Operations Security Quiz

Operations Security Quiz

1) Employee behavior in an organization is

a)usally far from optional

b)prone to create secure work environments

c)not subject to policies and guidance

d)similar to machines

2)Which of the following statements is true regarding organizational policy and security awareness training?

a)Employee attitudes toward security awareness training can range from indifferent to eager.

b)Employees’ willingness to work and learn is universal across different organization.

c)Employees’ adherence to security policy is solely dependent upon the organization’s structure.

d)You can only create an organizational policy framework to define policies in flat organizations.

3)Executive management, IT security policy enforcement monitoring, and human resources, all must have a unified front regarding the:

a)size and structure of the organization.

b)management structure and advancement opportunities.

c)issuance of executive orders within the organization.

d)disciplinary treatment of policy violations.

4)Which of the following areas of the organization is responsible for establishing the policy commitment and implementation for the entire organization?

a)Executive Management

b)Supervisory-Level Management

c)Human Resources

d)IT Security Policy Enforcement Monitoring

5)Which of the following areas of the organization conducts system logging, content filtering logging, and e-mail filtering logging with automated reporting for monthly or quarterly policy compliance reviews?

a)Executive Management

b)Supervisory-Level Management

c)Human Resources

d)IT Security Policy Enforcement Monitoring

Question 6

Which of the following areas of the organization is responsible for ensuring that employees, contractors, and consultants conform to all organizational policies?

a)Executive Management

b)Supervisory-Level Management

c)Human Resources

d)IT Security Policy Enforcement Monitoring

7)Violations of security policies are considered to be a(n) __________ issue upon which proper disciplinary actions must be taken.

a)law enforcement

b)employer-employee

c)executive-staff

d)implementation

8)Depending on the violation’s severity, repeat or continued violations of organization-wide policies might be grounds for:

a)refusing to pay earned wages.

b)denying overtime assignments.

c)termination of employment.

d)limiting an employee’s Internet access.

9)Flat organizational structures are characterized by a management structure that:

a)is cross-functional and more open to employee input.

b)places all decision making at the executive management level.

c)provides limited access and connectivity to employees.

d)considers employee contributions to be of no value.

10)Hierarchical organizational structures are characterized by departments that are separated by:

a)creativity level.

b)salary level, creating animosity between departments.

c)teams, creating competitiveness between departments.

d)function, creating multiple functional silos.

11)In hierarchical organizational structures, communication between employees tends to:

a)be very difficult to achieve at all.

b)occur across organizational functions.

c)be more “top-down.”

d)be more “bottom-up.”

12)In flat organizational structures, employees tend to be:

a)more open and communicative.

b)more interested in financial rewards.

c)constrained within their role or function.

d)less likely to interact across the organization.

13)Employees in organizations with flat organizational structures tend to be more:

a)creative and involved in business decisions.

b)dissatisfied and apathetic.

c)financially successful.

d)concerned about job security.

14) Hierarchical organizations are more likely than flat organizations to have a:

a)security policy.

b)formal chain of command.

c)profitable business model.

d)chief executive officer.

15)Which of the following can affect an employee’s sense of job security, purpose, and potential to contribute to the company’s success, all of which can make an employee feel dissatisfied or apathetic?

a)The U.S economy

b)A company’s IT policies

c)A company’s size

d)A company’s board of directors

16)Conducting annual audits and security assessments for policy compliance are critical security operations and management functions because:

a)people constantly change (they grow on the job, move to new jobs, etc.).

b)people tend to shy away from repetition and repetitive inputs.

c)employees never discover new risks and threats.

d)security awareness training is most often ineffective.

17)Which of the following statements is true regarding the scenario in the lab in which the Specialty Medical Clinic was being acquired by a larger parent organization?

a)Both the medical clinic and the larger parent organization had a hierarchical structure with multiple departments and clinics.

b)Both the medical clinic and the larger parent organization had a flat organizational structure.

c)The medical clinic had a hierarchical structure with multiple departments and clinics, while the larger parent organization had a flat organizational structure.

d)The larger parent organization had a hierarchical structure with multiple departments and clinics, while the medical clinic had a flat organizational structure.

18)Security awareness training can include special all-hands meetings called __________ meetings that are held between team or departmental leaders, with those leaders then sharing the information they’ve gained from those meetings with employees.

a)Town Hall

b)Task Force

c)Awareness

d)Security Reminders

19)Which of the following statements is true regarding ongoing security policy management?

a)New policy and procedures always negatively impact a business process or create unintended challenges in a particular department.

b)When users find that a policy is going to make their jobs harder, they’re much more likely to try to circumvent that policy.

c)Employee feedback is not helpful in determining how a policy might impose unintended challenges on an employee.

d)Be certain to communicate, to leaders and employees alike, that there may be adverse repercussions for providing feedback.

