Word Document Assignment

  1. Open the EmergencyProcedures-02.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  3. Change the theme to Integral and the theme color to Red.
  4. Change the top, bottom, left, and right margins to 0.75″.
  5. Select the entire document and change the font size to 12 pt.
  6. Format the title of the document.
    1. Select the title of the document and apply Heading 1 style.
    2. Open the Font dialog box, apply All caps effect, and change the font size to 16 pt.
    3. Change the Before paragraph spacing to 0 pt.
    4. Add a bottom border to the title using the Borders drop-down list.
  7. Apply and modify the Heading 2 style and delete blank lines.
    1. Apply the Heading 2 style to each of the bold section headings.
    2. Select the first section heading (“Emergency Telephones [Blue Phones]”).
    3. Change Before paragraph spacing to 12 pt. and After paragraph spacing to 3 pt.
    4. Apply small caps effect.
    5. Update Heading 2 style to match selection. All the section headings are updated.
    6. Turn on Show/Hide and delete all the blank lines in the document.
  8. Select the bulleted list in the first section and change it to a numbered list.
  9. Apply numbering format and formatting changes, and use the Format Painter.
    1. Apply numbering to the text below the section headings in the following sections: “Assaults, Fights, or Emotional Disturbances”; “Power Failure”; “Fire”; “Earthquake”; and “Bomb Threat.”
    2. Select the numbered list in the “Bomb Threat” section.
    3. Open the Paragraph dialog box, set Before and After paragraph spacing to 2 pt., deselect the Don’t add space between paragraphs of the same style check box, and click OK to close the dialog box.
    4. Use the Format Painter to copy this numbering format to each of the other numbered lists.
    5. Reset each numbered list so it begins with 1 (right-click the first item in each numbered list and select Restart at 1 from the context menu).
  10. Customize a bulleted list and use the Format Painter.
    1. Select the text in the “Accident or Medical Emergency” section.
    2. Create a custom bulleted list and use a double right-pointing triangle symbol (Webdings, Character code 56).
    3. Open the Paragraph dialog box and confirm the left indent is 0.25″ and hanging indent is 0.25″. If not, change the settings.
    4. Set Before and After paragraph spacing to 2 pt. and deselect the Don’t add space between paragraphs of the same style check box.
    5. Use the Format Painter to apply this bulleted list format to the following text in the following sections: “Tips to Professors and Staff” and “Response to Students.”
  11. Change indent and paragraph spacing and apply a style.
    1. Select the text below the “Emergency Telephone Locations” heading.
    2. Set a 0.25″ left indent.
    3. Set Before and After paragraph spacing to 2 pt.
    4. Confirm the Don’t add space between paragraphs of the same style box is unchecked (Paragraph dialog box).
    5. Apply Book Title style to each of the telephone locations in the “Emergency Telephone Locations” section. Select only the location, not the text in parentheses or following text.
  12. Change left indent and paragraph spacing and set a tab stop with a dot leader.
    1. Select the text below the “Emergency Phone Numbers” heading.
    2. Open the Paragraph dialog box and set a 0.25″ left indent for this text.
    3. Set Before and After paragraph spacing to 2 pt. and confirm the Don’t add space between paragraphs of the same style box is unchecked.
    4. Open the Tabs dialog box, set a right tab stop at 7″, and use a dot leader (2).
    5. Press Tab before the phone number (after the space) on each of these lines. The phone numbers align at the right margin with a dot leader between the text and phone number.
  13. Apply the Intense Reference style to the paragraph headings in the “Accident or Medical Emergency” section (“Life-Threating Emergencies” and “Minor Emergencies”). Include the colon when selecting the paragraph headings.
  14. Use the Replace feature to replace all instances of “Phone 911” with “CALL 911” with bold font style. Note: If previous Find or Replace criteria displays in the Replace dialog box, remove this content before performing this instruction.
  15. Insert a footer with document property fields and the current date that appears on every page.
    1. Edit the footer on the first page and use the ruler to move the center tab stop to 3.5″ and the right tab stop to 7″.
    2. Insert the Title document property field on the left. Use the right arrow key to deselect the document property field.
    3. Tab to the center tab stop and insert the Company document property field at center. Use the right arrow key to deselect the document property field.
    4. Tab to the right tab stop, insert (not type) the date (use January 1, 2020 format), and set it to update automatically.
    5. Change the font size of all the text in the footer to 10 pt.
    6. Add a top border to the text in the footer using the Borders drop-down list and close the footer.
  16. Use the Borders and Shading dialog box to insert a page border on the entire document.
    1. Use Shadow setting and solid line style.
    2. Select the fifth color in the first row of the Theme Colors (Dark Red, Accent 1) and 1 pt. line width.
  17. Center the entire document vertically (Hint: use the Page Setup dialog box).
  18. View the document in Side to Side page movement view [View tab, Page Movement group] and then return to Vertical page movement view.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Please Make Sure You Follow The Template STEP BY STEP. Thank You

Lab Deliverable for Lab n

Your Name

Date

Title: Creating, Using, Removing System Restore Points for Windows 8.1

Operating Environment:

1. Operating System: Windows 8.1 Pro

2. Hardware

3. Software

Description:

 

Notes, Warnings, & Restrictions:

Resources (Further Reading):

Procedures:

[First Section Heading & Brief Intro / Explanation]

[Step-by-Step]

 

[Second Section Heading & Brief Intro / Explanation]

[Step-by-Step]

 

 

[Last Section Heading & Brief Intro / Explanation]

[Step-by-Step]

 

 

 

 

Title:

Operating Environment:

1. Hardware

2. Software

Description:

 

Notes, Warnings, & Restrictions:

Resources (Further Reading):

Procedures:

 

[First Section Heading & Brief Intro / Explanation]

[Step-by-Step]

 

[Second Section Heading & Brief Intro / Explanation]

[Step-by-Step]

 

 

[Last Section Heading & Brief Intro / Explanation]

[Step-by-Step]

 

Title:

Operating Environment:

1. Hardware

2. Software

Description:

 

Notes, Warnings, & Restrictions:

Resources (Further Reading):

Procedures:

[First Section Heading & Brief Intro / Explanation]

[Step-by-Step]

 

[Second Section Heading & Brief Intro / Explanation]

[Step-by-Step]

 

 

[Last Section Heading & Brief Intro / Explanation]

[Step-by-Step]

 

