Computer Science homework help

Computer Science homework help

Basic Charts

 

The Excel file accompanying this assignment (SuperDrugsPrescriptions) contains fictitious pharmaceutical sales information. Using this data, create a Tableau worksheet to answer each of the following questions:

FILE to use: SuperDrugsPrescriptions.xlsx

 

1. Exactly recreate the following visualization of the average prescription price over time:

 

 

2. Exactly recreate the following visualization of prescription quantity vs. profit. The color of each mark denotes the region, and the shape denotes the drug supplier:

 

Use the viz you just created to answer the following in a word document:

 

· What pharmacy and drug supplier represented the highest profit mark on this viz, across all regions?

· What pharmacy and drug supplier represented the highest profit mark on this viz in the East region?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

LAB 2 Assignment Help

LAB 2 Assignment Help

1. Question #2 – Page # 88, Use data P02_03.xlsx.

The file P02_03.xlsx contains data from a survey of 399

people regarding a government environmental policy.

a. Create a crosstabs and an associated column chart for

Gender versus Opinion. Express the counts as percentages

so that for either gender, the percentages add

to 100%. Discuss your findings. Specifically, do the

two genders tend to differ in their opinions about the

environmental policy?

b. Repeat part a with Age versus Opinion.

c. Recode Salary to be categorical with categories “Less

than $40K,” “Between $40K and $70K,” “Between $70K

and $100K,” and “Greater than $100K” (where you can

treat the breakpoints however you like). Then repeat

part a with this new Salary variable versus Opinion.

2.  Question #20 – Page #96, Use data P02_56.xlsx

The file P02_56.xlsx contains monthly values of indexes

that measure the amount of energy necessary to heat or cool

buildings due to outside temperatures. (See the explanation

in the Source sheet of the file.) These are reported for each

state in the United States and also for several regions, as

listed in the Locations sheet, from 1931 to 2000.

a. For each of the Heating Degree Days and Cooling

Degree Days sheets, create a new Season variable

with values “Winter,” “Spring,” “Summer,” and “Fall.”

Winter consists of December, January, and February;

Spring consists of March, April, and May; Summer

consists of June, July, and August; and Fall consists of

September, October, and November.

b. Find the mean, median, and standard deviation

of Heating Degree Days (HDD), broken down by

Season,

for the 48 contiguous states location (code

5999). (Ignore the first and last rows for the given location,

the ones that contain -9999, the code for missing

values.)

Also, create side-by-side box plots of HDD,

broken down by season. Comment on the results. Do they go in the direction you would expect? Do the

same for Cooling Degree Days (which has no missing data).

c. Repeat part b for California (code 0499).

d. Repeat part b for the New England group of states

(code 5801).

3.  Question #30 – Page #105, Use data P03_30.xlsx

rates of various currencies versus the U.S. dollar. It is of

interest to financial analysts and economists to see whether

exchange rates move together through time. You could find

the correlations between the exchange rates themselves,

but it is often more useful with time series data to check for

correlations between differences from day to day.

a. Create a column of differences for each currency.

b. Create a table of correlations between all of the original

variables. Then on the same sheet, create a second

table of correlations between the difference variables.

On this same sheet, enter two cutoff values, one positive

such as 0.6 and one negative such as 20.5, and

use conditional formatting to color all correlations (in

both tables) above the positive cutoff green and all

correlations below the negative cutoff red. Do it so

that the 1’s on the diagonal are not colored.

c. Based on the second table and your coloring, can you

conclude that these currencies tend to move together

in the same direction? If not, what can you conclude?

dRepeat part for Ratio2.

1. Question #49 – Page #125, Use data P03_22.xlsx

The file P03_22.xlsx lists financial data on movies

released from 1980 to 2011 with budgets of at least

$20 million.

a. Create three new variables, Ratio1, Ratio2, and

Decade. Ratio1 should be US Gross divided by

Budget,

Ratio2 should be Worldwide Gross divided by

Budget, and Decade should list 1980s, 1990s, or

2000s, depending on the year of the release date.

If either US Gross or Worldwide Gross is listed as

“Unknown,” the corresponding ratio should be blank.

