2 Sets of Customer Service Questions

Save each chapter 5 and 6 questions separately in a word document

Chapter 5

1. List three characteristics skilled professionals must display when facing difficult

customer situations.

2. What is empathy?

3. What are four preparatory steps you can take prior to each customer interaction in

order to get focused?

4. Why is it important to let an angry customer vent?

5. How do customers want their incidents and complaints to be handled?

6. What do you need to do if you are a predominantly left-brained service provider?

7. What do you need to do if you are a predominantly right-brained service provider??

8. List four techniques a person can use to stay calm when facing a difficult situation.

9. What physical benefits do you derive from taking a deep breath when under

pressure?

10. What is positive imagery?

————————————————————

Chapter 6

1. Define the term root cause.

2. Explain the relationship that exists between processes and procedures.

3. A(n) __________ is a sign or an indication that an incident has occurred.

4. List two types of data you must gather before you can begin diagnosing an incident.

5. What are two ways that a short incident description is used?

6. List three benefits that are derived by asking questions.

7. Why is incident management referred to as a “closed loop process”?

8. When can incident notification occur?

9. What are the goals of customer notification?

10. What does an Ishikawa diagram display?

Discussion Board, Programming Logic

For this Discussion Board, please complete the following:

A computer program may need to accomplish multiple tasks. For example, an automated teller machine (ATM) program can accomplish the following tasks:

  • Verifying user’s credential
  • Displaying the current balance
  • Depositing money
  • Withdrawing money

A function is a block of organized and reusable code that can be used to accomplish a specific task. Assume that you are the programmer hired by a bank to write a program for its automated teller machines (ATM). Give an example of a task that you want to use a function to accomplish in the program, and answer the following questions:

  • What are the benefits to using a function to accomplish that task?
  • Does the function need parameters or return value? Why or why not?
Alternate Instruction for Microsoft 365 Apps icon

How to work on a spreed sheet document using the information given

 

Eller Software Services has received contract revenue information in a text file. You import, sort, and filter the data. You also create a PivotTable, prepare a worksheet with subtotals, and format related data as an Excel table.

[Student Learning Outcomes 4.1, 4.3, 4.4, 4.5, 4.6, 4.8]

Files Needed: EllerSoftware-04.xlsx (Available from the Start File link.) and EllerSoftwareText-04.txt (Available from the Resources link.)

Completed Project File Name: [your name]-EllerSoftware-04.xlsx

Skills Covered in This Project

  • Import a text file.
  • Use AutoFilters.
  • Sort data by multiple columns.
  • Create a PivotTable.
  • Format fields in a PivotTable.
  • Use the Subtotal command.
  • Format data in an Excel table.
  • Sort data in an Excel table.

Alternate Instruction for Microsoft 365 Apps icon This image appears when a project instruction has changed to accommodate an update to Microsoft 365 Apps. If the instruction does not match your version of Office, try using the alternate instruction instead.

  1. Open the EllerSoftware-04.xlsx start file. Click the Enable Editing button. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Import the EllerSoftwareText-04.txt file downloaded from the Resources link and load it to begin in cell A4. The text file is tab-delimited.
  3. Format the values in column H as Currency with zero decimal places.
  4. Click cell G4 and use the AutoFilter arrow to sort by date oldest to newest.
  5. Click cell F4 and use the AutoFilter arrow to sort by product/service name in ascending order.
  6. Filter the Date column to show only contracts for September using the All Dates in the Period option.
  7. Edit the label in cell A2 to display Contract Amounts for September.
  8. Select cells A1:H2 and press Ctrl+1 to open the Format Cells dialog box. On the Alignment tab, choose Center Across Selection.
  9. Change the font size for cells A1:H2 to 20 pt (Figure 4-102) and close the Queries & Connections pane.Date header displays filter icon.Figure 4-102 Imported data sorted and filtered
  10. Copy the Contracts sheet to the end and name the copy Data.
  11. Clear the date filter.
  12. Select cell A5 and click the PivotTable button [Insert tab, Tables group]. The range is identified as the EllerSoftwareText file.
  13. Verify that New Worksheet is selected, deselect the Add this data to the Data Model button, and click OK.
  14. Name the sheet PivotTable. Close the Queries & Connections pane.
  15. Show the Product/Service and Contract fields in the PivotTable.
  16. Drag the Contract field from the Choose fields to add to report area below the Sum of Contract field in the Values area so that it appears twice in the report layout and the pane (Figure 4-103).Values are identical.Figure 4-103 “Contract” field appears twice in the report
  17. Select cell C4 and click the Field Settings button [PivotTable Analyze tab, Active Field group]. Type Average Contract as the Custom Name, choose Average as the calculation, and set the Number Format to Currency with zero decimal places.
    Alternate Instruction for Microsoft 365 Apps icon Select cell C4 and click the Field Settings button [PivotTable Tools Analyze tab, Active Field group]. Type Average Contract as the Custom Name, choose Average as the calculation, and set the Number Format to Currency with zero decimal places.
  18. Select cell B4 and set its Custom Name to Total Contracts and the number format to Currency with zero decimal places.
  19. Apply Brown, Pivot Style Dark 3.
  20. Select the Data sheet tab and copy cells A1:A2. Paste them in cell A1 on the PivotTable sheet.
  21. Select Align Left for cells A1:A2 and 16 pt. as the font size. Edit the label in cell A2 to display Contract Amounts, September through December (Figure 4-104).Completed PivotTableFigure 4-104 Completed PivotTable
  22. Copy the Data sheet to the end and name the copy Subtotals.
  23. Select cell D5 and sort by City in A to Z order.
  24. Select cell A5 and convert the table to a range. Select cells A5:H31 and apply No Fill [Home tab, Font group].
  25. Use the Subtotal command to show a SUM for the contract amounts for each city.
  26. Edit the label in cell A2 to display Contract Amounts by City.
  27. Format the sheet to Landscape orientation, center the page vertically, and scale it to fit one page.
  28. Click the Billable Hours sheet tab and select cell A4.
  29. Click the Format as Table button [Home tab, Styles group], use Orange, Table Style Medium 10, and remove the data connections.
  30. Type 5% Add On in cell E4 and press Enter.
  31. Build a formula in cell E5 to multiply cell D5 by 105% and press Enter to copy the formula.
  32. Select cells A1:A2 and left align them. Then select cells A1:E2, click the Launcher for the Alignment group [Home tab], and select Center Across Selection from the Horizontal list.
  33. Use the AutoFilter arrows to sort by date in oldest to newest order.
  34. Save and close the workbook (Figure 4-105).Excel 4-4 completedFigure 4-105 Excel 4-4 completed
  35. Upload and save your project file.