1

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Microsoft Access Work

IfSuccessful_Status GA_Status_Icon SAM_Logo
true
false
ID FirstName LastName AssignmentGUID UserID
false Paulette West {01121CA1-7441-4AA2-A108-DA94031C3B66} {01121CA1-7441-4AA2-A108-DA94031C3B66}
ID FirstName LastName ProjectName SubmissionNum MaxScore Score EngineVersion
ID StepNumber Description IfSuccessful StepScore StepMaxScore ErrorText ActionName StepActionOrder
Category Description
Adventure Adventure experiences include skiing, scuba, biking, hiking, and climbing tours.
Eco Eco experiences work on environmental or ecological projects.
CustNo FName LName Street City State Zip Phone FirstContact
1 Mindi Scott 52411 Oakmont Rd Kansas City MO 64144 5554441234 Friend
2 Jacob Alman 2505 McGee St Waukee IA 50288 5551116931 Friend
3 Julia Bouchart 5200 Main St Kansas City MO 64105 5551113081 Mail
4 Jane Taylor 8206 Marshall Dr Lenexa KS 66214 5552229101 Mail
5 Samantha Garcia 600 Elm St Olathe KS 66031 5552227002 Friend
6 Kristen Collins 520 W 52nd St Kansas City KS 64105 5552223602 Radio
7 Tom Camel 520 W 52nd St Kansas City KS 64105 5552223602 Radio
8 Dick Lee 66020 King St Overland Park KS 66210 5552228402 Internet
9 Daniel Gonzalez 52520 W. 505 Ter Lenexa KS 66215 5553339871 Internet
10 Brad Perez 56 Jackson Rd Kansas City MO 64145 5553330401 Mail
11 Nancy Walker 466 Lincoln Rd Kansas City MO 64105 5553330401 Friend
12 Kathryn Hall 96 Lowell St Overland Park KS 66210 5554444404 Internet
13 Anne Johnson 525 Ambassador Dr Kansas City MO 64145 5554448844 Mail
14 Mary Jane Ramirez 903 East 504th St. Kansas City KS 64131 5554447414 Radio
15 Frank Torres 305 W. 99th St Lenexa KS 66215 5555664344 Radio
16 David Carter 7066 College Rd Overland Park KS 66211 5559997154 Internet
17 Jose Edwards 624 Richmond Ter Clive IA 50266 5556660365 Mail
18 Ralph Stewart 4435 Main St Greenfield IA 50849 5557778774 Internet
19 Naresh Blackwell 2345 Grand Blvd Kansas City KS 64108 5558886004 Friend
20 Elsie Smith 5253 Duck Creek Dr Iowa City IA 52240 5559998777 Friend
21 Toby Smith 5253 Duck Creek Dr Iowa City IA 52240 5559998777 Friend
22 Brandon Moore 3966 Woodland St West Des Moines IA 50266 5552228908 Internet
23 Gabriel Martin 345 College Rd Overland Park KS 66210 5553338505 Radio
24 Douglas Flores 525 College Rd Overland Park KS 66210 5554448505 Friend
25 Aaron Hill 2584 Meyer Rd Kansas City KS 64132 5557779414 Mail
26 Robert Nelson 201 Birch St Overland Park KS 66206 5558884514 Internet
27 Jaele Clark 620 King St Overland Park KS 66210 5557776434 Mail
28 Jenny Lewis 895 Lowell Dr Overland Park KS 66211 5556665084 Friend
29 Marcie Young 8320 Grant St Kansas City MO 64114 5552221388 Internet
30 Sharol Wood 2330 Shawnee Dr Westwood KS 66205 5553332434 Friend
31 Zohra Bell 506 Lowell St Point Lookout MO 65727 5556664404 Mail
32 Lisa Gomez 345 College Rd Ridgedale MO 65777 5557778504 Mail
33 Shirley Cruz 46 Maple Rd Hollister MO 65727 5551110403 Radio
34 Kori James 5234 Ash Rd Ridgedale MO 65777 5552228503 Radio
35 Jeanette Gray 4435 Main St Branson MO 65726 5552228773 Radio
36 Brad Long 123 Duck Creek Dr Johnston IA 50800 5553328888 Internet
37 Madison West 57 West 159th St Cushing PA 87087 5552887722 Radio
38 Nancy Cole 123 Duck Creek Dr Johnston IA 50800 5553328888 Internet
39 Tim Hayes 8206 Marshall Dr Lenexa KS 66214 5552229101 Mail
40 Hannah Hunter 66900 College Rd Overland Park KS 66210 5552225102 Radio
41 Marcus Mason 66900 College Rd Overland Park KS 66210 5552225102 Radio
42 Kris Shaw 900 Barnes St West Des Moines IA 50265 5556661324 Mail
43 Lois Gordon 900 Barnes St West Des Moines IA 50265 5556661324 Mail
44 Samuel Livingston 1551 Switzer St Gardner KS 66303 5556633366 Internet
45 Julie Livingston 1551 Switzer St Gardner KS 66303 5556633366 Internet
46 Aaron Wheeler 5989 Washington Ave Hollister MO 67827 5556766677 Internet
47 Kelsey Silva 7800 West 16th St Manhattan KS 66502 5556655522 Internet
48 Orlando Berry 7722 Mastin St Mission KS 63552 5558887722 Internet
49 Maria Armstrong 7722 Mastin St Mission KS 63552 5558887722 Internet
SalesNo SaleDate CustNo TripNo
1 4/28/20 18 1
2 4/28/20 32 1
3 4/28/20 6 3
4 4/28/20 42 1
5 4/28/20 43 1
6 4/28/20 19 1
7 4/29/20 3 12
8 4/29/20 7 3
9 5/3/20 33 10
10 5/3/20 31 10
11 5/3/20 12 10
12 5/3/20 17 10
13 5/9/20 4 2
14 5/29/20 34 1
15 5/30/20 30 36
16 5/30/20 43 36
17 5/30/20 39 36
18 5/30/20 15 36
19 5/30/20 7 47
20 5/30/20 4 36
21 5/30/20 6 47
22 5/30/20 42 36
23 5/30/20 18 36
24 5/31/20 38 36
25 5/31/20 36 36
26 6/1/20 40 36
27 6/1/20 41 36
28 6/28/20 25 1
29 6/29/20 6 36
30 6/29/20 5 2
31 6/29/20 29 2
32 6/29/20 11 2
33 6/29/20 3 2
34 6/29/20 2 2
35 6/29/20 1 2
36 6/29/20 7 36
37 6/30/20 15 2
38 6/30/20 14 2
39 7/5/20 43 51
40 7/5/20 6 51
41 7/5/20 7 51
42 7/5/20 42 51
43 7/6/20 8 51
44 7/6/20 17 51
45 7/7/20 9 36
46 7/7/20 9 51
47 7/7/20 41 51
48 7/7/20 40 51
49 7/7/20 19 51
50 7/7/20 11 51
51 7/7/20 12 36
52 7/9/20 5 51
53 7/9/20 26 3
54 7/9/20 19 3
55 7/10/20 20 3
56 7/10/20 24 3
57 7/10/20 21 3
58 7/10/20 22 3
59 7/11/20 30 3
60 7/11/20 28 3
61 7/11/20 29 3
62 7/11/20 43 3
63 7/11/20 42 3
64 7/12/20 11 5
65 7/12/20 15 5
66 7/12/20 10 4
67 7/12/20 13 4
68 7/13/20 34 5
69 7/13/20 14 5
70 7/13/20 35 5
71 7/13/20 17 5
72 7/13/20 13 5
73 7/13/20 12 5
74 7/17/20 15 6
75 7/17/20 31 6
76 7/18/20 33 6
77 7/18/20 42 6
78 7/18/20 32 6
79 7/18/20 43 6
80 7/19/20 18 6
81 7/19/20 25 6
82 7/20/20 16 7
83 7/20/20 22 7
84 7/20/20 27 7
85 7/20/20 28 7
86 7/24/20 23 7
87 7/24/20 20 7
88 7/24/20 21 7
89 7/31/20 24 8
90 7/31/20 27 9
91 8/1/20 26 8
92 8/4/20 17 9
93 8/5/20 15 9
94 8/5/20 29 9
95 8/6/20 25 8
96 8/7/20 23 8
98 8/8/20 36 44
99 8/11/20 38 44
100 8/11/20 42 46
101 8/12/20 43 46
102 8/12/20 20 45
103 8/13/20 21 45
104 8/14/20 44 3
105 8/15/20 45 3
106 8/15/20 46 3
107 8/15/20 47 3
StateName StateAbbreviation
Alaska AK
Alabama AL
Arkansas AR
Arizona AZ
California CA
Colorado CO
Connecticut CT
District of Columbia DC
Delaware DE
Florida FL
Georgia GA
Hawaii HI
Iowa IA
Idaho ID
Illinois IL
Indiana IN
Kansas KS
Kentucky KT
Louisiana LA
Massachusetts MA
Maryland MD
Maine ME
Michigan MI
Minnesota MN
Missouri MO
Mississippi MS
Montana MT
North Carolina NC
North Dakota ND
Nebraska NE
New Hampshire NH
New Jersey NJ
New Mexico NM
Nevada NV
New York NY
Ohio OH
Oklahoma OK
Oregon OR
Pennsylvania PA
Rhode Island RI
South Carolina SC
South Dakota SD
Tennessee TN
Texas TX
Utah UT
Virginia VA
Vermont VT
Washington WA
Wisconsin WS
West Virginia WV
Wyoming WY
TripNo TripName TripStartDate Duration City StateAbbrev Category Price
1 Stanley Bay Cleanup 7/4/20 3 Captiva FL Eco ¤ 750.00
2 Red Reef Cleanup 7/4/20 3 Islamorada FL Eco ¤ 1,500.00
3 Breckenridge Reconstruction 12/31/20 7 Breckenridge CO Eco ¤ 850.00
4 Boy Scout Project 8/1/20 7 Vail CO Eco ¤ 1,000.00
5 Bridgewater Country Study 8/5/20 10 Aspen CO Eco ¤ 2,000.00
6 Rocky Mountain Mission 8/9/20 3 Breckenridge CO Adventure ¤ 1,700.00
7 Monmouth Festival 11/10/20 7 Monmouth CO Eco ¤ 1,800.00
8 Great Fish Count 9/1/20 9 Denver CO Eco ¤ 700.00
9 Bikers for Ecology 9/10/20 5 Georgetown CO Adventure ¤ 800.00
10 Golden Hands Venture 5/21/20 4 Orlando FL Adventure ¤ 900.00
11 Hummer Trail Study 5/28/20 7 Key West FL Eco ¤ 1,250.00
12 Coastal Shore Cleanup 5/28/20 7 Captiva FL Adventure ¤ 1,000.00
13 High Adventurers 6/3/20 7 Ft. Lauderdale FL Adventure ¤ 1,400.00
15 Patriots in Disneyland 6/10/20 7 Orlando FL Adventure ¤ 1,500.00
17 Tropical Sailboat Voyage 6/17/20 7 Key West FL Adventure ¤ 1,450.00
18 Eagle Hiking Club 6/17/20 7 Aspen CO Adventure ¤ 1,500.00
19 Paradise Water Club 6/24/20 7 Fort Collins CO Adventure ¤ 1,400.00
20 Team Discovery 6/27/20 5 Breckenridge CO Adventure ¤ 1,200.00
21 Gulfside Birdwatchers 6/27/20 7 Tampa Bay FL Adventure ¤ 1,550.00
22 Perfect Waves Project 6/25/20 5 Huntington Beach CA Adventure ¤ 800.00
23 Outrigger Cleanup 6/27/20 7 Leadville CO Eco ¤ 1,000.00
24 Blue Canyon Youth Project 6/29/20 7 Breckenridge CO Adventure ¤ 1,400.00
25 Emmanuel Youth Club 6/29/20 7 Aspen CO Eco ¤ 900.00
26 Prairie Restoration Project 6/30/20 3 West Denver CO Eco ¤ 200.00
27 Butterfly House Construction 6/30/20 3 Denver CO Eco ¤ 400.00
28 Bass Habitat Project 6/30/20 4 Broomfield CO Eco ¤ 500.00
29 Silver Country Venture 7/11/20 14 Sacramento CA Adventure ¤ 3,500.00
30 Monterey Mysteries 7/12/20 7 Monterey CA Adventure ¤ 1,800.00
36 California Coastline Cleanup 8/22/20 7 San Diego CA Eco ¤ 1,200.00
37 Cactus Ecosystem 9/12/20 7 San Diego CA Eco ¤ 800.00
38 Water Education Foundation 9/19/20 14 Fresno CA Eco ¤ 1,300.00
39 Oakland Museum of Science 7/18/20 7 Oakland CA Eco ¤ 1,000.00
40 Redwood Forest Lab 9/27/20 14 Mill Valley CA Eco ¤ 1,500.00
41 Langguth Environment 10/17/20 10 Napa CA Eco ¤ 2,900.00
43 Japanese California Connection 8/17/20 4 Bolinas CA Eco ¤ 900.00
44 Bear Valley Adventures 8/17/20 3 Sacramento CA Adventure ¤ 800.00
45 Black Sheep Hikers 8/24/20 14 El Dorado Hills CA Adventure ¤ 3,000.00
46 Bigfoot Rafting Club 9/11/20 4 Placerville CA Adventure ¤ 850.00
47 Yosemite Park Cleanup 7/18/20 3 Sacramento CA Eco ¤ 1,250.00
48 Kings Canyon Bridge Builders 7/11/20 10 Three Rivers CA Eco ¤ 2,800.00
49 Golden State Tours 7/18/20 10 Sacramento CA Adventure ¤ 2,300.00
51 Mark Twain Forest Project 11/29/20 7 Branson CO Eco ¤ 1,200.00
52 Colorado Bald Eagle Watch Club 8/11/20 7 Estes Park CO Adventure ¤ 1,100.00
53 Convoy of Hope 12/31/20 14 San Diego CA Eco ¤ 1,000.00
54 Durango Wildfire Project 9/1/20 10 Durango CO Eco ¤ 1,400.00
55 Student Last Name Project 8/1/20 5 Boulder CO Eco ¤ 500.00
SELECT TourCategories.Category FROM TourCategories;
PARAMETERS __TripNo Value; SELECT DISTINCTROW * FROM CustomerSales AS CustomerRoster WHERE ([__TripNo] = TripNo);
SELECT States.StateAbbreviation, States.StateName FROM States;
SELECT DISTINCTROW * FROM States;
SELECT DISTINCTROW * FROM Trips;
SELECT Customers.CustNo, [LName] & “, ” & [FName] AS CustomerName FROM Customers ORDER BY [LName] & “, ” & [FName];
SELECT [States].[StateName], [States].[StateAbbreviation] FROM States ORDER BY [StateAbbreviation];
SELECT Sales.SalesNo, Customers.LName, Customers.FName, Trips.TripName FROM Trips INNER JOIN (Customers INNER JOIN Sales ON Customers.CustNo = Sales.CustNo) ON Trips.TripNo = Sales.TripNo ORDER BY Customers.LName, Customers.FName, Trips.TripName;
SELECT States.StateAbbreviation, States.StateAbbreviation, States.StateName FROM States ORDER BY States.StateName;
SELECT Categories.Category FROM Categories;
SELECT [Categories].[Category], [Categories].[Description] FROM Categories;
PARAMETERS __Category Value; SELECT DISTINCTROW * FROM Trips AS TripsByCategory WHERE ([__Category] = Category);
SELECT TourCategories.Category FROM TourCategories;
SELECT TourCategories.Category FROM TourCategories;
SELECT Trips.TripNo, Trips.TripName, Trips.TripStartDate, Trips.Duration, Trips.City, Trips.StateAbbrev, Trips.Category, Trips.Price FROM Trips ORDER BY Trips.TripName;
SELECT Customers.* FROM Customers WHERE (([State]<>”MO” Or [State] IS Null));
SELECT Trips.*, Categories.Description, Categories.Category AS Category_Categories FROM Categories INNER JOIN Trips ON Categories.Category = Trips.Category;
SELECT DISTINCTROW * FROM Trips;
SELECT Customers.CustNo, Customers.FName, Customers.LName, Customers.Street, Customers.City, Customers.State, Customers.Zip, Customers.Phone, Sales.SalesNo, Sales.SaleDate, Sales.CustNo, Trips.TripNo, Trips.TripName, Trips.TripStartDate, Trips.Duration, Trips.City, Trips.StateAbbrev, Trips.Category, Trips.Price FROM Trips INNER JOIN (Customers INNER JOIN Sales ON Customers.CustNo = Sales.CustNo) ON Trips.TripNo = Sales.TripNo WHERE (((Sales.SalesNo)=[Forms]![Switchboard]![cboFindCustomer]));
SELECT Customers.CustNo, Customers.FName, Customers.LName, [LName] & “, ” & [FName] AS CustomerName, Customers.Street, Customers.City, Customers.State, Customers.Zip, Customers.Phone, Customers.FirstContact, Sales.TripNo, Sales.CustNo, Sales.SaleDate FROM Customers INNER JOIN Sales ON Customers.CustNo = Sales.CustNo;
SELECT [FirstName] & ” ” & [LastName] AS StudentName, [_GradingReport].ProjectName, “Submission #” & [SubmissionNum] AS SubmissionCt, [_GradingReport].Score, [_GradingReport].MaxScore, “Score is: ” & [Score] & ” out of ” & [MaxScore] AS Grade, [_GradingReportSteps].[StepNumber] & “. ” & [Description] AS Step, [_GradingReportSteps].[StepScore] & “/” & [_GradingReportSteps].[StepMaxScore] AS StepGrade, [_GradingReportSteps].ActionName, IIf([ifsuccessful]=True,Null,[ErrorText]) AS Feedback, [_GradingReportSteps].IfSuccessful, [_GradingIcons].GA_Status_Icon, [_GradingReportSteps].StepNumber, [_GradingReportSteps].StepActionOrder, [_GradingReportSteps].ID, [_GradingIcons].SAM_Logo, [_GradingReportSteps].Description, [_GradingReport].EngineVersion FROM _GradingReport, _GradingIcons INNER JOIN _GradingReportSteps ON [_GradingIcons].[IfSuccessful_Status] = [_GradingReportSteps].IfSuccessful;
SELECT Categories.Category, Categories.Description FROM Categories;
SELECT Trips.TripName, Customers.LName, Customers.FName, Sales.SaleDate FROM Trips INNER JOIN (Customers INNER JOIN Sales ON Customers.CustNo = Sales.CustNo) ON Trips.TripNo = Sales.TripNo ORDER BY Trips.TripName, Customers.LName;
SELECT Trips.TripName, Trips.TripStartDate, Trips.Duration, Trips.City, Trips.StateAbbrev, Trips.Category, Trips.Price, Sales.SaleDate, Customers.FName, Customers.LName, Customers.Street, Customers.City, Customers.State, Customers.Zip, Customers.Phone, Customers.FirstContact FROM Trips INNER JOIN (Customers INNER JOIN Sales ON Customers.CustNo = Sales.CustNo) ON Trips.TripNo = Sales.TripNo ORDER BY Trips.TripName;
SELECT Categories.Category, Trips.TripName, Trips.TripStartDate, Trips.Price FROM Categories INNER JOIN Trips ON Categories.Category = Trips.Category ORDER BY Categories.Category, Trips.TripName;
SELECT States.StateName, Trips.TripName, Trips.TripStartDate, Trips.Price, States.StateAbbreviation FROM States INNER JOIN Trips ON States.StateAbbreviation = Trips.StateAbbrev WHERE (((States.StateAbbreviation)=[Forms]![Switchboard]![cboFindState])) ORDER BY States.StateName, Trips.TripName;
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Excel Chapter 9 Mid-Level 2 – Pizza Sales

