Pease check the attachment!!
Problem 5- Planning
Problem:Earned-value analysis. A project budget calls for the following expenditures:TaskDateBudgeted AmountBuild formsApril 1$10,000Pour foundationApril 1$50,000May 1$100,000Frame wallsMay 1$30,000June 1$30,000Remaining tasksJuly 1 and beyond$500,000
Define each term in your own words, calculate these values for the above project, and show your work:
- Budgeted cost baseline (make a graph illustrating this one)
- Budget at completion (BAC)
- Planned value (PV) as of May 1
- Earned value (EV) as of May 1 if the foundation work is only two-thirds complete. Everything else is on schedule.
- SV as of May 1.
- Actual cost as of May 1 is $160,000. Calculate the cost variance (CV) as of May 1.
- Schedule performance index (SPI)
- Cost performance index (CPI)
- Estimate to complete (ETC), assuming that the previous cost variances will not affect future costs
- Estimate at completion (EAC)
Text
Title: Project Management
Subtitle: https://opentextbc.ca/projectmanagement/
Authors: Adrienne Watt
Publisher: BCcampus Open Education
Publication Date: 2019
Edition: 2nd Edition
Discuss the connections that you made from the evidence
Learning Goal: I’m working on a writing multi-part question and need an explanation and answer to help me learn.
Assessment Traits
Assessment Description
Synthesis is the act of creating something new from multiple existing entities. Synthesis of research, then, is creating a new idea from existing ideas. This assignment is designed to help you identify how themes can emerge from reading literature and how you can synthesize this information in a way that creates new knowledge. You will use your understandings of the Topic 2 readings to complete a synthesis worksheet.
General Requirements:
This assignment will be used as a pre-writing activity for the synthesis paper in Topic 5.
Locate and download “Synthesis Worksheet” from the Topic Resources.
Review the articles by Baker & Pifer (2011), Gardner (2009), and Smith & Hatmaker (2014) located in the Topic Resources.
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Doctoral learners are required to use APA style for their writing assignments. Review the GCU APA Style Guide for Writing located in the Student Success Center.
You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.
Directions:
Complete the Synthesis Worksheet for the articles by Baker & Pifer (2011), Gardner (2009), and Smith & Hatmaker (2014). The completed worksheet will include the following sections:
An Introduction that introduces and provides context for the topic, presents three common themes that emerged from the readings, and provides organization for the paper with a thesis statement.
A description of the evidence to support three common themes that emerged from the articles. Since this is likely your first experience with this depth of synthesis, we have provided two of the themes found in the articles. Your task is to identify a third theme and to provide evidence from each article for all three common themes.
A conclusion where you will return to your thesis and provide evidence showing you successfully addressed your thesis statement. Discuss the connections that you made from the evidence and how each theme emerged from the central topic of doctoral identity.
Attachments
Operational excellence
Assignment: (2 page: 1 page each) Information Systems for Business and Beyond Questions:
- Chapter 13- study questions 1-10, Exercise 1 (2, 4)
Information Technology and Organizational Learning Assignment:
- Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges are present in the digital era. Will things get better or more complicated as times goes on? Explain. What are some methods to assimilate new generations into the workforce to think about competitive advantage?
Discussion: (Your response should be 250-300 words.)
This week we focus on the various maturity stages and variables in the middle manager best practices arc. Refer to chapter 12 from this week’s reading and not the various stages, what they are and why they are important.
Note: The first post should be made by Wednesday 5 p.m., EST. There is only one post due this week.
Assignment: (1 page)
Information Technology and Organizational Learning Assignment:
Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc. Define each of the maturity stages and performance dimensions. What are the key concepts from each section?
Security Architecture
Assessment Description
It is essential as a security expert to be able to evaluate potential risks within the security infrastructure in order to position security controls/countermeasures.
Create an overall security architecture structure diagram with descriptions of the architecture components making sure to:
- Identify all types of data and sensitive data the organization will store.
- Define where that information is stored.
- Record all hardware and software devices in your network.
- Describe how the security controls are positioned and how they relate to the overall systems architecture.
- Define security attacks, mechanisms, and services, and the relationships between these categories.
- Specify when and where to apply security controls.
- Present in-depth security control specifications.
- Address restricting access, layering security, employing authentication, encrypting storage, automating security, and IT infrastructure.
- Include the full scope of policy, procedural, and technical responsibilities.
APA style is not required, but solid academic writing is expected.
Refer to “CYB-690 Security Architecture Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.
Discussion question, 350 words and 2 references.
Describe an instance of plagiarism or other use of another’s intellectual property with which you are familiar. Please give one argument condemning this conduct and one argument defending it.
Exp19_Access_App_CapAssessment – Student Loans 1.0
Exp19_Access_App_CapAssessment – Student Loans 1.0
Exp19_Access_App_CapAssessment – Student Loans 1.0
Project Description:
Quill Financial Services has recently started working with student loans. You will build the company’s database. The initial set of financed student loans are stored in an Excel spreadsheet. You have already compiled the list of colleges and universities into an Access table. You will use your expertise to import the information from Excel, modify the table, create relationships, create queries, create forms, and create reports.
To start, you have been provided with a database the Information Technology department created. The database has one table. You will be importing an Excel spreadsheet into a table and creating a primary key.
Start Access. Open the downloaded Access file named Exp19_Access_Ch03_CapAssessment_Student_Loans.accdb.
Import the exploring_acap_grader_a1_Clients.xlsx Excel workbook into a table named Clients. While importing the data, make sure to select the option First Row Contains Column Headings, and select ClientID as the primary key field.