(Hint: For Decade, use the YEAR function to fill in a

new Year column. Then use a lookup table to populate

the Decade column.)

b. Use a pivot table to find counts of movies by various

distributors. Then go back to the data and create one

more column, Distributor New, which lists the distributor

for distributors with at least 30 movies and lists

Other for the rest. (Hint: Use a lookup table to populate

Distributor New, but also use an IF to fill in Other

where the distributor is missing.)

c. Create a pivot table and corresponding pivot chart

that shows average and standard deviation of Ratio1,

broken down by Distributor New, with Decade in the

Filters area. Comment on any

d. Repeat part for Ratio2.

1.  Question #63 – Page #129, Use data P03_63.xlsx

63. The file P03_63.xlsx contains financial data on 85

U.S. companies in the Computer and Electronic Product

Manufacturing sector (NAICS code 334) with 2009

earnings before taxes of at least $10,000. Each of these

companies listed R&D (research and development)

expenses on its income statement. Create a table of correlations

between all of the variables and use conditional

formatting to color green all correlations involving

R&D that are strongly positive or negative. (Use cutoff

values of your choice to define “strongly.”) Then create

scatterplots of R&D (Y axis) versus each of the other

most highly correlated variables. Comment on any patterns

you see in these scatterplots, including any obvious

outliers, and explain why (or if) it makes sense that

these variables are highly correlated with R&D. If there

are highly correlated variables with R&D, can you tell

which way the causality goes?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Case Study: Appliance Warehouse Services Assignment Help

Case Study: Appliance Warehouse Services Assignment Help

 

Create a 3- to 4-page document (to submit in Blackboard) that includes the following:

  • Summary: Explain your overall approach to analyzing and addressing the needs of the new Appliance Warehouse Service Department. How did you ensure you met the implementation, integration, and maintenance needs of the new Appliance Warehouse Service Department business case?
  • Work Breakdown Structure (WBS): Design a WBS for the project of planning and implementing the new Service Department. Identify each task needed in order to implement the new Services Department. Include duration times. Refer to the Week 2 Discussion.
  • System Maintenance Plan: Include measures to implement corrective, adaptive, perfective, and preventive maintenance. Include recommendation to maintain the system either using in-house resources or to outsources it. Include pros and cons of both maintenance types.
  • Security Risks: Identify and explain potential security risks for the Service Department business case. Consider physical, network,application, file, user, and procedural types of security risks. Include the backup system method to be used.

 

Our system administrator was asking me about the security for SIM. You and I have not discussed this topic in depth. We need to do a risk assessment and look at all types of security issues: physical, network, application, file, user, and procedural.

Make a list of the security risks for all six security levels. We need to make sure that we don’t leave our new system vulnerable to attacks.

Also, what is the backup method to be used for SIM? Please explain why you’ve chosen this method.

 

As you well know, maintenance on any system is essential to fix mistakes, add enhancements, or maintain security. I was wondering what you were thinking for SIM’s ongoing maintenance plan. We are hoping that this system will last for the next 5 years. We will have to assume responsibility for maintenance if we build this system in-house. Do you think we should hire enough IT staff to maintain this system in-house or should we outsource it?

To help the company think this decision through, please make two lists for pros and cons of in-house maintenance vs. outsourced maintenance. Could you get this to me today?

 

Now that we have isolated the necessary features for an in-house built system, we need figure out if it will be economically feasible to build this software. Mae Roth has asked for the bottom-line numbers for this project. Not only do we need to tell her how much the system will cost to build, but she wants to know what the total cost of ownership would be if we use this system for the next 5 years. You will need give her the numbers in net present value. Since our IT team is unionized, their contract states that they will get a $3/hour raise each year for the next 5 years.

Assume that we will need 2 servers initially for this project. Also assume that we will have to replace these servers every two years.

In the spreadsheet that you create, show the initial build cost and the cost for years 2-5 of maintenance. Finally, give the NPV for the entire project.

After the cost feasibility is complete, Mae will finally decide between the pre-packaged software and an in-house build. Thanks for all your incredible work on this project!

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Linux Implementation Proposal: Client Response Memo Assignment Help

Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

(12.3.2: Describe the implementation of controls.)

  • How will security be implemented in the Linux systems—both workstations and servers?

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

(12.4.1: Document how IT controls are monitored.)

  • The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

(2.3.2: Incorporate relevant evidence to support the position.)

  • Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

(10.1.3: Define the specifications of the required technologies.)