20)Which of the following statements is true regarding security awareness training?

a)Employees typically look forward to and enjoy mandatory security awareness training.

b)Security awareness training can be more effective if made unconventional or interactive.

c)The training should be uniform across all employees and departments.

d)The rationale behind the security training should be withheld from the employees.

Total 20 questions i have .

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Introduction To High Performance Computing Assignment Help

Introduction To High Performance Computing Assignment Help

COMP-5520 & 4900

Introduction to High Performance Computing

Assignment-1 (Due 2/8/2017)

 

1. Please read the first chapter from your book and answer questions 1.3, 1.5 and 1.8. (20 points each)

2. Write a research paper on High Performance Computing (40 points). Address the items

given below: a. How can you use High Performance Computing in your research or life? Give

two examples. b. Why do we need to write parallel programs? (read pages 1-3 from your book) c. Discuss the local and global impact of high performance computing on

individuals, organizations, and society. d. Attach this cover page to your paper and submit your paper on the due date

given above.

Submit your assignment through Elearn/Dropbox. Do not forget to put your name on your assignment. Any different form of submission except ELEARN will not be considered.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Term Paper: Planning An IT Infrastructure Audit For Compliance homework help

Term Paper: Planning An IT Infrastructure Audit For Compliance homework help

Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment.

The audit planning process directly affects the quality of the  outcome. A proper plan ensures that resources are focused on the right  areas and that potential problems are identified early. A successful  audit first outlines the objectives of the audit, the procedures that  will be followed, and the required resources.

Choose an organization you are familiar with and develop an eight to  ten page IT infrastructure audit for compliance in which you:

  1. Define the following items for an organization you are familiar with:
    1. Scope
    2. Goals and objectives
    3. Frequency of the audit
    4. Duration of the audit
  2. Identify the critical requirements of the audit for your chosen  organization and explain why you consider them to be critical  requirements.
  3. Choose privacy laws that apply to the organization, and suggest who is responsible for privacy within the organization.
  4. Develop a plan for assessing IT security for your chosen organization by conducting the following:
    1. Risk management
    2. Threat analysis
    3. Vulnerability analysis
    4. Risk assessment analysis
  5. Explain how to obtain information, documentation, and resources for the audit.
  6. Analyze how each of the seven (7) domains aligns within your chosen organization.
  7. Align the appropriate goals and objectives from the audit plan to each domain and provide a rationale for your alignment.
  8. Develop a plan that:
    1. Examines the existence of relevant and appropriate security policies and procedures.
    2. Verifies the existence of controls supporting the policies.
    3. Verifies the effective implementation and ongoing monitoring of the controls.
  9. Identify the critical security control points that must be verified  throughout the IT infrastructure, and develop a plan that includes  adequate controls to meet high-level defined control objectives within  this organization.
  10. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with  one-inch margins on all sides; citations and references must follow APA  or school-specific format. Check with your professor for any additional  instructions.
  • Include a cover page containing the title of the assignment, the  student’s name, the professor’s name, the course title, and the date.  The cover page and the reference page are not included in the required  assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance.
  • Describe the components and basic requirements for creating an audit plan to support business and system considerations
  • Develop IT compliance audit plans
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about topics related to information  technology audit and control using proper writing mechanics and  technical style conventions.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Peters Company Assignment help

Peters Company Assignment Help

The case study below offers an excellent perspective on how projects are often initiated under less than ideal circumstances—which often lays the ground work for project failure.

Companies that provide a service for another company usually respond to a bid document from a company that needs help.  This case study is a good example of this situation.  The bid document can be as simple as an email from the buyer to the seller or as complicated as a request for proposal (RFP) outlining the objectives of the project and asking a seller to develop a proposal that provides a solution.

Each company (seller and buyer) will have a business case for doing the project. The Peter’s Company is outsourcing for a reason.  The Corwin Corporation is taking on the project for a different set of reasons.  One of the reasons the Corwin Corporation is taking on the work is the looming, potentially very lucrative production contract if they are successful.  There are no guarantees in research and development project that there will be success.

Part 1 (20 points)–Prepare a requirements management plan (RMP) that addresses the five components described in Section 5.1.3.2, PMBOK 6e.  The plan should be at least 3 but not exceed 4 pages and does not need to conform to APA guidelines (except for citing and referencing sources).

