approvedwritershub.com
  • HOME
  • ABOUT US
  • HOW IT WORKS
    • TERMS AND CONDITIONS
  • SERVICES
  • BLOGS
  • LATEST REVIEWS
  • LOG IN
  • ORDER NOW
  • Search
  • Menu Menu

Modeling And Simulation With Arena

January 21, 2024/in Uncategorized /by Daniel Jennings

Exercise 1-

 

/Users/khashayarbehdinan/Desktop/Screen Shot 2016-06-20 at 11.01.16 AM.pngSuppose that 7.3, 6.1, 3.8 ,8.4, 6.9 ,7.1, 5.3, 8.2, 4.9, and 5.8 are 10 observations from a distribution (not highly skewed) with unknown mean µ,. Compute (10) , S2 (10), and an approximate 95 percent confidence interval for µ . For above data, test the null hypothesis

H0: µ= 6 at level =0.05.

Exercise 2-

Parts arrive at a single workstation system according to an exponential interarrival distribution with mean 21.5 seconds; the first arrival is at time 0. Upon arrival, the parts are initially processed. The processing-time distribution is TRIA(16, 19, 22) seconds. There are several easily identifiable visual characteristics that determine whether a part has a potential quality problem. These parts, about 10% (determined after the initial processing), are sent to a station where they undergo a thorough inspection. The remaining parts are considered good and are sent out of the system. The inspection-time distribution is 95 plus a WEIB(48.5, 4.04) random variable, in seconds. About 14% of these parts fail the inspection and are sent to scrap. The parts that pass the inspection are classified as good and are sent out of the system (so these parts didn’t need the thorough inspection, but you know what they say about hindsight). Run the simulation for10,000 seconds to observe the number of good parts that exit the system, the number of scrapped parts, and the number of parts that received the thorough inspection. Animate your model. Put a text box in your model with the output performance measures requested, and make just one replication.

 

Exercise 3-

 

An acute-care facility treats non-emergency patients (cuts, colds, etc.). Patients

arrive according to an exponential interarrival-time distribution with a mean of 11 (all times are in minutes). Upon arrival they check in at a registration desk staffed by a single nurse. Registration times follow a triangular distribution with parameters 6, 10, and 19. After completing registration, they wait for an available examination room; there are three identical rooms. Data show that patients can be divided into two groups with regard to different examination times. The first group (55% of patients) has service times that follow a triangular distribution with parameters 14, 22, and 39. The second group (45%) has triangular service times with parameters 24, 36, and 59. Upon completion, patients are sent home. The facility is open 16 hours each day. Make 200 independent replications of 1 day each and observe the average total time pa­tients spend in the system. Put a text box in your Arena file with the numerical results requested.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

0 0 Daniel Jennings Daniel Jennings2024-01-21 16:08:052024-01-21 16:08:05Modeling And Simulation With Arena

Module-8 Discussion

January 21, 2024/in Uncategorized /by Daniel Jennings

Include at least 250 words in your posting and at least 250 words in your reply.  Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.

Module 8 Discussion Question

Search “scholar.google.com” or your textbook. Discuss the issues organization’s face with regards to the protection of its customer information. How might an organization notify its users that all communications are being monitored and preserved? How will end users typically respond to such announcements?

Reply(Shiva)

 

It is normal for organizations to collect their customers’ data and store it in their databases. This act always comes with a price. The organizations have a duty to diligently protect the information at all costs. Even though organizations promise that they will protect their customers’ data, sometimes they fail to do so (Karjoth, Scunter, & Waidner, 2003).

Most organizations face problems for failing to protect their customers’ information. Take the example of a situation where the data is stolen by attackers. The customers’ run to courts demanding compensation. In other cases, organizations are accused of misusing personal data. This is done by selling customers’ data to third parties or using the data for marketing purposes. Sometimes they fail to observe disclosure requirements.

It also happens that some firms delete data accidentally or let unauthorized personnel access it. The end result is that the organization spends millions trying to retrieve the data. Poor handling of clients’ data leads to a bad reputation. Firms should notify their users whenever a breach occurs (Schwartz & Janger, 2007). Organizations have a role of informing their clients that they do collect, monitor and store their data. This can be done by including it in websites where clients are expected to submit their data. They can also send a notification to clients letting them know what time of information is being collected and monitored. If calls are affected, customers should be notified before they start giving their details.

