Exp19_Access_Ch03_ML1 – Small Business Loans 1.0

 

Exp19_Access_Ch03_ML1 – Small Business Loans 1.0

 

Exp19_Access_Ch03_ML1 – Small Business Loans 1.0

You are the manager of a regional  business loan department for the U.S. Small Business Administration  office. You have decided to evaluate whether Access could be used in  place of the Excel worksheet you are currently using. You will create a  table, add some sample customers, and import some recent data from an  Excel spreadsheet. You will calculate the payments for the loans that  are currently on the books by creating a query using the Pmt function.  You will also summarize each loan by the type of loan (M=Mortgage,  C=Car, and O=Other).

In   Design view, create a new table. Add the first field named CustomerID with   AutoNumber Data Type. Add Company as the second field name, and FirstName as   the third field name. Accept the default data types.
 

  Save the Table with name as Customers. Click Yes, when prompted for defining Primary   Key.

Add the following fields to the   Customers table (in this order), accepting the default data type of Short   Text:
 

LastName
   City
   State
   Zip
 

  Verify that CustomerID is the primary field.

Save the table and switch to   Datasheet view. Add the following records to the table:
 

Company FirstName LastName City State Zip
Jones   and Co Robert Paterson Greensboro NC 27401
   Elements, Inc. Merve Kana Paterson NJ 07505
   Godshall Meats, LLC Francisco De La Cruz Beverly Hills CA 90210

Import the spreadsheet using the   downloaded Excel file a03_h2_Loans.xlsx   into a new table. Choose LoanID as the primary key and accept all other   defaults in the Import Wizard.

Open the Loans table in Design   view. Change the InterestRate field format to
   Percent. Change the field size for the CustomerID field to Long  Integer. Save   and close the table. Click Yes when prompted that some  data may be lost. 

Create a relationship between   the CustomerID fields in the  Customers and Loans tables. Enforce referential   integrity. Save and  close the Relationships window.

Create a query using the two   tables that will calculate the payment  amount for each loan. Add the   following fields: Company, LoanID,  Amount, InterestRate, Term, and LoanClass,   in that order. Sort the  query by LoanID in ascending order. Save the query as   Loan   Payments.

Use the Expression Builder to   add a calculated field named Payment  in the first blank column to   calculate the loan payment for each loan  using the Pmt function. Insert the   appropriate field names in place  of the placeholder arguments. Assume the   loans have monthly payments  (12 payments per year). Ensure the payment   displays as a positive  number. Run the query.

Switch to Design view and change   the format for the Payment  calculated field to Currency. Run the query again   to verify your  change.

In Datasheet view, add a Totals   row. Use it to calculate the sum of  the Amount column, the average   InterestRate, and the average Term.  Save and close the query.

Create a copy of Loan Payments.   Save the new query as Loan Payments Summary. Open the Loan Payments Summary   query in Design view and rearrange the columns as follows:
   LoanClass, LoanID, Amount, and InterestRate. Delete columns Company, Term,   and Payment.

Group the Loan Payments Summary   query by the LoanClass field.  Display the number of loans in the LoanID   column, the sum in the  Amount column, and the average in the InterestRate   column. Run the  query.

Switch to Design view and   display the Property Sheet. For the LoanID field, change the caption to Loans. For the Amount field, change   the caption to Total Amount and change the format to   Currency. For the InterestRate field, change the caption to Avg Interest   Rate and change the format to Percent. Run the query.   Save and close the query.

Close all database objects.   Close the database and then exit Access. Submit the database as directed.

Questions

 

  • 11.1 List and briefly define three classes of intruders.
  • 11.2 What are two common techniques used to protect a password file?
  • 11.3 What are three benefits that can be provided by an intrusion detection system?
  • 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
  • 11.5 What metrics are useful for profile-based intrusion detection?
  • 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
  • 11.7 What is a honeypot?
  • 11.8 What is a salt in the context of UNIX password management?
  • 11.9 List and briefly define four techniques used to avoid guessable passwords.

Complete your answers on a WORD Document

Statistics Power Point Presentation – Please have an in-depth background in Statistics Introduction You have learned lots about doing statistical analyses. It is time to work without a net. For the course project, you will address some questions that in

 Statistics Power Point Presentation – Please have an in-depth background in Statistics

Introduction

You have learned lots about doing statistical analyses. It is time to work without a net.

For the course project, you will address some questions that interest you with the statistical methodology learned in this course. You choose the question; you decide how to collect data; you do the analyses. Please select a topic that aligns with your degree, so that the knowledge that you gain is practical and helpful in your future career. The questions can address almost any topic (although I have veto power), including topics in psychology, sociology, natural science, medicine, public policy, sports, law, etc. Please see the project ideas in the course documents, if you need help. However, the data that you collect should be quantitative in nature.

The project requires you to synthesize all the material from the course. Hence, it is one of the best ways to solidify your understanding of statistical methods. Plus, you get answers to issues that pique your intellectual curiosity.

Activity Instructions
Create a PowerPoint presentation detailing your research.