  • How does software installation work on Linux? Can we use existing Windows software?
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Network 206 Test homework help

Network 206 Test homework help

Question 1.1. (TCO 1) What additional information is contained in the 12-bit extended system ID of a BPDU? (Points : 6)

VLAN ID Host address MAC address Port ID

Question 2.2. (TCO 1) EIGRP is a _____. (Points : 6)

link-state routing protocol proprietary routing protocol protocol that works well in smaller networks statistical routing protocol

Question 3.3. (TCO 1) _____ is enabled by default. (Points : 6)

STP EtherChannel PortFast VLAN 100

Question 4.4. (TCO 2) How would you describe an EtherChannel implementation? (Points : 6)

EtherChannel supports between two to 10 separate links. It increases the chance of a spanning-tree loop. A trunked port can be part of an EtherChannel bundle. EtherChannel operates only at layer 2.

Question 5.5. (TCO 2) You have configured EtherChannel . Which command will display the group used? (Points : 6)

show interface port-channel3 show etherchannel summary show etherchannel port-channel show interface g0/1 etherchannel

Question 6.6. (TCO 2) The configuration of which other protocol can affect or cause problems with the EtherChannel configuration? (Points : 6)

LACP DTP STP DTP and STP

Question 7.7. (TCO 3) _____ is a global organization that certifies the interoperability of 802.11 products from different vendors. (Points : 6)

FCC IEEE ITU-R Wi-Fi Alliance

Question 8.8. (TCO 3) A(n) _____ is used in enterprise deployments to manage groups of lightweight access points (Points : 6)

access point RADIUS authentication server WLAN controller Wireless switch

Question 9.9. (TCO 3) Which technology is used to increase the available bandwidth for the wireless network? (Points : 6)

MIMO Mixed mode OFDM WPS

Question 10.10. (TCO 4) Which OSPF state is reached when the network has converged? (Points : 6)

Converge Exchange Full Two-Way

Question 11.11. (TCO 4) _____ is a link-state routing protocol. (Points : 6)

EIGRP OSPF RIPv2 RSTP

Question 12.12. (TCO 4) Why would OSPF routing protocol authentication be enabled on a network? (Points : 6)

To activate IPsec for IPv6 To share routing information with neighbors in a secure manner To block unauthorized access to the router To activate LACP

Question 1.1. (TCO 4) How might one describe OSPF type 5 LSAs? (Points : 6)

They are used to update routes between OSPF areas. They are called autonomous system external LSA entries. They are called router link entries. They are used where there is an elected DR in multi-access networks.

Question 2.2. (TCO 4) How might one describe OSPF type 3 LSAs? (Points : 6)

They are used to update routes between OSPF areas. They are called autonomous system external LSA entries. They are called router link entries. They are used where there is an elected DR in multi-access networks.

Question 3.3. (TCO 5) EIGRP _____ packets have a need for specific information. (Points : 6)

Hello Query Update Reply

Question 4.4. (TCO 5) The EIGRP hello packets are sent using the _____ protocol? (Points : 6)

TCP reliable RTP UDP unreliable RTP

Question 5.5. (TCO 5) What is a benefit of EIGRP? (Points : 6)

It is an open standard. Automatic route summarization of all routes Quickly adapts to alternate routes for rapid convergence It does not use loopback addresses.

Question 6.6. (TCO 5) A network engineer issues the maximum-paths command to configure load balancing in EIGRP. Which CLI mode is he in? (Points : 6)

Privileged mode Global configuration mode Router configuration mode Interface configuration mode

Question 7.7. (TCO 5) The quad zero static default route _____. (Points : 6)

is not used with EIGRP should be configured on the router facing the ISP is distributed for IPv6 with the redistribute IPv6 static command is represented as 0.0.0.0 255.255.0.0

Question 8.8. (TCO 5) _____ is also called the bit bucket. (Points : 6)

Loopback Link-Local Null0 interface EIGRP process link

Question 9.9. (TCO 6) On Cisco routers, where is the IOS stored? (Points : 6)

Flash memory NVRAM ROM tftp server

Question 10.10. (TCO 6) What is the tftp server used for? (Points : 6)

It allows for management of the router from a remote location. It is required for VPN connectivity for workers who must travel. It is used as a backup location for the IOS. It holds the IOS license agreement.