Some things to think about – how is the role of the in-house rep dealt with in the RMP as it relates to activities for planning, tracking and reporting requirements?   Configuration management is not just about software and versioning.  What processes will be used for configuration management activities as they relate to changes in the product requirements?  How and who will authorize/approve changes?   The traceability structure should be tailored to the type of project and should ensure that each requirement adds business value.

Part 5 (15 points)– Create Scope Validation Process.  Using the cast of characters from the case study (and any additional people needed), prepare a process for validating the work packages and higher-level components of the WBS.   For each part of the process flow diagram, explain in a separate page who from the case study is involved and what is to be done.

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Executive Program Practical Connection Assignment

Executive Program Practical Connection Assignment

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course(please refer attached document for Course content) have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Python Challenge 1 homework help

Python Challenge 1 homework help

In this challenge, you are tasked with creating a Python script for analyzing the financial records of your company. You will give a set of financial data called budget_data.csv. The dataset is composed of two columns: Date and Profit/Losses. (Thankfully, your company has rather lax standards for accounting so the records are simple.)
Your task is to create a Python script that analyzes the records to calculate each of the following:
The total number of months included in the dataset
The net total amount of “Profit/Losses” over the entire period
The average of the changes in “Profit/Losses” over the entire period
The greatest increase in profits (date and amount) over the entire period
The greatest decrease in losses (date and amount) over the entire period
As an example, your analysis should look similar to the one below:
Financial Analysis
—————————-
Total Months: 86
Total: $38382578
Average Change: $-2315.12
Greatest Increase in Profits: Feb-2012 ($1926159)
Greatest Decrease in Profits: Sep-2013 ($-2196167)

In addition, your final script should both print the analysis to the terminal and export a text file with the results.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Solved Word_Intro_Cap1_National_Sales_Meeting Assignment Help

Solved Word_Intro_Cap1_National_Sales_Meeting Assignment Help

Solved Word_Intro_Cap1_National_Sales_Meeting

Project Description:

In this project, you will apply skills you practiced from the Objectives in Word Chapters 1-3. You will assist Irene Shviktar, the Vice President of Marketing, to edit and create documents for a National Sales Meeting that will precede a Winter Sports Expo sponsored by Front Range Action Sports. The documents include a cover letter from the vice president to the company president. The letter will accompany a packet of materials for the meeting and the expo, which includes a brief resume for the guest speaker, a flyer that will announce the expo, a newsletter for employees, and a research paper on the history and development of skis.

1

Open the Word document Student_Word_Cap1_National_Sales_Meeting.docx downloaded with this Project. Be sure that the rulers and formatting marks display.

2

On the letter on Page 1, select the first paragraph—Front Range Action Sports—and increase the Font Size to 28 pt. Change the Font Size of the next four paragraphs—the address lines and website—to 12 pt.

3

Select the first five paragraph lines that you just formatted, change the Font to Arial, and then with the text selected, display the Borders and Shading dialog box. Create a 6 pt, Automatic-colored border on the left side of the selected text.

In the paragraph that begins If you have any, select the second sentence and move it to the beginning of the paragraph. Adjust spacing as necessary so that there are no extra blank spaces at the end of the paragraph.

4

On Page 2, in the newsletter, select the second paragraph of text, which begins with Employee Newsletter. Display the Borders and Shading dialog box, and then add an Automatic-colored, 3 pt line below the paragraph.

5

Starting with the paragraph that begins National Sales Meeting, select all of the text from that point to the end of the page, including the paragraph mark after the word event. Do not select the Page Break. Change the Spacing After to 6 pt, format the text in two columns, and apply the Justify alignment.

6

At the top of the first column, select the paragraph National Sales Meeting. From the Font dialog box, change the Font Size to 20, apply Bold, and add the Small caps effect. Then Center the paragraph. Apply the same formatting to the paragraph Winter Sports Expo.

7

On the same page, in the blank line above the last paragraph of the newsletter, insert the picture from your downloaded files wCap1_Powder_Skiing.jpg. If necessary, set the Width of the picture to 3″ and apply a 10 pt Soft Edges effect.

8

In the blank paragraph at the top of Page 3, insert a 2×3 table. In the first cell of the table, type the following four lines, pressing ENTER after each line:

Robert Lewis
1227 Aspen Lake Trail
Vail, CO 81657
www.boblewisskis.com

9

In the second row of the table, in the first cell, type CAREER HIGHLIGHTS and then press TAB. In the second cell of the second row, insert the text from the downloaded file wCap1_Career_Text.docx and then press BACKSPACE to remove the blank line at the bottom of the inserted text.

