Exp22_Excel_Ch02_HOE – Townsend Mortgage Company homework help

Exp22_Excel_Ch02_HOE – Townsend Mortgage Company homework help

Excel Chapter 2 Hands-On Exercise – Townsend Mortgage Company

Exp22_Excel_Ch02_HOE – Townsend Mortgage Company
Exp22 Excel Ch02 HOE – Townsend Mortgage Company

 

 

Project Description:
You are an assistant to Yui Matheson, a mortgage broker at the Townsend Mortgage Company. Yui spends days reviewing mortgage rates and trends, meeting with clients, and preparing paperwork. Yui relies on your expertise in using Excel to help analyze mortgage data. Today, Yui provided you with sample mortgage data: loan number, house cost, down payment, mortgage rate, and the length of the loan in years. She asked you to perform some basic calculations so that the output provided by her system can be checked to verify that it is calculating results correctly. You have also been tasked with calculating the amount financed, the periodic interest rate, the total number of payment periods, the percentage of the house cost financed, and the payoff year for each loan. In addition, you will calculate totals, averages, and other basic statistics. Furthermore, Yui asked you to complete another worksheet that uses functions to look up interest rates from a separate table, calculate the monthly payments, and determine how much (if any) the borrower will have to pay for private mortgage insurance (PMI).

 

 

Start Excel. Download and open the file named Exp22_Excel_Ch02_HOE_Loans.xlsx. Grader has automatically added your last name to the beginning of the filename.

 

You would like to create a formula to calculate the amount financed for each loan.

Enter a formula in cell D8 to calculate the amount financed for the first mortgage. Once completed, copy the formula down completing column D.

 

 

You would like to create a formula to calculate the monthly interest rate per period for each loan.

Enter in formula in cell F8 to calculate the monthly interest rate for the first loan. Add the appropriate absolute cell reference for cell B5 and then use the fill handle to copy the formula down completing column F.

 

You would like to calculate the total number of payment periods for each loan. To complete the task, you will use a mixed cell reference as an alternative to an absolute cell reference.

Enter a formula in cell H8 to calculate the total number of payment periods per loan. Use an appropriate mixed cell reference for cell B5 and then use the fill handle to copy the formula down completing column H.

 

You would like to calculate the total value of the homes being financed.

Use AutoSum in cell B16 to calculate the total value of all homes sold.

 

You would like to calculate the average value of all homes being purchased.

Use AutoSum in cell B17 to calculate the average value of all homes being purchased.

 

You would like to calculate the median value of all homes being purchased.

Enter a function in cell B18 to calculate the median value of all homes being financed.

 

You would like to display the cost of the least expensive home.

Enter a function in cell B19 to display the value of the least expensive home financed.

 

You would like to display the value of the most expensive home financed.

Enter a function in cell B20 to display the most expensive home financed.

 

You would like to determine the total number of homes financed.

Enter a function in cell B21 to count the total number of homes being financed based on the values column B.

 

To complete your calculations you will use the fill handle to copy the previously created functions.

Use the fill handle to copy the functions in the range B16:B21 through the range C16:D21.

 

You would like to test the functions you created by editing one of the values in the worksheet.

Edit the value in cell B9 to 425000. Note the results of the formulas are now updated.

 

It is a good practice to insert the date in a worksheet containing financial information. You will use the TODAY function to insert the current date in cell B4.

Use the TODAY function to insert the current date in cell B4.

 

You would like to use a lookup function on the Payment Info worksheet to determine the annual percentage rate (APR) of homes financed based on the lookup table in the range D4:E6.

Use the XLOOKUP function in cell G9 to determine the APR based on the years financed in cell F9, lookup array in the range D4:D6, and return array in the range E4:E6. Be sure to use the appropriate absolute cell referencing. Then use the fill handle to copy the function down completing column G.

 

Next you will calculate the total payment for each mortgage financed.

Use the PMT function in cell H9 to calculate the monthly payment based on the APR in cell G9, years financed in cell F9, and amount financed in cell D9. Ensure the final value is positive. Use the appropriate absolute cell references and then copy the function down completing the column.

 

For your last step you will determine the monthly personal mortgage insurance (PMI) if applicable. Since not all mortgages require PMI, you will use the IF function.

Enter an IF function in cell I9 to determine the monthly PMI if applicable. The mortgage requires PMI if the percent of down payment is less than 20% (cell B7). If the mortgage requires PMI it is .38% of the amount financed. Be sure to use the appropriate absolute cell references for the input values and then use the fill handle to copy the function down completing the column.

 

Save and close Exp22_Excel_Ch02_HOE_Loans.xlsx. Exit Excel. Submit the file as directed.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

2

 

The Tip Left column in the Friday worksheet contains a fill color and number formatting. You want to fill these formats to the other daily worksheets.

Group the Friday through Monday worksheets, staring with the Friday worksheet. Fill the format only for the range E5:E24.

 

8

 

3

 

Now you want to insert column totals for the five worksheets simultaneously.

With the worksheets still grouped, insert SUM functions in the range B25:E25 and apply the Totals cell style. Ungroup the worksheets.

 

5

 

4

 

The Week worksheet is designed to be a summary sheet. You want to insert a hyperlink to the Total heading in the Monday worksheet.

On the Week worksheet, in cell A5, insert a hyperlink to cell A25 in the Monday worksheet with the ScreenTip text Monday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

5

 

In cell A6 on the Week worksheet, insert a hyperlink to cell A25 in the Tuesday worksheet with the ScreenTip text Tuesday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

6

 

In cell A7, insert a hyperlink to cell A25 in the Wednesday worksheet with the ScreenTip text Wednesday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

7

 

In cell A8, insert a hyperlink to cell A25 in the Thursday worksheet with the ScreenTip text Thursday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

8

 

In cell A9, insert a hyperlink to cell A25 in the Friday worksheet with the ScreenTip text Friday’s Totals. Test the hyperlink to ensure it works correctly.