On their side, customers can respond to this by accepting or declining to share their information. They can unsubscribe from services their dislike. Furthermore, they can seek clarification in case there is ambiguity. They can also ask firms to delete their data after the contractual terms.

References

Karjoth, G., Scunter, M., & Waidner, M. (2003, June 24). Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. Retrieved December 4, 2018, from https://link.springer.com/chapter/10.1007/3-540-36467-6_6

Schwartz, P. M., & Janger, E. J. (2007). Notification of Data Security Breaches 105 Michigan Law Review 2006-2007. Retrieved December 4, 2018, from https://heinonline.org/HOL/LandingPage?handle=hein.journals/mlr105&div=36&id=&page=

Reply(venu)

 

Organization have the right to monitor their employee’s use of the information and internet including visiting social networking sites, checking e-mails, and instant messaging on computers owned by the organization, during employee’s on-duty hours. Organization need to have a plan to ensure the security of your information assets. Failure to protect your data’s confidentiality might result in customer credit card numbers being stolen, with legal consequences and a loss of goodwill. Lose your clients’ confidential information and you may have fewer of them in the future.

Designated security officer: organizations for security regulations and standards, having a Designated Security Officer is not optional it’s a requirement. Security officer is the one responsible for coordinating and executing our security program. The officer is our internal check and balance. This person or role should report to someone outside of the IT organization to maintain independence.

Policies and Procedures: The policies and procedures component is the place where we get to decide what to do about them. Physical security documents how you will protect all three C-I-A aspects of your data from unauthorized physical access. Authentication, authorization, and accountability establishes procedures for issuing and revoking accounts. It specifies how users authenticate, password creation and aging requirements, and audit trail maintenance. Security awareness makes sure that all users have a copy of your acceptable use policy and know their responsibilities; it also makes sure that your IT employees are engaged in implementing your IT-specific policies.

Risk assessment: This component identifies and assesses the risks that your security program intends to manage. Unauthorized access to your own data and client or customer data. Remember, if you have confidential information from clients or customers, you’re often contractually obliged to protect that data as if it were your own.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

0 0 Daniel Jennings Daniel Jennings2024-01-21 16:07:042024-01-21 16:07:04Module-8 Discussion

Business Ethics

January 21, 2024/in Uncategorized /by Daniel Jennings

 

4th question

Summary:

Pick one of the following terms for your research: Stakeholder, corporate citizenship, reputation, corporate governance, or executive compensation.

Journal article I need two copys

Plz follow this instructions

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement. SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term. DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. REFERENCES: All references must be listed at the bottom of the submission–in APA format.

5th question

Summary:

Read Wells Fargo Banking Scandal and complete the questions at the end of the case study.

Plz click the link you got questions

““““““““““————————————————————–

6th question

Summary:

Pick one of the following terms for your research: Integrity, ethical dilemma, conflict of interest, bribery, or fraud.

Journal article I need two copys

Plz follow this instructions

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement. SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term. DISCUSSION: Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment. REFERENCES: All references must be listed at the bottom of the submission–in APA format.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

0 0 Daniel Jennings Daniel Jennings2024-01-21 16:06:032024-01-21 16:06:03Business Ethics

Access 2019 Project Due Tomorrow Night

January 21, 2024/in Uncategorized /by Daniel Jennings

Illustrated Access 2019 | Modules 1-4: SAM Capstone Project 1a

Midwest Executive Professionals

Illustrated Access 2019 | Modules 1-4: SAM Capstone Project 1a

Improve a database by creating and modifying tables, queries, forms, and reports

GETTING STARTED

Open the file IL_AC19_CS1-4a_FirstLastName_1.accdb, available for download from the SAM website.

Save the file as IL_AC19_CS1-4a_FirstLastName_2.accdb by changing the “1” to a “2”.

If you do not see the .accdb file extension in the Save As dialog box, do not type it. The program will add the file extension for you automatically.

To complete this SAM Project, you will also need to download and save the following data files from the SAM website onto your computer:

Support_AC19_CS-1-4a_Industries.xlsx

Open the _GradingInfoTable table and ensure that your first and last name is displayed as the first record in the table. If the table does not contain your name, delete the file and download a new copy from the SAM website.