10

In the third row of the table, in the first cell, type EDUCATION and then in the cell to the right, type Mr. Lewis’ educational information as follows, pressing ENTER after each line:
University of Colorado
Ph.D. in Psychology
University of Colorado
M.S. in Psychology
University of Minnesota
B.S. in Psychology

11

Insert a new row at the bottom of the table. In the first cell of the new row, type CONSULTANT and then in the cell to the right, type the following, pressing ENTER after each line:
U.S. Junior Ski Team
U.S. National Ski Team
Special Olympics

12

Apply Bold to the headings CAREER HIGHLIGHTS, EDUCATION, and CONSULTANT. Drag the vertical border between the two columns to the 1.5-inch mark on the horizontal ruler.

13

In the first row, merge the two cells, and then Center the text. Select Robert Lewis, increase the Font Size to 24 pt, apply Bold, and then add 24 pt space Before the text. Select the web address and add 18 pt space after the text.

14

Create a bulleted list, using solid round black bullets, for the items below SKIING and below COACHING. Apply Bold to the name of each university, and then apply 12 pt spacing after to the name of each college degree.

15

Select the table, and then remove all borders. From the Borders and Shading dialog box, add a 3 pt solid border to the top of the table.

16

Near the top of Page 4, in the paragraph that begins The use of skis, in the third line, position the insertion point to the right of the period following wood, and then insert the following footnote: The oldest known ski and pole is more than 4,000 years old.

17

Modify the footnote style by changing the Font Size to 11 pt, add a First Line Indent of 0.5″, and set Line spacing to 2.0 (double).

18

In the paragraph that begins The use of skis, position the insertion point to the left of the period at the end of the paragraph. Using the MLA format, add the following Book citation:
Author: Huntford, Roland
Title: Two Planks and a Passion: The Dramatic History of Skiing
Year: 2008
City: New York
Publisher: Continuum Press

In the text, select the Huntford citation and add the page numbers 4-6

19

On Page 6, in the blank line below the Works Cited title, insert the built-in Bibliography. Select the two references, change the line spacing to 2.0 and change the Spacing After to 0 pt. Center the Bibliography title. After the bibliography is entered and formatted, delete the Works Cited paragraph.

20

On Page 7, select the two paragraphs below the title that begin Friday and Saturday, and then change the Spacing After to 0.

21

Select the three paragraphs below the title—the dates—and then from the Borders and Shading dialog box, apply a Box border using theme color Blue, Accent 1 (fifth column, first color) and a 3 pt border. Click the Shading tab, and add Shading using theme color Blue, Accent 1, Lighter 80% (fifth column, second color).

22

Click after the colon at the end of the line that precedes the bulleted list. Insert the downloaded picture wCap1_Downhill_Skiing.jpg. Change the Height of the picture to 3.5″, and then set the wrapping to Square.

23

Position the picture so that the Horizontal Alignment is set to Right relative to Column and the Vertical Alignment is set to Top relative to Line. Apply a Picture Style using the Soft Edge Rectangle.

24

At the bottom of the flyer, click in the second blank paragraph below the last paragraph of text. Insert a Basic Process SmartArt (first style under Process). Click the outer rectangle surrounding the SmartArt to select it, and if necessary, change the wrapping style to In Line with Text. On the Format tab, set the Height of the SmartArt graphic to 1″ and the Width to 6.5″. Add the following text, in order, to the three shapes:
Exhibits
Speakers
Workshops

To the SmartArt graphic, apply the 3-D Polished style.

25

Save and close the file, and then submit for grading.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exp22_Excel_Ch02_HOE – Townsend Mortgage Company homework help

Exp22_Excel_Ch02_HOE – Townsend Mortgage Company homework help

Excel Chapter 2 Hands-On Exercise – Townsend Mortgage Company

Exp22_Excel_Ch02_HOE – Townsend Mortgage Company
Exp22 Excel Ch02 HOE – Townsend Mortgage Company

 

 

Project Description:
You are an assistant to Yui Matheson, a mortgage broker at the Townsend Mortgage Company. Yui spends days reviewing mortgage rates and trends, meeting with clients, and preparing paperwork. Yui relies on your expertise in using Excel to help analyze mortgage data. Today, Yui provided you with sample mortgage data: loan number, house cost, down payment, mortgage rate, and the length of the loan in years. She asked you to perform some basic calculations so that the output provided by her system can be checked to verify that it is calculating results correctly. You have also been tasked with calculating the amount financed, the periodic interest rate, the total number of payment periods, the percentage of the house cost financed, and the payoff year for each loan. In addition, you will calculate totals, averages, and other basic statistics. Furthermore, Yui asked you to complete another worksheet that uses functions to look up interest rates from a separate table, calculate the monthly payments, and determine how much (if any) the borrower will have to pay for private mortgage insurance (PMI).

