Need help Developing a Conceptual Database Model
Exp19_Access_Ch03_ML1 – Small Business Loans 1.0
Exp19_Access_Ch03_ML1 – Small Business Loans 1.0
Exp19_Access_Ch03_ML1 – Small Business Loans 1.0
You are the manager of a regional business loan department for the U.S. Small Business Administration office. You have decided to evaluate whether Access could be used in place of the Excel worksheet you are currently using. You will create a table, add some sample customers, and import some recent data from an Excel spreadsheet. You will calculate the payments for the loans that are currently on the books by creating a query using the Pmt function. You will also summarize each loan by the type of loan (M=Mortgage, C=Car, and O=Other).
In Design view, create a new table. Add the first field named CustomerID with AutoNumber Data Type. Add Company as the second field name, and FirstName as the third field name. Accept the default data types.
Save the Table with name as Customers. Click Yes, when prompted for defining Primary Key.
Add the following fields to the Customers table (in this order), accepting the default data type of Short Text:
LastName
City
State
Zip
Verify that CustomerID is the primary field.
Save the table and switch to Datasheet view. Add the following records to the table:
Company FirstName LastName City State Zip
Jones and Co Robert Paterson Greensboro NC 27401
Elements, Inc. Merve Kana Paterson NJ 07505
Godshall Meats, LLC Francisco De La Cruz Beverly Hills CA 90210
Import the spreadsheet using the downloaded Excel file a03_h2_Loans.xlsx into a new table. Choose LoanID as the primary key and accept all other defaults in the Import Wizard.
Open the Loans table in Design view. Change the InterestRate field format to
Percent. Change the field size for the CustomerID field to Long Integer. Save and close the table. Click Yes when prompted that some data may be lost.
Create a relationship between the CustomerID fields in the Customers and Loans tables. Enforce referential integrity. Save and close the Relationships window.
Create a query using the two tables that will calculate the payment amount for each loan. Add the following fields: Company, LoanID, Amount, InterestRate, Term, and LoanClass, in that order. Sort the query by LoanID in ascending order. Save the query as Loan Payments.
Use the Expression Builder to add a calculated field named Payment in the first blank column to calculate the loan payment for each loan using the Pmt function. Insert the appropriate field names in place of the placeholder arguments. Assume the loans have monthly payments (12 payments per year). Ensure the payment displays as a positive number. Run the query.
Switch to Design view and change the format for the Payment calculated field to Currency. Run the query again to verify your change.
In Datasheet view, add a Totals row. Use it to calculate the sum of the Amount column, the average InterestRate, and the average Term. Save and close the query.
Create a copy of Loan Payments. Save the new query as Loan Payments Summary. Open the Loan Payments Summary query in Design view and rearrange the columns as follows:
LoanClass, LoanID, Amount, and InterestRate. Delete columns Company, Term, and Payment.
Group the Loan Payments Summary query by the LoanClass field. Display the number of loans in the LoanID column, the sum in the Amount column, and the average in the InterestRate column. Run the query.
Switch to Design view and display the Property Sheet. For the LoanID field, change the caption to Loans. For the Amount field, change the caption to Total Amount and change the format to Currency. For the InterestRate field, change the caption to Avg Interest Rate and change the format to Percent. Run the query. Save and close the query.
Close all database objects. Close the database and then exit Access. Submit the database as directed.
Questions
- 11.1 List and briefly define three classes of intruders.
- 11.2 What are two common techniques used to protect a password file?
- 11.3 What are three benefits that can be provided by an intrusion detection system?
- 11.4 What is the difference between statistical anomaly detection and rule-based intrusion detection?
- 11.5 What metrics are useful for profile-based intrusion detection?
- 11.6 What is the difference between rule-based anomaly detection and rule-based penetration identification?
- 11.7 What is a honeypot?
- 11.8 What is a salt in the context of UNIX password management?
- 11.9 List and briefly define four techniques used to avoid guessable passwords.
Complete your answers on a WORD Document
Statistics Power Point Presentation – Please have an in-depth background in Statistics Introduction You have learned lots about doing statistical analyses. It is time to work without a net. For the course project, you will address some questions that in
Statistics Power Point Presentation – Please have an in-depth background in Statistics
Introduction
You have learned lots about doing statistical analyses. It is time to work without a net.
For the course project, you will address some questions that interest you with the statistical methodology learned in this course. You choose the question; you decide how to collect data; you do the analyses. Please select a topic that aligns with your degree, so that the knowledge that you gain is practical and helpful in your future career. The questions can address almost any topic (although I have veto power), including topics in psychology, sociology, natural science, medicine, public policy, sports, law, etc. Please see the project ideas in the course documents, if you need help. However, the data that you collect should be quantitative in nature.
The project requires you to synthesize all the material from the course. Hence, it is one of the best ways to solidify your understanding of statistical methods. Plus, you get answers to issues that pique your intellectual curiosity.
Activity Instructions
Create a PowerPoint presentation detailing your research.
