.
  • Each section expects to have minimum 90 words.
  • Title each of your section accordingly.
  • The points included in the report are expected to be technical and relevant to the chosen topic. Also, the links / names of the source are expected to be acknowledged in the appropriate sections.

Parable of Sower to apply VBM

  1. What past personal experience(s) can you relate to the parable?
  2. How does the Scripture inform your understanding of the VBM?
  3. What can you do differently or better as a result of this reflective learning exercise?

Read this below URL and use (Matthew 13:1-23) and refer to the book attached to answer the questions.

https://www.biblegateway.com/passage/?search=Matthew+13%3A1-23&version=NLT

minimum 300 words with 2 references

Case Study Paper- 250 words

  Read the Module 1 Case Study and answer the following question in a word document and then submit/upload your document. Document format identified below.

Question: In 2015, Google announced the introduction of a new service called Android Pay. Using your favorite search engine or the resources of your library, learn more about Android Pay and, in about 250 words, explain why you think Google decided to develop this new product. In your answer, be sure to consider why Google also decided to continue offering its Google Wallet product.

MODULE 1 CASE STUDY BELOW: 

 Case Study 1:  Digital Wallets on Mobile Devices: Apple and Google One of the fastest-growing segments of the online payments business is mobile payments. U.S. mobile payments are expected to reach $140 billion by 2019 and purchases using mobile devices could account for half of all online retail sales by 2017. Google introduced one of the first digital wallet products that would work on a mobile device in 2011 when it also introduced support for the operation of NFC chips in its Android mobile operating system. Google Wallet stores a MasterCard account for users that agree to maintain a cash balance with the card’s issuing bank, so it operates essentially as a debit card. Google Wallet does not charge a fee to merchants or the MasterCard issuing banks, nor does it charge a transaction fee. Instead, it generates revenue from advertisers who pay to display ads, offer coupons or other promotions (specific ads are displayed based on the mobile device’s proximity to the stores that are making the offers). Google Wallet has been slow to catch on with users. In 2014, Apple introduced a digital wallet product for its mobile devices called Apple Pay. In operation, Apple Pay is similar to Google Wallet; however, the infrastructure and revenue model is different. Apple Pay charges the issuing banks a fee of 0.05 percent of the transaction amount and guarantees each transaction; that is, if the transaction is fraudulent, Apple will cover the loss. Credit card companies normally charge merchants a fee ranging between 2 and 3 percent of the transaction amount, so the additional Apple Pay fee serves as a low-priced insurance plan for them. Consumers will not be charged at all for using Apple Pay and will not be given advertising messages. Further, Apple has stated that it does not collect information about consumer buying habits from Apple Pay data. Apple arranged for American Express, Discover, MasterCard, and Visa credit cards to be included in their system, along with a group of large card-issuing banks. They also included major retailers such as Bloomingdales, Disney, Staples, Walgreens and Whole Foods. These participants will be able to collect data on consumer buying habits, but only on those consumers that use their card or shop at their stores. Apple reported that more than a million credit cards were registered with Apple Pay in the first three days it was available. After Apple Pay’s introduction, an increase in the number of retailers that accept NFC payments (as you learned in this chapter, NFC technology is used by both Google Wallet and Apple Pay) caused an increase in the use of Google Wallet.
 (Schneider 499)  Schneider, Gary. Electronic Commerce, 12th Edition. Cengage Learning, 20160226.   
 

Your word document should have the following;

  • Title page, with your name, class, date, and assignment identifier
  • Body of the paper (one or two pages) double spaced, 12 point font, New Times Roman, 1 inch margins all sides
  • References  should be identified/listed on a separate page (last page of submission). All references must follow APA format.

Save file as casestudy2-FDL in Microsoft word format

Cyber Defense

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

A number of web based firms offer what they describe as a free online security check of your PC or network. Some require download of executable software for the check. Would you trust such an offer? Why or why not?

Several firms offer fee based professional network security evaluation. Locate the web page for one such firm and briefly describe some of the services offered.

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you 

assignment

 

Prior to beginning work on this assignment, read the following article:

Also, be sure you have completed the Academic Integrity Interactive learning activity and read the following previously assigned readings:

There are websites that facilitate academic dishonesty and provide multiple ways for students to engage in unethical academic behavior. Conversely, there are tools that help students to properly complete work in a manner that is aligned with academic integrity. Additionally, there is an arsenal of tools that assist professors and organizations to verify the authenticity, validity, and academic rigor utilized in a paper. When a violation occurs, pejorative repercussions can occur. 

In your paper,

  • Identify at least two repercussions for violations. 
  • Describe how repercussions of academic dishonesty can affect one’s professional career. 
  • Explain how a student can prevent academic dishonesty, thus preventing negative effects on one’s academic journey and professional career. 

For additional guidance on avoiding plagiarism, see the Writing Center resources Plagiarism Guide (Links to an external site.) and Steps to Avoiding Plagiarism (Links to an external site.).

The How Technology Allows Academic Dishonesty to Follow You paper,

Cybersecurity Training

 An organization should establish an effective cybersecurity training program for personnel having authorized access to critical cyber assets.

Create a training plan for everyone who works at the organization. The training plan should address (but is not limited to) the following:

1. Articulate a culture of security awareness, collaboration, and buy-in among management, staff, clients, and stakeholders.

2. Describe common security risks and how to avoid them.

3. Describe policies, access controls, and procedures developed for critical electronic devices and communication networks.

4. Describe the proper use of critical electronic devices and communication networks.

5. Describe the proper handling of critical information.

6. Present action plans and procedures to recover or reestablish critical electronic devices and communication networks.

7. Address the risks resulting from insecure behavior of employees.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Cybersecurity Training Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.