 

 

Start Excel. Download and open the file named Exp22_Excel_Ch02_HOE_Loans.xlsx. Grader has automatically added your last name to the beginning of the filename.

 

You would like to create a formula to calculate the amount financed for each loan.

Enter a formula in cell D8 to calculate the amount financed for the first mortgage. Once completed, copy the formula down completing column D.

 

 

You would like to create a formula to calculate the monthly interest rate per period for each loan.

Enter in formula in cell F8 to calculate the monthly interest rate for the first loan. Add the appropriate absolute cell reference for cell B5 and then use the fill handle to copy the formula down completing column F.

 

You would like to calculate the total number of payment periods for each loan. To complete the task, you will use a mixed cell reference as an alternative to an absolute cell reference.

Enter a formula in cell H8 to calculate the total number of payment periods per loan. Use an appropriate mixed cell reference for cell B5 and then use the fill handle to copy the formula down completing column H.

 

You would like to calculate the total value of the homes being financed.

Use AutoSum in cell B16 to calculate the total value of all homes sold.

 

You would like to calculate the average value of all homes being purchased.

Use AutoSum in cell B17 to calculate the average value of all homes being purchased.

 

You would like to calculate the median value of all homes being purchased.

Enter a function in cell B18 to calculate the median value of all homes being financed.

 

You would like to display the cost of the least expensive home.

Enter a function in cell B19 to display the value of the least expensive home financed.

 

You would like to display the value of the most expensive home financed.

Enter a function in cell B20 to display the most expensive home financed.

 

You would like to determine the total number of homes financed.

Enter a function in cell B21 to count the total number of homes being financed based on the values column B.

 

To complete your calculations you will use the fill handle to copy the previously created functions.

Use the fill handle to copy the functions in the range B16:B21 through the range C16:D21.

 

You would like to test the functions you created by editing one of the values in the worksheet.

Edit the value in cell B9 to 425000. Note the results of the formulas are now updated.

 

It is a good practice to insert the date in a worksheet containing financial information. You will use the TODAY function to insert the current date in cell B4.

Use the TODAY function to insert the current date in cell B4.

 

You would like to use a lookup function on the Payment Info worksheet to determine the annual percentage rate (APR) of homes financed based on the lookup table in the range D4:E6.

Use the XLOOKUP function in cell G9 to determine the APR based on the years financed in cell F9, lookup array in the range D4:D6, and return array in the range E4:E6. Be sure to use the appropriate absolute cell referencing. Then use the fill handle to copy the function down completing column G.

 

Next you will calculate the total payment for each mortgage financed.

Use the PMT function in cell H9 to calculate the monthly payment based on the APR in cell G9, years financed in cell F9, and amount financed in cell D9. Ensure the final value is positive. Use the appropriate absolute cell references and then copy the function down completing the column.

 

For your last step you will determine the monthly personal mortgage insurance (PMI) if applicable. Since not all mortgages require PMI, you will use the IF function.

Enter an IF function in cell I9 to determine the monthly PMI if applicable. The mortgage requires PMI if the percent of down payment is less than 20% (cell B7). If the mortgage requires PMI it is .38% of the amount financed. Be sure to use the appropriate absolute cell references for the input values and then use the fill handle to copy the function down completing the column.

 

Save and close Exp22_Excel_Ch02_HOE_Loans.xlsx. Exit Excel. Submit the file as directed.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

2

 

The Tip Left column in the Friday worksheet contains a fill color and number formatting. You want to fill these formats to the other daily worksheets.

Group the Friday through Monday worksheets, staring with the Friday worksheet. Fill the format only for the range E5:E24.

 

8

 

3

 

Now you want to insert column totals for the five worksheets simultaneously.

With the worksheets still grouped, insert SUM functions in the range B25:E25 and apply the Totals cell style. Ungroup the worksheets.

 

5

 

4

 

The Week worksheet is designed to be a summary sheet. You want to insert a hyperlink to the Total heading in the Monday worksheet.

