ADVANCED EXCEL

Using the PERT method sample file uploaded, follow the method outlined in the .pdf file and PPT to complete the schedule with 95% confidence level.

Find the Z value for 95% confidence level in pdf file containing the z table.

Exp19_Excel_Ch01_CapAssessment_Training

 

Exp19_Excel_Ch01_CapAssessment_Training

 

Project Description:

You manage a company that provides corporate training workshops. Your two types of clients are business people and college professors. You want to complete a spreadsheet that calculates gross revenue for upcoming training workshops. Finally, you will improve the appearance of the worksheet by applying font, alignment, and number formats.

Python

 

EMBL (European Molecular Biology Laboratory) and EBI (European Bioinformatics Institute) are basically the equivalent of NCBI here in the US. They hold the same data but store the data in a different format. Your task is to parse out an EMBL record (see file attached) just like we did for GenBank records in the discussions. 

EMBL’s records are actually easier to parse out! Just parse out the sequence ID (line starts with ID), description (DE) and sequence (SQ). Use at least one function. 

Net Present Value Analysis

 (KB) Net Present Value Analysis

In this assignment you will perform a Net Present Value Analysis for a project.

 1. Assume a student is planning to pursue a two-year master’s degree. There are two educational options the student is considering, with investment and cash flows as follows. 

Option A: Full-Time Education Example cash investment: $100,000. Currently the student is earning $30,000. The  student will quit his/her current job to study a Master’s degree in computer science.  Upon graduation the student hopes to earn $60,000 per year in new job. 

Option B: Part-Time Education Example cash investment: $100,000. Currently the student is earning $30,000. The  student can work part-time for three years at a salary of $20,000 while studying towards  the master’s degree in project management. Upon graduation the student anticipates a possible increase in salary by $10,000 (total $40,000) in the same company. 

The requirements for the assignment are:

 • Answer the following questions based on the unit readings: 

1. Briefly describe what net present value is, how it is calculated, and what it is used for.

 2. Calculate the NPV for each educational option. The discount rate is 8%. 

3. Which option should the student choose? Explain your decision including  any necessary assumptions made. 

• The paper must be APA-formatted as a Word document. 

• SafAssign will be used to check this assignment for plagiarism. Remember to  paraphrase in your own words and do not copy directly. 

• The length must be 1-2 pages, excluding the title and reference pages. 

• Include at least one reference. 

ERM W 9 D

 

The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

2-3 paragraphs (Internet Research)

 In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs 

Information security policies – MS cybersecurity assignment

 

Identify a recent incident in cyber(in)security, investigate it in detail and write up a report on it using the following structure. Please see below for ineligible incidents.

Maximum 2000 words. This does not include references. Provide citation of sources using any recognized format.

The paper must contain the following two sections:

  1. Apply the Diamond model

Use the framework of the model to identify Adversary, Victim, Infrastructure and Capability. Pay special attention to what the paper calls “the Social-Political meta-feature determining the Adversary-Victim relationship, and the Technology meta-feature enabling both the infrastructure and capabilities.”

  1. Policy assessment

Identify at which level of organization this problem is best addressed. Does this incident, in your judgment, reflect the need for some kind of public policy change at the national (9) or transnational (10) level? Or is it best handled at the organizational (8) or industry level (8.5)? In making this assessment, consider how common these types of incidents are, what kinds of risks they pose, and what kind of legal, technical or policy tools could combat them.

Grading will be based on the following criteria:

  • Thoroughness of background research
  • Demonstrated understanding of and correct application of the diamond model
  • Demonstrated understanding of the different “layers” of governance and the reasoning underlying your policy recommendations
  • Clarity and organization of the writing 

Ineligible Incidents

The below incidents can not be used for this assignment. The reason is that some incidents have already been analyzed in class, or there are already too many materials floating around on the web that could be copied.  Here is a list of incidents that are not allowed:

  • Banrisul (Brazilian bank) (2016)
  • Capital One (2019)
  • Equifax (2017)
  • Marriott (2018)
  • Solarwinds (2020)
  • Target (2013)
  • TJX (2007)
  • Ukraine electrical power grid (2015/2016)
  • US Office of Personnel Management (2014)
  • Yahoo (2014/2016)

Journal Entry

– Pick one of the following terms for your research: collaboration, divisional structure, functional structure, horizontal structure, matrix structure, outsourcing, reengineering, teams, vertical linkages, or virtual team. 

–  The paper should have a definition, Summary and Discussion ( Summary should have 150-200 words and discussion should have 300-350 words. )

– Attach minimum 2 references

– Absolutely no plagiarism, attach a plagiarism report with 0% similarity index.