PROJECT STEPS

Midwest Executive Professionals is a firm that connects professional job seekers with job openings. You work in the Research Department of Midwest Executive Professionals as a research analyst. You are developing an Access database application to help manage and analyze companies, jobs, applicants, and job placements facilitated by your company. In Design View of the Applications table, modify the table with the following instructions:

Add a new field after the ApplicationDate field named FollowupDate with a Date/Time data type.

Use ApplicationID to rename the ID field. Save and close the Applications table.

In Datasheet View of the JobSeekers table, complete the following instructions:

Delete the record for Richard Marlay (JobSeekerID 14).

Edit John to be Jonathan for JobSeekerID 10.

Enter a new record into the table using the information in Table 1. Close the JobSeekers table.

Table 1: New Record for JobSeekers Table

JobSeekerID

(AutoNumber will automatically number this field)

FirstName

Leonardo

LastName

Eagan

Phone

5551118887

In the Navigation Pane, make Industries the new name for the Categories table.

Use the import wizard to append the records from the Support_AC19_CS-1-4a_Industries.xlsx to the Industries table. Do not save the import steps. (Hint: If a warning message appears, Click Open.)

Create a new table in Table Design View with the following specifications:

Enter Employees as the name of the new table.

Add a new field named EmployeeID with the Numberdata type. Set it as the Primary key field.

Add two new fields named EmployeeFirst and EmployeeLast in the order shown. They should have the Short Text data type and field size properties of 20.

Add a new field named Email with the Hyperlink data type. Set the Required property to Yes.

Add a new field named Salary with the Currency data type. Set the Default Value property to 45000.

Add a new field named Extension with the Short Textdata type. Update the Input Mask property using the Input Mask Wizard. Select the Extension input mask and update the field to 9999, so that 9999;;_ is the final input. Accept the default in the last window. Save the table and then close it.

In Datasheet View of the JobSeekers table, complete the following options:

Delete the Comments field. (Hint: It currently does not have any data.)

Move the Phone field to be the last field in the datasheet.

Sort the records in ascending order by LastName. Save and close the JobSeekers table.

Create a new query in Design View using the Companies and Jobs tables with the following options:

Select the CompanyName and Industry fields from the Companies table and the JobTitle and StartingSalaryfields from the Jobs table.

Join the tables using the CompanyID field from the Companies table and the Company field from the Jobstable.

Save the query, using HighSalaries as the name.

With the HighSalaries query still open in Design View, add criteria to select only those records where the StartingSalary is greater than or equal to 50000, save the query, switch to Datasheet View as shown in Figure 1, and then close it.

Figure 1: HighSalaries Query in Datasheet View

Use the Simple Query Wizard to create a new query with the following options:

Use the JobSeekers and Applications tables.

Select all four fields from the JobSeekers table and the ApplicationDate field from the Applications table.

Create a detail query.

Use ApplicationDates as the title for the query. Save and close the query.

In Design View of the ApplicationListing query, modify the query with the following options:

Add criteria to select all records with Administrative Assistant or User Support Director as the JobTitle.

Sort the records in ascending order by LastName, and then by FirstName. Run the query to display it in Datasheet View as shown in Figure 2, and then save and close it.

Figure 2: ApplicationListing Query in Datasheet View

In Design View of the DirectorSeptember query, add criteria using wildcard characters to select all records with Director anywhere in the JobTitle field and an ApplicationDate greater than or equal to 9/1/2018. Run the query to display it in Datasheet View as shown in Figure 3, and then save and close it.

Figure 3: DirectorSeptember Query in Datasheet View

Use the Form Wizard to create a new form with the following options:

Select all of the fields from the Jobs table.

Choose a Columnar layout.

Use JobsEntry as the title. Save and close the JobsEntry form.

Use the Report Wizard to create a new report with the following options:

Select all of the fields from the Companies table.

Group the records by Industry.

Sort the records in ascending order by CompanyName.

Use a Stepped layout and a Portrait orientation.

Use CompanyListing as the title. Preview, save, and close the report.

Open the JobSeekerEntry form in Form View, enter Jacob as the FirstName value for the first record to replace Jack, and then add a new record in the main form with the information in Table 2.