1. (TCO 1) Name the characteristics which would more likely be considered in purchasing an access layer switch, as compared to buying switches that operate at the other layers of the Cisco hierarchical design model. (Points : 14)

 

Question 2.2. (TCO 2) What is a benefit of using the channel-group 2 mode passive interface configuration command? (Points : 14)

 

Question 3.3. (TCO 3) Describe in detail the WiGig standard, in your own words. (Points : 14)

 

Question 4.4. (TCO 4) What is the criteria for selecting the OSPF router ID that uniquely identifies a router in an OSPF domain? Explain the process of selecting the router ID. (Points : 14)

 

1. (TCO 4) In your own words, list and describe the four steps to implementing multi-area OSPF. (Points : 14)

 

Question 2.2. (TCO 5) What are the three default EIGEP ADs with the source of route. List them in the order of preferred administrative distance with the best AD first. (Points : 14)

 

Question 3.3. (TCO 5) Write all the necessary commands to support MD5 authentication of the CHG_Secure keychain with a key string of Pep$R5. You must also include the IOS command prompts in front of the commands. Assume that you are already in global config mode. Rtr1(config) # (Points : 14)

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Agriculture Insurance Conference Assignment

Agriculture Insurance Conference Assignment

Vaccination Schedule

Think of vaccines as a coat of armor for your child. To keep it shiny and strong, you have to make sure your child’s immunizations are up to date. Timely vaccinations help to prevent disease and keep your family and the community healthy. Some immunizations are given in a single shot, while others require a series of shots over a period of time.

Vaccines for children and teenagers are listed alphabetically below with their routinely recommended ages. Missed doses will be assessed by your child’s physician and given if necessary. Keep a personal record of all immunizations and bring it with you to each office visit.

Name of Vaccine When It’s Recommended Total Doses

Inactivated poliovirus (IPV) At 2, 4, 6 months, and 4-6 years 4

Chickenpox (varicella) At 12 months and 4-6 years 2

Tetanus and diphtheria (Td) At 11-12 years 1

Diphtheria, tetanus, and pertussis (DTaP) At 2, 4, 6 and 12-15 months, and 4-6 years 5

Hepatitis A (HepA) At 12 and 18 months 3

Human papillomavirus (HPV) 3-dose series for girls at age 11-12 years 3

Pneumococcal conjugate (PCV) At 2, 4, 6, and 12 months 4

Live intranasal influenza Annually starting at age 2 years Annually

Inactivated influenza (flu shot) Annually starting at age 6 months Annually

Measles, mumps, and rubella (MMR) At 12 months and 4-6 years 2

Pneumococcal polysaccharide (PPSV) At 2, 4, 6, and 12 months 4

Haemophilus influenzae type b (Hib) At 2, 4, 6, and 12 months 4

Rotavirus (RV) At 2, 4, and 6 months 3

 

These recommendations are for generally healthy children and teenagers and are for information only. If your child has ongoing health problems, special health needs or risks, or if certain conditions run in your family, talk with your child’s physician. He or she may recommend additional vaccinations or schedules based on earlier immunizations and special health needs.

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Data Analytics Assignment

Data Analytics Assignment

3/18/2020 Solved: A local beer producer sells two types of beer, a regula… | Chegg.com

https://www.chegg.com/homework-help/business-analytics-5th-edition-chapter-4-problem-8p-solution-9781285965529?trackid=f19d957256bc&stracki… 1/4

home / study / math / statistics and probability / statistics and probability solutions manuals / business analytics / 5th edition / chapter 4 / problem 8p

Business Analytics (5th Edition) See this solution in the app

Problem

A local beer producer sells two types of beer, a regular brand and a light brand with 30% fewer calories. The company’s marketing department wants to verify that its traditional approach of appealing to local whitecollar workers with light beer commercials and appealing to local blue- collar workers with regular beer commercials is indeed a good strategy. A randomly selected group of 400 local workers are questioned about their beer-drinking preferences, and the data in the file P04_08.xlsx are obtained.

a. If a blue-collar worker is chosen at random from this group, what is the probability that he/she prefers light beer (to regular beer or no beer at all)?

b. If a white-collar worker is chosen at random from this group, what is the probability that he/she prefers light beer (to regular beer or no beer at all)?

c. If you restrict your attention to workers who like to drink beer, what is the probability that a randomly selected blue-collar worker prefers to drink light beer?

d. If you restrict your attention to workers who like to drink beer, what is the probability that a randomly selected white-collar worker prefers to drink light beer?

e. Does the company’s marketing strategy appear to be appropriate? Explain why or why not.

Step-by-step solution

The data for survey of local workers with regard to beer-drinking preferences is given below.