 

2

 

9

 

Now, you are ready to insert references to cells in the individual worksheets. First, you will insert a reference to Monday’s Food Total.

In cell B5 on the Week worksheet, insert a formula with a 3-D reference to cell B25 in the Monday worksheet. Copy the formula to the range C5:E5.

 

2

 

10

 

The next formula will display the totals for Tuesday.

In cell B6, insert a formula with a 3-D reference to cell B25 in the Tuesday worksheet. Copy the formula to the range C6:E6.

 

2

 

11

 

In cell B7, insert a formula with a 3-D reference to cell B25 in the Wednesday worksheet. Copy the formula to the range C7:E7.

 

2

 

12

 

In cell B8, insert a formula with a 3-D reference to cell B25 in the Thursday worksheet. Copy the formula to the range C8:E8.

 

2

 

13

 

In cell B9, insert a formula with a 3-D reference to cell B25 in the Friday worksheet. Copy the formula to the range C9:E9.

 

2

 

14

 

Now you want to use a function with a 3-D reference to calculate the totals.

In cell B10 on the Week worksheet, insert the SUM function with a 3-D reference to calculate the total Food purchases (cell B25) for the five days. Copy the function to the range C10:E10.

 

5

 

15

 

The servers are required to share a portion of their tips with the Beverage Worker and Assistants. The rates are stored in another file.

Open the Exp_Excel_Ch09_Cap_Assessment_Rates.xlsx workbook. Go back to the Exp_Excel_Ch09_Cap_Assessment_Tips.xlsx workbook. In cell F5 of the Week worksheet, insert a link to the Beverage Worker Tip Rate (cell C4 in the Rates workbook) and multiply the rate by the Monday Drinks (cell C5). Copy the formula to the range F6:F9.

 

5

 

16

 

Next, you will calculate the tips for the assistant.

In cell G5 in the Tips workbook, insert a link to the Assistant Tip Rate (cell C5 in the Rates workbook) and multiply the rate by the Monday Subtotal (cell D5). Copy the formula to the range G6:G9. Close the Rates workbook.

Note: The tip is a monetary value in the Week worksheet. It should be formatted for Accounting Number Format.

 

5

 

17

 

You noticed a circular error when you first opened the Tips workbook. Now you will find and correct it.

On the Week worksheet, check for errors and correct the formula with the circular reference.

 

5

 

18

 

You want to create a validation rule to prevent the user from accidentally entering a negative value. For now, you will create a validation in the Friday worksheet.

Select the range E5:E24 in the Friday worksheet, create a validation rule to allow a decimal value greater than or equal to zero. Enter the input message title Tip and the input message Enter the amount of tip. (including the period). Use the Stop alert with the error alert title Invalid Number and the error alert message The tip must be zero or more. (including the period). Test the data validation by attempting to enter -20 in cell E5 and then cancel the change.

 

10

 

19

 

Now you will copy the validation settings to the other daily worksheets.

Copy the range E5:E24 in the Friday worksheet. Group the Monday through Thursday worksheets, select the range E5:E24, and use Paste Special Validation to copy the validation settings.

 

10

 

20

 

You want to unlock data-entry cells so that the user can change the tips in the daily worksheets.

Group the Monday through Friday worksheets. Select the ranges E5:E24 and unlock these cells.

 

10

 

21

 

Create footer with your name on the left side, the sheet name code in the center, and the file name code on the right side of all worksheets.

 

5

 

22

 

Now that you unlocked data-entry cells, you are ready to protect the worksheets to prevent users from changing data in other cells. Individually, protect each sheet using the default allowances without a password.

 

12

 

23

 

Mark the workbook as final.

Note: Mark as Final is not available in Excel for Mac. Instead, use Always Open Read-Only on the Review tab.

 

0

 

24

 

Save and close Exp19_Excel_Ch09_Cap_Assessment_Tips.xlsx. Exit Excel. Submit the file as directed.

 

0

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Wireshark Lab: IP V6.0

Wireshark Lab: IP V6.0

Wireshark Lab: IP v6.0

Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross

“Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb

© 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved

image1.jpg

In this lab, we’ll investigate the IP protocol, focusing on the IP datagram. We’ll do so by analyzing a trace of IP datagrams sent and received by an execution of the traceroute program (the traceroute program itself is explored in more detail in the Wireshark ICMP lab). We’ll investigate the various fields in the IP datagram, and study IP fragmentation in detail.

Before beginning this lab, you’ll probably want to review sections 1.4.3 in the text and section 3.4 of RFC 2151 [ ftp://ftp.rfc-editor.org/in-notes/rfc2151.txt ] to update yourself on the operation of the traceroute program. You’ll also want to read Section 4.4 in the text, and probably also have RFC 791 [ ftp://ftp.rfc-editor.org/in-notes/rfc791.txt ] on hand as well, for a discussion of the IP protocol.