Table 2: New Record for JobSeekerEntry Form

JobSeekerID

(AutoNumber field will automatically increment)

FirstName

Camilla

LastName

Escobar

Open the JobSeekerEntry form in Layout View and modify it with the following options:

Right-align the text in the JobSeekerID, FirstName, and LastName labels.

Edit the FirstName label to read First Name and use Last Name to rename the LastName label.

Delete the Close command button in the Form Footer section.

With the JobSeekerEntry form still open in Layout View, modify it with the following options:

Add the Phone field to the form and position it just below the Last Name label.

Change the font color for the Phone label to Automatic (black).

Apply a quick style, Colored Outline – Blue, Accent 1(first 1st row second 2nd column of Theme Styles gallery) to the Close command button in the Form Header section. Display the form in Form View as shown in Figure 4, and then save and close it.

Figure 4: JobSeekerEntry Form in Form View

Open the JobListing report in Layout View and add conditional formatting so that any StartingSalary value greater than or equal to $70,000 is formatted using Green 3 background color (7th column, 4th row in the Standard Colors pallete). Save the JobListing report.

With the JobListing report still open in Layout View, modify it with the following options:

Change the background color of the Starting Salary label in the Page Header section to the same color, Green 3 (7th column 4th row in the Standard Colors palette).

Group the two labels in the Report Header section together in a tabular layout. Save and display the report in Report View as shown in Figure 5, and then close it.

Figure 5: JobListing Report in Report View

In Layout View of the JobSeekerListing report, modify it with the following options:

Change the Theme Colors to Green .

Change the Theme Fonts to Franklin Gothic. Display the report in Report View as shown in Figure 6, and then save and close it.

Figure 6: JobSeekerListing Report in Report View

Save and close any open objects in your database. Compact and repair your database, close it, and then exit Access. Follow the directions on the SAM website to submit your completed project.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

0 0 Daniel Jennings Daniel Jennings2024-01-21 16:05:272024-01-21 16:05:27Access 2019 Project Due Tomorrow Night

Process ID (PID) Manger In C For Linux

January 21, 2024/in Uncategorized /by Daniel Jennings

# To run, enter # make all all: testpid testpid: test.o pid.o gcc -lpthread -o testpid test.o pid.o pid.o: pid.c pid.h gcc -c pid.c test.o: test.c pid.h gcc -lpthread -c test.c

/* Start code for Programming Project 5. Create 4 files with proper file extension. */ // File 1, pid.h // This header file is included in pid.c and test.c #include <pthread.h> #define PID_MIN 300 #define PID_MAX 350 /* mutex lock for accessing pid_map */ pthread_mutex_t mutex; //File 2, pid.c #include “pid.h” #include <pthread.h> #include <stdio.h> /** * Allocates the pid map. */ int allocate_map(void) { } /** * Allocates a pid */ int allocate_pid(void) { } /** * Releases a pid */ void release_pid(int pid) { } //File , test.c #include <pthread.h> #include <unistd.h> #include <stdio.h> #include <time.h> #include “pid.h” #define NUM_THREADS 100 #define ITERATIONS 10 #define SLEEP 5 /** * mutex lock used when accessing data structure * to ensure there are no duplicate pid’s in use. */ pthread_mutex_t test_mutex; void *allocator(void *param) { } int main(void) { int i; pthread_t tids[NUM_THREADS]; //Todo: /* allocate the pid map */ if (allocate_map() == -1) return -1; //Todo: printf(“***DONE***\n”); return 0; } //File 4, Makefile, To compile, enter “make all” all: testpid testpid: test.o pid.o gcc -lpthread -o testpid test.o pid.o pid.o: pid.c pid.h gcc -c pid.c test.o: test.c pid.h gcc -lpthread -c test.c

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

0 0 Daniel Jennings Daniel Jennings2024-01-21 16:04:522024-01-21 16:04:52Process ID (PID) Manger In C For Linux

Lab #1 Work

January 21, 2024/in Uncategorized /by Daniel Jennings

Managing Risk in Information Systems

Powered by vLab Solutions

JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

LABORATORY MANUAL TO ACCOMPANY

VERSION 2.0

INSTRUCTOR VERSION

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

1

Introduction

The task of identifying risks in an IT environment can become overwhelming. Once your mind

starts asking “what if…?” about one IT area, you quickly begin to grasp how many

vulnerabilities exist across the IT spectrum. It may seem impossible to systematically search for

risks across the whole IT environment.