Exp19_Excel_Ch09_ML2_Pizza_Sales_Instructions.docx
Grader – Instructions Excel 2019 Project

Exp19_Excel_Ch09_ML2_Pizza_Sales
Project Description:
You manage a chain of pizza restaurants in Augusta, Lewiston, and Portland, Maine. Each store manager created a workbook containing the quarterly sales for each type of sale (dine-in, carryout, and delivery). You want to create links to a summary workbook for the yearly totals.

Steps to Perform:
Step

Instructions

Points Possible

1

Start Excel. Download and open the file named Exp19_Excel_Ch09_ML2_Pizza.xlsx. Grader has automatically added your last name to the beginning of the filename.

0

2

You want to enter totals from the Augusta workbook into the Pizza workbook. Display the Augusta worksheet; in cell B4, insert a link to the Dine-In total in cell F4 in the Exp19_Excel_Ch09_ML2_Augusta workbook. Edit the formula to make the cell reference relative.

5

3

You want to copy the formula down the column but preserve the original formatting. Use AutoFill to copy the formula from cell B4 to the range B5:B7 in the Augusta worksheet. Close the Augusta workbook; keep the Pizza workbook open.

6

4

You want to enter totals from the Portland workbook into the Pizza workbook. Display the Portland worksheet; in cell B4 insert a link to the Dine-In total in cell F4 in the Exp19_Excel_Ch09_ML2_Portland workbook. Edit the formula to make the cell reference relative.

5

5

You want to copy the formula down the column but preserve the original formatting. Use AutoFill to copy the formula from cell B4 to the range B5:B7 in the Portland worksheet. Close the Portland workbook; keep the Pizza workbook open.

6

6

You want to enter totals from the Lewiston workbook into the Pizza workbook. Display the Lewiston worksheet; in cell B4 insert a link to the Dine-In total in cell F4 in the Exp19_Excel_Ch09_ML2_Lewiston workbook. Edit the formula to make the cell reference relative.

5

7

You want to copy the formula down the column but preserve the original formatting. Use AutoFill to copy the formula from cell B4 to the range B5:B7 in the Lewiston worksheet. Close the Lewiston workbook; keep the Pizza workbook open.

6

8

The Summary sheet should contain the same formatting as the other sheets. Select the range A1:B7 in the Lewiston worksheet. Group the Lewiston and Summary worksheets. Fill formatting only across the grouped worksheets.

5

9

Ungroup the worksheets and change the width of column B to 16 in the Summary worksheet.

2

10

You are ready to insert functions with 3-D references in the Summary worksheet. In cell B4, insert a SUM function that calculates the total Dine-In sales for the three cities.

5

11

Copy the formula in cell B4 and use the Paste Formulas option in the range B5:B7 to preserve the formatting.

5

12

You are ready to display the Contents worksheet and insert hyperlinks. • Insert a hyperlink in cell A3 that links to cell B7 in the Augusta sheet. Include the ScreenTip text: Augusta total sales (no period). • Insert a hyperlink in cell A4 that links to cell B7 in the Portland sheet. Include the ScreenTip text: Portland total sales (no period). • Insert a hyperlink in cell A5 that links to cell B7 in the Lewiston sheet. Include the ScreenTip text: Lewiston total sales (no period). • Insert a hyperlink in cell A6 that links to cell B7 in the Summary sheet. Include the ScreenTip text: Total sales for all locations (no period).