1. Capturing packets from an execution of traceroute

In order to generate a trace of IP datagrams for this lab, we’ll use the traceroute program to send datagrams of different sizes towards some destination, X. Recall that traceroute operates by first sending one or more datagrams with the time-to-live (TTL) field in the IP header set to 1; it then sends a series of one or more datagrams towards the same destination with a TTL value of 2; it then sends a series of datagrams towards the same destination with a TTL value of 3; and so on. Recall that a router must decrement the TTL in each received datagram by 1 (actually, RFC 791 says that the router must decrement the TTL by at least one). If the TTL reaches 0, the router returns an ICMP message (type 11 – TTL-exceeded) to the sending host. As a result of this behavior, a datagram with a TTL of 1 (sent by the host executing traceroute) will cause the router one hop away from the sender to send an ICMP TTL-exceeded message back to the sender; the datagram sent with a TTL of 2 will cause the router two hops away to send an ICMP message back to the sender; the datagram sent with a TTL of 3 will cause the router three hops away to send an ICMP message back to the sender; and so on. In this manner, the host executing traceroute can learn the identities of the routers between itself and destination X by looking at the source IP addresses in the datagrams containing the ICMP TTL-exceeded messages.

We’ll want to run traceroute and have it send datagrams of various lengths.

· Windows. The tracert program (used for our ICMP Wireshark lab) provided with Windows does not allow one to change the size of the ICMP echo request (ping) message sent by the tracert program. A nicer Windows traceroute program is pingplotter, available both in free version and shareware versions at http://www.pingplotter.com . Download and install pingplotter, and test it out by performing a few traceroutes to your favorite sites. The size of the ICMP echo request message can be explicitly set in pingplotter by selecting the menu item Edit-> Options->Packet Options and then filling in the Packet Size field. The default packet size is 56 bytes. Once pingplotter has sent a series of packets with the increasing TTL values, it restarts the sending process again with a TTL of 1, after waiting Trace Interval amount of time. The value of Trace Interval and the number of intervals can be explicitly set in pingplotter.

· Linux/Unix/MacOS. With the Unix/MacOS traceroute command, the size of the UDP datagram sent towards the destination can be explicitly set by indicating the number of bytes in the datagram; this value is entered in the traceroute command line immediately after the name or address of the destination. For example, to send traceroute datagrams of 2000 bytes towards gaia.cs.umass.edu, the command would be:

%traceroute gaia.cs.umass.edu 2000

Do the following:

· Start up Wireshark and begin packet capture (Capture->Start) and then press OK on the Wireshark Packet Capture Options screen (we’ll not need to select any options here).

· If you are using a Windows platform, start up pingplotter and enter the name of a target destination in the “Address to Trace Window.” Enter 3 in the “# of times to Trace” field, so you don’t gather too much data. Select the menu item Edit->Advanced Options->Packet Options and enter a value of 56 in the Packet Size field and then press OK. Then press the Trace button. You should see a pingplotter window that looks something like this:

image2.png

Next, send a set of datagrams with a longer length, by selecting Edit->Advanced Options->Packet Options and enter a value of 2000 in the Packet Size field and then press OK. Then press the Resume button.

Finally, send a set of datagrams with a longer length, by selecting Edit->Advanced Options->Packet Options and enter a value of 3500 in the Packet Size field and then press OK. Then press the Resume button.

Stop Wireshark tracing.

· If you are using a Unix or Mac platform, enter three traceroute commands, one with a length of 56 bytes, one with a length of 2000 bytes, and one with a length of 3500 bytes.

Stop Wireshark tracing.

If you are unable to run Wireshark on a live network connection, you can download a packet trace file that was captured while following the steps above on one of the author’s Windows computers . You may well find it valuable to download this trace even if you’ve captured your own trace and use it, as well as your own trace, when you explore the questions below.

2. A look at the captured trace

In your trace, you should be able to see the series of ICMP Echo Request (in the case of Windows machine) or the UDP segment (in the case of Unix) sent by your computer and the ICMP TTL-exceeded messages returned to your computer by the intermediate routers. In the questions below, we’ll assume you are using a Windows machine; the corresponding questions for the case of a Unix machine should be clear. Whenever possible, when answering a question below you should hand in a printout of the packet(s) within the trace that you used to answer the question asked. When you hand in your assignment, annotate the output so that it’s clear where in the output you’re getting the information for your answer (e.g., for our classes, we ask that students markup paper copies with a pen, or annotate electronic copies with text in a colored font).To print a packet, use File->Print, choose Selected packet only, choose Packet summary line, and select the minimum amount of packet detail that you need to answer the question.

1. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol part of the packet in the packet details window.

image3.png

What is the IP address of your computer?

2. Within the IP packet header, what is the value in the upper layer protocol field?

3. How many bytes are in the IP header? How many bytes are in the payload of the IP datagram? Explain how you determined the number of payload bytes.

4. Has this IP datagram been fragmented? Explain how you determined whether or not the datagram has been fragmented.

Next, sort the traced packets according to IP source address by clicking on the Source column header; a small downward pointing arrow should appear next to the word Source. If the arrow points up, click on the Source column header again. Select the first ICMP Echo Request message sent by your computer, and expand the Internet Protocol portion in the “details of selected packet header” window. In the “listing of captured packets” window, you should see all of the subsequent ICMP messages (perhaps with additional interspersed packets sent by other protocols running on your computer) below this first ICMP. Use the down arrow to move through the ICMP messages sent by your computer.

5. Which fields in the IP datagram always change from one datagram to the next within this series of ICMP messages sent by your computer?

6. Which fields stay constant? Which of the fields must stay constant? Which fields must change? Why?

7. Describe the pattern you see in the values in the Identification field of the IP datagram

Next (with the packets still sorted by source address) find the series of ICMP TTL-exceeded replies sent to your computer by the nearest (first hop) router.

8. What is the value in the Identification field and the TTL field?

9. Do these values remain unchanged for all of the ICMP TTL-exceeded replies sent to your computer by the nearest (first hop) router? Why?

Fragmentation

Sort the packet listing according to time again by clicking on the Time column.