Thankfully, a solution is at hand that simplifies identifying threats and vulnerabilities in an IT

infrastructure. That method is to divide the infrastructure into the seven domains: Wide Area

Network (WAN), Local Area Network-to-Wide Area Network (LAN-to-WAN), Local Area

Network (LAN), Workstation, User, System/Application, and Remote Access. Systematically

tackling the seven individual domains of a typical IT infrastructure helps you organize the roles,

responsibilities, and accountabilities for risk management and risk mitigation.

In this lab, you will identify known risks, threats, and vulnerabilities, and you will organize

them. Finally, you will map these risks to the domain that was impacted from a risk management

perspective.

Learning Objectives

Upon completing this lab, you will be able to:

Identify common risks, threats, and vulnerabilities found throughout the seven domains of a

typical IT infrastructure.

Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT

infrastructure.

Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the

organization from a risk-assessment perspective.

Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities

found throughout the seven domains of a typical IT infrastructure.

Lab #1 Identifying Threats and Vulnerabilities in an IT Infrastructure

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

4 | LAB #1 Identifying Threats and Vulnerabilities in an IT Infrastructure

Risks, Threats, and Vulnerabilities Primary Domain Impacted

Unauthorized access from public Internet

Hacker penetrates IT infrastructure through modem bank

Communication circuit outages

Workstation operating system (OS) has a known software vulnerability

Denial of service attack on organization’s e- mail server

Remote communications from home office

Workstation browser has software vulnerability

Weak ingress/egress traffic-filtering degrades performance

Wireless Local Area Network (WLAN) access points are needed for LAN connectivity within a warehouse

Need to prevent rogue users from unauthorized WLAN access

Doctor destroys data in application, deletes all files, and gains access to internal network

Fire destroys primary data center

Intraoffice employee romance gone bad

Loss of production data server

Unauthorized access to organization-owned workstations

LAN server OS has a known software vulnerability

Nurse downloads an unknown e-mail attachment

Service provider has a major network outage

A technician inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers

Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router

Note: Some risks will affect multiple IT domains. In fact, in real-world environments, risks and their direct consequences will most likely span across several domains. This is a big reason to implement controls in more than one domain to mitigate those risks. However, for the exercise in step 6 that follows, consider and select only the domain that would be most affected.

Subsequent next steps in the real world include selecting, implementing, and testing controls to minimize or eliminate those risks. Remember that a risk can be responded to in one of four ways: accept it, treat it (minimize it), avoid it, or transfer it (for example, outsource or insurance).

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company – All Rights Reserved.

 

 

  • Pages from 9781284058680_ILMx_Risk20
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

0 0 Daniel Jennings Daniel Jennings2024-01-21 16:03:532024-01-21 16:03:53Lab #1 Work

Exp19_Excel_Ch01_ML1_Rentals

January 21, 2024/in Uncategorized /by Daniel Jennings

Exp19_Excel_Ch01_ML1_Rentals

Exp19 Excel Ch01 ML1 Rentals

Excel Chapter 1 Mid-Level 1 – Rentals

 

Project Description:

You manage a beach guest house in Ft. Lauderdale containing three types of rental units. Prices are based on peak and off-peak times of the year. You need to calculate the maximum daily revenue for each rental type, assuming all units are rented. In addition, you need to calculate the discount rate for off-peak rental times. Finally, you will improve the appearance of the worksheet by applying font, alignment, and number formats.

 

Start Excel. Download and open the file named Exp19_Excel_Ch01_ML1_Rentals.xlsx. Grader has automatically   added your last name to the beginning of the filename.

 

You want to format   the main title to have a consistent appearance to other documents and   spreadsheets.

Apply the Heading 1 cell style to the range A1:G1.
Hint: Cell Styles is on the Home tab.

 

You want to apply a   similar, complementary style to the date, which is below the main title.
Apply the 20% – Accent1 cell style to the range A2:G2.

 

The Peak Rentals   heading is centered over the related data in columns C and D. You want the   Off-Peak Rentals heading to be centered over its related data.
Merge and center Off-Peak Rentals   in the range E4:G4.
Hint: Merge and Center is on the Home tab.

