Challenge Yourself 3.3

A Skills Approach: Excel 2016 Chapter 3: Using Formulas and Functions

1 | Page Challenge Yourself 3.3 Last Updated 3/19/18

Challenge Yourself 3.3 In this project you will complete a vehicle shopping workbook to compare the purchase of several vehicles. After completing the project, you can make a copy of the file and use it to compare vehicle purchases you are considering for yourself. Be sure to save your work often!

Skills needed to complete this project: • Naming Ranges of Cells

• Calculating Averages

• Finding Data Using the VLOOKUP Function

• Working with Named Ranges

• Using the Function Arguments Dialog to Enter Functions

• Using the Logical Function IF

• Calculating Loan Payments Using the PMT Function

• Creating Formulas Referencing Data from Other Worksheets

• Displaying and Printing Formulas

• Finding Errors Using Trace Precedents and Trace Dependents

• Finding Minimum and Maximum Values

• Using Formula AutoComplete to Enter Functions

• Updating Named Ranges with the Name Manager

• Editing and Deleting Names with the Name Manager

• Checking Formulas for Errors

1. Open the start file EX2016-ChallengeYourself-3-3. The file will be renamed automatically to include your

name. Change the project file name if directed to do so by your instructor, and save it.

2. If the workbook opens in Protected View, click the Enable Editing button in the Message Bar at the

top of the workbook so you can modify it.

3. The registration fee information in cells B11:C17 on the Data sheet will be used in lookup formulas later in

this project. Name the range RegistrationFees to make it easier to use later.

4. Return to the Purchase worksheet.

5. Calculate the average MPG for each vehicle.

a. Enter a formula in cell C10 using the AVERAGE function to calculate the average value of C8:C9.

Use only one argument.

b. Copy the formula to the appropriate cells for the other vehicles.

c. Excel will detect a possible error with these formulas. Use the SmartTag to ignore the error. Hint: Use

the SmartTag while cells C10:F10 are selected and the error will be ignored for all the selected cells.

6. Calculate the registration fee for each vehicle.

a. Enter a formula in cell C13 to look up the registration fee for the first vehicle. Use the vehicle type in

cell C4 as the Lookup_value argument. Use the RegistrationFees named range as the Table_array

argument. The registration fees are located in column 2 of the data table. Require an exact match.

b. Copy the formula to the appropriate cells for the other vehicles.

Step 1

Download start file

 

 

A Skills Approach: Excel 2016 Chapter 3: Using Formulas and Functions

2 | Page Challenge Yourself 3.3 Last Updated 3/19/18

7. Determine whether or not you will need a loan for each potential purchase.

a. In cell C15, enter a formula using an IF function to determine if you need a loan. Your available cash is

located on the Data sheet in cell A3. If the price of the car is less than or equal to your available cash,

display “no”. If the price of the car is more than your available, cash, display “yes”. Use absolute

references where appropriate—you will be copying this formula across the row.

b. Copy the formula to the appropriate cells for the other vehicles.

8. Calculate how much you would need to borrow for each purchase.

a. In cell C16, enter a formula to calculate the price of the vehicle minus your available cash (from cell A3

in the Data worksheet). Use absolute references where appropriate—you will be copying this formula

across the row.

b. Copy the formula to the appropriate cells for the other vehicles.

9. Calculate the monthly payment amount for each loan.

a. In cell C20, enter a formula using the PMT function to calculate the monthly loan payment for the

first vehicle.

• Hint: Divide the interest rate by 12 in the Rate argument to reflect monthly payments.

• Hint: Multiply the number of years by 12 in the Nper argument to reflect the number of monthly

payments during the life of the loan.

• Hint: Use a negative value for the loan amount in the Pv argument so the payment amount is expressed

as a positive number.

b. Copy the formula to the appropriate cells for the other vehicles.

10. Compute the monthly cost of gas.

a. In cell C21, enter a formula to calculate the number of miles you expect to drive each month. Divide

the value of number of miles (cell A5 from the Data sheet) by the average MPG for the vehicle

multiplied by the price of a gallon of gas (cell A6 from the Data sheet).

b. Copy the formula to the appropriate cells for the other vehicles.

c. If cells D21:F21 display an error or a value of 0, display formulas and check for errors.

d. If you still can’t find the error, try displaying the precedent arrows.

e. Hint: The references to the cells on the Data sheet should use absolute references. If they do not, the

formula will update incorrectly when you copy it across the row.

11. Compute the monthly cost of maintenance.

a. In cell C22, enter a formula to calculate the monthly maintenance cost: Divide cell C12 by 12.

b. Copy the formula to the appropriate cells for the other vehicles.

12. Compute the monthly cost of insurance.

a. In cell C23, enter a formula to calculate the monthly insurance cost: Divide cell C14 by12.

b. Copy the formula to the appropriate cells for the other vehicles.

 

 

A Skills Approach: Excel 2016 Chapter 3: Using Formulas and Functions

3 | Page Challenge Yourself 3.3 Last Updated 3/19/18

13. In cells C24:F24, compute the total the monthly cost for each vehicle.

14. Determine which vehicles are affordable.

a. In cell C26, enter a formula using the IF function to display “yes” if the total monthly cost (cell C24)

is less than or equal to the total monthly amount available for vehicle expenses (Data sheet, cell A4).

Display “no” if the total monthly cost is not less than or equal to the total monthly amount available.

b. Copy the formula to the appropriate cells for the other vehicles.

c. Display formulas and use the error checking skills learned in this lesson to track down and fix

any errors.

15. Complete the Analysis section using formulas with statistical functions. Use named ranges instead of cell

references in the formulas. Calculate the average, highest, and lowest values for each of the following:

a. Price

b. MPG City

c. MPG Highway

d. Average MPG

e. Maintenance/Year

f. Registration Fee

g. Insurance/Year

h. Amount to Borrow

i. APR

j. Years

k. Loan Payment

l. Gas

m. Maintenance/Month

n. Insurance/Month

o. Total Monthly

Hints:

• Select cells B7:F24 and use Excel’s Create from Selection command to create named ranges for each

row using the labels at the left side of the range as the names.