10. Find the first ICMP Echo Request message that was sent by your computer after you changed the Packet Size in pingplotter to be 2000. Has that message been fragmented across more than one IP datagram? [Note: if you find your packet has not been fragmented, you should download the zip file http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip and extract the ip-ethereal-trace-1packet trace. If your computer has an Ethernet interface, a packet size of 2000 should cause fragmentation. ]

11. Print out the first fragment of the fragmented IP datagram. What information in the IP header indicates that the datagram been fragmented? What information in the IP header indicates whether this is the first fragment versus a latter fragment? How long is this IP datagram?

12. Print out the second fragment of the fragmented IP datagram. What information in the IP header indicates that this is not the first datagram fragment? Are the more fragments? How can you tell?

13. What fields change in the IP header between the first and second fragment?

Now find the first ICMP Echo Request message that was sent by your computer after you changed the Packet Size in pingplotter to be 3500.

14. How many fragments were created from the original datagram?

15. What fields change in the IP header among the fragments?

� References to figures and sections are for the 6th edition of our text, Computer Networks, A Top-down Approach, 6th ed., J.F. Kurose and K.W. Ross, Addison-Wesley/Pearson, 2012.

� Download the zip file � HYPERLINK “http://gaia.cs.umass.edu/ethereal-labs/ethereal-traces.zip” ��http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip� and extract the file ip-ethereal-trace-1. The traces in this zip file were collected by Wireshark running on one of the author’s computers, while performing the steps indicated in the Wireshark lab. Once you have downloaded the trace, you can load it into Wireshark and view the trace using the File pull down menu, choosing Open, and then selecting the ip-ethereal-trace-1 trace file.

� The packets in the ip-ethereal-trace-1 trace file in � HYPERLINK “http://gaia.cs.umass.edu/ethereal-labs/ethereal-traces.zip” ��http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip� are all less that 1500 bytes. This is because the computer on which the trace was gathered has an Ethernet card that limits the length of the maximum IP packet to 1500 bytes (40 bytes of TCP/IP header data and 1460 bytes of upper-layer protocol payload). This 1500 byte value is the standard maximum length allowed by Ethernet. If your trace indicates a datagram longer 1500 bytes, and your computer is using an Ethernet connection, then Wireshark is reporting the wrong IP datagram length; it will likely also show only one large IP datagram rather than multiple smaller datagrams.. This inconsistency in reported lengths is due to the interaction between the Ethernet driver and the Wireshark software. We recommend that if you have this inconsistency, that you perform this lab using the ip-ethereal-trace-1 trace file.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

PC Build And Manual Part homework help

PC Build And Manual Part homework help

You will provide a comprehensive and detailed manual documenting the step-by-step process for building a computer using the components provided in LabSim 13.1: “Build a Computer from Scratch.” The manual will be used by entry-level technicians, so it should be clear, concise, and formatted using the IEEE citation style, with screenshots of each step from LabSim 13.1. Your manual should be similar to step-by-step instructions on How to Change the Oil in Your Car. Note carefully how in this example, not only is each step described individually, and in detail, but also there is a visual representation of each step. You should model your submission along the same lines. Keep in mind that your manual will be used as a guide for new technicians.

The manual should not document how to complete a LabSim section; rather, it should provide detailed instructions on how to build an actual computer for a potential customer:

“Drag the motherboard from the shelf to the motherboard plate in the system case.”

“After properly grounding yourself, pick up the motherboard and place it inside the area where the motherboard will sit in the case. Align the screw holes on the motherboard with the screw holes on the case. Use appropriate screws to mount the motherboard inside the case, making sure not to scratch the surface of the motherboard.”

To learn about the required parts which must be present in your submissions, and to learn how you will be assessed on this assignment, please take a moment to review the  rubrics.

The manual will be submitted in three separate parts, at three suggested milestone times. Part 1 addresses Sections 1-5 of the overall manual, Part 2 addresses Sections 6-10, and Part 3 addresses Sections 11-12.

PC Build & Manual Part 1:

1. Workspace Preparation (LabSim 2.0)
2. Installing Motherboard (LabSim 3.3)
3. Installing Power Supply (LabSim 3.2)
4. Installing CPU (LabSim 3.5)
5. Installing RAM (LabSim 3.7/3.8)

PC Build & Manual Part 2:

6. Installing Hard Drive (LabSim 5.2)
7. Installing Optical Drive (LabSim 5.3)
8. Installing Video Card (LabSim 3.12)
9. Connecting Monitors, Keyboard, and Mouse (LabSim 4.0)
10. BIOS Configuration (LabSim 3.10)

PC Build & Manual Part 3:

11. Installing Windows 7 (LabSim 10.3)
12. Configuring Critical Windows Features (LabSim 9.0 and 10.0)

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

  1. sDownload the attached template called “INFO620-Assignment1_LastNameFirst.doc”.
  2. Change the file name applying your Last Name and First Name in place of the LastNameFirst.
  3. Then open the newly saved file and enter your name and the date due on the top of the document.
  4. Then enter each problem’s solution within this same file in their proper locations WITHOUT changing or erasing the questions.
  5. Support your responses and answers by references from the text.
  6. Review and complete all questions.
  7. Then upload to Assignment #1 area of the Assignments.
  8. Your grade may be reduced if these instructions are NOT followed closely.

