Help please!!! Problem Solving Cases in Microsoft Access & Excel – 15th edition – Case 6

 

Problem

CREATING A SPREADSHEET FOR DECISION SUPPORT

In this assignment, you will produce a spreadsheet that models Philly Landscaping’s estimated 2017 revenues, expenses, and profits; provides forecasts of 10 years of cash flows for the company; and allows for the input of other variables to answer Steve’s questions. In Assignment 2, you will use your spreadsheet to gather data and then write a memorandum that documents your analysis and findings. In Assignment 3, you will prepare and give an oral presentation of your analysis and conclusions to Steve.

First, you need to create the spreadsheet model based on your conversations with Steve and your understanding of the questions he would like to have answered. The model will cover 11 years—2017 as the base year and 10 subsequent years as requested by the bank to provide estimated cash flows. This section helps you set up each of the following spreadsheet components before entering cell formulas:

• Constants
• Inputs
• Summary of Key Results
• Calculations

A discussion of each section follows. The spreadsheet skeleton for this case is available for you to use; it will save you time. To access the spreadsheet skeleton, go to your data files, select Case 6, and then select

Philly Landscaping.xlsx.

Constants Section

Your spreadsheet should include the constants, otherwise known as assumptions, shown in Figure 6-1. An explanation of the line items follows the figure.

• Prices—These prices are based on averages that Steve provided.
• Rough Yard Work per Square Foot
• Gutter Cleaning per Linear Foot
• Power Washing per Square Foot
• Lawn Mowing and Edging per Square Foot
• Driveway Seal Coating per Square Foot
• Fall Leaf Clearing per Square Foot
• Snow Removal per Square Foot
• Costs—The average cost of labor and materials is based on averages Steve provided from previous years.
• Customer Base—These values show the company’s current number of customers and average lot coverage areas for various company services. Most of these averages are shown in square footage (Sq Ft).
• Customers—This value shows the number of customers currently served by the company.
• Average Lawn Surface (Sq Ft)
• Average Power Washing Surface (Sq Ft)
• Average Gutter Length (Linear Ft)
• Average Snow Removal Surface (Sq Ft)
• Average Driveway Seal Coating Surface (Sq Ft)
• Average Fall Leaf Clearing Surface (Sq Ft)
• Economic and Environmental Factors—Based on conversations with his accountant, Steve feels comfortable using a 25 percent tax rate for the model.

Inputs Section

As Steve explained earlier, he would like to answer some important questions to determine his best option for retirement. First, the model needs to evaluate the impact of the loan on the customer base’s growth. Second, the model needs to evaluate the repayment of the loan if it is approved. Finally, Steve has different ideas on how much money he will need to retire comfortably; he thinks an amount between $75,000 and $100,000 annually would be sufficient. The DSS will determine whether these options are viable.

Your spreadsheet should include the following inputs, as shown in Figure 6-2. Note that the spreadsheet extends to 2027, as explained earlier, but the remaining figures in this case have been cropped to fit the page.

• Customer Base Change %—This value is the expected change in the size of the customer portfolio. The value could be positive, negative, or zero starting in 2017.
• Annual Payments For Loan—The bank’s loan officer has provided an estimate of an annual total payment of $120,000 for a loan of $1 million with a 3 percent interest rate over 10 years.
• Annual Income Required For Retirement—This value represents what Steve is willing to accept as annual retirement income.

Summary of Key Results Section

Your spreadsheet should include the results shown in Figure 6-3. A general explanation of this section follows

the figure.

For each year starting in 2017, this section should include values that are already calculated elsewhere in the spreadsheet. The formulas in the Summary of Key Results section will echo results from throughout your model; no long or complicated formulas need to be used in this section. The purpose of gathering the results together is to make for an easier job when configuring Scenario Manager later.

Calculations Section

To create an accurate decision tool, you should calculate intermediate results that will be used to determine the year-end numbers needed for the model. It is generally a good idea to arrive at these final numbers in a series of steps rather than in one short calculation. Errors are easier to identify if the steps are broken out, and it also makes troubleshooting a breeze. The calculations shown in Figures 6-4, 6-5, and 6-6 are based on 2017 values in the Constants section (Customer Base values and prices); starting in 2018, the calculations take into account the inputs from each scenario. When called for, use absolute referencing properly. Values must be computed by cell formula; hard-code numbers in formulas only when you are told to do so. Cell formulas should not reference a cell with a value of “NA.”