• Open the Name Manager and review the names Excel created. Notice that any spaces or special

characters in the label names are converted to _ characters in the names.

• To avoid typos as you create each formula, try using Formula AutoComplete to select the correct

range name.

16. Before finishing the project, check the worksheet for errors.

17. Save and close the workbook.

18. Upload and save your project file.

19. Submit project for grading.

Step 2

Upload & Save

Step 3 Grade my Project

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

CIS 110 LAB ASSIGNMENT DETAILS AT THE ATTACHED…

Week 1 Lab Assignment 1: Install Visual Logic

Click the link above to submit your assignment.

Complete lab 1 using Visual Logic in which you:

1. Submit a word document with a screenshot showing successful installation of Visual Logic.

1. Write a short answer (four to five [4-5] sentences) in the comment text box located with the assignment submission link to the following:

. A summary of the technical experiences that you used in completing this lab.

. The commands that were of greatest benefit to you.

. Your general comments on the overall lab experience.

 

 

Week 2 Lab Assignment 2 Submission

Click the link above to submit your assignment.

Complete labs 2-5 using Visual Logic in which you:

1. Submit the .vls file you create in Visual Logic as well as a screenshot of the output. For full credit, the program must function correctly, produce the correct answer, and be logically succinct.

2. Write a short answer (four to five [4-5] sentences) in the comment text box located with the assignment submission link to the following:

1. A summary of the technical experiences that you used in completing this lab.

2. The commands that were of greatest benefit to you.

3. Your general comments on the overall lab experience.

 

 

Week 4 Lab Assignment 3 Submission

Click the link above to submit your assignment.

Complete labs 2-5 using Visual Logic in which you:

1. Submit the .vls file you create in Visual Logic as well as a screenshot of the output. For full credit, the program must function correctly, produce the correct answer, and be logically succinct.

2. Write a short answer (four to five [4-5] sentences) in the comment text box located with the assignment submission link to the following:

1. A summary of the technical experiences that you used in completing this lab.

2. The commands that were of greatest benefit to you.

3. Your general comments on the overall lab experience.

 

Week 7 Lab Assignment 4 Submission

Click the link above to submit your assignment.

Complete labs 2-5 using Visual Logic in which you:

1. Submit the .vls file you create in Visual Logic as well as a screenshot of the output. For full credit, the program must function correctly, produce the correct answer, and be logically succinct.

2. Write a short answer (four to five [4-5] sentences) in the comment text box located with the assignment submission link to the following:

1. A summary of the technical experiences that you used in completing this lab.

2. The commands that were of greatest benefit to you.

3. Your general comments on the overall lab experience.

 

 

 

Week 8 Lab Assignment 5 Submission

Click the link above to submit your assignment.

 

Complete labs 2-5 using Visual Logic in which you:

1. Submit the .vls file you create in Visual Logic as well as a screenshot of the output. For full credit, the program must function correctly, produce the correct answer, and be logically succinct.

2. Write a short answer (four to five [4-5] sentences) in the comment text box located with the assignment submission link to the following:

1. A summary of the technical experiences that you used in completing this lab.

2. The commands that were of greatest benefit to you.

3. Your general comments on the overall lab experience.

 

 

 

Lab Assignment Breakdown

Week Due

Graded Lab Exercises

Points

1

Lab 1: Visual Logic Installation

10

2

Lab 2: Exercise 6 on page 35

10

4

Lab 3: Exercise 5 (Part A) on page 172

20

7

Lab 4: Chapter 9 Exercise 4 on page 421

 

Lab 5: Exercise 4 on page 468

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Data Science And Methodology Assignment (Small Assignment – I Need In 6 Hours)

See assignment details below. Please make sure answers are correct as per this link https://tdwi.org/~/media/64511A895D86457E964174EDC5C4C7B1.PDF  NO REFERENCES REQUIRED. NO MIN WORD COUNT. I have attached the below as a PDF

 

In this Assignment, you will demonstrate your understanding of the   data science methodology by applying it to a given problem. Pick one of the   following topics to apply the data science methodology to:

1. Emails

2. Hospitals

3. Credit Cards

You will have to play the role of the client as well as the data   scientist to come up with a problem that is more specific but related to   these topics.

__________________________________

Which topic did you choose to apply the data science methodology to? (2 marks)

……………………….

Next, you will play the role of the client and the data scientist.

Using the topic that you selected, complete the Business Understanding stage by coming up with a problem that you would like to solve and phrasing it in the form of a question that you will use data to answer. (3 marks)

You are required to:

1. Describe the problem, related to the topic you selected.

2. Phrase the problem as a question to be answered using data.

For example, using the food recipes use case discussed in the labs, the question that we defined was, “Can we automatically determine the cuisine of a given dish based on its ingredients?”.

…………………………

Briefly explain how you would complete each of the following stages for the problem that you described in the Business Understanding stage, so that you are ultimately able to answer the question that you came up with. (5 marks):

1. Analytic Approach

2. Data Requirements

3. Data Collection

4. Data Understanding and Preparation

5. Modeling and Evaluation

You can always refer to the labs as a reference with describing how you would complete each stage for your problem.

………………………………

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Sony BUSINESS PROBLEMS AND DECISION MAKING

 
Sony
BUSINESS PROBLEMS AND DECISION MAKING
 
 
12/6/2015

 

 

In this paper we will discuss in detail about the analysis and problem solving approach of Sony.