On the Week worksheet, in cell A5, insert a hyperlink to cell A25 in the Monday worksheet with the ScreenTip text Monday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

5

 

In cell A6 on the Week worksheet, insert a hyperlink to cell A25 in the Tuesday worksheet with the ScreenTip text Tuesday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

6

 

In cell A7, insert a hyperlink to cell A25 in the Wednesday worksheet with the ScreenTip text Wednesday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

7

 

In cell A8, insert a hyperlink to cell A25 in the Thursday worksheet with the ScreenTip text Thursday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

8

 

In cell A9, insert a hyperlink to cell A25 in the Friday worksheet with the ScreenTip text Friday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

9

 

Now, you are ready to insert references to cells in the individual worksheets. First, you will insert a reference to Monday’s Food Total.

In cell B5 on the Week worksheet, insert a formula with a 3-D reference to cell B25 in the Monday worksheet. Copy the formula to the range C5:E5.

 

2

 

10

 

The next formula will display the totals for Tuesday.

In cell B6, insert a formula with a 3-D reference to cell B25 in the Tuesday worksheet. Copy the formula to the range C6:E6.

 

2

 

11

 

In cell B7, insert a formula with a 3-D reference to cell B25 in the Wednesday worksheet. Copy the formula to the range C7:E7.

 

2

 

12

 

In cell B8, insert a formula with a 3-D reference to cell B25 in the Thursday worksheet. Copy the formula to the range C8:E8.

 

2

 

13

 

In cell B9, insert a formula with a 3-D reference to cell B25 in the Friday worksheet. Copy the formula to the range C9:E9.

 

2

 

14

 

Now you want to use a function with a 3-D reference to calculate the totals.

In cell B10 on the Week worksheet, insert the SUM function with a 3-D reference to calculate the total Food purchases (cell B25) for the five days. Copy the function to the range C10:E10.

 

5

 

15

 

The servers are required to share a portion of their tips with the Beverage Worker and Assistants. The rates are stored in another file.

Open the Exp_Excel_Ch09_Cap_Assessment_Rates.xlsx workbook. Go back to the Exp_Excel_Ch09_Cap_Assessment_Tips.xlsx workbook. In cell F5 of the Week worksheet, insert a link to the Beverage Worker Tip Rate (cell C4 in the Rates workbook) and multiply the rate by the Monday Drinks (cell C5). Copy the formula to the range F6:F9.

 

5

 

16

 

Next, you will calculate the tips for the assistant.

In cell G5 in the Tips workbook, insert a link to the Assistant Tip Rate (cell C5 in the Rates workbook) and multiply the rate by the Monday Subtotal (cell D5). Copy the formula to the range G6:G9. Close the Rates workbook.

Note: The tip is a monetary value in the Week worksheet. It should be formatted for Accounting Number Format.

 

5

 

17

 

You noticed a circular error when you first opened the Tips workbook. Now you will find and correct it.

On the Week worksheet, check for errors and correct the formula with the circular reference.

 

5

 

18

 

You want to create a validation rule to prevent the user from accidentally entering a negative value. For now, you will create a validation in the Friday worksheet.

Select the range E5:E24 in the Friday worksheet, create a validation rule to allow a decimal value greater than or equal to zero. Enter the input message title Tip and the input message Enter the amount of tip. (including the period). Use the Stop alert with the error alert title Invalid Number and the error alert message The tip must be zero or more. (including the period). Test the data validation by attempting to enter -20 in cell E5 and then cancel the change.

 

10

 

19

 

Now you will copy the validation settings to the other daily worksheets.

Copy the range E5:E24 in the Friday worksheet. Group the Monday through Thursday worksheets, select the range E5:E24, and use Paste Special Validation to copy the validation settings.

 

10

 

20

 

You want to unlock data-entry cells so that the user can change the tips in the daily worksheets.

Group the Monday through Friday worksheets. Select the ranges E5:E24 and unlock these cells.

 

10

 

21

 

Create footer with your name on the left side, the sheet name code in the center, and the file name code on the right side of all worksheets.

 

5

 

22

 

Now that you unlocked data-entry cells, you are ready to protect the worksheets to prevent users from changing data in other cells. Individually, protect each sheet using the default allowances without a password.

 

12

 

23

 

Mark the workbook as final.

Note: Mark as Final is not available in Excel for Mac. Instead, use Always Open Read-Only on the Review tab.

 

0

 

24

 

Save and close Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx. Exit Excel. Submit the file as directed.