An explanation of each item in this section follows the figure in which the item is shown.

• Rough Yard Work—The product of the average lawn surface and the number of customers. Steve tells you that only 25 percent of customers request this service. Format cells for numbers with zero decimals.
• Lawn Mowing and Edging—The product of the average lawn surface and the number of customers. Steve tells you that only 25 percent of customers request this service. Format cells for numbers with zero decimals.
• Power Washing—The product of the average power washing surface and the number of customers. Format cells for numbers with zero decimals.
• Gutter Cleaning—The product of the average gutter length and the number of customers. Format cells for numbers with zero decimals.
• Snow Removal—The product of the average snow removal surface and the number of customers. Format cells for numbers with zero decimals.
• Driveway Seal Coating—The product of the average driveway seal coating surface and the number of customers. Format cells for numbers with zero decimals.
• Fall Leaf Clearing—The product of the average lawn surface and the number of customers. Steve tells you that 75 percent of customers request this service. Format cells for numbers with zero decimals.

• Rough Yard Work—Total expected revenue multiplied by the unit price in the Constants section. Format cells for currency with zero decimals.
• Lawn Mowing and Edging—Total expected revenue multiplied by the unit price in the Constants section. Format cells for currency with zero decimals.
• Power Washing—Total expected revenue multiplied by the unit price in the Constants section. Format cells for currency with zero decimals.
• Gutter Cleaning—Total expected revenue multiplied by the unit price in the Constants section. Format cells for currency with zero decimals.
• Snow Removal—Total expected revenue multiplied by the unit price in the Constants section. Format cells for currency with zero decimals.
• Driveway Seal Coating—Total expected revenue multiplied by the unit price in the Constants section. Format cells for currency with zero decimals.
• Fall Leaf Clearing—Total expected revenue multiplied by the unit price in the Constants section. Format cells for currency with zero decimals.
• Total Revenue—The sum of all revenues for the year. Format cells for currency with zero decimals.

• Labor and Materials—Based on current estimates, the annual expense for labor and materials is $500,000. This number will need to be updated based on customer base changes starting in 2018. Format cells for currency with zero decimals.
• Loan Repayment—Repayment would start in 2018 if the loan offer is approved. Format cells for currency with zero decimals.
• Total Expense—The sum of labor and materials and the loan repayment. Format cells for currency with zero decimals.
• Income Before Taxes—The difference between total revenue and total expense. Format cells for currency with zero decimals.
• Tax Expense—The tax liability based on the tax rate in the Constants section. Format cells for currency with zero decimals.
• Net Income—The difference between net income before taxes and tax expense. Format cells for currency with zero decimals.
• Enough Income to Hire Manager?—Starting in 2018, if the difference between net income and the amount required to retire is over $50,000, enter “Yes.” Otherwise, enter “No.”
• Income Over Expected Annuity Earnings?—Starting in 2018, if net income is greater than the estimated annuity value ($100,000), enter “Yes.” Otherwise, enter “No.”

Using the Spreadsheet to Gather Data

You have built the spreadsheet to model several possible situations. For each of the four test scenarios, you want to know the annual cash flow, whether Steve will be able to hire a general manager, and whether income from the company surpasses the estimated annuity value.

You will run “what-if” scenarios with the four sets of input values using Scenario Manager. (See Tutorial C for details on using Scenario Manager.) Set up the four scenarios. Your instructor may ask you to use conditional formatting to make sure your input values are proper. Note that in Scenario Manager you can enter noncontiguous cell ranges, such as C19, D19, C20:F20.

The relevant output cells are Annual Income, Enough Income to Hire Manager?, and Income Over Expected Annuity Earnings? from 2018 to 2027. All of these cells are shown in the Summary of Key Results section. Run Scenario Manager to gather the data in a report. When you finish, print the spreadsheet with the input for any of the scenarios, print the Scenario Manager summary sheet, and then save the spreadsheet file a final time.

 

Documenting Your Results in a Memo

Use Microsoft Word to write a brief memo that documents your analysis and results. You can address the memo to Steve, the owner of Philly Landscaping. Observe the following requirements:

• Set up your memo as described in Tutorial E.
• In the first paragraph, briefly state the business situation and the purpose of your analysis.
• Next, describe the scenarios tested.
• State your conclusions.
• Support your statements graphically, as your instructor requires. Your instructor may ask you to return to Excel and copy the results of the Scenario Manager summary sheet into the memo. You should include a summary table built in Word based on the Scenario Manager summary sheet results. (This procedure is described in Tutorial E.)
• Your table should have the format shown in Figure 6-7.