Umer Arif

MIS 535

Prof. Najib Kalai

 

 

TABLE OF CONTENTS

ABSTRACT   ………………………………………………            3

INTRODUCTION     ………………………………………            4

COMPANY BACKGROUND         ………………………            5

PROBLEMS FACED BY SONY     ……………………….            6-7

PROBLEM SOLVING PROCESS   ………………………            8-10

APPROACHES USED BY SONY   ………………………            10

TOOLS USED BY SONY    ………………………………            11

SOLUTIONS TAKEN BY SONY    ………………………            12-13

SWOT ANALYSIS OF PDCA         ………………………            14

CONCLUSION         ……………………………………….           15

REFERENCES          ……………………………………….           16

 

ABSTRACT

Decision making and problem solving are important skills for any business. Sony is a leading company in innovation but they gradually lost their superiority in the new competitive world of innovation and the presence of new technology to solve business problems.

In this report, we discuss the current procedures adopted to analyze and solve the problem and also the tools used by Sony to get these problems solved. We also identify the best solutions and new opportunities which helps Sony to become a leader again.

In this report, I would like to perform SWOT (Strength, Weakness, Opportunities and Threats) analysis on the existing model (Plan-Do-Check-Act Cycle- PDCA Cycle) of Sony. I will compare the existing model with other available models in the market and suggest the recommendations to the company by findings and comparative results.

Finally, I will implement the best strategy adopted by Sony to solve their problems in the future.

 

 

INTRODUCTION

 

Sony lost its magic formula from last decades. Company lost it high position in the market. By seeing continuous downfall in the sales of Sony, the management finds the solution to this problem and plans to reorganize the company “ONE SONY” to prioritize the business. But this solution didn’t help the company at all. The downfall in the sales continues and Sony lost its position in the World market day by day.

From last several months, Sony is facing an expected loss of $640 million in financial year 2011 (Jeff Blagdon, 2012) due to increase in tax charges and restructuring costs. Sony also incurs a loss of $312 million in Q1 of financial year 2012 (Daniel Copper, 2012). Sony is continuously losing money and its position in the market and don’t have any chance for its growth in recent years due to its problem solving strategies.

A reputed business magazine reports that the shares of Sony is at its lowest price in 31 years of period and incur a net loss of 456.7bn yen at the end of March, 2012 (NEWS Business, 2012). Sony’s movies, music and financial proves to be profitable in the quarter but regular loss from television, personal computers and mobile phones bring the company to its bottom line.

 

SONY COMPANY PROFILE

Sony is a Japanese multinational corporation established in 1946 and headquarter is located in Tokyo, Japan. Sony is the leading manufacturer in the field of consumer electronics such as refrigerator, television, mobile phones etc. In the list of Fortune Global 500, its rank was 87th in 2012 (CNN Money, 2012). Sony is an international company which is engaged in the development, design, manufacture and sale if various consumer electronic products (The New York Times, 2012). Sony also contact third party manufactures for information technology products. Sony’s sales team and management work hard to sales its products globally through subsidiaries, retailers, distributors and office websites. Sony is also engaged in entertainment industry including Pictures, Music. Sony is also engaged in financial services such as banking and credit financing. Sony is also engaged in network services and advertisement business.

 

PROBLEMS FACED BY SONY

Sony is facing many problems but there are two main reasons which lead to the decline in Sony. These reasons are:

Lack of Innovation

The major quality of Sony is its development of innovation. Sony has the ability to develop new products according to the consumers need. They understand the hidden needs of the consumer well and try to develop new innovative products to fulfill their needs. The development of Walkman made him leader in the field of portable music players but they didn’t continue with this product and never upgrade it to sustain its initial success (Surowiecki’s, 2011). When Apple iPad is launched in the market, they prove to be a big challenge for the innovative ideas of Sony (Business@GW, 2012). Sony is continuously losing its consumer oriented innovative ideas which directly harms the reputation of Sony (Hirai, 2012).

Lack of Core Competence

Another reason behind Sony’s fall is that Sony ignored the improvement in its core business of developing innovative ideas. They stuck into their new multiple businesses of financial services, music label, online music store, advertisement agency, movies and games. Sony is lacking behind in product positioning and branding due to lack of focuses and core competence (Byford, 2012).

Objectives

Sony identifies these two problems as the vital business problems. Once Sony lacks in innovation, it also lose core competency. With the help of problem solving and decision making skills, we can identify the root cause of the problems and find best solutions to overcome from these problems. The best solutions and theory helps Sony to gain competitive advantage over their rivals.

With the help of problems which we have studied for Sony, we will discuss how to solve critical business problems by adopting proper strategies and how to implement these overall strategies to achieve the goal. This problem solving process include theories, analysis of situations with the help of real life management problems, help us in understanding decision making skills and strategies and finally teach us how to solve real life problems in future.

Overview of the Problem Solving and Decision Making

Problem Solving and decision making are important skills for any organization to survive in today’s competitive world (Shibata, 1997). Problem Solving is a methodology in which we proceed step by step to analyze a situation and then develop and implement available solutions of the problem (Kendra, 1997). Decision making is nothing but taking right decision at every step of problem solving process (Adair, 2010). The quality of decision making supports problem solving process in order to get better results for business strategies (Greg, 2009).

  

PROBLEM SOLVING PROCESS IN SONY

Consumers need and requirements are changing everyday as electronic market is developing and reach to its new heights. Sony has to take immediate steps to reinforce its competitive advantages (Mariko, 2012). The major issue which should be resolved by Sony is to make their products more appealing to current consumers (Shunichi, 2012). With reference to business, problem solving approach begins with the analysis of problem and ends with the solution with the help of which organization gains profit (Ozasa, 2000).

Sony use a five step integrated problem solving and decision making process (Saeromi, 2012). Sony deals with this process of problem solving and decision making together to achieve the best solutions for the business problems in order to get effective and quick solutions (Yau, 2011). The table below describes all the five steps in brief and then we will discuss all the steps in detail and how Sony applies them to the problems.

 

 

Table 1: Problem Solving Process in Sony

STEP PROBLEM SOLVING STAGE DECISION MAKING
1 Identify the problem 1 Frame the decision.
2 Explore alternatives 2 Innovate to address needs and identify alternatives.
3 Select an alternative 3 Decide and commit to act.
4 Implement the solution 4 Manage consequences.
5 Evaluate the solution 4 & 1 Manage consequences and frame the related decision.