10

13

You want to create a data validation rule. Select the range B3:B5 on the Future worksheet and add the following data validation rule: • Allow Date between 3/1/2021 and 10/1/2021. • Enter the input message title: Proposed Date (no period). • Enter the input message: Enter the proposed opening date for this location. (including the period). • Select the Information error alert style. • Enter the error alert title: Confirm Date (no period). • Enter the error message: Confirm the date with the VP. (including the period).

13

14

You should test the validation rule to ensure it works correctly. Enter 10/5/2021 in cell B5 and click OK in the Confirm Date message box.

3

15

You want to unlock a range on the Future worksheet to enable changes by users. Unlock the range B3:B5.

6

16

Now that the cells are unlocked, you are ready to protect the Future worksheet. Protect the worksheet without a password and using the default settings.

6

17

Hide the Future worksheet.

6

18

Create a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side of the five visible worksheets.

6

19

Mark the workbook as final. Note: Mark as Final is not available in Excel for Mac. Instead, use Always Open Read-Only on the Review tab.

0

20

Save and close Exp19_Excel_Ch09_ML2_Pizza.xlsx. Exit Excel. Submit the file as directed.

0

Total Points

100

Created On: 09/03/2020 1 Exp19_Excel_Ch09_ML2 – Pizza Sales 1.1

Amy_Exp19_Excel_Ch09_ML2_Pizza.xlsx
Contents
Pizza Workbook
Augusta
Portland
Lewiston
Summary
Augusta
Augusta
Category Total
Dine-In
Pick-up
Delivery
Total
Portland
Portland
Category Total
Dine-In
Pick-up
Delivery
Total
Lewiston
Lewiston
Category Total
Dine-In
Pick-up
Delivery
Total
Summary
Regional Totals
Category Total
Dine-In
Pick-up
Delivery
Total
Future
Plans for New Locations
Eugene 5/1/2021
Salem 7/1/2021
Hillsboro 9/1/2021
Exp19_Excel_Ch09_ML2_Portland.xlsx
Portland
Portland Location
Category 1st Quarter 2nd Quarter 3rd Quarter 4th Quarter Total
Dine-In $ 45,000 $ 41,000 $ 38,000 $ 33,000 $ 157,000
Pick-up $ 19,000 $ 21,000 $ 20,000 $ 20,000 $ 80,000
Delivery $ 25,000 $ 35,000 $ 45,000 $ 55,000 $ 160,000
Total $ 89,000 $ 97,000 $ 103,000 $ 108,000 $ 397,000
&A &F

Exp19_Excel_Ch09_ML2_Lewiston.xlsx
Lewiston
Lewiston Location
Category 1st Quarter 2nd Quarter 3rd Quarter 4th Quarter Total
Dine-In $ 12,000 $ 10,000 $ 8,000 $ 6,000 $ 36,000
Pick-up $ 27,000 $ 26,000 $ 26,000 $ 26,000 $ 105,000
Delivery $ 25,000 $ 34,000 $ 46,000 $ 60,000 $ 165,000
Total $ 64,000 $ 70,000 $ 80,000 $ 92,000 $ 306,000
&A &F

Exp19_Excel_Ch09_ML2_Augusta.xlsx
Augusta
Augusta Location
Category 1st Quarter 2nd Quarter 3rd Quarter 4th Quarter Total
Dine-In $ 40,000 $ 34,000 $ 29,000 $ 22,000 $ 125,000
Pick-up $ 62,000 $ 63,000 $ 62,000 $ 63,000 $ 250,000
Delivery $ 22,000 $ 26,000 $ 35,000 $ 42,000 $ 125,000
Total $ 124,000 $ 123,000 $ 126,000 $ 127,000 $ 500,000
&A &F

Exp19_Excel_Ch09_ML2_Pizza_final_result.jpg

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Discussion 13

Adjust your audio

This is a narrated slide show. Please adjust your audio so you can hear the lecture.

If you have problems hearing the narration on any slide show please let me know.

 

1

© 2016 John Wiley & Sons, Inc.

Chapter 12 Knowledge Management, Business Intelligence, and Analytics

2

 

Opening Case: Netflix

What gave Netflix assurance that House of Cards would be a success?

What gives Netflix a competitive advantage?

© 2016 John Wiley & Sons, Inc.

3

Data from 33 million people provided strong evidence that the British version was very popular and Kevin Spacey was also a popular actor

Again, data from millions of users, showing what they watch, when they pause, when they rewind, etc. Patterns emerge that speak volumes about preferences. Their analytics algorithms provide better data than focus groups (and in real time).

3

More Real World Examples

Caesar’s and Capital One both collect and analyze customer data.

Result: They can determine who are the most profitable customers and then follow up with them.

Caesar’s: frequent gamblers

Capital One: charge a lot and pay off slowly

They provide products that would appeal to the profitable customers.

© 2016 John Wiley & Sons, Inc.

4

 

4

A Real World Example from Sports

Oakland As and Boston Red Sox baseball teams

Crunched the numbers on the potential players, such as on-base percentage

Others who did not do the analysis failed to recognize the talent

© 2016 John Wiley & Sons, Inc.

5

 

5

Five Ways Data Analytics can Help an Organization (McKinsey and Co.)

Making data more transparent and usable more quickly

Exposing variability and boosting performance

Tailoring products and services

Improving decision-making

Improving products

© 2016 John Wiley & Sons, Inc.

6

Terminology

Knowledge management: The processes needed to generate, capture, codify and transfer knowledge across the organization to achieve competitive advantage

Business intelligence: The set of technologies and processes that use data to understand and analyze business performance

Business analytics: The use of quantitative and predictive models, algorithms, and evidence-based management to drive decisions

© 2016 John Wiley & Sons, Inc.

7

Data, Information, and Knowledge (reprise)

© 2016 John Wiley & Sons, Inc.

8

8

 

The Value of Managing Knowledge

Value Sources of Value
Sharing best practices Avoid reinventing the wheel Build on valuable work and expertise
Sustainable competitive advantage Shorten innovation life cycle Promote long term results and returns
Managing overload Filter data to find relevant knowledge Organize and store for easy retrieval
Rapid change Build on/customize previous work for agility Streamline and build dynamic processes Quick response to changes
Embedded knowledge from products Smart products can gather information Blur distinction between manufacturing/service Add value to products
Globalization Decrease cycle times by sharing knowledge globally Manage global competitive pressures Adapt to local conditions
Insurance for downsizing Protect against loss of knowledge when departures occur Provide portability for workers who change roles Reduce time to acquire knowledge

© 2016 John Wiley & Sons, Inc.

9

Dimensions of Knowledge

 

 

Explicit

Teachable

Articulable

Observable in use

Scripted

Simple

Documented

Tacit

Not teachable

Not articulable

Not observable

Rich

Complex

Undocumented

Examples:

Estimating work

Deciding best action

Examples:

Explicit steps

Procedure manuals

© 2016 John Wiley & Sons, Inc.

10

10

 

Four Modes of Knowledge Conversion (and examples)

 

Transferring by mentoring, apprenticeship

 

Transferring by models, metaphors

 

Learning by doing; studying manuals

 

Obtaining and following manuals

© 2016 John Wiley & Sons, Inc.

11

Knowledge Management – Four Processes

Generate – discover “new” knowledge

Capture – scan, organize, and package it

Codify – represent it for easy access and transfer (even as simple as using hash tags to create a folksonomy)

Transfer – transmit it from one person to another to absorb it

© 2016 John Wiley & Sons, Inc.

12

12

 

Measures of KM Project Success

Example of specific benefits of a KM project:

Enhanced effectiveness

Revenue generated from extant knowledge assets

Increased value of extant products and services

Increased organizational adaptability

More efficient re-use of knowledge assets

Reduced costs

Reduced cycle time

© 2016 John Wiley & Sons, Inc.

13

13

 

Components of Business Analytics

Component Definition Example
Data Sources Data streams and repositories Data warehouses; weather data
Software Tools Applications and processes for statistical analysis, forecasting, predictive modeling, and optimization Data mining process; forecasting software package
Data-Driven Environment Organizational environment that creates and sustains the use of analytics tools Reward system that encourages the use of the analytics tools; willingness to test or experiment
Skilled Workforce Workforce that has the training, experience, and capability to use the analytics tools Data scientists, chief data officers, chief analytics officers, analysts, etc. Netflix, Caesars and Capital One have these skills

© 2016 John Wiley & Sons, Inc.

14

 

14

Data Sources for Analytics

Structured (customers, weather patterns) or unstructured (Tweets, YouTube videos)

Internal or external

Data warehouses full of a variety of information

Real-time information such as stock market prices

 

© 2016 John Wiley & Sons, Inc.

15

Data Mining

Combing through massive amounts of customer data, usually focused on:

Buying patterns/habits (for cross-selling)

Preferences (to help identify new products/ features/enhancements to products)

Unusual purchases (spotting theft)

It also identifies previously unknown relationships among data.

Complex statistics can uncover clusters on many dimensions not known previously

(e.g., People who like movie x also like movie y)

© 2016 John Wiley & Sons, Inc.

16

Four Categories of Data Mining Tools

Statistical analysis: Answers questions such as “Why is this happening?”

Forecasting/Extrapolation: Answers questions such as “What if these trends continue?”

Predictive modeling: Answers questions such as “What will happen next?”

Optimization: Answers questions such as “What is the best that can happen?”

 

© 2016 John Wiley & Sons, Inc.

17

How to be Successful

Achieve a data driven culture

Develop skills for data mining

Use a Chief Analytics Officer (CAO) or Chief Data Officer (CDO)

Shoot for high maturity level (see next slide)

© 2016 John Wiley & Sons, Inc.