GIVING AN ORAL PRESENTATION

Your instructor may ask you to explain your analysis and results in an oral presentation. If so, assume that Steve wants the presentation to last 10 minutes or less. Use visual aids or handouts that you think are appropriate. See Tutorial F for tips on preparing and giving an oral presentation.

Netlab 3

 

  1. Complete Netlab 3 . 

    NETLAB 3. A. IDS Evasion. 

    1. Initiating Network Monitoring Application 
    2. Testing IDS results with Regular Nmap scan 
    3. Testing IDS results with decoy scan 
    4. Testing IDS results with Spoofed MAC Scan 
    5. NETLAB 3. B. Password Cracking With John The Ripper and Hashcat. 
    6. Generating Password List for Password Cracking 
    7. Create a User Account to be cracked. 
    8. Password cracking Using John the Ripper
    9. Password Cracking Using Hashcat 
    10. NETLAB 3. C. Metasploit Framework Fundamental & Armitage. 
      1. Getting familiar with Metasploit. Why do pen testers use Metasploit? 
      2. Vulnerability scanning Using the WMAO Module. 
      3. Configuring Exploits and Payloads. 
      4. Finding and Execuritn Attacks in Armitage. 
    11. SAMPLE SCREENSHOT.pdf

  ASSIGNMENT SUBMISSION

  1. Text SubmissionWrite Submission
  2. Attach Files  

  ADD COMMENTS

  1. CommentsFor the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).P0 WORDSPOWERED BY TINY

 

Cybersecurity

 Answer the following questions. 

Part 1

· Within the context of cybersecurity, how would you define risk management?

· What are 3 techniques/strategies used, when an organization embarks on risk management?

· For each of your 3 techniques/strategies, 

§ Provide a brief description of each of  your 3 techniques/strategies

Provide your source(s)!

Part 2 

  

· Provide   3 examples of encryption through software

· Provide 3  examples of encryption through   hardware

· Which would you say is more effective? encryption   through software or encryption through hardware? Why?

Provide   your source(s)!

0

Part 3

· Provide names of 3 countries that engage in cyber-warfare

· Provide 3  examples of state-sponsored cyber-attacks

Provide your source(s)!

Information Techology project

 

For your personal use, what would be the most ideal home network setup and why?  Describe it fully.  Number of devices, connection types, uses for devices, etcetera.

Your design will be a list of all the specifications that this network will have.  In addition, you will need to write up a document explaining why you have selected these specifications, features, and components.

At a minimum you must consider the following items in your design.

  1. Cost
  2. Functionality
  3. Connecting devices
  4. Internet connections

Devices to consider on your network can include but are not limited to:

  • Printers
  • DVRs
  • Smart TVs
  • Gaming Consoles
  • Appliances
  • Computers
  • Mobile devices
  • Digital media players
  • Smart home devices

Document minimum requirements:

  • A minimum of one full paragraph in addition to a neatly ordered equipment list. (DO NOT copy the list from the Internet)
  • Your submission must have three to seven devices excluding the modem and router.
  • Submit only one document via the link title above.
  • Use paragraph structure. Use complete sentences and proper grammar and spelling.
  • Include a header that contains your name, the assignment name, and the course code from page two of the syllabus.
  • Your document must be one of the following formats (.doc, .docx, or .rtf).
  • Cite any and all sources.

Unit 5 Data Flow Diagram Creation

 

Unit Outcomes:

  • Discover a variety of diagrams relating to systems analysis.
  • Describe logical process models.
  • Create Data Flow Diagrams.

Course Outcome:

IT460–3: Create logical models that describe system processes.

Assignment Instructions

Avery has opened a gym and rehabilitation center specifically designed to provide training and recovery for service members who may have been injured while on duty. New members are provided a free fitness assessment to help determine their current fitness levels and to ascertain the extent of any injury to help onboard them into the program.

Avery has designed a basic system to help onboard these new gym members. When members are seen for the first time, they complete a simple gym membership form that asks for their name, address, phone number, and brief medical history, which are stored in the gym member file. They are also asked to schedule a Fitness Assessment.

Therapists or trainers must check the assessment calendar file for an available time. Members may also call to change their assessments. Because these assessments are scheduled in advance, Avery usually sends a reminder postcard and text message to each member one week before the appointment.