 

0

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Wireshark Lab: IP V6.0

Wireshark Lab: IP V6.0

Wireshark Lab: IP v6.0

Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross

“Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb

© 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved

image1.jpg

In this lab, we’ll investigate the IP protocol, focusing on the IP datagram. We’ll do so by analyzing a trace of IP datagrams sent and received by an execution of the traceroute program (the traceroute program itself is explored in more detail in the Wireshark ICMP lab). We’ll investigate the various fields in the IP datagram, and study IP fragmentation in detail.

Before beginning this lab, you’ll probably want to review sections 1.4.3 in the text and section 3.4 of RFC 2151 [ ftp://ftp.rfc-editor.org/in-notes/rfc2151.txt ] to update yourself on the operation of the traceroute program. You’ll also want to read Section 4.4 in the text, and probably also have RFC 791 [ ftp://ftp.rfc-editor.org/in-notes/rfc791.txt ] on hand as well, for a discussion of the IP protocol.

1. Capturing packets from an execution of traceroute

In order to generate a trace of IP datagrams for this lab, we’ll use the traceroute program to send datagrams of different sizes towards some destination, X. Recall that traceroute operates by first sending one or more datagrams with the time-to-live (TTL) field in the IP header set to 1; it then sends a series of one or more datagrams towards the same destination with a TTL value of 2; it then sends a series of datagrams towards the same destination with a TTL value of 3; and so on. Recall that a router must decrement the TTL in each received datagram by 1 (actually, RFC 791 says that the router must decrement the TTL by at least one). If the TTL reaches 0, the router returns an ICMP message (type 11 – TTL-exceeded) to the sending host. As a result of this behavior, a datagram with a TTL of 1 (sent by the host executing traceroute) will cause the router one hop away from the sender to send an ICMP TTL-exceeded message back to the sender; the datagram sent with a TTL of 2 will cause the router two hops away to send an ICMP message back to the sender; the datagram sent with a TTL of 3 will cause the router three hops away to send an ICMP message back to the sender; and so on. In this manner, the host executing traceroute can learn the identities of the routers between itself and destination X by looking at the source IP addresses in the datagrams containing the ICMP TTL-exceeded messages.

We’ll want to run traceroute and have it send datagrams of various lengths.

· Windows. The tracert program (used for our ICMP Wireshark lab) provided with Windows does not allow one to change the size of the ICMP echo request (ping) message sent by the tracert program. A nicer Windows traceroute program is pingplotter, available both in free version and shareware versions at http://www.pingplotter.com . Download and install pingplotter, and test it out by performing a few traceroutes to your favorite sites. The size of the ICMP echo request message can be explicitly set in pingplotter by selecting the menu item Edit-> Options->Packet Options and then filling in the Packet Size field. The default packet size is 56 bytes. Once pingplotter has sent a series of packets with the increasing TTL values, it restarts the sending process again with a TTL of 1, after waiting Trace Interval amount of time. The value of Trace Interval and the number of intervals can be explicitly set in pingplotter.

· Linux/Unix/MacOS. With the Unix/MacOS traceroute command, the size of the UDP datagram sent towards the destination can be explicitly set by indicating the number of bytes in the datagram; this value is entered in the traceroute command line immediately after the name or address of the destination. For example, to send traceroute datagrams of 2000 bytes towards gaia.cs.umass.edu, the command would be:

%traceroute gaia.cs.umass.edu 2000

Do the following:

· Start up Wireshark and begin packet capture (Capture->Start) and then press OK on the Wireshark Packet Capture Options screen (we’ll not need to select any options here).

· If you are using a Windows platform, start up pingplotter and enter the name of a target destination in the “Address to Trace Window.” Enter 3 in the “# of times to Trace” field, so you don’t gather too much data. Select the menu item Edit->Advanced Options->Packet Options and enter a value of 56 in the Packet Size field and then press OK. Then press the Trace button. You should see a pingplotter window that looks something like this:

image2.png

Next, send a set of datagrams with a longer length, by selecting Edit->Advanced Options->Packet Options and enter a value of 2000 in the Packet Size field and then press OK. Then press the Resume button.

Finally, send a set of datagrams with a longer length, by selecting Edit->Advanced Options->Packet Options and enter a value of 3500 in the Packet Size field and then press OK. Then press the Resume button.

Stop Wireshark tracing.

· If you are using a Unix or Mac platform, enter three traceroute commands, one with a length of 56 bytes, one with a length of 2000 bytes, and one with a length of 3500 bytes.

Stop Wireshark tracing.

If you are unable to run Wireshark on a live network connection, you can download a packet trace file that was captured while following the steps above on one of the author’s Windows computers . You may well find it valuable to download this trace even if you’ve captured your own trace and use it, as well as your own trace, when you explore the questions below.