18

Level Description Source of Business Value
1 – Reporting What happened? Reduce costs of summarizing, printing
2 – Analyzing Why did it happen? Understanding root causes
3 – Describing What is happening now Real-time understanding & corrective action
4 – Predicting What will happen? Can take best action
5 – Prescribing How should we respond? Dynamic correction

Five Maturity Levels of Analytical Capabilities

© 2016 John Wiley & Sons, Inc.

19

BI and Competitive Advantage

There is a very large amount of data in databases.

Big data: techniques and technologies that make it economical to deal with very large datasets at the extreme end of the scale: e.g., 1021 data items

Large datasets can uncover potential trends and causal issues

Specialized computers and tools are needed to mine the data.

Big data emerged because of the rich, unstructured data streams that are created by social IT.

 

© 2016 John Wiley & Sons, Inc.

20

Practical Example

Asthma outbreaks can be predicted by U. of Arizona researchers with 70% accuracy

They examine tweets and Google searches for words and phrases like

“wheezing” “sneezing” “inhaler” “can’t breathe”

Relatively rare words (1% of tweets) but 15,000/day

They examine the context of the words:

“It was so romantic I couldn’t catch my breath” vs

“After a run I couldn’t catch my breath”

Helps hospitals make work scheduling decisions

© 2016 John Wiley & Sons, Inc.

21

Sentiment Analysis

Can analyze tweets and Facebook likes for

Real-time customer reactions to products

Spotting trends in reactions

Useful for politicians, advertisers, software versions, sales opportunities

 

 

© 2016 John Wiley & Sons, Inc.

22

Google Analytics and Salesforce.com

Listening to the community: Identifying and monitoring all conversations in the social Web on a particular topic or brand.

Learning who is in the community: Identifying demographics such as age, gender, location, and other trends to foster closer relationships.

Engaging people in the community: Communicating directly with customers on social platforms such as Facebook, YouTube, LinkedIn, and Twitter using a single app.

Tracking what is being said: Measuring and tracking demographics, conversations, sentiment, status, and customer voice using a dashboard and other reporting tools.

Building an audience: Using algorithms to analyze data from internal and external sources to understand customer attributes, behaviors, and profiles, then to find new similar customers

© 2016 John Wiley & Sons, Inc.

23

Google Analytics

Web site testing and optimizing: Understanding traffic to Web sites and optimizing a site’s content and design for increasing traffic.

Search optimization: Understanding how Google sees an organization’s Web site, how other sites link to it, and how specific search queries drive traffic to it.

Search term interest and insights: Understanding interests in particular search terms globally, as well as regionally, top searches for similar terms, and popularity over time.

Advertising support and management: Identifying the best ways to spend advertising resources for online media.

© 2016 John Wiley & Sons, Inc.

24

Internet of Things (IoT)

Much big data comes from IoT

Sensor data in products can allow the products to:

Call for service (elevators, heart monitors)

Parallel park, identify location/speed (cars)

Alert you to the age of food (refrigerator)

Waters the lawn when soil is dry (sprinklers)

Self-driving cars find best route (Google)

© 2016 John Wiley & Sons, Inc.

25

Intellectual Capital vs Intellectual Property

Intellectual Capital: the process for managing knowledge

Intellectual Property: the outputs; the desired product for the process

Intellectual Property rights differ remarkably by country

© 2016 John Wiley & Sons, Inc.

26

Closing Caveats

These are emerging concepts and disciplines

Sometimes knowledge should remain hidden (tacit) for protection

We should remain focused on future events, not just look over the past

A supportive culture is needed in a firm to enable effective KM and BI

 

© 2016 John Wiley & Sons, Inc.

27

Summary

After you have listened to this lecture and read Chapter 12 of your text

Go to Discussion Board 13 and answer the discussion prompt

Finally complete Quiz 12

 

28

© 2016 John Wiley & Sons, Inc.

 

28

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

3-F Method

Analysis on the Demand of Top Talent Introduction in Big Data and Cloud Computing Field in China

Based on 3-F Method Zhao Linjia, Huang Yuanxi, Wang Yinqiu, Liu Jia

National Academy of Innovation Strategy, China Association for Science and Technology, Beijing, P.R.China

Abstract—Big data and cloud computing, which can help China to implement innovation-driven development strategy and promote industrial transformation and upgrading, is a new and emerging industrial field in China. Educated, productive and healthy workforces are necessary factor to develop big data and cloud computing industry, especially top talents are essential. Therefore, a three-step method named 3-F has been introduced to help describing the distribution of top talents globally and making decision whether they are needed in China. The 3-F method relies on calculating the brain gain index to analysis the top talent introduction demand of a country. Firstly, Focus on the high-frequency keywords of a specific field by retrieving the highly cited papers. Secondly, using those keywords to Find out the top talents of this specific field in the Web of Science. Finally, Figure out the brain gain index to estimate whether a country need to introduce top talents of a specific field abroad. The result showed that the brain gain index value of China’s big data and cloud computing field was 2.61, which means China need to introduce top talents abroad. Besides P. R. China, those top talents mainly distributed in the United States, the United Kingdom, Germany, Netherlands and France.

I. INTRODUCTION Big data and cloud computing is a new and emerging

industrial field[1], and increasing widely used in China[2-4]. Talents’ experience is a source of technological mastery[5], essentially for developing and using big data technologies. Most European states consider the immigration of foreign workers as an important factor to decelerate the decline of national workforces[6]. Lots of universities and research institutes have set up undergraduate and/or postgraduate courses on data analytics for cultivating talents[7]. EMC corporation think that vision, talent, and technology are necessary elements to providing solutions to big data management and analysis, insuring the big data success[8].

Bibliometrics research has appeared as early as 1917[9], and has been proved an effective method for assessing or identifying talents. Based on analyses of publication volume, journals and their impact factors, most cited articles and authors, preferred methods, and represented countries, Gallardo-Gallardo et. al[10] assess whether talent management should be approached as an embryonic, growth, or mature phenomenon.

In this paper, we intend to analysis whether China need to introduce top talents in the field of big data and cloud computing by using bibliometrics. In section 2, the 3-F method

for top talent introduction demand analysis will be discussed. In section 3, we will analysis the demand of top talent introduction in big data and cloud computing field in China.

II. METHOD In general, metering indicators contain the most productive

authors, journals, institutions, and countries, and the collaboration networks between authors and institutions[11, 12]. Based on the commonly used bibliometrics method, 3-F method for top talent introduction demand analysis is proposed. 3-F method has three steps:

Firstly, searching the literature database and forming a high-impact literature collection in a specific field. Focusing on the high-frequency keywords in the high-impact literature collection by using the text analysis method as the research hotspots. Just to be clear, the high-impact literature refers to the journal literature whose number of cited papers ranked in the top 1% in the same discipline and in the same year.

Secondly, retrieving those keywords in the Web of Science to find out where those top talents of this specific field are. Find the top talents by collected the information about talents’ country distribution, the institutions distribution and so on through the high-impact literature collection. Among them, the top talent refers to the first author or the communication author of the high-impact literatures.

Finlly, Figure out the brain gain index to determine the top talents introduction demand of a certain country. The brain gain index is calculated as following formulas:

Iik = (Twk / Tik) / (Pw / Pi) (1) Among them, Iik means the brain gain index value of

country (i) in the field (k), Twk means the number of world’s top talents in the field (k), Tik means the number of country’s (i) top talents in the field (k), Pw means the world population, Pi means the country’s (i) population. If Iik was more than 1, that means the country (i) has less top talents in the field (k), therefore the talent introduction demand will be relatively strong. In contrast, if Iik was less than 1, that means the country’s (i) has greater top talents in the field (k) than the world average, and the talent introduction demand will not be so strong.

Additionally, the literature information mainly from the ISI Web of Science (SCI, CPCI-S), and the the data analysis and visualization tools are TDA and Tableau.

2017 Proceedings of PICMET ’17: Technology Management for Interconnected World

978-1-890843-36-6 ©2017 PICMET

 

 

III. CASE STUDY

Using 3-F method to analysis the top talents introduction demand in the big data and cloud computing field. We collected the high-impact literatures from January 1, 2006 to July 31, 2016. The literature Language was English and the literature type was article. Combining with the above conditions, we got 546 high-impact literatures in the big data and cloud computing field. Then the high-frequency keywords have been obtained (Table 1) and served as the research hotspots set.

TABLE I. THE RESEARCH HOTSPOTS OF THE HIGH-IMPACT LITERATURES IN BIG DATA AND CLOUD COMPUTING FIELD

Order Keywords Frequency

1 cloud computing 48

2 big data 24

3 virtualization 11

4 cloud manufacturing 9

5 internet of things (IoT) 8

6 mobile cloud computing 8

7 bioinformatics 6

8 climate change 6

9 Hadoop 6

10 software-defined networking (SDN) 6

……

 

At the same time, we displayed the frequency distribution of research hotspots in the way of cloud chart(fig. 1).

Fig. 1. The cloud chart of research hotspots that in the field of big data and

cloud computing

Then, we find the information about nationality (Table 2), institutes (Table 3) of top talents in the high-impact literature collection. Results showed there were 662 top talents worldwide in the big data and cloud computing field. The top ten countries or regions who had the most top talents were the United States, P.R.China, the United Kindom, Germany, the Netherlands, France, Canada, Australia, Italy and Switzerland and Spain tied for the tenth.