 

Step 1: Begin with a Problem and treat it as a challenge

All business has problems. Problem solving process starts with the analyses of problem and then to treat these problems as a challenge. The major problem of Sony is in the reduction of sales of products. For this, Sony is trying to collect all the information related to its products, services and market. Once the major problems are identified, Sony will consider these problems into the challenges.

Step 2: Explore Alternatives

The second step is to explore alternative solutions to the problem identified in Step 1. In this step we generate alternative solutions and then evaluate the alternatives. After Sony will generate all the alternatives for the problem then they will make criteria to prioritize the solutions. To generate alternative solutions Sony may adopt some approaches like group discussions and market surveys.

Step 3: Select an alternative

In this step, we have to select the best solution to implement. After evaluating all the alternatives, the best solution which is closest to the problem will be evaluated properly. Sony will have to make proper check to identify all the results by implementing the solution. This step is a critical step in problem solving process as one wrong decision may lead to entire failure of system.

Step 4: Implement the solution

Sony is now ready to implement the plan entirely. In this Sony will have to implement the solutions with five parts: develop a basic plan, determine objectives, identify the resources required, and build a plan and finally implement the plan.

Step 5: Evaluate the situation

The last but the major step is evaluating all the situations after implementing the process. In this we have to monitor the ongoing process with the decision making process to achieve the goal of organization.

APPROACHES USED BY SONY

CPS approach is used by Sony to adopt changes made inside the organization. Sony recognizes that its own employees have innovative ideas but the only need is to put these ideas at right place and also have to motivate them to share those ideas. In this approach, Sony develops a team of personnel to participate in the change process and share their ideas. This process brings all employees, employers and even consumers. Sony use CPS approach to encourage consumers to participate in the survey which helps in innovating new ideas rather than to rely on traditional ideas of problem solving.

The major characteristic of this approach is that it converts the problems into opportunities and help Sony in the development of their business. With the help of this approach Sony not only able to generate new innovative ideas but also gain competitive advantage over its competitors. It helps Sony to re-define the problems they are facing, change these problems into challenges with new innovative ideas and then take appropriate actions to achieve the goals.

Sony consider CPS approach as an innovator and try to resolve each and every problem to gain competitive advantage with new innovative ideas and develop new and latest products by keeping the consumer needs in mind and become a leader in its market again.

 

 

 

TOOLS USED BY SONY

PDCA Cycle (Plan-Do-Check-Act) is a four step never ending tool used by Sony for continuous improvement (Walter Shewhart, 1986). This cycle is just like a circle which is repeated again and again for continuous improvement. PDCA tool helps Sony to control and continuous improvement of products and market (Golum, 2010). PDCA cycle helps Sony to answer some major questions in problem solving and decision making process. The table below explains it.

Table 2: Objective of PDCA cycle at each stage by Sony

PLAN  
Identify the problems – what Analyze the problem and identify the future business opportunities of Sony. Set SMART (Specific, Measureable, Agreed, Realistic and Timeframe) Goals.
Analyze the problems – why Analyze the root cause of the problem so that we get best solution for the problem. We have to gather data from the personnel in this step.
Develop solutions Find more than one potential solution for the problem and also make plan to chose and implement the best solution from all the alternatives.
DO  
Implement Solutions Sony will immediately and cost effectively implements the best solution to solve the problem and collect and record the results for further improvement.
CHECK  
Evaluate and study results Sony will check all the desired results of the new solution and if Sony will found any undesirability in the solution, they will return to plan phase to find another best solution by analyzing the problem again.
ACT  
Implement the full scale solutions Sony will now fully implement the new solution with all the changes necessary to adopt this solution, provide proper training and also look for future opportunities.

 

 

SOLUTION TAKEN BY SONY AND ALTERNATIVES

Innovation Oriented Solution

Innovating new ideas and technology was the key of success for Sony which is lost from several years. In order to reinforce its capabilities in the field of innovation, Shoji Nemoto (head of innovation technology) and Tomoyuki Suzuki (image senior Vice President) take a serious lead towards it and guide individuals of Sony to develop new technologies and ideas with their great experience in the field of R&D and technical knowledge (Ellen, 2012). Sony also lead by Kunimasa Suzuki (head of products and services innovation strategy) to provide efficient technological ideas for the existing product line (Rosen, 2012). Sony is now working in order to generate new innovative ideas and also acquire next generation innovative technology. The important departments like R&D, design and marketing consumer centric to develop new ideas and technologies which helps the company to re design all the products and regain the image of the products.

Sony is now working with long term strategies and growing ever faster in the field of developing new ideas and technologies. They are now capable of developing true values to its products so that the products will be closer to the consumers and will be liked by them. The major success and growing field of Sony is its new developing business in the field of medical. They start developing printers, monitors, cameras and other useful equipments in the field of medical. Till yet its medical business line is not a separate unit but scattered at various business lines but now they decide to make a different and separate medical business group under the leadership of Executive Deputy President Hiroshi Yoshioko (Sony Annual Report, 2012).

Brand Focus and Core Competence Oriented Solutions

After studying the need of the market and consumers, Sony wants to focus on three major areas of developing digital imaging, game and mobile business. They now adopt new technologies and features to make proper research for these products and wants to make investment in these areas to move forward. Sony decided to dedicate about 70% of its total R&D budget to these three areas only (Sony Group, 2012). Sony wants to regain its brand leadership by strengthening its brand focus.

Sony is also focusing in television business for which they are reducing their operational cost. They already make cost reduction in the manufacturing of LCD panel by reducing models in the year 2012 as compared to the year 2011. Sony also wants to make reduction in fixed business costs to up to 60% and also 30% reduction in operating costs (Sony Annual Report, 2012).

