Exp19_Excel_Ch09_CapAssessment_Tips

 

Exp19_Excel_Ch09_CapAssessment_Tips

 

98% Marked 

Please Use your file      

1

Start   Excel. Download and open the file named Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx.   Grader has automatically added your last name to the beginning of the   filename.
 

  The Excel workbook contains circular references. When you open the file, an   error message displays. This error will be resolved as part of the project

2

The   Tip Left column in the Friday worksheet contains a fill color and number   formatting. You want to fill these formats to the other daily worksheets.
 

  Group the Friday through Monday worksheets, staring with the Friday   worksheet. Fill the format only for the range E5:E24.

3

Now   you want to insert column totals for the five worksheets simultaneously.
 

  With the worksheets still grouped, insert SUM functions in the range B25:E25   and apply the Totals cell style. Ungroup the worksheets.

4

The   Week worksheet is designed to be a summary sheet. You want to insert a   hyperlink to the Total heading in the Monday worksheet.
 

  On the Week worksheet, in cell A5, insert a hyperlink to cell A25 in the   Monday worksheet with the ScreenTip text Monday’s Totals. Test the hyperlink to   ensure it works correctly.

5

In   cell A6 on the Week worksheet, insert a hyperlink to cell A25 in the Tuesday   worksheet with the ScreenTip text Tuesday’s Totals. Test the hyperlink to   ensure it works correctly.

6

In   cell A7, insert a hyperlink to cell A25 in the Wednesday worksheet with the   ScreenTip text Wednesday’s Totals. Test the hyperlink to ensure it works   correctly.

7

In   cell A8, insert a hyperlink to cell A25 in the Thursday worksheet with the   ScreenTip text Thursday’s Totals. Test the hyperlink to ensure it works   correctly.

8

In   cell A9, insert a hyperlink to cell A25 in the Friday worksheet with the   ScreenTip text Friday’s Totals. Test the hyperlink to ensure it works   correctly.

9

Now,   you are ready to insert references to cells in the individual worksheets.   First, you will insert a reference to Monday’s Food Total.
 

  In cell B5 on the Week worksheet, insert a formula with a 3-D reference to   cell B25 in the Monday worksheet. Copy the formula to the range C5:E5.

10

The   next formula will display the totals for Tuesday.
 

  In cell B6, insert a formula with a 3-D reference to cell B25 in the Tuesday   worksheet. Copy the formula to the range C6:E6.

11

In   cell B7, insert a formula with a 3-D reference to cell B25 in the Wednesday   worksheet. Copy the formula to the range C7:E7.

12

In   cell B8, insert a formula with a 3-D reference to cell B25 in the Thursday   worksheet. Copy the formula to the range C8:E8.

13

In   cell B9, insert a formula with a 3-D reference to cell B25 in the Friday   worksheet. Copy the formula to the range C9:E9.

14

Now   you want to use a function with a 3-D reference to calculate the totals.
 

  In cell B10 on the Week worksheet, insert the SUM function with a 3-D   reference to calculate the total Food purchases (cell B25) for the five days.   Copy the function to the range C10:E10.

15

The   servers are required to share a portion of their tips with the Beverage   Worker and Assistants. The rates are stored in another file.
 

  Open the Exp_Excel_Ch09_Cap_Assessment_Rates.xlsx   workbook. Go back to the Exp_Excel_Ch09_Cap_Assessment_Tips.xlsx   workbook. In cell F5 of the Week worksheet, insert a link to the Beverage   Worker Tip Rate (cell C4 in the Rates workbook) and multiply the rate by the   Monday Drinks (cell C5). Copy the formula to the range F6:F9.

16

Next,   you will calculate the tips for the assistant.
 

  In cell G5 in the Tips workbook, insert a link to the Assistant Tip Rate   (cell C5 in the Rates workbook) and multiply the rate by the Monday Subtotal   (cell D5). Copy the formula to the range G6:G9. Close the Rates workbook.
 

  Note: The tip is a monetary value in the Week worksheet. It should be   formatted for Accounting Number Format.