TABLE II. THE NATIONALITY DISTRIBUTION OF TOP TALENTS IN THE BIG DATA AND CLOUD COMPUTING FIELD

Order Country or Region Number of the top talent 1 US 268 2 P. R. China 48 3 UK 47 4 Germany 39 5 Netherlands 28 6 France 27 7 Canada 22 8 Australia 21 9 Italy 19 10 Switzerland 13 Spain 13 12 Japan 10 13 Korea 8 Malaysia 8 15 Singapore 7 New Zealand 7 17 Austria 6 18 Belgium 5 Sweden 5 India 5 Chinese Taipei 5 ……

TABLE III. THE INSTITUTES DISTRIBUTION OF TOP TALENTS IN THE BIG DATA AND CLOUD COMPUTING FIELD

Order Country or Region Number of the top talent

1 Harvard University (US) 10

2 Purdue University (US) 7

University of Malaya (Malaysia) 7

University of Maryland (US) 7

Unversity of Melbourne (Australia) 7

University of Missouri (US) 7

7 Oxford Unversity (UK) 6

8 Chinese Academy of Sciences (P.R.China) 5

ETH Zurich (Switzerland) 5

Massachusetts General Hospital (US) 5

Northwestern University (US) 5

University of British Columbia (Canada) 5

UC, Berkeley (US) 5

UC, San Diego (US) 5

University of Texas at Austin (US) 5

University of Washington (US) 5

……

 

2017 Proceedings of PICMET ’17: Technology Management for Interconnected World

 

 

From table 2 and 3 we can see that China was in the second place worldwide. However, China’s top talent is much less than the United States. In addition, the overall strength of Chinese research institutions is not strong. So, whether China should introduce top talents from other countries is need to be discussed.

According to the formula of the brain gain index, and using the world population data as well as the Chinese mainland population data released by the World Bank, the value of the Chinese brain gain index of big data and cloud computing was 2.61. In comparison, the brain gain index value of the United States was 0.11. That means China need to introduce top talent in the field of big data and cloud computing.

IV. CONCLUSION

In the knowledge economy era, the international flow of top talent has become convenient and frequent. Facing the world’s top talent shortage, China and the world’s major countries have developed overseas top talent introduction programs. Until 2007, almost all European countries had introduced some skillselective migration policies in order to attract the top talents. To make the overseas top talent introduction programs more effective and targeted is helpful for occupying the strategic high ground in the global top talent competition.

This paper improved the traditional talent evaluation function of bibliometric method, and presented the 3-F analysis method, which was applied to analyze the demand of top talents. The 3F method could help the government official to make decision whether need to introduce top talents to develop a new industry field and lock these top talents geographic location.

REFERENCES [1] .Xu, B.M., X.G. Ni. Development Trend and Key Technical Progress of

Cloud Computing[J]. Bulletin of the Chinese Academy of Sciences, 2015. 30(2), pp. 170-180.

[2] Xiao, Y., Y. Cheng, Y.J. Fang, Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow, in Iaeds15: International Conference in Applied Engineering and Management, P. Ren, Y. Li, and H. Song, Editors. 2015, Aidic Servizi Srl: Milano. pp. 325-330.

[3] Zhu, Y.Q., P. Luo, Y.Y. Huo et. al, Study on Impact and Reform of Big Data on Higher Education in China, in 2015 3rd International Conference on Social Science and Humanity, G. Lee and Y. Wu, Editors. 2015, Information Engineering Research Inst, USA: Newark. p. 155-161.

[4] Wang, X., L.C. Song, G.F. Wang et.al. Operational Climate Prediction in the Era of Big Data in China: Reviews and Prospects[J]. Journal of Meteorological Research, 2016. 30(3), pp. 444-456.

[5] Dahlman, C., L. Westphal, Technological effort in industrial development——An Interpretative Survey of Recent Research[R]. 1982.

[6] Cerna, L., M. Czaika, European Policies to Attract Talent: The Crisis and Highly Skilled Migration Policy Changes, in High-Skill Migration and Recession. 2016, Springer. pp. 22-43.

[7] Jin, X., B.W. Wah, X. Cheng et. al. Significance and challenges of big data research[J]. Big Data Research, 2015. 2(2), pp. 59-64.

[8] Fang, H., Z. Zhang, C.J. Wang et. al. A survey of big data research[J]. IEEE Network, 2015. 29(5), pp. 6-9.

[9] Cole, F.J., Eales, N. B. The history of comparative anatomy[J]. science Progress, 1917. 11, pp. 578-596.

[10] Gallardo-Gallardo, E., S. Nijs, N. Dries et. al. Towards an understanding of talent management as a phenomenon-driven field using bibliometric and content analysis[J]. Human Resource Management Review, 2015. 25, pp. 264-279.

[11] Clarke, B.L. Multiple authorship trends in scientific papers[J]. Science, 1964. 143(3608), pp. 822-824.

[12] Gonzalez-Valiente, C.L., J. Pacheco-Mendoza, R. Arencibia-Jorge. A review of altmetrics as an emerging discipline for research evaluation[J]. Learned Publishing, 2016. 29(4), pp. 229-238.

 

2017 Proceedings of PICMET ’17: Technology Management for Interconnected World

 

<< /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles false /AutoRotatePages /None /Binding /Left /CalGrayProfile (Gray Gamma 2.2) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated \050SWOP\051 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Warning /CompatibilityLevel 1.7 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJobTicket false /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.0000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails false /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams true /MaxSubsetPct 100 /Optimize true /OPM 0 /ParseDSCComments false /ParseDSCCommentsForDocInfo false /PreserveCopyPage true /PreserveDICMYKValues true /PreserveEPSInfo false /PreserveFlatness true /PreserveHalftoneInfo true /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts true /TransferFunctionInfo /Remove /UCRandBGInfo /Preserve /UsePrologue false /ColorSettingsFile () /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages true /ColorImageMinResolution 200 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages true /ColorImageDownsampleType /Bicubic /ColorImageResolution 300 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages false /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /ColorImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasGrayImages false /CropGrayImages true /GrayImageMinResolution 200 /GrayImageMinResolutionPolicy /OK /DownsampleGrayImages true /GrayImageDownsampleType /Bicubic /GrayImageResolution 300 /GrayImageDepth -1 /GrayImageMinDownsampleDepth 2 /GrayImageDownsampleThreshold 1.50000 /EncodeGrayImages true /GrayImageFilter /DCTEncode /AutoFilterGrayImages false /GrayImageAutoFilterStrategy /JPEG /GrayACSImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /GrayImageDict << /QFactor 0.76 /HSamples [2 1 1 2] /VSamples [2 1 1 2] >> /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 15 >> /AntiAliasMonoImages false /CropMonoImages true /MonoImageMinResolution 400 /MonoImageMinResolutionPolicy /OK /DownsampleMonoImages true /MonoImageDownsampleType /Bicubic /MonoImageResolution 600 /MonoImageDepth -1 /MonoImageDownsampleThreshold 1.50000 /EncodeMonoImages true /MonoImageFilter /CCITTFaxEncode /MonoImageDict << /K -1 >> /AllowPSXObjects false /CheckCompliance [ /None ] /PDFX1aCheck false /PDFX3Check false /PDFXCompliantPDFOnly false /PDFXNoTrimBoxError true /PDFXTrimBoxToMediaBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXSetBleedBoxToMediaBox true /PDFXBleedBoxToTrimBoxOffset [ 0.00000 0.00000 0.00000 0.00000 ] /PDFXOutputIntentProfile (None) /PDFXOutputConditionIdentifier () /PDFXOutputCondition () /PDFXRegistryName () /PDFXTrapped /False /CreateJDFFile false /Description << /CHS <FEFF4f7f75288fd94e9b8bbe5b9a521b5efa7684002000410064006f006200650020005000440046002065876863900275284e8e55464e1a65876863768467e5770b548c62535370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c676562535f00521b5efa768400200050004400460020658768633002> /CHT <FEFF4f7f752890194e9b8a2d7f6e5efa7acb7684002000410064006f006200650020005000440046002065874ef69069752865bc666e901a554652d965874ef6768467e5770b548c52175370300260a853ef4ee54f7f75280020004100630072006f0062006100740020548c002000410064006f00620065002000520065006100640065007200200035002e003000204ee553ca66f49ad87248672c4f86958b555f5df25efa7acb76840020005000440046002065874ef63002> /DAN <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> /DEU <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> /ESP <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> /FRA <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> /ITA (Utilizzare queste impostazioni per creare documenti Adobe PDF adatti per visualizzare e stampare documenti aziendali in modo affidabile. I documenti PDF creati possono essere aperti con Acrobat e Adobe Reader 5.0 e versioni successive.) /JPN <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> /KOR <FEFFc7740020c124c815c7440020c0acc6a9d558c5ec0020be44c988b2c8c2a40020bb38c11cb97c0020c548c815c801c73cb85c0020bcf4ace00020c778c1c4d558b2940020b3700020ac00c7a50020c801d569d55c002000410064006f0062006500200050004400460020bb38c11cb97c0020c791c131d569b2c8b2e4002e0020c774b807ac8c0020c791c131b41c00200050004400460020bb38c11cb2940020004100630072006f0062006100740020bc0f002000410064006f00620065002000520065006100640065007200200035002e00300020c774c0c1c5d0c11c0020c5f40020c2180020c788c2b5b2c8b2e4002e> /NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken waarmee zakelijke documenten betrouwbaar kunnen worden weergegeven en afgedrukt. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5.0 en hoger.) /NOR <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> /PTB <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> /SUO <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> /SVE <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> /ENU (Use these settings to create PDFs that match the “Required” settings for PDF Specification 4.01) >> >> setdistillerparams << /HWResolution [600 600] /PageSize [612.000 792.000] >> setpagedevice

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exp19_Excel_Ch02_ML2_SmartPhone

Grader – Instructions Excel 2019 Project

Exp19_Excel_Ch02_ML2_SmartPhone

 

Project Description:

You have just graduated from college and before beginning your first professional job, you would like to purchase a new smartphone. You have the option to purchase the new phone in one payment or make monthly payments by taking advantage of a 36 month flex payment plan. The payment plan charges an APR of 1.75% for the service. Prior to making your payment decision, you would like to make a worksheet to calculate the monthly payment for consumer reports top three smartphones for young professionals.