The alternative solution is the restructuring of organizational structure and operational units and also has to take necessary steps about the business units which are of no use to gain efficiency and enhancement in managerial and operational efficiency (Minato-ku, 2012).

Impact of these solutions

After implementing these solutions, the business from consumer electronics rises about 70% of overall sales and 80% of operating income came from this business unit at the end of year 2014 (Sony Annual Report, 2012). Sony also target total sales of digital imaging business unit of about 1.5 trillion yen and a double digit. Sony also focuses on game business and mobile business and target sales of one trillion yen and 1.8 trillion yen respectively with a profitability of 8%.

 

 

 

 

SWOT ANALYSIS OF PDCA CYCLE USED BY SONY

Strengths

·         With the help of this approach, Sony was able to identify the problem clearly with all the possible risks, able to find best solutions and then implement the solutions for the evaluation of business changes.

·         PDCA cycle is an effective tool with the help of which Sony will able to use its resources optimally and get best results.

·         Possibility of errors is reduced to its minimal after the completion of whole PDCA cycle.

·         Sony will able to take corrective measures and can change the solution if the solution chosen by them not suited the organization fully.

·         This will also save time of Sony while solving any problem in future also.

Weakness

·         PDCA cycle is a simple method which does not reflect some activities such as leadership, training and communication and other major skills.

·         PDCA cycle works only for short term strategies and improvements instead working for long term strategies and improvements.

·         Change is implemented in the organization, individual have no right to complain for it and resist it.

Opportunities

·         The “plan” step help Sony to think and make plans for future whereas “check” step helps Sony to identify whether the solution is able to achieve the goals or not.

·         PDCA cycle is a never ending process which continuously finds errors and corrects them at early stages only.

·         PDCA cycle help Sony to optimum utilization of its resources which make problem solving and decision making process simple and faster.

·         PDCA cycle is a continuous process which helps Sony to reduce the chance of mistakes.

Threats

·         Ignores the individual in an organization.

·         A major threat of PDCA cycle is its reactive nature which is far behind from the proactive approach of new methodologies and technologies.

·         PDCA cycle is a continuous improvement process and requires continuous changes which lead Sony in a continuous state of instability.

·         PDCA cycle may lead to uncertain environment which also lead to confusing and fatigue environment among the individuals.

 

CONCLUSION

Problem solving and decision making skills are important for the success of any individual or organization. The proper implementation of solution is required to make it a success. It is not an easy task but proper use of available technologies, methodologies, models and tools to support this process will lead to produce effective solutions. Effective problem solving and decision making approach requires careful identification, analysis, evaluation and step-by-step planning. It proved to be advantage if implemented in an effective manner and also a disadvantage for the business.

 

REFERENCES

Hirai (2012) Sony Accelerates Transformation to Drive Innovation and Growth. Available at: http://www.sony.net/SonyInfo/News/Press/200911/09-133E/index.html (January 24, 2013).

 

Kendra (1997). One Greater Lesson From Steve Jobs: Innovation Begins as A Social Movement. Available at: http://www.fastcodesign.com/1665211/steve-jobsembodied-the-entrepreneurial-capitalism-we-alllove (February 13, 2013).

 

Mariko (2012). An Overview of the General Theory of Innovation. Available at: http://www.trizjournal.com/archives/2008/04/06/ (February 15, 2013).

 

Minato-Ku (2012). Classic Brand Failures: Sony Betamax. Available at: http://brandfailures.blogspot.sg/2006/10/calssic-brand-failures-sony-betamax.html (February 15, 2013).

 

NEWS Business (2012). Sony Shares Tumble to 31-Year Low Amid Record Losses. Available at: http://www.bbc.co.uk/news/business-18030939 (February 20, 2013).

 

Ozasa (2000). Mapping the Problem Solving Process.Available at: http://www.studygs.net/problem/problemsolvingo. htm (February 20, 2013).

 

Problem Solving Process in Sony (2012).Available at: http://www.sony.net/SonyInfo/News/Press/index.html (February 20, 2013).

 

Rosen (2012). Creative Problem Solving Leads to Organizational Innovation. Available at:

http://www.projectsmart.co.uk/creative-problemsolving-leads-to-organisational-innovation.html

(February 21, 2013).

 

Shewhart, W. (1986). Innovation Process. Available at:http://www.jpb.com/creative/innovationprocess.php (March 4, 2013).

 

Shibata, H. (1997) Sony Says Professional Products to Help Consumer Unit. Available at:

http://www.bloomberg.com/news/2012-04-05/sonysays-professional- products-to-help-consumerunit.html (January 24, 2013).

 

Shunichi (2012). Overview of the Problem Definition Process. Available at: http://www.processinnovation.ca/problem/problemsolve.html (February 21, 2013).

 

Sony Annual Report (2012). Available at: http://www.sony.net/SonyInfo/IR/financial/ar/2012/

index.html (February 22, 2013).

 

Sony Group (2012). Decision-Making-Solution. Available at: http://www.decision-making-solutions.com/decision_making_model.html (February 22, 2013).

 

Surowiecki’s, J. (2011). Sony R & D Mission. Available at: http://www.sony.net/SonyInfo/technology/rd/index.html (February 7, 2013).

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Answer As Per The Instructions

Answer As Per The Instructions

Petrie’s Electronics Project Closeout Report: Here are some suggested topics to cover – you can add more!
Points
Include an introduction 1
Describe Final System Acceptance Criteria 2
Resources: Were the right personnel assigned to the project? 2
What are some maintenance challenges you see for the CRM system? How can we reduce the cost for the six types of maintenance mentioned in Chapter 10? 2
What preventive maintenance tasks need to be scheduled? What other types of maintenance will be needed? How can we measure the effectiveness of maintenance? 2
Describe the process you recommend for controlling maintenance requests and configuration management. 2
Describe the most important lessons learned. 2
Include a Conclusion and Reference Page following APA formatting. 2
System Implementation and Operation SDLC Phase 4 Package
15
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Python Scripting

CIT  425/L  Fall  2020                     Lab  1

Due  to  Canvas  on  Friday  October  16th  2020  at  11:55pm  as  a  single  .pdf  including  all   typed  answers  and  screen-­shots.