Week 1 Assignment Grading Rubric: 

#1.9 0.2 points #3.13 0.3 points #4.12a 0.2 points
#1.10 0.2 points #3.16 0.3 points #4.12b 0.2 points
#1.12 0.2 points #3.19a 0.2 points #4.12c 0.2 points
#1.13 0.2 points #3.19b 0.2 points #4.12d 0.2 points
#1.14a 0.2 points #3.19c 0.2 points #4.12e 0.2 points
#1.14b 0.2 points #3.19d 0.2 points #4.12f 0.2 points
#2.14 0.3 points #3.20 0.3 points #4.15a 0.2 points
#2.15 0.3 points     #4.14b 0.1 points

Here are the contents of Assignment #1 (however – please use the template attached  – don’t copy and paste from here):

CH1: DATABASES AND DATABASE USERS
#1.9 – What is the difference between controlled and uncontrolled redundancy?
#1.10 – Specify all the relationships among the records of the database shown in Figure 1.2.
#1.12 – Cite some examples of integrity constraints that you think can apply to the database shown in Figure 1.2.
#1.13 – Give examples of systems in which it may make sense to use traditional file processing instead of a database approach.
#1.14 – Consider Figure 1.2.
a.        If the name of the ‘CS’ (Computer Science) Department changes to ‘CSSE’ (Computer Science and Software Engineering) Department and the corresponding prefix for the course number also changes, identify the columns in the database that would need to be updated.
b.       Can you restructure the columns in COURSE, SECTION, and PREREQUISITE tables so that only one column will need to be updated?
CH 2: DATABASE SYSTEM CONCEPTS AND ARCHITECTURE
#2.14 – if you were designing a Web-based system to make airline reservations and to sell airline tickets, which DBMS Architecture would you choose from Section 2.5? Why? Why would the other architectures not be a good choice?
#2.15 – Consider Figure 2.1. In addition to constraints relating the values of columns in one table to columns in another table, there are also constraints that impose restrictions on values in a column or a combination of columns within a table. One such constraint forces that a column or a group of columns must be unique across all rows in the table. For example, in the STUDENT table, the StudentNumber column must be unique (to prevent two different students from having the same StudentNumber). Identify the column or the group of columns in the other tables that must be unique across all rows in the table?
CH 3: THE RELATIONAL DATA MODEL AND RELATIONAL DATABASE CONSTRAINTS
#3.13 – Consider the relation CLASS(Course#, Univ_Section#, InstructorName, Semester, BuildingCode, Room#, TimePeriod, Weekdays, CreditHours). This represents classes taught in a university with unique Univ_Section#. Give what you think should be various candidate keys and
#3.16 – Consider the following relations for a database that keeps track of student enrollment in courses and the books adopted for each course:
STUDENT (SSN, Name, Major, Bdate)
COURSE (Course#, Quarter, Grade)
ENROLL (SSN, Course#, Quarter, Grade)
BOOK_ADOPTION (Course#, Quarter, Book_ISBN)
TEXT (Book_ISBN, Book_Title, Publisher, Author)
Specify the foreign keys for this schema, stating any assumptions you make.
#3.19 – Consider a STUDENT relation in a UNIVERSITY database with the following attributes (Name, SSN, Local_phone, Address, Cell_phone, Age, GPA). Note that the cell phone may be from a different city and state (or province) from the local phone. A possible tuple of the relation is shown below:
Name
SSN
LocalPhone
Address
CellPhone
Age
GPA
George Shaw William Edwards
123-45-6789
555-1234
123 Main St., Anytown, CA 94539
555-4321
19
3.75
a.        Identify the critical missing information from the LocalPhone and CellPhone attributes as shown in the example above. (Hint: How do call someone who lives in a different state or province?)
b.       Would you store this additional information in the LocalPhone and CellPhone attributes or add new attributes to the schema for STUDENT?
c.        Consider the Name attribute. What are the advantages and disadvantages of splitting this field from one attribute into three attributes (first name, middle name, and last name)?
d.       What general guideline would you recommend for deciding when to store information in a single attribute and when to split the information.
#3.20 – Recent changes in privacy laws have disallowed organizations from using SSN to identify individuals unless certain restrictions are satisfied. As a result, most US universities cannot use SSNs as primary keys (except for financial data). In practice, StudentID, a unique ID, a unique identifier, assigned to every student, is likely to be used as the primary key rather than SSN since StudentID is usable across all aspects of the system. Reference the entire problem in the text
CH 4: Basic SQL
#4.12 – Specify the following queries in SQL on the database schema of Figure 1.2.
a)       Retrieve the names of all senior students majoring in ‘COSC’ (computer science).
b)       Retrieve the names of all courses taught by professor King in 85 and 86.
c)       For each section taught by professor King, retrieve the course number, semester, year, and number of students who took the section.
d)       Retrieve the name and transcript of each senior student (Class=5) majoring in COSC. Transcript includes course name, course number, credit hours, semester, year, and grade for each course completed by the student.
e)       Retrieve the names and major departments of all straight A students (students who have a grade of A in all their courses).
f)        Retrieve the names and major departments of all students who do not have any grade of A in any of their courses.
#4.15 – Consider the EMPLOYEE table’s constraint EMPSUPERFK as specified in Figure 4.2 is changed to read as follows:
CONSTRAINT EMPSUPERFK
 FOREIGN KEY (SUPERSSN) REFERNCES EMPLOYEE(SSN)
        ON DELETE CASCADE ON UPDATE CASCADE,
Answer the following questions:
a.        What happens when the following command is run on the database state shown in Figure 5.6?
                DELETE EMPLOYEE WHERE LNAME = ‘Borg’
b.       Is it better to CASCADE or SET NULL in case of EMPSUPERFK constraint ON DELETE?
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Exp19_Excel_Ch10_ML1_Dow_Jones_Instructions.docx

Grader – Instructions Excel 2019 Project

Exp19_Excel_Ch10_ML1_Dow_Jones

 

Project Description:

You are an intern for Hicks Financial, a small trading company located in Toledo, Ohio. Your intern supervisor wants you to create a report that details all trades made in February using current pricing information from the Dow Jones Index. To complete the task, you will import and shape data using Power Query. Then you will create data connections and visualizations of the data.