 

To help other people   know that the Off-Peak Rentals heading is related to three columns of data,   you want to apply a fill color to that heading. You will choose a different   color to distinguish these data columns from the fill color used for the Peak   Rentals heading.
Apply Blue fill color (the eighth color below Standard Colors) and White,   Background 1 font color to cell E4.
Hint: Fill Color and Font Color are on the Home tab.

 

Three headings   (Maximum Revenue, Maximum Revenue, and Discount Rate) do not fully display on   the fifth row. Instead of widening the columns, you want to wrap the headings   within their respective cells. This will enable you to maintain the column   width appropriate for the data below the headings.
Center and wrap the headings on row 5.
Hint: Use the Home tab.

 

You are ready to   calculate the Peak Rentals Maximum Revenue that can be earned. The maximum   revenue is the total revenue if all rental units are rented.
In cell D6, enter a formula that calculates the Peak Rentals Maximum Revenue.
Hint: Formula is: No. of Units*Daily Rate

 

The Discount Rate is   the percentage off of the Peak Rentals Per Day Rate used to calculate the   Off-Peak Rentals Per Day rate. The Studio Apartment rents for $120 Off-Peak,   which is 80% of the $149.95 Peak rate. Therefore, the Discount Rate for the   Off-Peak Per Day rate is 20%.
In cell G6, enter a formula that calculates the Discount Rate for the   Off-Peak rental price per day.
Hint: Formula is: 1-(Off-Peak Rentals Daily Rate/Peak Rentals Daily Rate)

 

You created formulas   for the Peak Rentals Maximum Revenue and the Discount Rate for the Off-Peak   Rentals for the Studio Apartment rental type. Now you want to copy the   formulas to the remaining rental types so that you don’t have to create formulas   again.
Copy the formula in cell D6 to cells D7:D8. Copy the formula in cell G6 to   cells G7:G8.
Hint: Use the fill handle.

 

The values in the   columns are hard to read with varying number of decimal points. The   Accounting Number Format will align the decimal points and display dollar   signs to improve the appearance of the monetary values.
Format the range C6:F8 with Accounting Number Format.
Hint: Accounting Number Format is on the Home tab.

 

The Discount Rate   formula results are displayed as decimal points. However, formatting the   values as percentages will align decimal points and clearly indicate the   percentages.
Format the range G6:G8 in Percent Style with one decimal place.
Hint: Look in the Number group on the Home tab.

 

You applied a solid   blue to the Off-Peak Rentals heading, so you will apply a complementary   lighter blue fill color to the data below that heading.
Apply Blue, Accent 1, Lighter 80% fill color to the range E5:G8.
Hint: The Fill Color palette contains an option for selecting more colors to   customize.

 

A solid red fill is   applied to the Peak Rentals heading. You will select a complementary custom   fill color for the data below that heading.
Select the range C5:D8 and apply a custom fill color with Red 242, Green 220,   and Blue 219.
Note, Mac users, in the Colors dialog box, click the Color Sliders tab and   then select the RGB Sliders.
Hint: On the Home tab, in the Font group, click Fill Color, and then click More   Colors.

 

Answer the first   question below the worksheet data. Apply Yellow highlight color to the   correct answer in either cell A16, A17, or A18.

 

Answer the second   question below the worksheet data. Apply Yellow highlight color to the   correct answer in either cell A22, A23, or A24.

 

Answer the third   question below the worksheet data. Change XX.X%   to the correct percentage in cell A28.

 

Now that the   worksheet contains formulas and is formatted, you are ready to apply Page   Setup options to prepare the worksheet to be printed, if needed.
Select Landscape orientation, center the data horizontally on the page, and   apply the setting to fit to one page.
Hint: The Page Layout tab contains options needed.

 

It is important to   provide identification information in a footer of the worksheets. In   particular, the textbook series name, the worksheet name, and the file name   help identify the worksheet.
Insert a footer with the text Exploring Series on the left side, the sheet   name code in the center, and the file name code on the right side.
Hint: Use the Insert tab or the Page Layout tab to insert a footer.

 

To preserve the   original data, you make a copy a worksheet so that you can manipulate the   data or if you want to review the formulas.
Create a copy of the Rental Rates worksheet, place the new sheet to the right   side of the original worksheet, and rename the new sheet as Formulas.
Hint: Display a shortcut menu from the sheet tab.
 