This  is  an  individual  assignment!

1)   Download the following 2 files from Canvas, under Supplemental Material a.   An /etc/shadow file

•   This is a sample /etc/shadow file, formatted as below b.   100000passwords.txt

•   A password dictionary file •   One hundred thousand passwords, one password per line

Note: not every password in this /etc/shadow file is “encrypted” using the same hashing algorithm. See the /etc/shadow guide below (courtesy nixCraft)…

 

 

 

2)   Using only standard UNIX commands like crypt, and a script in the scripting language of your choice (from PERL, PHP, Python, bash, etc)….

a.   Transform the /etc/shadow file any way you like… for instance, you can turn it into multiple files, each containing nothing but one password per line, etc. This is for your convenience, for part b.

b.   Write a script that uses the password dictionary file to crack as many passwords as possible in the original /etc/shadow file. NOTE: YOU MUST WRITE AN ORIGINAL SCRIPT. YOU CANNOT USE ANY KIND OF DOWNLOADED TOOL OR UTILITY FOR THIS PART!

You will likely want to use crypt.crypt(…) in Python

•   For full credit, you must paste your script here, and then explain exactly what steps you took to execute the script and crack the passwords in the file.

•   Which passwords were you able to crack? •   How long did the entire process take?

 

 

3)   Using a tool of your choice (see those available in Kali Linux, for instance), crack the /etc/shadow file.

•   Which tool(s) did you use for this task? Paste the complete set of command lines for full credit.

•   Which passwords were you able to crack? (Were you able to crack any that you could not crack in part 2?)

•   How long did the process take?

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Lab Assignment

Lab Assignment 1:

Each lab will be submitted based on the following:

  1. Log into the Toolwire LiveLabs environment.
  2. Complete the weekly labs described below using Toolwire LiveLabs.
  3. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.
  4. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.
Toolwire LiveLabs Lab Submission Breakdown
Lab

Assignment

Week

Due

Toolwire Lab #: Title Deliverables for Submission
1 2 Lab 1 : Analyzing IP Protocols with Wireshark 1.     Lab Assessments file;

2.  Optional: Challenge Questions file, if assigned by your instructor.

 

LAB ASSIGNMENT 2:

Each lab will be submitted based on the following:

  1. Log into the Toolwire LiveLabs environment.
  2. Complete the weekly labs described below using Toolwire LiveLabs.
  3. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.
  4. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.
Toolwire LiveLabs Lab Submission Breakdown
Lab

Assignment

Week

Due

Toolwire Lab #: Title Deliverables for Submission
2 2 Lab 2: Using Wireshark and NetWitness Investigator to Analyze Wireless Traffic 1.     Lab Report file including screen captures of  the following steps: Part 1 Step 15, Part 1 Step 29, Part 2 Step 8, and Part 2 Step 10;

2.     Lab Assessments file;

3.  Optional: Challenge Questions file, if assigned by your instructor.

LAB ASSIGNMENT 3:

Each lab will be submitted based on the following:

  1. Log into the Toolwire LiveLabs environment.
  2. Complete the weekly labs described below using Toolwire LiveLabs.
  3. Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.
  4. Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.
Toolwire LiveLabs Lab Submission Breakdown
Lab

Assignment

Week

Due

Toolwire Lab #: Title Deliverables for Submission
3 2 Lab 3: Configuring a pfSense Firewall on the Client 1.     A completed pfSenseFirewallPlanning.xlsx spreadsheet;

2.     Lab Report file including screen captures of  the following steps: Part 2, Step 22;

3.     Lab Assessments file;

4.  Optional: Challenge Questions file, if assigned by your instructor.

Provide deliverables in the form of documents, files, and / or screenshots for the steps specified in each lab assignment. Some labs require the use of Microsoft Word or OpenOffice for preparing and submitting deliverables.

Answer the Lab Assessment questions for each of the individual labs completed in each week’s Lab Assignment. Note: This is an academic writing assignment. Correct punctuation, grammar, and spelling are necessary. Points will be deducted for poor writing.

Toolwire LiveLabs Lab Submission Breakdown
Lab
Assignment
Week
Due
Toolwire Lab #: Title Deliverables for Submission
1 2 Lab 1 : Analyzing IP Protocols with Wireshark 1. Lab Assessments file;
2. Optional: Challenge Questions file, if assigned by your instructor.
2 2 Lab 2: Using Wireshark and NetWitness Investigator to Analyze Wireless Traffic 1. Lab Report file including screen captures of the following steps: Part 1 Step 15, Part 1 Step 29, Part 2 Step 8, and Part 2 Step 10;
2. Lab Assessments file;
3. Optional: Challenge Questions file, if assigned by your instructor.
3 2 Lab 3: Configuring a pfSense Firewall on the Client 1. A completed pfSenseFirewallPlanning.xlsx spreadsheet;
2. Lab Report file including screen captures of the following steps: Part 2, Step 22;
3. Lab Assessments file;
4. Optional: Challenge Questions file, if assigned by your instructor.

Grading for each lab assignment will be based on the following rubric.

Points: 30 Lab Assignments
Criteria Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Complete the lab assignment.
Weight: 100%
Did not submit or incompletely completed the lab assignment. Partially completed the lab assignment. Satisfactorily completed the lab assignment. Thoroughly completed the lab assignment.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Help With Simple JAVA Code

Define a utility class for displaying values of type double. Call the class DoubleOut. Include all the methods in the class DollarFormat, all the methods from the class OutputFormat , and a method called scienceWrite that displays a value of type double using e notation, such as 2 .13e-12. (This e notation is also called scientific notation, which explains the method name.) When displayed in e notation, the number should appear with exactly one nonzero digit before the decimal point-unless the number is exactly zero. The method scienceWrite will not advance to the next line. Also add a method called scienceWriteln that is the same as scienceWrite except that it does advance to the next line. All but the last two method definitions can simply be copied from the text (or more easily from the source code for this book that is available on the Web.). Note that you will be overloading the method names write and writeln.