17

You   noticed a circular error when you first opened the Tips workbook. Now you   will find and correct it.
 

  On the Week worksheet, check for errors and correct the formula with the   circular reference. 

18

You   want to create a validation rule to prevent the user from accidentally   entering a negative value. For now, you will create a validation in the   Friday worksheet.
 

  Select the range E5:E24 in the Friday worksheet, create a validation rule to   allow a decimal value greater than or equal to zero. Enter the input message   title Tip and   the input message Enter the amount of tip. (including the   period). Use the Stop alert with the error alert title Invalid Number and the error   alert message   The tip must be zero or more. (including the period). Test the   data validation by attempting to enter -20 in cell E5 and then cancel the change.

19

Now   you will copy the validation settings to the other daily worksheets.
 

  Copy the range E5:E24 in the Friday worksheet. Group the Monday through   Thursday worksheets, select the range E5:E24, and use Paste Special   Validation to copy the validation settings.

20

You   want to unlock data-entry cells so that the user can change the tips in the   daily worksheets.
 

  Group the Monday through Friday worksheets. Select the ranges E5:E24 and   unlock these cells.

21

Create   footer with your name on the left side, the sheet name code in the center,   and the file name code on the right side of all worksheets.

22

Now   that you unlocked data-entry cells, you are ready to protect the worksheets   to prevent users from changing data in other cells. Individually, protect   each sheet using the default allowances without a password.

23

Mark   the workbook as final.
 

  Note: Mark as Final is not available in Excel for Mac. Instead, use Always   Open Read-Only on the Review tab.

24

Save   and close Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx.   Exit Excel. Submit the file as directed.

Week#9 Discussion

 The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week. 

Reading source:

 

Chen, J. & Zhu, Q. (2019). Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things. IEEE Transactions on Information Forensics and Security, 14(11), 2958-2971.

Borek, A. (2014). Total Information Risk Management: Maximizing the Value of Data and Information Assets (Vol. First edition). Amsterdam: Morgan Kaufmann

Executive Practical Connection Assignment cloud computing

 

For this project, you will create a proposal to migrate a critical business function to the cloud at an organization you are familiar with or can easily research. 

Select an organization that you can research that has an on-premises business function that you believe will benefit from a migration to cloud computing. This paper must be entirely original content and checked with grammarly.com before submitting. The paper should include the following sections. Each must be called out with a heading.

  • Company Overview:  The section should include the company name, the industry they are in, and a general overview of the organization.
  • The On-Premises Function. Discuss the current application or functional domain that you are proposing for a move to the cloud. For example, an inventory management system or the organization’s email platform. Why will this benefit from cloud migration?
  • The Proposed Cloud Solution:  Describe your proposal for moving the function to the cloud. Be specific and detailed. Would you use SaaS, PaaS, or IaaS services? Which service provider would you use? What timeline do you propose? Include as much detail as possible. This portion should be 1-2 pages.
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations on how they might achieve even greater success.    

This paper should not be a cursory overview. This class has a technical focus and should focus on the proposal of the technical solution. It should detail what is being moved to the cloud, what cloud services will be used, and what the predicted benefits are. It is a persuasive paper trying to convince the organizational leadership to approve a project to move a function to the cloud, not an analysis of an organization that has already done so.
Do not write about Amazon, Azure, Google, Apple, IBM, or other cloud providers. You may not use Netflix, Xerox, Fitbit as a topic organization for this paper.

Requirements:
The paper must adhere to APA guidelines, including Title and Reference pages.  
You must list at least three scholarly sources listed on the reference page. They must apply to your paper.  
You must have at least four headings listed above
You must cite each source in the body of the paper to give credit where due.  
Per APA, the paper should use a 12-point Time New Roman font, double spaced throughout, and you must indent the first sentence of each paragraph .5 inches.  
The body of the paper should be 4 – 5 pages in length.  
The Title and Reference pages do not count towards the page count requirements.
Check your work with grammarly.com before submitting it.