- Begin with very clear and well-defined hypotheses. You should think of questions that interest you first, and then worry about how to collect and analyze data to address those questions. Generally, vague topics lead to uninteresting projects.
- The most important aspects of any statistical analysis are stating questions and collecting data. Hence, to get the full experience of running your own study, the project requires you to analyze data that you collect. It is not permissible to use data sets that have been put together by others. You are permitted to collect data off the web; however, you must be the one who decides on the analyses and who puts the data set together. Keep in mind that by the end of lectures, you will have learned many inferential statistical techniques, such as hypothesis testing with t, chi square tests for goodness of fit and independence, independent and dependent t tests, ANOVA, correlation, and regression. These techniques will help you address your question of interest.
- Provide an adequate description of the methods and design of the study. Report on the possible biases associated with your data collection.
- Be realistic in planning your research design: can you carry out what you have planned within a reasonable time period and investment of your own energy? The quality of the final product is what counts, not just the amount of perspiration that went into it!
- Make use of the concepts and methods learned in this course, and not just general knowledge, in planning and completing this type of project.
Presentation Format
An effective presentation communicates your project in a clear and concise fashion. The slides should address the following six points:
- Statement of the problem: Describe the questions you address and any key issues surrounding the questions.
- Data collection: Explain how you collected the data. Include the sample type, sample size, and any questions you asked. Also, include response rates.
- Analyses: Describe which inferential statistical test analysis that you did. Be ready to explain why you believe this method is justified.
- Results: Present the six step hypothesis test. Include the EXCEL printout, and any tables or graphs that support your analyses (be judicious here–too many tables and graphs hurt the clarity of your message).
- Conclusions: State your p-value and then the answer your question of interest, based upon the data that you collected.
- Discussion: What implications do your results have for the population you sampled from? What could be done to improve the study if it was done again? What types of biases might exist?
Presentation Requirements
- Length varies
- Title slide
- References slide
===============================================================================================================
Please note, this presentation should be focus on international import or merchandise if possible.
attached is the example provided by the instructor and the grading rubric
disction
– need one page
odule 11 question about Identify Threats
The increasing pace of digital transformation requires network administrators, technicians, engineers, architects, executives, and even users to consistently monitor shifting vulnerabilities and new threats. While you can never identify every threat to a network, it’s important to regularly identify the greatest threats and develop strategies to protect against them. After working through this module and building on all you’ve learned earlier in this course, you’re developing a solid understanding of the types of threats faced by today’s networks. Do some research online to find what today’s network admins are most concerned about. Then, respond to the following question:
- In your opinion at this point in your career, what do you believe is the greatest threat network admins should work to mitigate on their networks?
Risk management
Risk management frameworks have a common set of core components. They are:
- Program scope
- Information risk objectives
- Information risk policy
- Risk appetite/tolerance
- Roles and responsibilities
- Risk management life-cycle process
- Risk management documentation
- Management review
For each component, discuss:
- A description of what it is
- The different elements that comprise the component
- How it used to manage risk
- Assignment Format: APA format
- Submission Format: MS Word
- Length: 7 pages (not including cover & references pages)
- Citations Required: minimum 5 citations (At least 2 Scholarly and 3 from other reliable sources)
Week 8 Course Project
Week 8
Course Project Presentation
Add one new feature you have not added. This could be an additional array or function, an additional calculation, more inputs, or even try adding color. Create a powerpoint presentation explaining your course project. You should include the following slides: introduction, conclusion, purpose, challenges in your code, future improvements to your code, and conclusions. Include screenshots showing your program working through each phase. Discuss the evolution of your program through each phase.
Security Awareness Training
Scenario
You have been in your role as the CIO for Premier University for almost one year. In that time, you have managed to hire a chief information security officer (CISO) to oversee Premier University’s information security program. The CISO is working to address the university’s GLBA data safeguarding requirements that you previously provided to the Premier University president.The CISO notes that guidance from the Department of Education Office of Federal Student Aid in 2016 recommends that higher education institutions use NIST SP 800-171 to protect the confidentiality of the student financial aid data that the institution uses and stores.You recently notified the university’s president that information security awareness and training is a gap in the institution’s written information security program. Even though a high percentage of higher education institutions require mandatory information security awareness training for faculty and staff, the university president remains unconvinced that Premier University should require information security training.
Tasks
Using your knowledge of the circumstances of the data breach that the institution experienced over a year ago, guidance from the Department of Education Office of Federal Student Aid, as well as other sources you researched, write a persuasive memo to the Premier University president that argues that the institution should implement mandatory information security awareness training for all faculty and staff.For this part of the project:
- Read the Department of Education Office of Federal Student Aid at https://ifap.ed.gov/dear-colleague-letters/07-01-2016-gen-16-12-subject-protecting-student-information.
- Research the need for security awareness training for faculty and staff at public universities, such as the latest EDUCAUSE Information Security Almanac
- Write a persuasive, professional memo that addresses the need for security awareness training.
- In the memo, include any sources you consulted.