 

Write a driver program to test your method scienceWriteln. This driver program should use a stub for the method scienceWri te. (Note that this means you can write and test scienceWriteln before you even write scienceWrite.) Then write a driver program to test the method sci enceWri te. Finally, write a program that is a sort of super driver program that takes a double value as input and then displays it using the two writeln methods and the scienceWriteln method. Use the number 5 for the number of digits after the decimal point when you need to specify such a number. This super driver program should allow the user to repeat this testing with additional numbers of type double until the user is ready to end the program.

 

Rubric

1.     Completeness and Correctness of Code – 40 points

2.     Correct Execution – 40 points

3.     Comments – 10 points

Pseudocode – 10 points

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Write A JAVA Program

lab1/.classpath

lab1/.project

lab1 org.eclipse.jdt.core.javabuilder org.eclipse.jdt.core.javanature

lab1/.settings/org.eclipse.jdt.core.prefs

eclipse.preferences.version=1 org.eclipse.jdt.core.compiler.codegen.inlineJsrBytecode=enabled org.eclipse.jdt.core.compiler.codegen.targetPlatform=1.8 org.eclipse.jdt.core.compiler.codegen.unusedLocal=preserve org.eclipse.jdt.core.compiler.compliance=1.8 org.eclipse.jdt.core.compiler.debug.lineNumber=generate org.eclipse.jdt.core.compiler.debug.localVariable=generate org.eclipse.jdt.core.compiler.debug.sourceFile=generate org.eclipse.jdt.core.compiler.problem.assertIdentifier=error org.eclipse.jdt.core.compiler.problem.enumIdentifier=error org.eclipse.jdt.core.compiler.source=1.8

lab1/bin/lab1/Car.class

package lab1;
public synchronized class Car {
    private static final Object egn;
    Engine eng;
    Wheel whe;
    Wheel[] Window;
    public void Car();
    public boolean equals(Object);
}

lab1/bin/lab1/Engine.class

package lab1;
public synchronized class Engine {
    public void Engine();
}

lab1/bin/lab1/Vehicle.class

package lab1;
public abstract synchronized class Vehicle {
    private String vehicleName;
    public void Vehicle();
    public void AbstrtactVehicle(String);
    public String getVehicleName();
    public String toString();
}

lab1/bin/lab1/Wheel.class

package lab1;
public synchronized class Wheel {
    public void Wheel();
}

lab1/src/lab1/Car.java

lab1/src/lab1/Car.java

package  lab1 ;

public   class   Car   {
private   static   final   Object  egn  =   null ;
/*
Data fields
*/
Engine  eng ;
Wheel   whe ,
Window []  windows  =   new   Window [ 4 ];

public   boolean  equals ( Object  obj )   {
if   ( obj  ==   this )   return   true ;
if   ( obj  ==   null )   return   false ;
if   ( this . getClass ()   ==  obj . getClass ())   {
Car  other  =   ( Car )  obj ;
return  egn . equals ( other . eng )   &&  whe . equals ( other . whe );
}   else   {
return   false ;
}
}
}

lab1/src/lab1/Engine.java

lab1/src/lab1/Engine.java

package  lab1 ;

public   class   Engine   {

}

lab1/src/lab1/Vehicle.java

lab1/src/lab1/Vehicle.java

package  lab1 ;

public   abstract   class   Vehicle   {

/** The name of the vehicle */
private   String  vehicleName ;

/**
* Initializes the vehicleName.
*  @param  vehicleName the kind of vehicle
*  @return
*/
public   void   AbstrtactVehicle ( String  vehicleName )   {
this . vehicleName  =  vehicleName ;
}

/**
* Get the kind of vehicle.
*  @return  the vehicleName
*/
public   String  getVehicleName ()   {
return  vehicleName ;
}

@ Override
public   String  toString ()   {
return   "Vehicle is a "   +  vehicleName ;
}

}

lab1/src/lab1/Wheel.java

lab1/src/lab1/Wheel.java

package  lab1 ;

public   class   Wheel   {

}

lab.png

lab1.png

lab2.png

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

IT Project/ Assignment- With Turnitin Report

Scenario:

Overview: Now that you’re super knowledgeable about security, let’s put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets.

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world’s finest artisanal, hand-crafted widgets. They’ve hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

· An external website permitting users to browse and purchase widgets

· An internal intranet website for employees to use

· Secure remote access for engineering employees

· Reasonable, basic firewall rules

· Wireless coverage in the office

· Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don’t want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you’ll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization’s requirements and the following elements should be incorporated into your plan:

· Authentication system

· External website security

· Internal website security

· Remote access solution

· Firewall and basic rules recommendations

· Wireless security

· VLAN configuration recommendations

· Laptop security configuration

· Application policy recommendations

· Security and privacy policy recommendations

· Intrusion detection or prevention for systems containing customer data

 

 

 

 

**** This is an example*** I found same assignment on Chegg.com****

 

Introduction

This document describes how the functional and nonfunctional requirements recorded in the Requirements Document and the preliminary user-oriented functional design based on the design specifications.

Furthermore, it describes the design goals in accordance with the requirements, by providing a high-level overview of the system architecture, and describes the data design associated with the system, as well as the human-machine scenarios in terms of interaction and operation. The high-level system design is further decomposed into low-level detailed design specifications including hardware, software, data storage and retrieval mechanisms and external interfaces.

Purpose of the  Security Infrastructure Design Document

The Security Infrastructure Design Document helps to document and track the necessary information required to effectively define architecture and system design in order to give the guidance on the security architecture of the IT environment that is going to be established.