You want to display   the formulas and set print options so that it will be easier to read and   interpret the rental formulas on a printout, if needed.
On the Formulas worksheet, display cell formulas, and set options to print   gridlines and headings.
Hint: Use the Formulas tab on the ribbon.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

0 0 Daniel Jennings Daniel Jennings2024-01-21 16:03:162024-01-21 16:03:16Exp19_Excel_Ch01_ML1_Rentals

Computer Science Week 8 Assignment Home Office Renovation – Project Proposal: WBS And Project Schedule (Use My Week 5 Assignment)

January 21, 2024/in Uncategorized /by Daniel Jennings

Overview

In the assignment due in Week 5, you defined key portions of your Home Office Renovation project. Now, it is time to develop a work breakdown structure (WBS) and project schedule for your project.

Note: Please use your project from the Week 5 assignment to complete this assignment.

For this assignment, you will create Work Breakdown Structure (WBS). To create your WBS, you may use MS Word, MS Excel, Visio, or any other visual format that allows for graphical elements to be included. (See Figure 4.4 from Chapter 4 of your Project Management: The Managerial Process textbook). Alternatively, you may use a coded format using MS Word. (See Exhibit 4.1 – Coding the WBS from Chapter 4 of your Project Management: The Managerial Process textbook as an example. The example is in MS Project format, but the same could be done in MS Excel).

Instructions

Each of the following should be included in your WBS submission:

  1. Create a WBS which contains graphical elements of the project scope including the project, major deliverables, and supporting deliverables. WBS should be easy to read and contain consistent formatting throughout.
  2. Create a depiction of the project within the WBS.
    • One Level 1 is provided describing the complete project.
    • Three Level 2s are provided describing major deliverables.
    • Three Level 3s are provided describing supporting deliverables.
    • Two Level 4s are provided with the lowest manageable responsibility level.
  3. For each of the identified deliverables (identified in the four levels from item #2), create a project schedule containing all activities from levels 1-4. Each activity should contain a start and end date and a list of resources required to complete the project.
  4. Provide a minimum of three pieces of information that need to be communicated to stakeholders. For each of the three pieces – which creates an example of a project network – you should address who will be targeted; when they will receive the communication; what will be communicated; and how it will be communicated.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.

The specific course learning outcome associated with this assignment is:

  • Develop a project plan including the critical elements of project scope, priorities, work breakdown structure (WBS), communication plan, and a project network to ensure effective implementation.
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

0 0 Daniel Jennings Daniel Jennings2024-01-21 16:01:432024-01-21 16:01:43Computer Science Week 8 Assignment Home Office Renovation – Project Proposal: WBS And Project Schedule (Use My Week 5 Assignment)

Computer Science Assignment – Phish-A-Prof

January 21, 2024/in Uncategorized /by Daniel Jennings

In this assignment, you are taking on the role of a person who is responsible for raising awareness of the threats and posted by phishing messages.  The target audience is the faculty members and administrators at Adelphi.  You want to create an example of a phishing message that can be used to demonstrate effective techniques used by such messages and help train faculty and administration to avoid falling for such scams.

For this part, your team will design an effective phishing message.  Your design must include a subject line and a message body.  In the message body, you can use the following placeholders to make the phish more realistic:

  • [FIRST]        First name of recipient
  • [LAST]         Last name of recipient
  • [EMAIL]       Email address included in the message
  • [URL]           URL of a phishing landing page (you can specify the text that would be displayed for the link)

Be creative as you want, as long as you keep the tone and content “business appropriate.”  Remember the target audience and tailor your messages for the target audience.

If you want to incorporate graphics feel free to do so.  You can submit either an email text (with appropriate placeholders) or a PDF of a formatted message.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

0 0 Daniel Jennings Daniel Jennings2024-01-21 16:01:122024-01-21 16:01:12Computer Science Assignment – Phish-A-Prof

Diversity, Equity, And Inclusion Campaign

January 21, 2024/in Uncategorized /by Daniel Jennings

Scenario

You are newly appointed to the communications team for a reputable, multi-faceted philanthropic organization, Momentum for Better. The current task for your team is to create a brand-new campaign that promotes Diversity, Equity, and Inclusion. To kick off this campaign, you have been asked to develop a mood board presentation and written summary that you will present to leadership at the upcoming annual meeting.