 

Steps to Perform:

Step Instructions Points Possible
1 Start Excel. Download and open the file named Exp19_Excel_Ch02_Assessment_SmartPhone.xlsx. Grader has automatically added your last name to the beginning of the filename. 0
2 Rename Sheet 1 FlexPay. Hint: Double-click the sheet name tab to rename the worksheet. 4
3 Type Flex Pay Calculator in cell A1, and then merge and center the title on the first row in the range A1:C1. Apply bold, 20 pt font size, Blue, Accent 1, font color. 8
4 Merge and center the range A2:C2, type Inputs, and apply Thick Outside Borders. Note, Mac users, apply Thick Box Border. 10
5 Type APR and # of payments in the range A3:A4. 6
6 Type 1.75% in cell B3 and 36 in cell B4. Merge and center the range A6:C6, type Outputs, and apply Thick Outside Borders. 12
7 Type Model in cell A7, Price in cell B7, and Payment in cell C7. 9
8 Type iphone x in cell A8, Samsung Galaxy in cell A9, and LG V30 in cell A10. Enter the corresponding prices 949799, and 650 in the range B8:B10 and apply Currency Number Format. Resize column A as needed to display all text. 15
9 In cell C8, enter a PMT function to calculate the monthly flex payment for the first option. Be sure to use the appropriate absolute, relative, or mixed cell references. Use the fill handle to copy the function down through cell C10. Make sure each of the monthly flex payments is a positive value. 13
10 Type Highest payment, Average payment, and Lowest payment in the range A12:A14. 5
11 In cell B12, use the MAX function to calculate the highest flex payment, in cell B13, use the AVERAGE function to calculate the average flex payment, and in cell B14, use the MIN function to calculate the lowest flex payment. 12
12 Insert a footer with your name on the left side, the sheet name in the center, and the file name code on the right side of the worksheet. 6
13 Save the workbook. Close the workbook and then exit Excel. Submit the workbook as directed. 0
Total Points 100

 

Created On: 08/21/2020 1 Exp19_Excel_Ch02_ML2 – SmartPhone 1.3

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Responses

Article 1:

Question: Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications? 

 

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

 

 

Article 2:

Question: Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications? 

Web applications, or software as a service (SaaS) Web applications, has certainly revolutionized the way individuals utilize the net. Advancement as advanced and as more people have started to utilize the Internet, the net has experienced through predominant turns specially Web2.0, Web 3.0 and Internet of things. Example customer-facing applications, it has ended up exceptionally troublesome with recently presented security threats. Such applications can effortlessly enter through the conventional security measures taken and enable the programmers to break classified data.

How web 2.0 change securities for internet:

Web 2.0 capabilities serve 2 main purposes 1) to reach the public straightforward manner referred to as social media and 2) to improve the business process. They are progressively utilized by companies for superior staff collaboration and communication. Web 2.0 innovation offers numerous preferences in terms of enhancing the Web and making strides the client involvement, they are too bringing a number of security concerns and assault vectors into presence. Since one characteristic for a web2.0 application is to emerge more noteworthy client association, the presentational the person or client to security threats and vulnerabilities increases.

The following are few security issues of Web 2.0 Environment. They are:

Insufficient Authentication Controls:

In numerous Web 2.0 applications, content is confined within the hands of numerous different clients, not only a select number of affirmed clients. That implies there’s a more noticeable possibility that a less-experienced client will roll out an improvement that will adversely influence the general framework.

Cross Site Scripting (XSS):

In a stored cross-site scripting (XSS) vulnerability, malevolent info sent by a hacker is put away in the framework at that point, then showed to different users. Frameworks that enable clients to include arranged substance – like HTML for instance – are particularly defenseless to this assault

Phishing:

In spite of the fact that phishing isn’t only a hazard related with Web 2.0 applications using any and all means, the huge number of unique client programming being used makes it harder for users to recognize the honest to goodness and the phony sites. That empowers more viable phishing assaults.

Information Leakage and Integrity:

Data Integrity is one of the key components of information security. In spite of the fact that a hack could prompt loss of respectability, so can unexpected falsehood. An incredible case of this in the general population field is a mixed up alter on Wikipedia which is then acknowledged as truth by a considerable lot of the site’s guests. In a business domain, having frameworks open to numerous clients permits a vindictive or mixed up client or clients to post and distribute incorrect data which crushes the respectability of the information.

Despite many security issues, I would use Web2.0 because Web 2.0 is a people-oriented technology. Convenience, social highlights, joint effort, quick stacking applications, intelligence, snappy advancement times and continuous updates are on the whole real patterns. Rather than a million highlights stuffed into one costly programming program, you get littler, sleeker online applications that mean to do only a couple of things extremely well.

 

 

 

 

Article 3:

Question:

1.  Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

 

While developing a new product its uniqueness should be different from others so that it can survive in the competitive world. Its features must be different and understandable so that it can be preferred by everyone easily. Further these features must provide benefits which can attract more customers by using strategies in marketing. This way we can increase sales and also profits. Based on the benefits only customers prefer your product so they must be easy to use, safe and affordable. Further purpose of the product must be easily understood by consumers. Based on products features we can find potential customers. For example say when painting your building you may chose to paint professionals or laborer to paint. But each one’s work is different to each other. While describing your product to customers, say about its benefits and qualities which will make them interest in the product. For example if the product is about athletic gear focus on durability, comfort and design of the product. We can share the social responsibility by creating the product eco friendly and attract more customers.

Social media sites are better platform for interacting with customers. It also helps in building brand among customers daily. By answering their questions and sharing, will helps in building product image and forms loyal group of customers. It has also drawbacks like problem related to customer service may change violent on facebook and twitter and this causes trolls to harass employee and consumers because of inappropriate posts on website. So organizations have to resolve these conflicts sometimes (Basu, 2017).

Web marketing:  this is another strategy for advertising which involves search engine marketing, email marketing, social media marketing, and banner advertising which are done through online. Currently pay per click marketing, SEM is best and evolving quickly in business organizations for advertising.

Consumer Review Networks: with this, consumers can find any product reviews, services and information about brands etc. these reviews will add more value to products in websites. Through this reviews organizations can build up their product value.

 

 

 

 

Article 4:

Question:

1.  Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

This is a service of delivering cargo, especially small-sized goods what do not weigh much by drones. This will require the manufacture of programmed drones, which will use GPS to take route and travel from the point of order to the point of delivery. This will make the process of delivery of small packages fast and efficient, with the recipient receiving his cargo on time. Use of the drones will be more economical as it will save on time and money. No manpower will be required, where the time spent by delivery-persons can be taken, and the individuals find other things to do. Nonetheless, use of drones is a way of improving lifestyle.

Any products will be delivered using drones, especially in urban areas. Therefore, the drones can be used in transferring retail products between sellers and consumers. For instance, vendors of fast foods can be sending lunch boxes to individuals who may have ordered online, right in the places where they are. Therefore, every individual is fit to use the service so long as s/he may wish to transport items without necessarily traveling. The drones will, however, be limited to lifting the weight.

Use of drones in the delivery of cargo is much more economical and environmentally friendly as no burning of fuel is involved and thus, no release of carbon dioxide into the air. The drones use electric energy, which sometimes can be gotten from natural sources such as solar and wind. Among how this service can be marketed electronically include using advertisement though ads on websites, search engines, and phone applications (Gabbai, 2017; Zhang, 2017). The other possible way is through using a tell-a-friend-to-tell-a-friend, initiative after that the service being introduced, the first individuals to use it will recommend their friends using social media such as Facebook, Instagram, among others. The third way is through creating a commercial website and optimizing it using Google search engine, such that upon a customer looking up for such as service, it be popping up atop the list (Gabbai, 2017; Zhang, 2017). One basic disadvantage is that the drones may face obstacles, and they can travel limited ranges of distances. Use of this service will mean joblessness to delivery-person.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab #9

CS1150 Introduction to Computer Science

Lab #9 – Networking, 40 points

Objective:

To study how networks route packets to various destination hosts. Learn how networks ensure reliable delivery.

 

Instructions:

Make sure to do the Activity as outlined in the LabCH19.pdf file. The activity is actually a tutorial that will help you to solve the problems in the exercises. It is expected that you will complete the Activity before you begin the exercises.

When you are finished, save and rename the completed document as “firstname_lastname_lab9.docx”. Then, submit the saved document to Pilot.

 

 

 

 

 

 

 

 

 

 

 

 

EXERCISE 1

 

1) Start the “TCP/IP” applet.

2) Copy and paste the following text into the “Your Message” box:

 

 

Computer networking is essential in our world today.

 

 

Note that this message is exactly 52 ASCII characters long, counting spaces and the period at the end.

 

It should look like this:

 

 

 

Then, press the button “Send a message” and watch.

 

3) Count how many DAT and ACK packets were sent. (Don’t rely on the “Status” box, actually count the packets yourself.)

 

Write your answers here:

 

DEFINE DAT AND GIVE NUMBER OF DAT PACKETS:

 

DEFINE ACK AND GIVE NUMBER OF ACK PACKETS:

 

 

4) Determine the steps for calculating how many characters were sent during the entire exchange.

 

Assuming that:

· Every DAT or ACK packet has a packet header (example: DAT 1 0 221)

· Besides the packet header, every DAT packet carries AT MOST 10 characters of data.

· The last packet carried less than 10 characters of data. (52 data characters in the message, remember? 52 doesn’t divide nicely into 10)

· ACK packets have no data, just a packet header.

· Every blank space, even in a packet header, counts as a character.

· Assume that every packet header is 9 characters long

 

We calculated that exactly 171 characters were sent back and forth in total during the entire process. How did we get that number?

 

Show the mathematical steps to calculate the number 171 here, below this line.:

 

 

 

5) Calculate the overhead, expressed as a percentage. Here is the process:

· There are 52 characters of actual data in the message, including blanks and punctuation.