2. General Overview and Design Approach

2.1 General Overview

The client requires an IT infrastructure to perform their business activities that involve e-commerce applications and internal VPN access for their customers as well as employees with a high priority on the security and privacy of customer information and of the client’s as well

2.2 Assumptions/Constraints/Risks

Assumptions

It has been assumed that the employees are increased by 5% every year thereby reflecting the usage of the network bandwidth and increase of the devices that are connected to the enterprise network infrastructure.

Constraints

The following are the key considerations associated with the security of the infrastructure:

· Authentication system

· External website security

· Internal website security

· Remote access solution

· Firewall and basic rules recommendations

· Wireless security

· VLAN configuration recommendations

· Laptop security configuration

· Application policy recommendations

· Security and privacy policy recommendations

· Intrusion detection or prevention for systems containing customer data

Risks

Since the infrastructure is meant to carry out the e-commerce related transactions that may involve third party merchant authorizations and financial related issues, a strict security mechanism needs to be enforced so as to ensure that there is no such issue related in customers transactions as it may affect the reputation of the organization.

Additionally, there should be a backup mechanism to take the data backups at regular intervals to deal with any unwanted situations like system failures, attacks by intruders etc.,

2.3 Alignment with Federal Enterprise Architecture

The proposed architecture strictly complies with federal Enterprise architecture, All the protocols being used, and the hardware interfaces used compiles with the industry standards as specified so as to ensure compatibility of the networks as well as the security in compliance with CMS Enterprise Architecture (EA)

3. Design considerations

3.1 Goals:

The following are the desirable outcomes of the security infrastructure proposed to be implemented in the organization:

· An external website permitting users to browse and purchase widgets securely.

· An internal intranet website like that of a VPN for employees to use

· Secure remote access for engineering employees

· Reasonable, basic firewall rules

· Wireless coverage in the office

· Reasonably secure configurations for laptops

· Privacy of the user data

3.2 Architectural Strategies

For external website to perform purchase activity by customers:

In order to provide a secure e-commerce transaction, the following are the primary which security goals include:

· Protecting confidentiality of the data

· Making sure that unauthorized persons or systems cannot access the information of users;

· Making sure that the information accessed is genuine;

· Making the data accessible and usable;

· Logging the transactions for further reference and support activity

· Verifying the authenticity of a person to perform a transaction.

1. For intranet website accessed by employees:

Since the data is accessed by the company employees only it should be only available to company’s level of access making it private from other information being maintained on the infrastructure So,the following are the considerations in this case:

· Making sure that the access is within their intranet by implementing a firewall mechanism

· Specifying the authentication mechanism to access the website by the employees

· Supervising the activities and user management on the website by an administrator

1. Secure remote access for engineering employees

We can perform safe implementation of remote access control objectives based on the following security considerations:

Device type: What device types require remote access?

Role: What remote access is appropriate for that role given the device used?

Location. Is access from a public location, another company site, internal wireless, etc.?

Process and data: What processes and data are accessible given the first three access characteristics?

Authentication method: Does the need for strong authentication increase based on the device used, where it is used, and what it is allowed to access?

1. Basic firewall rules to be implemented:

Block by default – to block all incoming and outgoing connections

Allow specific traffic – only allow specified IP addresses

Allow Inbound-only allowing intranet users

1. Wireless coverage in the office

Can be provided with an 802.11 WLAN adapter/router with PSK(pre-shared key) configuration or a login based limited access to company WIFI by the employees

Security considerations: Should be Password protected and metered

1. V-LAN Configuration:

VLAN network segmentation creates security zones that enables flexible and strong control of what a remote user can access. security zones separating incoming traffic from internal resources. Using dynamic VLAN assignments and access control lists, we can control user access based on the conditions

1. Laptop Security configuration:

One of the most vulnerable parts of the infrastructure is the laptop computers that employees use. These devices can be responsible for bringing in viruses or malware or causing the organization to lose sensitive data. This can be checked using the techniques such as:

· Encrypting the disks on the laptops

· Ensuring Antimalware/Antivirus are up to date in regular intervals

· White listing the devices on the network

· Running a product such as System Center Configuration Manager, LANDesk, Altiris, or some other systems management platform

1. Application policy recommendations

· Integrate secure coding principles in all software components of infrastructure.

· Perform automated application security testing as part of the overall application testing process.

· Development and testing environments should redact all sensitive data or use de-identified data.

· Compliance with industry standard data policies and protocols

1. Security and privacy policy recommendations

Explain How the organization Collects and Use Personal Information

· Cookie Policy – Cookies are used to store user preferences or shopping cart contents. Clearly explain your cookie practice.

· How organization will Share Customer Information – Customers need to know that their data will only be used to complete the transaction and that any further use of that data (including selling or distributing it) requires their consent.

· Contact Information – Make it easy for your customers to contact you or file a complaint.

Display Privacy Policy Make sure new customers or users have easy access to your policy mandatorily

Publish Email Opt-Out Policies – Include opt-out options in your email marketing

Get a Seal of Approval – Third party validation of your online privacy and security policy can enhance your credibility. And trust of security

Intrusion detection or prevention for systems containing customer data

As the demand for E-Commerce grows on the Internet so will the increasing potential for E-Commerce sites to be attacked. Implementing security methodologies pertaining to an E-Commerce environment is not a simple thing. It should consider various threats and anomalies that can cause an attack. This can be achieved though penetration testing and reverse engineering to detect by signature or by an anomaly. This can be achieved by a third-party IDS system readily available in the market

Summary

Thus, we can conclude the report of the security infrastructure of the organization has been assessed and recommendations were made as required for the proposed environment as specified

Key assets being protected:

Customer information, Company related information

Key threats to protect against:

Intrusion to website, Data Loss

Key activities to protect against:

Customer purchase of artifacts, payment transactions, employee data

Relative ranking of fundamental security goals:

This is an important exercise for every organization as part of the risk mitigation planning process. For this project, the ranking came out like this:

Confidentiality: high

Integrity: high

Availability: medium

Auditability: medium

Nonrepudiation: N/A

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!