Comment

Here ‘W’ denotes white-collar workers and ‘B’ denotes blue-collar worker in ‘Type’ column. In ‘Preference’ column, ‘L’ denotes those workers who prefer to drink light beer, ‘R’ denotes those workers who prefer to drink regular beer and ‘N’ denotes those workers who prefer not to drink beer.

Comment

Step 1 of 8

Step 2 of 8

My Textbook Solutions

Business Analytics 5th Edition

Business Analytics 5th Edition

Business Analytics:… 5th Edition

View all solutions

Post a question Answers from our experts for your tough homework questions

Enter question

Continue to post 20 questions remaining

Statistics Chegg tutors who can help right now

Ashish Indian Institute of F… 185

Varun Université de Genève 59

Fabio Scuola Normale Su… 38

Find me a tutor

1 Bookmark Show all steps:Chapter 4, Problem 8P ON

  Textbook Solutions Expert Q&A Study Pack Practice NEW!

Search 

 

 

3/18/2020 Solved: A local beer producer sells two types of beer, a regula… | Chegg.com

https://www.chegg.com/homework-help/business-analytics-5th-edition-chapter-4-problem-8p-solution-9781285965529?trackid=f19d957256bc&stracki… 2/4

A pivot table has been created to show the counts of worker type for different drinking preferences of workers where the total number of workers surveyed is 400. The screenshot of the pivot table is given below.

Comment

a. From the pivot table given above the number of blue collar workers that prefer light beer is 111 and the total number of blue collar workers is 250. So the probability E of a randomly chosen blue collar worker that prefers light beer is given by,

Comment

b. From the pivot table given above the number of white collar workers that prefer light beer is 79 and the total number of white collar workers is 150. So the probability F of a randomly chosen white collar worker that prefers light beer is given by,

Comment

c. From the pivot table given above the number of blue collar workers that prefer light beer is 111 and the number of worker that drink beer is 371. So the probability G of a randomly chosen beer drinking worker being a blue collar worker that prefers light beer is given by,

Step 3 of 8

Step 4 of 8

Step 5 of 8

Step 6 of 8

1 Bookmark Show all steps:Chapter 4, Problem 8P ON

  Textbook Solutions Expert Q&A Study Pack Practice NEW!

Search 

 

 

3/18/2020 Solved: A local beer producer sells two types of beer, a regula… | Chegg.com

https://www.chegg.com/homework-help/business-analytics-5th-edition-chapter-4-problem-8p-solution-9781285965529?trackid=f19d957256bc&stracki… 3/4

Recommended solutions for you in Chapter 4

Was this solution helpful?

Comments (3)

d. From the pivot table given above the number of white collar workers that prefer light beer is 79 and the number of worker that drink beer is 371. So the probability H of a randomly chosen beer drinking worker being a white collar worker that prefers light beer is given by,

Comments (2)

e. The company’s marketing strategy to target blue collar workers who drink regular beer and white collar worker who drink light beer is most appropriate, since these two type of workers comprise the largest segment in their two respective subgroups.

Comment

Step 7 of 8

Step 8 of 8

10 0

Chapter 4, Problem 28P

Consider the probability distribution of the weekly demand for copier paper (in hundreds of reams) used in a corporation’s duplicating center, as shown in the file P04_27.xlsx. a. Use simulation to generate 500 values of this random…

See solution

Chapter 4, Problem 3P

The publisher of a popular financial periodical has decided to undertake a campaign in an effort to attract new subscribers. Market research analysts in this company believe that there is a 1 in 4 chance that the increase in the number of new…

See solution

ABOUT CHEGG

LEGAL & POLICIES

CHEGG PRODUCTS AND SERVICES

CHEGG NETWORK

CUSTOMER SERVICE

1 Bookmark Show all steps:Chapter 4, Problem 8P ON

  Textbook Solutions Expert Q&A Study Pack Practice NEW!

Search 

 

 

3/18/2020 Solved: A local beer producer sells two types of beer, a regula… | Chegg.com

https://www.chegg.com/homework-help/business-analytics-5th-edition-chapter-4-problem-8p-solution-9781285965529?trackid=f19d957256bc&stracki… 4/4

 

© 2003-2020 Chegg Inc. All rights reserved. 1 Bookmark Show all steps:Chapter 4, Problem 8P ON

  Textbook Solutions Expert Q&A Study Pack Practice NEW!