Benchmark – Cybersecurity Program

 Using all of the previous assignment information, students will present a comprehensive Cybersecurity Program that reports on the final state of their enterprise.

Refer to the “Cybersecurity Program Template,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

APA style is not required, but solid academic writing is expected.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

OSI Characteristics

Write a 2 to 3-page paper on the seven layers of the OSI model.

Identify the 7 layers of the OSI model.

Describe 2 or 3 characteristics, protocols, or functions of each layer (i.e., what happens in each layer or what it does) in 1 or 2 paragraphs each.

Cite at least 2 sources, such as video, library articles, or websites, other than your textbook in your assignment.

Format your references according to APA guidelines.

NIST Cybersecurity Framework (CSF) & ISO 27001 Certification Process

 Assessment Description

In this assignment, students will review the NIST cybersecurity framework and ISO 270001 certification process. In a visual format (such as table, diagram, or graphic) briefly explain the differences, similarities, and intersections between the two. Then, present the following in 750-1,000 words:

  1. A brief description of the NIST Cybersecurity framework
  2. A brief description of the ISO 270001 certification process
  3. The number of controls/sub-controls used in the NIST CSF and ISO 270001 certification process framework to support the protections around computer and cyber forensics
  4. An explanation as to why organizations should seek this framework and/or certification to base their security program strategy and decisions upon
  5. An explanation as to why ISO 270001 has rapidly become an industry best practice/standard against which organizations are basing their cybersecurity programs (including value-add, cost, and pros/cons)

Make sure to reference academic or NIST official publications (most current year available via the Internet) or other relevant sources published within the last 5 years.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

Blockchain Initiatives Literature Review

 While most applications of blockchain technology have emerged in the financial sector (for example, Zcash, Circle, and Abra), its practical applications go beyond finance, because essentially any type of digital asset can be tracked and traded through a blockchain. Many different industries are experimenting in the blockchain space, even though this experimentation is still in its early stages. Examples range from medical records (MedRec, PokitDok), to digital rights and micropayments (Brave Browser, Ascribe, Open Music Initiative), identity systems (uPort), and supply chains (Everledger, Hyperledger).

For your literature review this week, you are required to choose a blockchain initiative that interests you. It could be an existing application that you have come across in your own research, one of the examples listed above, or an idea that you may have for blockchain technology as a solution to a business problem.

You are to review the literature on your blockchain initiative and discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection.

Paper Layout:

  1. Title Page
  2. Table of contents:
    1. Use a Microsoft Enabled Table of Contents feature.
  3. Background:
    1. Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue. Be sure to discuss similar blockchain initiatives here.
  4. Research Questions:
    1. In the identified problem area that you are discussing, what were the research questions that were asked? Be sure to include main research questions from all the literature you are reviewing.
  5. Methodology:
    1. What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen. You will discuss the methodology for all the literature you are reviewing.
  6. Data Analysis:
    1. What were some of the findings, for example, if there were any hypotheses asked, were they supported?
  7. Conclusions:
    1. What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported? Be sure to also include the similarities and differences between the literature. Also discuss here the future of this blockchain initiative and if it is a viable initiative.

Paper requirements:

  • Be a minimum of 7 pages in length, not including the required cover page and reference pages.
  • Follow APA 7 guidelines. Be sure to conduct research on formatting literature reviews.
  • Your literature review should include a minimum of 8 scholarly peer-reviewed journal articles. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. You can use Grammarly for help with your grammar and spelling.

Assignment 1

Answer the following questions:

Map the layers of the TCP/IP model to the OSI model

Each layer of OSI has a body/group that is responsible for the standards, please name them

Describe the progression through the OSI model of the following:

A web browser request and connection to www.cnn.com

An email being sent from Outlook on a Windows machine from your APUS email account to [email protected]

Submit these assignments as a single Word document

HW

 

Word cloud generators have become popular tools for meetings and team-building events. Groups or teams are asked to use these applications to input words they feel best describe their team or their role. A “word cloud” is generated by the application that makes prominent the most-used terms, offering an image of the common thinking among participants of that role.

What types of words would you use to build a nursing word cloud? Empathetic, organized, hard-working, or advocate would all certainly apply. Would you add policy-maker to your list? Do you think it would be a very prominent component of the word cloud?

Nursing has become one of the largest professions in the world, and as such, nurses have the potential to influence policy and politics on a global scale. When nurses influence the politics that improve the delivery of healthcare, they are ultimately advocating for their patients. Hence, policy-making has become an increasingly popular term among nurses as they recognize a moral and professional obligation to be engaged in healthcare legislation.