 

Steps to Perform:

Step Instructions Points Possible
1 Start Excel. Download and open the file named Exp19_Excel_Ch10_GRADER_ML1_Dow.xlsx. Grader has automatically added your last name to the beginning of the filename. 0
2 Use Get & Transform Data tools (Power Query) to import the Dow Index information located in Table 2 from the URL https://finance.yahoo.com/quote/%5EDJI/components?p=%5EDJI. Before loading the data, use the Power Query Editor to remove the Change, % Change, and Volume columns. Format the Last Price column as Currency, name the query Dow and load the data into the existing worksheet. 15
3 Name the worksheet Current_Price. 5
4 Use Power Query to import trade data located in the workbook Exp19_Excel_Ch10_GRADER_ML1-TradeInfo.csv. Before loading the data, if necessary use the Power Query Editor to remove the NULL value columns and use the First Row As Headers. Split the company column using the left most space as the delimiter and rename the respective columns Symbol and Company Name. 15
5 Rename the worksheet Trades. 5
6 Add the Dow table and the Exp19_Excel_Ch10_GRADER_ML1-TradeInfo table to the Data Model. 0
7 Use Power Pivot to create the following relationship: Table Exp19_Excel_Ch10_GRADER_ML1-TradeInfo Field Symbol Table Dow Field Symbol 15
8 Use Power Pivot to create a PivotTable with the EXP19_Excel_Ch110_GRADER_ML1_TradeInfo Date field as a Filter, Last Price as a value, and the Dow table Company Name as Rows. 20
9 Create a Clustered Column PivotChart based on the PivotTable that compares the trading price of Apple and Coca-Cola stocks. 15
10 Add the chart title Trading Comparison, apply Accounting Number Format to cells C4:C5, and name the worksheet Price_Comparison. 5
11 Delete Sheet 1, if necessary. 5
12 Edit the connection properties to Refresh data when opening the file. 0
13 Save and close Exp19_Excel_Ch10_GRADER_ML1_Dow.xlsx and Exp19_Excel_Ch10_GRADER_ML1-TradeInfo.csv. Exit Excel. Submit the file as directed. 0
Total Points 100

 

Created On: 10/05/2020 1 Exp19_Excel_Ch10_ML1 – Dow Jones 1.3

Amy_Exp19_Excel_Ch10_GRADER_ML1-Dow.xlsx

Sheet1

1

2

3

4

5

6

7

8

9

A

B

C

D

E

Exp19_Excel_CH10_GRADER_ML1_Dow Jones_Final.jpg

Exp19_Excel_Ch10_GRADER_ML1-TradeInfo.csv

Date,Trade_#,Company,,,,, 2/27/2021,8280,CAT Caterpillar,,,,, 2/25/2021,3564,CVX Chevron,,,,, 2/25/2021,7709,BA Boeing,,,,, 2/11/2021,5494,BA Boeing,,,,, 2/7/2021,6555,HD Home Depot,,,,, 2/13/2021,8821,CSCO Cisco,,,,, 2/14/2021,4771,DIS Disney,,,,, 2/17/2021,9021,HD Home Depot,,,,, 2/28/2021,1342,BA Boeing,,,,, 2/6/2021,5092,AAPL Apple,,,,, 2/20/2021,9602,AAPL Apple,,,,, 2/16/2021,3952,GS Goldman Sachs,,,,, 2/20/2021,3432,MMM 3M,,,,, 2/10/2021,2953,KO Coca-Cola,,,,, 2/27/2021,9270,AXP American Express,,,,,

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

homework help For PROJECT – Implementing an Online Shopping System with Use of the Decorator, Strategy, and Command Patterns

homework help For PROJECT – Implementing an Online Shopping System with Use of the Decorator, Strategy, and Command Patterns

PROJECT – Implementing an Online Shopping System with Use of the Decorator, Strategy, and Command Patterns

(and more!)

 

PROBLEM

You are to design and implement an Amazon.com-like online shopping system. You may include actual features of Amazon (e.g., Prime customers), or you may include your own features. The capabilities of the system MUST INCLUDE the following:

 

· generation of a receipt of some kind for all of the orders placed, and the

inclusion of items on the receipt that are a result of the particular items

purchased (by use of the Decorator design pattern).

 

· the use of the Command design pattern for implementation of the

overall command-driven aspect of the system.

 

· the use of the Strategy design pattern for any part of the system the

demonstrates its appropriate use

In addition, utilize any other design patterns that can be appropriately applied. Be creative in the features supported by the inclusion of such design patterns. For example, the Decorator design pattern can be used for any situation in which there are various combinations of behavior that cannot be determined until runtime (not just the printing of a receipt). For example, the total amount of an order may utilimately be based on (a) the items ordered, (b) the shipping option selected, (c) whether a preferred (“prime”) customer or not, (d) whether you have any credit from previous purchases/returns, (e) whether you are purchasing items that are currently on sale, (f) whether the purchase of a given item gives you a free associated item, etc. The same is true of the Strategy pattern, it can be used in any situation in which a section of code (algorithm) can vary, and especially if it can be judged that it may vary in the future.

 

 

DECORATOR AND COMMAND PATTERN MATERIALS

Materials are provided giving details on the design and example use of the Decorator pattern (from a previous Best Buy assignment(Decorator)) and the Command pattern (from a previous automated restaurant system assignment(Restaurant)). These should be used for studying the details of the GENERAL use of these patterns.

 

 

System Interface / User Interface

Your system must be designed with the use of a system interface class, as demonstrated in the automated restaurant system assignment. The methods of the system interface must only return values of type String for a separate user interface to call .The user interface may be text-based, or a GUI interface.