Search 

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exp19_Word_Ch03_HOEAssessment_Radio Assignment

Exp19_Word_Ch03_HOEAssessment_Radio Assignment

Exp19_Word_Ch03_HOEAssessment_Radio

 

Project Description:

You work with the Radio Advertisers Federation to promote the use of radio advertising. In this document, you provide a summary of research related to the weekly reach of various media sources, including tables describing the reach as well as the weekly hours most households spend with those sources. The summary will be distributed to various local advertisers as part of a mail merge process.

 

Start   Word. Download and open the file named Exp19_Word_Ch03_HOEAssessment_Radio.docx. Grader has automatically added   your last name to the beginning of the filename.

 

Ensure that Ruler is shown and   that nonprinting characters are displayed. Move to the last page of the   document and type the following, beginning in the first cell of the blank row   at the bottom of the table:
24 RA Tablet 78.1

 

Move to the second blank   paragraph following the table. Draw a table approximately 6 inches wide and 3   1/2 inches tall. Draw one vertical grid line at approximately 3 inches from   the left to create two columns. Draw 5 horizontal grid lines to divide the   table into 6 approximately evenly spaced rows of about 1/2 inch each. Rows do   not have to be precisely spaced as you will distribute them later.

 

Erase the vertical gridline in the first row, so that the row includes only   one column. Ensure the insertion point is located in the first row and type Table 2 –   Weekly Hours (Average Watch or Listen Time). (Ensure that a space precedes   and follows the hyphen and do not type the period.) Press TAB and complete   the table as follows (do not press TAB at the end of the last entry):
Radio 25.7
TV 21.5
Smartphone 18.3
PC 10.7
Tablet 7.7

 

Select Table 2 and change the   font size of all text to 12 pt. Apply bold formatting to the first row in   Table 2. Delete the Category column in the first table. Insert a row above   the first row in Table 1 and type Table 1 – Weekly Reach of Media. (Ensure that a space precedes   and follows the hyphen and do not type the period.)

 

In Table 1, insert a row between   Hub and Insight. Type the following in the new row, ensuring that the new   entry is in Times New Roman, 12 pt.
Nielsen Smartphone  142.3

 

In Table 2, insert a blank row   above row 2. Type Source in the first cell of the new row and type Hours in the second cell. Apply bold   formatting to both cells. Select Table 2, ensure that the Table Tools Layout   tab is selected, and click Distribute Rows.

 

Select cells in the first column   of Table 1, from row 2 through the end of the table. Ensure that you do not   include text from row 1. Split the cells, making sure to deselect Merge cells before split. Type Source in cell 2 of row 2 in Table 1.   Complete the remaining cells in the second column as follows. (Type only   those shown in column 2 of the list below.)
PPM  30
Hub 87
Neilsen 82
Insight 26
RA 12

 

Insert a row below the last row   in Table 1. In the third column of the new row, type Total. Apply bold formatting to the   word Total and apply Align Center   Right alignment. In the next cell on the same row, enter a formula to sum all   cells in the column above. You do not need to select a number format.

 

Sort the rows containing media   sources in Table 1 (rows 3-7) by Column 3 in ascending order so that the   media sources are shown in alphabetical order. Do not include the heading   rows or the total row in the sort.

 

Insert a column to the right of   the last column in Table 1 and type Percentage of Total in the second row of the new   column. In the third row of the last column, type a formula that divides the   Households Reached value in the cell to the left by the Total in the last row   and then multiplies by 100 to convert the result to a percentage. The formula   is =d3/d8*100. Select a number format of   0.00%.

 

Include a formula in each cell   in the Percentage of Total column except for the last cell (on the Total   row), adjusting cell references in each formula to reflect the current row.   Apply Align Center alignment to all numeric entries in the last two columns.

 

Merge all cells in the first row   of Table 1 and ensure that the text is centered. Change the number of   households reached by TV to 197.5. Update the field in the last row of that column (the total) and   also update all fields in the last column to reflect that change.

 

At the first blank paragraph at   the beginning of the second page, insert text from Radio_Statistics.docx. In Table 1, apply a style of Grid Table 4   – Accent 3 (row 4, column 4 under Grid Tables). Deselect First Column in the   Table Style Options group to remove bold formatting from the first column.   Bold all cells in row 2 and apply Align Center alignment.

 

Center both tables horizontally   on the page. Select Table 2. Select a border style of Double solid lines, ½   pt, Accent 3 (row 3, column 4). Apply the border style to all borders.