Unit 7 Assignment 1

  Use the Internet, regional or state newspapers, or professional journals to search for requests for proposals.

a. Copy the RFPs and bring them to class for discussion.

b. From a careful reading of one RFP, identify the problem or need.

c. Identify the audience the proposal writer needs to address.

d. Brainstorm a list of ideas to include in the proposal’s introduction.

presentaion 2

topic :  what makes a good hash function. 

 Make sure to give specific details and examples of good hash functions. I need like 4 slides excluding introduction slide. please give detail explanation in note section of a slide so that I can understand

Discussion

Part 1) Project Management: What is a project, and what are its main attributes? How is a project  different from what most people do in their day-to-day jobs? Discuss the  importance of top management commitment and the development of standards for successful project management. Provide examples to  illustrate the importance of these items based on your experience on any  type of project. Discuss the unique challenges that an IT project  presents.

Min 300 words 2 references

Part 2a “Data Warehouse Architecture”  (2 pages): Explain the major components of a data warehouse  architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

part 2b “Big Data” (2 pages):  Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

part 2c “Green Computing” (3 pages):   One of our topics in Chapter 13 surrounds IT Green Computing. The need  for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully.  Discuss that organization and share your link.

3 scholarly references. APA formatting.

Part1 and part2 need to be separately attached.

10s3

Read NIST SP 800-30 revision 1 (http://csrc.nist.gov/publications/nistpubs/800-30-rev1/sp800_30_r1.pdf (Links to an external site.)), NIST SP 800-53 revision 4, Chapters 1 thru 3 (http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf (Links to an external site.)), and NIST SP 800-18 revision 1 (http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf (Links to an external site.)), all of which are located in your Module 3 Resources folder. 

Develop a System Security Plan (SSP) based on the information system selected in Project 1 using the sample provided in NIST SP 800-18 revision 1, Appendix A, as a guide; Note for #13, Minimum Security Controls in the SSP template: you only need to specify the appropriate control baseline from NIST SP 800-53 revision 4 and any additional controls or control enhancements (MINIMUM OF 2) added as part of the tailoring process, including your rationale for the addition.  Do NOT list all the controls and enhancements in the selected baseline.

List the following briefly each question in 30 words and Explain the differences for 1.7

1.1 What is the OSI security architecture?

1.2 What is the difference between passive and active security threats?

1.3 List and briefly define categories of passive and active security attacks.

1.4 List and briefly define categories of security services.

1.5 List and briefly define categories of security mechanisms.

1.6 List and briefly define the fundamental security design principles.

1.7 Explain the difference between an attack surface and an attack tree.

Web Application

I have implemented the web application for that you need to implement the Email multifactor authentication. And need to implement the registration form and login functionality from the data base.

You can use Xamp/ wamp server and need a video of execution from you that it

Database,ER diagram, SQL

 

ER Model and Normalization

Q1: Garage Database [40 points]

We want to design a database for a local garage. For each customer, we want to record the (unique) name, the customer address, and the contact phone number. For each vehicle, we want to record the unique vehicle’s identification number (VIN), and the vehicle’s make, model and year. For each repair job we want to record the description of the job done (maximum 200 chars), the date, and the total dollar cost. A repair job may involve zero or more parts (like, e.g., “windshield wipers”, “battery”, etc.) For each part we want to record its (unique) part number, the part name and its cost. In addition, note that:

• Each vehicle may have 1 or more repair jobs.

• Each customer may be the primary owner of 1 or more vehicles.

• Every vehicle has only one primary owner (we ignore co-owners).

• No vehicle can have more than one repair job in any given day.

Please answer the following questions:

Q1.1. (10 points) Draw an ER diagram for this database. Make sure to indicate primary keys, cardinality constraints, weak entities (if any), and participation constraints. List any assumptions you make in the process.

Q1.2. (10 points) Translate the ER diagram in Q1.1 into relational database tables (i.e. give the SQL DDL statements). Make sure that the translation captures key constraints (primary keys and foreign keys if applicable) and participation constraints in the ER diagram. Identify constraints, if any, that you are not able to capture.