  • Begin with very clear and well-defined hypotheses. You should think of questions that interest you first, and then worry about how to collect and analyze data to address those questions. Generally, vague topics lead to uninteresting projects.
  • The most important aspects of any statistical analysis are stating questions and collecting data. Hence, to get the full experience of running your own study, the project requires you to analyze data that you collect. It is not permissible to use data sets that have been put together by others. You are permitted to collect data off the web; however, you must be the one who decides on the analyses and who puts the data set together. Keep in mind that by the end of lectures, you will have learned many inferential statistical techniques, such as hypothesis testing with t, chi square tests for goodness of fit and independence, independent and dependent t tests, ANOVA, correlation, and regression. These techniques will help you address your question of interest.
  • Provide an adequate description of the methods and design of the study. Report on the possible biases associated with your data collection.
  • Be realistic in planning your research design: can you carry out what you have planned within a reasonable time period and investment of your own energy? The quality of the final product is what counts, not just the amount of perspiration that went into it!
  • Make use of the concepts and methods learned in this course, and not just general knowledge, in planning and completing this type of project.

Presentation Format
An effective presentation communicates your project in a clear and concise fashion. The slides should address the following six points:

  • Statement of the problem: Describe the questions you address and any key issues surrounding the questions.
  • Data collection: Explain how you collected the data. Include the sample type, sample size, and any questions you asked. Also, include response rates.
  • Analyses: Describe which inferential statistical test analysis that you did. Be ready to explain why you believe this method is justified.
  • Results: Present the six step hypothesis test. Include the EXCEL printout, and any tables or graphs that support your analyses (be judicious here–too many tables and graphs hurt the clarity of your message).
  • Conclusions: State your p-value and then the answer your question of interest, based upon the data that you collected.
  • Discussion: What implications do your results have for the population you sampled from? What could be done to improve the study if it was done again? What types of biases might exist?

Presentation Requirements

  • Length varies
  • Title slide
  • References slide

===============================================================================================================

Please note, this presentation should be focus on international import or merchandise if possible.

attached is the example provided by the instructor and the grading rubric

disction

– need one page

 

odule 11 question about Identify Threats

The increasing pace of digital transformation requires network administrators, technicians, engineers, architects, executives, and even users to consistently monitor shifting vulnerabilities and new threats. While you can never identify every threat to a network, it’s important to regularly identify the greatest threats and develop strategies to protect against them. After working through this module and building on all you’ve learned earlier in this course, you’re developing a solid understanding of the types of threats faced by today’s networks. Do some research online to find what today’s network admins are most concerned about. Then, respond to the following question:

  • In your opinion at this point in your career, what do you believe is the greatest threat network admins should work to mitigate on their networks?

Risk management

 

Risk management frameworks have a common set of core components. They are:

  • Program scope
  • Information risk objectives
  • Information risk policy 
  • Risk appetite/tolerance
  • Roles and responsibilities
  • Risk management life-cycle process
  • Risk management documentation
  • Management review

For each component, discuss:

  • A description of what it is
  • The different elements that comprise the component
  • How it used to manage risk

 

  • Assignment Format: APA format
  • Submission Format: MS Word
  • Length: 7 pages (not including cover & references pages)
  • Citations Required: minimum 5 citations (At least 2 Scholarly and 3 from other reliable sources)

Week 8 Course Project

 Week 8

Course Project Presentation

Add one new feature you have not added. This could be an additional array or function, an additional calculation, more inputs, or even try adding color. Create a powerpoint presentation explaining your course project. You should include the following slides: introduction, conclusion, purpose, challenges in your code, future improvements to your code, and conclusions. Include screenshots showing your program working through each phase. Discuss the evolution of your program through each phase.

Security Awareness Training

 

Scenario

You have been in your role as the CIO for Premier University for almost one year. In that time, you have managed to hire a chief information security officer (CISO) to oversee Premier University’s information security program. The CISO is working to address the university’s GLBA data safeguarding requirements that you previously provided to the Premier University president.The CISO notes that guidance from the Department of Education Office of Federal Student Aid in 2016 recommends that higher education institutions use NIST SP 800-171 to protect the confidentiality of the student financial aid data that the institution uses and stores.You recently notified the university’s president that information security awareness and training is a gap in the institution’s written information security program. Even though a high percentage of higher education institutions require mandatory information security awareness training for faculty and staff, the university president remains unconvinced that Premier University should require information security training.

Tasks

Using your knowledge of the circumstances of the data breach that the institution experienced over a year ago, guidance from the Department of Education Office of Federal Student Aid, as well as other sources you researched, write a persuasive memo to the Premier University president that argues that the institution should implement mandatory information security awareness training for all faculty and staff.For this part of the project:

  • Read the Department of Education Office of Federal Student Aid at https://ifap.ed.gov/dear-colleague-letters/07-01-2016-gen-16-12-subject-protecting-student-information.
  • Research the need for security awareness training for faculty and staff at public universities, such as the latest EDUCAUSE Information Security Almanac
  • Write a persuasive, professional memo that addresses the need for security awareness training.
  • In the memo, include any sources you consulted.