 

Select row 1 of Table 2 and   apply a custom shading color of Red – 137, Green – 121, and Blue – 139.   Change the font color of all text in row 1 to White, Background 1 and ensure   that it is bold. Shade all remaining rows, including those on page 3, in Light   Gray, Background 2. Change the Pen Color to Black, Text 1, and drag the   border dividing row 1 from row 2 in Table 2.

 

Select the first two rows of   Table 2 and repeat the header rows so that they display at the top of the   table section that is currently shown on page 3. Include a caption below   Table 1 with the text Table 1: Household   Reach of Media Sources. (Do not type the period and ensure that a space follows the   colon.) Include a caption below Table 2 with the text Table 2: Average Weekly Hours. (Do not type the period and   ensure that a space follows the colon.) Modify the Caption style to include   center alignment with bold, italicized text.

 

Move to the end of the document   and press ENTER. Insert text from Ratings_Sources.docx.   Select all text from Ratings Source   to http://www.rainc.com. Whether   you select the paragraph mark following the URL is irrelevant; however, do   not select the blank paragraph on the following line. Convert the selected   text to a table, accepting all default settings. Apply a table style of Grid,   Table 4 (row 4, column 1 under Grid Tables) and add a caption below the new   table as Table 3: Major   Ratings Sources.   (Do not type a period.)

 

Begin a mail merge procedure,   selecting the Access database Source   Ratings.accdb as a recipient list. Note Mac users, select the text file Source Ratings.txt as a recipient   list.
Edit the recipient list to add the following record and respond affirmatively   when asked to update the recipient list:
Source ID  Company Guild Member
B9111 Insight False

 

Filter the recipient list to   select only those with a value of False in the Guild Member column. Replace [Company Name] in the last body paragraph on page 2 with the   merge field of Company. Be sure to   include the brackets in the text to be replaced.

 

Preview results and then finish   the merge, editing individual documents and merging all. Press CTRL+A to   select all of the merged document and copy the selection. Display Exp19_Word_Ch03_HOEAssessment_Radio,   move the insertion point to the end of the document (after the last caption)   and insert a page break. Paste all copied text, resulting in a 7-page   document

 

Save and close Exp19_Word_Ch03_HOEAssessment_Radio.docx. Close all other open documents without   saving. Submit   Exp19_Word_Ch03_HOEAssessment_Radio.docx as directed.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Create A Step-By-Step IT Security Policy For Handling User Accounts/Rights For A Student Who Is Leaving Prematurely

Computer Science homework help

Computer Security Fundamentals

by Chuck Easttom

 

Chapter 10 Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Chapter 10 Objectives

  • Recognize the importance of security policies
  • Understand the various policies and the rationale for them
  • Know what elements go into good policies
  • Create policies for network administration
  • Evaluate and improve existing policies

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Explain what cyber terrorism is and how it has been used in some actual cases.

Understand the basics of information warfare.

Have a working knowledge of some plausible cyber terrorism scenarios.

Have an appreciation for the dangers posed by cyber terrorism.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Introduction

  • Technology by itself cannot solve all network security problems.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Cyber terrorism, according to the definition of the FBI:

Premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

Typically, loss of life in a cyber attack would be less than in a bombing attack.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Introduction (cont.)

  • Virus software won’t prevent a user from manually opening an attachment and releasing a virus.
  • A technologically secured network is still vulnerable if former employees (perhaps some unhappy with the company) still have working passwords. Or if passwords are simply put on Post-it notes on computer monitors.
  • A server is not secure if it is in a room that nearly everyone in the company has access to.
  • Your network is not secure if end users are vulnerable to social engineering.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

What Is a Policy?

  • A security policy is a document that defines how an organization deals with some aspect of security. There can be policies regarding end-user behavior, IT response to incidents, or policies for specific issues and incidents.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Defining User Policies

  • Passwords
  • Internet use
  • E-mail attachments
  • Installing/uninstalling software
  • Instant messaging
  • Desktop configuration

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

System Admin Policies

  • New Employees
  • Departing Employees
  • Change Control
  • Access Control

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Other Issues

  • Bring Your Own Device
  • A major concern in the modern network
  • New Employees
  • Departing Employees

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Bring your own device (BYOD) has become a significant issue for most organizations. Most, if not all, of your employees will have their own smart phones, tablets, smart watches, and Fitbits that they will carry with them into the workplace. When they connect to your wireless network, this introduces a host of new security concerns. You have no idea what networks that device previously connected to, what software was installed on them, or what data might be exfiltrated by these personal devices.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Change Management