2. A look at the captured trace

In your trace, you should be able to see the series of ICMP Echo Request (in the case of Windows machine) or the UDP segment (in the case of Unix) sent by your computer and the ICMP TTL-exceeded messages returned to your computer by the intermediate routers. In the questions below, we’ll assume you are using a Windows machine; the corresponding questions for the case of a Unix machine should be clear. Whenever possible, when answering a question below you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. When you hand in your assignment, annotate the output so that it’s clear where in the output you’re getting the information for your answer (e.g., for our classes, we ask that students markup paper copies with a pen, or annotate electronic copies with text in a colored font).To print a packet, use File->Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.

1. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol part of the packet in the packet details window.

image3.png

What is the IP address of your computer?

2. Within the IP packet header, what is the value in the upper layer protocol field?

3. How many bytes are in the IP header? How many bytes are in the payload of the IP datagram? Explain how you determined the number of payload bytes.

4. Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented.

Next, sort the traced packets according to IP source address by clicking on the Source column header; a small downward pointing arrow should appear next to the word Source. If the arrow points up, click on the Source column header again. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol portion in the “details of selected packet header” window. In the “listing of captured packets” window, you should see all of the subsequent ICMP messages (perhaps with additional interspersed packets sent by other protocols running on your computer) below this first ICMP. Use the down arrow to move through the ICMP messages sent by your computer.

5. Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer?

6. Which fields stay constant? Which of the fields must stay constant? Which fields must change? Why?

7. Describe the pattern you see in the values in the Identification field of the IP datagram

Next (with the packets still sorted by source address) find the series of ICMP TTL-exceeded replies sent to your computer by the nearest (first hop) router.

8. What is the value in the Identification field and the TTL field?

9. Do these values remain unchanged for all of the ICMP TTL-exceeded replies sent to your computer by the nearest (first hop) router? Why?

Fragmentation

Sort the packet listing according to time again by clicking on the Time column.

10. Find the first ICMP Echo Request message that was sent by your computer after you changed the Packet Size in pingplotter to be 2000. Has that message been fragmented across more than one IP datagram? [Note: if you find your packet has not been fragmented, you should download the zip file http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip and extract the ip-ethereal-trace-1packet trace. If your computer has an Ethernet interface, a packet size of 2000 should cause fragmentation. ]

11. Print out the first fragment of the fragmented IP datagram. What information in the IP header indicates that the datagram been fragmented? What information in the IP header indicates whether this is the first fragment versus a latter fragment? How long is this IP datagram?

12. Print out the second fragment of the fragmented IP datagram. What information in the IP header indicates that this is not the first datagram fragment? Are the more fragments? How can you tell?

13. What fields change in the IP header between the first and second fragment?

Now find the first ICMP Echo Request message that was sent by your computer after you changed the Packet Size in pingplotter to be 3500.

14. How many fragments were created from the original datagram?

15. What fields change in the IP header among the fragments?

� References to figures and sections are for the 6th edition of our text, Computer Networks, A Top-down Approach, 6th ed., J.F. Kurose and K.W. Ross, Addison-Wesley/Pearson, 2012.

� Download the zip file � HYPERLINK “http://gaia.cs.umass.edu/ethereal-labs/ethereal-traces.zip” ��http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip� and extract the file ip-ethereal-trace-1. The traces in this zip file were collected by Wireshark running on one of the author’s computers, while performing the steps indicated in the Wireshark lab. Once you have downloaded the trace, you can load it into Wireshark and view the trace using the File pull down menu, choosing Open, and then selecting the ip-ethereal-trace-1 trace file.

� The packets in the ip-ethereal-trace-1 trace file in � HYPERLINK “http://gaia.cs.umass.edu/ethereal-labs/ethereal-traces.zip” ��http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip� are all less that 1500 bytes. This is because the computer on which the trace was gathered has an Ethernet card that limits the length of the maximum IP packet to 1500 bytes (40 bytes of TCP/IP header data and 1460 bytes of upper-layer protocol payload). This 1500 byte value is the standard maximum length allowed by Ethernet. If your trace indicates a datagram longer 1500 bytes, and your computer is using an Ethernet connection, then Wireshark is reporting the wrong IP datagram length; it will likely also show only one large IP datagram rather than multiple smaller datagrams.. This inconsistency in reported lengths is due to the interaction between the Ethernet driver and the Wireshark software. We recommend that if you have this inconsistency, that you perform this lab using the ip-ethereal-trace-1 trace file.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!