 

WHAT TO SUBMIT

Please submit one pdf document along with your code. (Export all class diagrams to pdf. Do not submit file formats of the particular UML drawing tool used.) and also Your code separately. Your submission should include,

· A use case diagram of your system. There is no set number of use cases to include – that will vary based on the particular system designing. Include an explanation of each use case. (Scenarios do not need to be provided.)

· The class diagram for your system. Make sure to include all of the classes and interfaces. The class diagram should include the relationships of association, composition, aggregation, generalization (inheritance), and dependency where they exist; notation of multiplicity, navigation, and role names where appropriate; and the inclusion of the methods within each class, including access modifiers (public, protected, private), parameters, and return type (instance variables do not need to be included).

· Discussion of the use of each design pattern within your design, including

· why you made the decision to incorporate the use of the pattern

· the benefits of the included pattern

· what specific aspects of the system can be easily modified as a

result of the use of design patterns in the design

· Program code, with sufficient in-code documentation

 

· List of commands the system provides, with a brief explanation of each

1

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Warming Hut Management

This week it seems like everyone needs an answer to a question. The Accounting Manager for Operations has asked you to update some analysis prepared earlier in the year. In an attempt to predict year-end changes in net income, you have been asked to prepare some reports on changes in condominium rental fees, ski lift tickets, and X Game tickets and pricing.

The Sales Department for Luxury Condominiums wants to know how increasing their rental pricing by varying percentages will affect the existing pricing. The manager would like to know how that will increase the Summit Ridge Mountain Resort’s total revenue. A one-variable data table might be good to create these results.

The supervisor in charge of setting prices for lift tickets also needs some help. She wants to price the lift tickets so that they are affordable but yet offer the resort a chance to improve its net income at the end of the season. A one-variable data table might be able to answer this question.

Resort Management has a target income for the X Games. They need help determining the best combination of pricing and quantity of tickets to sell for the X Games to be a success. A two-variable data table might be best to display these results.

And there are more puzzling questions. Resort Management has reviewed variables such as lift ticket prices, restaurant revenues, retail revenues, maintenance costs, and payroll. They would like you to create a Scenario Summary to determine optimistic, mid-range, and pessimistic scenarios for the resort. The Operations Manager would like to know how these changes might affect revenue, expenses, and net income. A Scenario Summary would be a good choice for this analysis.

Last, all of the Warming Hut Management need a little help with some investigation on their data. They have quite a bit of data collected but need some assistance making sense of it. It may be time to polish your skills with Pivot Tables, because the management has many questions and concerns. Your boss is confident about your ability to be creative and customize some Pivot Tables that are unique to each Hut.

What-If questions need solid answers. It is time to provide a professional response.

Deliverables

After completing the steps below, turn in one Excel 2016 workbook. Rename the workbook with your lastname_first initial_Week6_Lab. xlsx. Example: If your name were Jane Doe, your workbook would be Doe_J_Week6_Lab.xlsx.

LAB 6 – What-If-Analysis
Step Task Points Possible Points Received Comments
1 Complete Income Statement
1a – g Complete formulas & formatting 4
2 Build One-Variable Data Tables
2a One-Variable Data Table for condo rentals 3
2b One-Variable Data Table for ski lift tickets 3
2c Apply conditional formatting 2
2d Answer question in G17 5
3 Build Two-Variable Data Table
3a Enter Net Income and format 3
3b Apply conditional formatting 3
3c-d Answer question in G17 5
4 Scenarios and Summary
4a Name Cells for Scenario 2
4b Create three scenarios 4
4c Create Scenario Summary 2
4d Move sheet & apply formatting 2
5 Create Pivot Tables
5a, b Build Pivot Table 1 3
5c Build Pivot Table 2 3
5d Build Pivot Table 2 3
5e Create a chart for one pivot table 2
5f Apply professional formatting 2
6 Create Documentation Sheet
6a Create Documentation Sheet 2
6b Organize worksheet contents 1
6c, d Format Documentation Sheet 1
Comment: What you learned from completing this Lab 5
TOTAL POINTS 60 0

Week 6 Grading Rubric

Lab Resources

Microsoft Office: Excel 2016

Options for Accessing Microsoft Excel 2016

  1. Use a personal copy on your PC. You can request a copy of Microsoft Office 2016 via the Student Software Store icon on the Course Resources Page.
  2. If you are a MAC user, click to read the MAC User Information.
  3. If you do not have Excel 2016 installed locally, then access the software by going to the Course Resources page, Lab Resources section, and click the Virtual Lab Citrix icon.

Lab Steps

Preparation

You will be using Microsoft Excel 2016 for this lab.

Be sure you have read the required chapter materials and reviewed the hands-on exercise videos located on the Lesson page before you begin the lab.

Please do not rely solely on the hands-on exercise videos to complete this week’s lab. The videos provide detailed examples walking you through the hands-on exercises. Applying the hands-on exercise examples will provide both practice and instruction of what to complete.

Begin: Open and Save

Download the spreadsheet Week 6 Lab – Summit Ridge Mountain Resort Student.xslx. (Links to an external site.)Links to an external site. You will be prompted to save the file. Click yes.

Open the saved file from your Download folder on your computer.

Note: If you are using the Remote Lab environment, you will need to follow the instructions for uploading the file. These instructions can be found on the Lab page when you click on the Lab icon on Course Resources.

To save the spreadsheet with a new file name,

  • open the workbook in Excel 2016; and
  • in Excel, click File and then Save As and rename it as lastname_first initial_Week6_Lab.xlsx (Jane Doe would save the file as Doe_J_Week6_Lab.xlsx).