  • RFC
  • CAB
  • Follow-up

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Software Development Policies

  • Security standards
  • Testing

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Incident Response Policies

  • Handling viruses
  • Dealing with breaches

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Data Classification

  • Public
  • Secure

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

BCP and DRP

  • DRP
  • BCP
  • BIA

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Fault Tolerance

  • Backups
  • Full: All changes
  • Differential: All changes since last full backup
  • Incremental: All changes since last backup of any type
  • RAID

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Relevant Laws & Regulations

  • HIPAA
  • Sarbanes-Oxley
  • PCI

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

Summary

  • In this chapter, you learned the technology is not enough to ensure a secure network. You must have clear and specific policies detailing procedures on your network. Those policies must cover employee computer resource use, new employees, outgoing employees, access rights, how to respond to an emergency, and even how secure code in applications and websites is.
  • User policies must cover all aspects of how the user is expected to use company technology. In some cases, such as instant messaging and web use, policies may be difficult to enforce, but that does not change that they must still be in place. If your user policies fail to cover a particular area of technology use, then you will have difficulty taking any action against any employee who performs that particular misuse.

© 2016 Pearson, Inc. Chapter 10 Computer Security Policies

*

 

*

 

*

Explain what cyber terrorism is and how it has been used in some actual cases.

Understand the basics of information warfare.

Have a working knowledge of some plausible cyber terrorism scenarios.

Have an appreciation for the dangers posed by cyber terrorism.

*

Cyber terrorism, according to the definition of the FBI:

Premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents.

Typically, loss of life in a cyber attack would be less than in a bombing attack.

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

*

Bring your own device (BYOD) has become a significant issue for most organizations. Most, if not all, of your employees will have their own smart phones, tablets, smart watches, and Fitbits that they will carry with them into the workplace. When they connect to your wireless network, this introduces a host of new security concerns. You have no idea what networks that device previously connected to, what software was installed on them, or what data might be exfiltrated by these personal devices.

*

 

*

 

*

All these could lead to significant deaths: train wrecks, hospital deaths, loss of air traffic control resulting in plane crashes, and so forth.

*

 

*

 

*

 

*

 

*

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Non-Deterministic Finite Automata

1. Construct an nfa that accepts all integer numbers in C. Explain why your construct is an nfa.

2. Prove in detail the claim made in the previous section that if in a transition graph there is a walk

labeled w, there must be some walk labeled w of length no more than Λ + (1 + Λ) |w|.

3. Find a dfa that accepts the language defined by the nfa in Figure 2.8.

4. Convert the nfa in Exercise 13, Section 2.2, into an equivalent dfa.

 

 

5. Convert the nfa defined by

δ(q0,a)δ(q1,b)δ(q2,a)==={q0,q1}{q1,q2}{q2}δ(q0,a)={q0,q1}δ(q1,b)={q1,q2}δ(q2,a)={q2}

with initial state q0 and final state q2 into an equivalent dfa.

6. Is it true that for every nfa M = (Q, Σ, δ, q0, F), the complement of L (M) is equal to the set {w ∈ Σ* : δ*

(q0, w) ∩ (Q − F) ≠ ∅}? If so, prove it; if not, give a counterexample.

7. Prove that for every nfa with an arbitrary number of final states there is an equivalent nfa with only one final state. Can we make a similar claim for dfa’s?

8. Consider the dfa with initial state q0, final state q2 and δ(q0,a)=q2δ(q1,a)=q2δ(q2,a)=q3δ(q3,a)=q3δ(q0,b)=q2δ(q1,b)=q2δ(q2,b)=q3δ(q3,b)=q1δ(q0,a)=q2δ(q0,b)=q2δ (q1,a)=q2δ(q1,b)=q2δ(q2,a)=q3δ(q2,b)=q3δ(q3,a)=q3δ(q3,b)=q1 Find a minimal equivalent dfa.

9. Minimize the number of states in the dfa in Figure 2.16.

 

THEOREM 2.2 Let L be the language accepted by a nondeterministic finite accepter MN = (QN, Σ, δN, q0, FN). Then there exists a deterministic finite accepter MD = (QD, Σ, δD, {q0}, FD) such that L = L (MD).

10. Use the construction of Theorem 2.2 to convert the nfa in Figure 2.10 to a dfa. Can you see a simpler answer more directly?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!