Assignment Requirements

Use Visio to Construct a Level 1 DFD based on the attached use cases. Each use case corresponds to a process in the Gym System. Use Gane and Sarson symbols. All the information can be analyzed from the Use Cases. Some of the Information is provided below. You will have to determine and label all the Data Flows in the DFD.

Entity: Gym Member

Processes:

  • Schedule (or change) a Fitness Assessment
  • Collect Membership Information
  • Send Reminder and text message

Data Files:

  • Calendar File
  • Gym Member File
  • Data Flows:
    • At least 16 are needed

 

IT460: Unit 5 Assignment Data Flow Diagrams

Use Case Name: Gym Member makes or changes a fitness assessment

ID: _1_

Importance Level: High

Primary Actor: Gym Member

Short Description: This describes how a new fitness assessment is made or an existing fitness assessment is changed.

Trigger: Gym Member calls to schedule new fitness assessment or change an existing fitness assessment.

Type: External/Temporal

Major Inputs:

Major Outputs:

Description

Source

Description

Destination

Gym Member name

Gym Member

Scheduled fitness assessment

Gym Member

Desired fitness assessment

Gym Member

Scheduled fitness assessment

Calendar file

Fitness assessment to change

Gym Member

Available fitness assessments

Gym Member

Available fitness assessments

Calendar file

Check Gym Member name

Gym Member file

Existing Gym Members

Gym Member file

Major Steps Performed

  1. Get Gym Member’s name. Check Gym Member name with Gym Member file.
  2. If new Gym Member, get address and phone number and enter in new Gym Member file entry.
  3. If this is a fitness assessment change, find current fitness assessment in fitness assessment file, and cancel it.
  4. Get desired fitness assessment time and match with available fitness assessments in Calendar File. When a suitable time is found, enter scheduled fitness assessment in the Calendar file and confirm with Gym Member.

Information for Steps

Gym Member name

Gym Member File

Address

Phone number

New Gym Member information

Fitness assessment to change

Existing Fitness assessments

Desired fitness assessment

Available fitness assessments

Scheduled fitness assessments

Use Case Name: Collect new Gym Member information

ID: _2_

Importance Level: High

Primary Actor: New Gym Member

Short Description: This describes how new Gym Member information is collected when a new Gym Member arrives for fitness assessment.

Trigger: New Gym Member arrives for fitness assessment.

Type: External/Temporal

Major Inputs:

Major Outputs:

Description

Source

Description

Destination

New Gym Member information

Gym Member Information

Gym Member file

(Includes name, address,

Gym Member

phone number)

Injury History

Gym Member

Major Steps Performed

  1. When the Gym Member arrives, determine if he/she has been seen before in this gym. If they have not, have them fill out a Gym Member information form.
  2. Use the information on the Gym Member information form to update and complete the Gym Member’s entry in the Gym Member file.

Information for Steps

Gym Member status

Gym Member name

Address

Phone number

Injury history

Use Case Name: Send fitness assessment reminder card and text message

ID: _3_

Importance Level: Medium

Primary Actor: System

Short Description: This describes how reminder cards and text message sent to Gym Members one week prior to fitness assessment.

Trigger: Time to send reminders and text message one week before scheduled fitness assessments.

Type: External/Temporal

Major Inputs:

Major Outputs:

Description

Source

Description

Destination

Current date

Calendar

Fitness assessment notification card

Gym Member

Scheduled fitness assessments

Calendar file

Text message

Gym Member

Gym Member Contact Info

Gym Member file

Major Steps Performed

  1. Each day find the fitness assessments in the Calendar file for the day week.
  2. Prepare fitness assessment notification card and text message to all Gym Members having fitness assessments.

Information for Steps

Current date

Scheduled fitness assessments

Name

Address

Fitness assessment

Fitness assessment notification card

Week 5 DQ AIT

Discuss the similarities and differences when managing an IT project vs. any other project. Specifically, what risks are associated with IT projects, and how would you manage and mitigate the risks? 

What you have learned in the program (Applied IT) thus far.

Note: 300 words with intext citations with 2 references must.

Disaster recovery

Using a Web browser, go to www.securityfocus.com. What information is provided under the

BugTraq tab? Under the Vulnerabilities tab? On the Vulnerabilities tab, select Microsoft as the

Vendor and Windows Messenger as the title. Look for a PNG Buffer Overflow vulnerability.

What information is provided under the Exploit tab?What does it mean? How could an attacker

use this information? How could a security manager?