Q1.3. (20 points) Identify the functional dependencies that you expect should hold for the Garage Database domain. Use the dependencies to find keys and BCNF normal forms.

 

Q2: Restaurant Database [ 40 points]

The student administrator of the Mini University wants to design a database for profiling students’ preferences for the nearby restaurants and the dishes. For example, the student Jack Smith likes the “rib eye steak” at the “TGI Fridays”, not the “rib eye steak” at the “Olive Garden”, while the student Nancy Graham likes the Italian spaghetti at “Zeppoli’s”.

• Each student has his/her SSN, the name, and the department.

• Each restaurant has its name, and the mailing address.

• The name of a restaurant may not be unique, but the mailing address is unique.

• Each dish has the name and the price.

• The price of a dish might differ on different restaurants. For example, “rib eye steak” is $15 at “TGI Fridays”, but $20 at the “Olive Garden”.

• The name of a dish is unique within a restaurant. Two restaurants may have the same dish name.

• A dish is offered by at least one restaurant, and a restaurant offers at least a dish.

Please answer the following questions:

Q2.1. (10 points) Draw an ER diagram for this database. Make sure to indicate primary keys, cardinality constraints, weak entities (if any), and participation constraints. List any assumptions you make in the process.

Q2.2. (10 points) Translate the ER diagram in Q2.1 into relational database tables (i.e. give the SQL DDL statements). Make sure that the translation captures key constraints (primary keys and foreign keys if applicable) and participation constraints in the ER diagram. Identify constraints, if any, that you are not able to capture.

Q2.3. (20 points) Identify the functional dependencies that you expect should hold for the Restaurant Database domain. Use the dependencies to find keys and BCNF normal forms.

 

Q3: Reverse Engineering [20 points]

This question tests how well you understand the algorithm for converting E/R diagrams to relational schemas. An E/R diagram when converted to relations (using the mechanical construction that we know and love) gives rise to the following relations:

  • R(a, b, c)
  • S(a, d)
  • T(a, d, f, g)

You may assume that the same symbols refer to the same attribute and different symbols refer to different attributes (e.g., the attributes a in the relations R, S and T are the same) i.e. it ultimately comes from a single entity set or relationship in the E/R diagram.

Your task is to reverse-engineer the E/R diagram from these relations; in other words, what E/R diagram could have produced these relations. For full credit, give two different E/R diagrams that could have produced these (and only these) relations (i.e. 10 points for each correct E/R diagram).

 Submission Guidelines and Requirements

  • Include your name and UCM ID in the assignment
  1. Add the following statement in your solution “I certify that the codes/answers/outputs of this assignment are entirely my own work.”

// Your Name

// Your UCM ID

//Certificate of Authenticity: “I certify that the assignment is entirely my own work.”

  1. Add comments to your submission as much as possible
  2. Submit your ER diagrams, relation schemas, functional dependencies and normalized forms
  3. Zip your files and upload the zipped file onto Blackboard
  4. There could be more than one correct answer. We shall accept them all
  5. Whenever you are making an assumption, please state it clearly
  6. Grading standards:
  • There will be automatic 10 points penalty if your submission is missing certificate of authenticity
  • Late submission: Late submission is allowed with a 10% deduction per day (delay in submission). Submission after 3 days of the deadline won’t be accepted

CHANGES TO BE MADE!!!!!

 1.1 No primary keys, cardinality constraints, weak entities (if any), and participation constraints are given in your ER diagram
1.2 DDL statements means “Create table” statements with primary keys and foreign keys
1.3 Functional dependencies means for example: Customer.Name —> Customer.Address, Customer.PhoneNumber. All dependencies like this and also BCNF normal form.

2.1 No primary keys, cardinality constraints, weak entities (if any), and participation constraints are given in your ER diagram
2.2 DDL statements means “Create table” statements with primary keys and foreign keys
2.3 Functional dependencies means for example: Student.SSN —> Student.Name, Student.Department. All dependencies like this and also BCNF normal form.

3. Please mention participation constraints by double lines()strong and weak participation), keys etc. in the ER diagram