Now that you have imported the data from the spreadsheet, you will modify the field properties in the Clients table and demonstrate sorting.
Open the Clients table in Design view. Change the ClientID field size to 6 and remove the @ symbol from the ClientID format property. Change the ZIP field size to 5. Change the ExpectedGraduation field to have 0 Decimal Places. Delete the Comments field. Add a new field named LastContact as the last field in the table. Change the data type to Date/Time, and change the format to Short Date. Switch to Datasheet View, and apply Best Fit to all columns. Sort the table on the LoanAmount field in descending order, then save and close the table.
Now that the table is imported and modified, you will create a relationship between the Colleges and Clients tables.
Open the Relationships window. Add the Clients and Colleges tables to the window, and create a one-to-many relationship between the CollegeID fields in the Clients and Colleges tables. Enforce referential integrity between the two tables and select the cascade updates and cascade delete options. Save the changes, and close the Relationships window.
Polly Esther, a financial adviser, would like your assistance in helping her find certain information. You will create a query for her and demonstrate how she can change information.
Create a new query using Design view. From the Clients table, add the LastName, FirstName, Email, Phone, and ExpectedGraduation fields, in that order. From the Colleges table, add the CollegeName field. Sort the query by LastName and then FirstName, both in ascending order. Set the criteria in the ExpectedGraduation field to 2019. Run the query. Save the query as 2019 Graduates and close the query.
Now that you have created the query, you will create a second query for Polly that will calculate the loan payments for which each student will be responsible (assuming monthly payments).
Create a copy of the 2019 Graduates query. Name the copy Loan Payments and open the query in Design view. Remove the criteria from the ExpectedGraduation field. Create calculated field named MonthlyPayment that determines the estimated monthly student loan payment. The loan will have a fixed rate of 5% interest, paid monthly, for 10 years. Using the Pmt function, replace the rate argument with 0.05/12, the num_periods argument with 10*12, and the present_value argument with the LoanAmount field. Use 0 for the future_value and type arguments. Format the field as Currency.
Run the query. Ensure the payment displays as a positive number. Add a total row to Datasheet view. Average the MonthlyPayment field and count the values in the LastName column. Save and close the query.
Stann Dupp, the director of finance, needs to summarize information about all of the student loans Quill Financial Services offers based on each college. You will create a totals query for him to summarize the number of loans, average loan amount by college.
Create a new query using Design View. From the Colleges table, add the CollegeName field. From the Clients table, add the ClientID and LoanAmount fields. Display the Total row, and group by CollegeName. Show the count of ClientID and the average LoanAmount.
Change the caption for the ClientID field to Num Loans, and the caption for LoanAmount to Avg Loan. Format the LoanAmount field as Standard. Run the query. Save the query as Loan Summary by College and close it.
Jay Walker, one of the company’s administrative assistants, will handle data entry. He has asked you to simplify the way he inputs information into the Clients table. You will create a form based on the Clients table.
Create a Split Form using the Clients table as the source. Change the height of all of the fields and labels to .25 collectively. Reorder the fields in the bottom half of the split form so the FirstName displays before the LastName field. Switch to Form view and click the row for Riya Gonzalez. Change her expected graduation date to 2022. Save the form as Client Information and close it.
Stann is hoping you can create a more print-friendly version of the query you created earlier for him to distribute to the executives. You will create a report based on the Loan Payments query.
Create a report using the Report Wizard. From the Loan Payments query, add the LastName, FirstName, Email, ExpectedGraduation, CollegeName, and MonthlyPayment fields. Do not add any grouping or sorting. Ensure the report is in Landscape orientation. Save the report as Loans by Client and view the report in Layout view. Adjust the width and position of the fields and labels so that all of the values are visible. Save the report.
Now that you have included the fields Stann has asked for, you will work to format the report to make the information more obvious.
Apply the Integral theme. Group the report by the ExpectedGraduation field. Sort the records within each group by LastName then by FirstName, both in ascending order. Switch to Print Preview mode and verify that the report is only one page wide (Note: it may be a number of pages long).
IT214 Week 7
Discussion:
Define, mathematically, the Fibonacci sequence. Find and post four occurrences of Fibonacci sequences in nature. Justify your posting.
You must reply to at least two posts.
Business continuity plan
Review Chapter 15. Discusss Business Continuity Planning Policy in detail. Also discuss any 2 policies that may affect disaster recovery.
Reference one Additional article, in addition to the textbook itself. (MLA or APA citation is okay).
Format: Times 12, 1 inch margin, minimum of 2.5 pages double spaced (not counting references and other information such as your name, etc.)
Case Studies
D 2.1
From the lecture and from chapter 2 of the book, What are the types of hackers and what defines them? A hacker’s skills can range from the novice to the very experienced. What differentiates a novice hacker versus a very experienced hacker? What are the ways that a hacker can “perfect” their skills?
CS 2.1
Conduct research on one of the following attacks (DAPT, Stuxnet, Duqu, or the Iran Certificate Attack. In a 3 to 4 page paper (not including title and reference pages) provide a brief synopsis of the attack. Use what you’ve learned in the first 3 chapters of the course. Some information that should be included in your paper is, the type of attack, why the attack occurred, and who conducted the attack. Be sure to cite your sources and follow APA formatting. Some sources for the attacks can be found on page 50 of your online textbook.
Book Review Chapter 2
Chapter two, write a 3-4 page review (not including the Title page or Reference page) of the chapter. The review is to give your point of view on one of the topics based on the web sites found on page 50 of the book