You are reminded that a mood board is a deliverable—a collage of images, colors, patterns/textures, and text—that visually describes the intended look & feel of the campaign.

You DON’T need to be an artist or designer to create a mood board, but you DO need to have a keen understanding of what various visuals communicate and how they make people feel. Keep in mind the various ways that you analyzed and evaluated visuals throughout this course.

Instructions

Mood Board Presentation

  1. First, create a Microsoft PowerPoint presentation. Your presentation will need to have the slides listed below clearly labeled.
  2. Visually compelling title slide
  3. Colors and Patterns
  4. Logos, Ethos, Pathos
  5. Graphics
  6. Delivery Methods
  7. Memes
  8. Second, think about the overall look & feel that you want the campaign to have. Then, search the web for examples of the kinds of images, graphics, colors, and patterns/textures that you have in mind.
  9. Third, copy and paste those images, graphics, etc., into the appropriate slides of your Microsoft PowerPoint presentation. You must have at least four (4) images per slide, except for the Memes slide, which just needs two (2). The images should fill up as much of the slide as possible but DON’T stretch or squish the images. Here is more detail about the types of images you need to include in the slides.
  10. Visually compelling title slide
  11. Include one main image and a title for your presentation.
  12. Include the organization’s name, Momentum for Better.
  13. Colors and Patterns
  14. Your color scheme must feature two colors.
  15. Images of color swatches or things that are your chosen colors (e.g., fire engine red, canary yellow, etc.).
  16. Patterns or textures that feature strong use of lines (e.g., stripes, swirls, borders, plaid, etc.).
  17. Logos, Ethos, Pathos (choose one main rhetorical approach)
  18. Photos of people that signify your chosen rhetorical approach.
  19. Photos must include people of various genders, ethnicities, and ages.
  20. Graphics
  21. Logo and/or symbol graphics that convey diversity, equity, and inclusion.
  22. Delivery Methods
  23. Images of two (2) chosen delivery methods for spreading awareness about the campaign. For example, if you want social media to be one of the options, then include photos of a person using social media.
  24. Memes
  25. Create two (2) positive, inspiring memes that fit the overall message of Diversity, Equity, and Inclusion. Don’t make the memes funny, satirical, or divisive.
  26. You can only use public domain or Creative Commons licensed images. You CAN’T use images from movies, shows, comics, books, video games, etc.
  27. You may use PowerPoint, Canva, Adobe Express, Microsoft Paint, or any other app to create the memes. Save them as a JPG or PNG file, then insert them into your PowerPoint presentation.
  28. Fourth, as you develop the visually compelling title slide and all the other slides, you need to demonstrate your understanding of visual presentation. In other words, your slides need to be aesthetically pleasing with good visual connectivity.

Written Summary

Once you’ve finished creating your mood board presentation, you need to write a detailed summary explaining why you chose the visuals that you did. Your summary should include the following:

  1. In a Microsoft Word document, use APA formatting. The title on your title page must match the title slide of your mood board presentation.
  2. Your introductory paragraph must explain your overall intended look & feel for the campaign and how it will communicate Diversity, Equity, and Inclusion. For example, will it be serene, energetic, serious, or something else?
  3. Include section headings in your summary, and these must match the slide labels from your mood board presentation.

Each section must contain 2–3 full paragraphs explaining your chosen images in detail. Keep in mind how you’ve analyzed and evaluated visuals throughout this course. Connect them to the overarching message of Diversity, Equity, and Inclusion. You’ll be graded on your ability to defend your choices and clearly articulate your analysis.

Submit a PowerPoint presentation (PPTX) and Microsoft Word document (DOCX).

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

0 0 Daniel Jennings Daniel Jennings2024-01-21 16:00:362024-01-21 16:00:36Diversity, Equity, And Inclusion Campaign
Page 125 of 660«‹123124125126127›»

DISCLAIMER

Approvedwritershub.com helps students cope with college assignments and write papers on a wide range of topics. We deal with academic writing, creative writing, and non-word assignments.

PAYMENT METHODS

CONTACT US

E MAIL:

support@approvedwritershub.com

WhatsApp: +1(925)3749165

Online Chat 24/7

Archive

  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • January 2022
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
© Copyright - approvedwritershub.com - powered by Enfold WordPress Theme
Scroll to top
WhatsApp
Hello
Can we help you?
Open chat