· Subtract the number of characters of actual data (52 characters) from the total number of characters sent in both directions in all the packets (from earlier in the lab). This gives you the number of characters sent that were not actually data, just part of the cost/overhead of sending the actual data.

· Divide the number of overhead characters by the total number of characters to calculate the overhead expressed as a percentage of the total.

 

Write the overhead percentage here, below this line:

 

 

 

 

6) Imagine you have a million-character message to send. Calculate how many packets will be needed and how many characters will be sent in total for the entire process to move the message from node 0 to node 1:

 

Write your answers here:

 

HOW MANY PACKETS TOTAL:

HOW MANY CHARACTERS TOTAL:

 

 

 

7) What would be an obvious way to decrease the overhead percentage? Why might this solution backfire? Under what conditions would that occur?

 

Write your answers here:

 

OBVIOUS WAY TO DECREASE OVERHEAD PERCENTAGE:

HOW THAT COULD BACKFIRE:

UNDER WHAT CONDITIONS:

 

 

8) What is the purpose of IP address? What is the purpose of Routers?

 

Write your answers here:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

EXERCISE 2

 

1) Start or restart the “TCP/IP” applet again. Once again, copy and paste the following text into the “Your Message” box:

 

 

Computer networking is essential in our world today.

 

 

2) This time, change the selection away from Leave packets undamaged to Delete packets that are touched.

3) Delete some data packets by clicking on them as they move along the wire, and watch the re-transmission after timeout.

 

 

 

 

 

4) What happens if you delete the re-transmitted packet? Does the TCP/IP applet need to take any special action?

 

Write what happens here, below this line:

 

 

 

Is special action needed if re-transmitted packet is deleted? Write your answer here, below this line:

 

 

 

 

5) What happens if you delete ACK or NAK packets?

 

Write your answer here, below this line:

 

 

 

 

 

 

 

 

EXERCISE 3

 

1) Start the “Network router” applet.

Select Example 3, the ring network.

 

 

2) Double-click on the node 37.61.25.46. List the nodes it is directly connected to (the nodes in its connection table).

 

Write your list of nodes here, below this line:

 

3) If 37.61.25.46 wants to send packets to a node that is not directly connected, to which node will it first send the packets? (Check the routing table by double clicking on the node.)

 

Write the address of the next node here, below this line:

 

4) Run the applet for a while, letting it generate packets continuously. Double-click on 37.61.25.46 again and look at its statistics. How many packets were sent? Received? Forwarded?

 

Write your answers here:

 

PACKETS SENT:

PACKETS RECEIVED:

PACKETS FORWARDED:

 

 

5) Which nodes are sending packets out, and to whom?

 

Write your answers here:

 

NODES THAT ARE SENDING PACKETS:

NODES THAT ARE RECEIVING PACKETS:

 

6) Click on 138.92.6.17. Write down its statistics.

PACKETS SENT:

PACKETS RECEIVED:

PACKETS FORWARDED:

 

 

 

 

 

 

EXERCISE 4

 

1) Start the “Network router” applet. Select Example 4, the star network.

2) Look at the routing and connection tables for the center node and several other nodes. Describe any pattern you can see in these tables.

 

Write your description here, below this line:

 

3) How is the connection table for the center node different from the other nodes?

 

Write your answer here, below this line:

 

4) Select Generate when I click on a node from the pull-down menu.

 

5) If you double-click on 159.121.2.13, you will see that its destination node is 126.14.5.46. Run the applet, click on 159.121.2.13, and watch the packets go. What color does the sending computer turn briefly? What color does the destination computer turn? What does it mean if a node flashes green?

 

Write your answers here:

WHAT COLOR (SENDING COMPUTER):

WHAT COLOR (DESTINATION COMPUTER):

WHAT DOES IT MEAN IF A NODE FLASHES GREEN:

 

Try it again with 8.10.20.25 to confirm.

 

 

 

6) Many early computer networks used a star topology like this example. What would happen if the center node in this type of network dies?

 

Write your answer here, below this line:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Exercise 5

 

Create a new topology using 4 nodes.

 

1) Create 4 nodes with following IP addresses

Node 1 = 130.108.7.11

Node 2 = 130.108.7.22

Node 3 = 130.108.7.33

Node 4 = 130.108.7.44

 

2) Make Node 3 as a forwarding node and connect it with all the other remaining nodes.

3) Let the sender receiver pair be as following:

Sender Receiver
Node 1 Node 2
Node 2 Node 4
Node 4 Node 1

 

 

4) Your topology should look like as given below:

5) Paste your screenshot below this line:

 

 

Rubric (40 pts possible):

Exercise   Points
1 Question 1 0
  Question 2 0
  Question 3 1
  Question 4 1
  Question 5 2
  Question 6 1
  Question 7 1
  Question 8 2
2 Question 1 0
  Question 2 1
  Question 3 1
  Question 4 3
  Question 5 3
3 Question 1 1
  Question 2 1
  Question 3 1
  Question 4 1
  Question 5 2
  Question 6 2
4 Question 1 1
  Question 2 1
  Question 3 1
  Question 4 1
  Question 5 2
  Question 6 2
5 Question 1 2
  Question 2 2
  Question 3 2
  Question 5 2
Total   40
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exp19_Excel_Ch03_Cap_Gym

Exp19_Excel_Ch03_Cap_Gym

 

#Exp19 Excel Ch03 Cap Gym

 

Project Description:

You and a business partner opened a fitness gym three years ago. Your partner oversees managing the operations of the gym, ensuring the right equipment is on hand, maintenance is conducted, and the appropriate classes are being offered with the right trainers and staff. You oversee managing the business aspects, such as marketing, finance, and general personnel issues. The business is nearing the end of its third year. You have put together the financials, and now you want to show the data more visually because you know it will make more sense to your business partner that way. You want to create charts and insert sparklines that show the trends to discuss with your partner.

 

Start   Excel. Download and open the file named Exp19_Excel_Ch03_Cap_Gym.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

You will create a pie chart to   focus on the expenses for the current year.
Insert a 2-D pie chart using the ranges A11:A19 and D11:D19 on the Income   worksheet.

 

Move the chart to a new chart   sheet named Expenses. Move it to the right of the Membership sheet.

 

The chart needs a descriptive,   easy-to-read title.
Change the chart title to Expenses for Year 3 and change the font size to 20.

 

You want to create a clustered   bar chart.
Insert a clustered bar chart using the ranges A4:D4 and A11:D19 on the Income   worksheet.

 

You want to place this chart and   other charts on a Summary worksheet to look at trends.
Move the chart as an object on the Summary worksheet. Cut the bar chart and   paste it in cell I1.

 

The chart should have a   descriptive title to explain which expenses are excluded.
Change the bar chart title to Expenses (Without Payroll and Cost of Sales).

 

You want to filter out the   Payroll and Cost of Sales to focus on other expenses. The bar chart displays   expenses the first expense (Advertising) at the bottom of the category axis.   You want to reverse the categories to display in the same sequence as the   expenses are listed in the worksheet.
Apply a chart filter to remove Payroll and Cost of Sales. Select the category   axis and use the Format Axis task pane to display categories in reverse   order. Change the Maximum Bound to 25000.
Mac Users: Apply the filter using Select Data and Switch Row/Column. Be sure   to switch the rows and columns back after filtering the data.

 

You decide to format the pie   chart with data labels and remove the legend because there are too many   categories for the legend to be effective.
Display the Expenses sheet and remove the legend. Add Percent and Category   Name data labels and choose Outside End position for the labels. Change the   data labels font size to 10.

 

You want to emphasize the   Education & Training slice by exploding it.
Explode the Education & Training slice by 12%.

 

Add the Light Gradient – Accent   2 fill color to the chart area.

 

You create another chart showing   the Balance sheet items. You change the chart to a clustered column and   switch the row and column data to focus on each balance sheet item.
Insert a stacked column chart using the ranges A4:D4, A10:D10, A15:D15, and   A16:D16 on the Balance sheet.
Change the chart type to Clustered Column and switch the rows and columns in   the chart.

 

You want to move the column   chart to be on the Summary worksheet along with the bar chart.
Move the column chart to the Summary worksheet. Cut the chart and paste it in   cell A1.

 

The column chart needs to have a   descriptive title to indicate the data comes from the Balance
sheet.
Change the title to 3-Year Balance Sheet.

 

The last chart will be a line   chart to show the trends in Memberships.
Insert a line chart using the range I3:L15 on the Membership worksheet.

 

You want to move the line chart   to be on the same Summary sheet as column and bar charts.
Move the line chart to the Summary worksheet. Cut the chart and paste it in   cell A17.

 

Because the lowest value is   between 200 and 300, you will change the vertical axis at 200 instead of 0.
Adjust the vertical axis so the Minimum Bound is 200 and display a vertical axis title # of   Memberships for   the line chart.

 

Apply Chart Style 4 and change   colors to Monochromatic Palette 8 for the line chart.

 

Move the legend to the top of   the chart and add the chart title 3-Year Membership Trends.

 

It is a best practice to add Alt   Text for each chart for accessibility compliance.
Display the pie chart and add Alt Text: The pie chart displays percentage of   expenses for Year 3. (including the period)

 

Display the column chart and add   Alt Text: The column chart displays total assets, total   liabilities, and retained earnings for three years. (including the period)

 

Display the bar chart and add   Alt Text: The bar chart displays expenses for three years without   payroll or cost of sales. (including the period)

 

Display the line chart and add   Alt Text: The line chart displays monthly trends in   memberships for three years. (including the period)

 

You want to add sparklines to   the Daily Attendance Trends. You add high points to emphasize which time of   day is the most popular for your membership.
Select range B16:F16 on the Membership worksheet. Insert Column Sparklines using   data from the range B6:F14. Display the high points for the sparklines.

 

Insert a footer with Exploring   Series on the   left, the sheet name code in the center, and the file name code on the right   on the Membership, Expenses, and Summary sheets individually. Change to   Normal view.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!