Step 1: Complete Income Statement

It is time to build the formulas needed to complete the income statement. Begin working on the Income Statement worksheet and complete formulas for all of the cells marked in gray.

  1. Enter the formula to calculate the Condo Rentals Revenue in C13 Multiple the Quantity of Condo Rental Days * the Price for Condo Rental.
  2. Enter the formula to calculate the Ski Lift Revenue in C14 Multiple the Quantity of Ski Lift Tickets * the Price for Ski Lift Tickets.
  3. Enter the formula to calculate the Winter X Games Revenue in C17 Multiple the Quantity of X Games Tickets * the Price for X Games Tickets.
  4. Enter the formula to calculate the Total Revenues in C20 and Total Expenses in C34.
  5. Make sure the cell references for Total Revenues and Total Expenses are placed in cells C37 and C38 respectively.
  6. Enter the formula to calculate the Net Income in cell C39.
  7. Apply professional formatting to all of this data using the image below as a guide.

Income Statement

Step 2: Build the One-Variable Data Tables

Now that the Income Statement is complete, begin to address the questions about the condo rentals and ski lift tickets.

  1. Build a one-variable data table based on condo rental days. The initial values for Revenue and Net Income for cells I6 and I7 should be cell references from the income statement.
  2. Build a one-variable data table based on the quantity of ski lift tickets. The initial values for Revenue and Net Income for cells I14 and I15 should be cell references from the income statement.
  3. Apply conditional formatting to highlight Net Income of at least $250,000 for each of the one-variable data tables.
  4. In cell G17, a question exists. “If management has a target net income of at least $250,000, which of the above SPECIFIC scenarios in the condo rentals or ski tickets one-variable data table would you recommend using? Explain your reasoning.” Make sure you place your answer in the text box beginning in cell G20.
  5. Apply professional formatting to all of this data using the image below as a guide.

One-Variable Data Tables 

Step 3: Build the Two-Variable Data Table

Once the one-variable data tables are complete, begin to address the questions about the X Games tickets sold.

  1. Build a two-variable data table based on the quantity and price of the X Games tickets sold.  Enter a reference to Net Income in cell I27 from the income statement.
  2. Apply conditional formatting to highlight Net Income of at least $250,000 for each of the two-variable data table.
  3. In cell G37, a question exists. “If management has a target net income of at least $250,000. Which of the above SPECIFIC combinations of price and quantity of X Games Tickets in the two-variable data table would you recommend using? Explain your reasoning.”
  4. Make sure you place your answer in the text box beginning in cell G40.
  5. Apply professional formatting to all of this data using the image below as a guide.
    Two-Variable Data Table

Step 4: Create the Scenario Summary

You addressed quite a few questions. Now it is time to create a Scenario Summary.

  1. Assign names to all of the income statement cell values in column C in the assumptions, revenues, expenses, and summary sections using the labels in column B. For example, select cells B5:C10, and then on the Formula tab in the Defined Names Group, select “Create from Selection” and use the left column as the name (repeat on lower sections).
  2. Build three scenarios by changing cells C8, C15, C16, C29, and C30 using the following data: Optimistic, Mid-range, and Pessimistic.
    Scenario Details
  3. Generate the Scenario Summary using C37:C39 as the result cells.
  4. Move the Scenario Summary sheet after the Income Statement and apply professional formatting to all of this data using the image below as a guide.

Completed Scenarios

Step 5: Create Pivot Tables From Warming Hut Data

Select the Warming Hut Sales Worksheet. You notice the data are not formatted or organized well.

  1. Use the Warming Hut Sales data to build Pivot Tables.
  2. Build the first Pivot Table to summarize total sales by category and by location. Name this sheet Pivot Table 1.
  3. Build the second Pivot Table to summarize total sales by category and by season for only the Summit View location. Name this sheet Pivot Table 2.
  4. Build the third Pivot Table to summarize total sales by month and by product for only the Mogul Hill location. Name this sheet Pivot Table 3.
  5. Choose one of the created Pivot Tables and add a professional chart to the same worksheet.
  6. Apply professional formatting to all of this data using the image below as a guide.
    Click Image to Expand

Step 6: Create a Documentation Sheet

Clean up the formatting of your Excel workbook, taking into account professional appearance.

 

The Minimum Requirement (per the Grading Rubric)

 

  1. Insert a new spreadsheet into the workbook. The documentation sheet should be the first sheet in the workbook.
  2. Make certain all contents of the workbook are properly noted on the documentation sheet.
  3. Make certain each tab has a descriptive name for each tab (sheet) in the workbook.
  4. Create the professional documentation worksheet. Be sure to include a description of each worksheet. An image is provided below.
    Click Image to Expand

     

 

 

Finish and Submit

Save your Excel file. Make sure you are aware as to where your files are physically saved. Saving your file often is good practice (Ctrl + s).

Your Excel file should contain seven worksheets.

  • Documentation Page
  • Income Statement
  • Scenario Summary
  • WarmingHutSales
  • Pivot Table 1
  • Pivot Table 2
  • Pivot Table 3

Submit one workbook. When submitting the workbook, provide a comment in the comments area explaining what you learned from completing this lab activity. File naming convention: If your name is Jane Doe, then your file should be named very similar to Doe_J_Week6_Lab.xlsx.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Discussion Week 5(Business Continuity And Disaster Recovery)homework help

Business Continuity And Disaster Recovery homework help

GETTING STARTED

Overview of the Project

Nothing is impossible for the man who doesn’t have to do it himself.

—A. H. WEILER

INTRODUCTION

The job of a business executive requires coordination of the many activities necessary to create a successful business. Markets must be analyzed, potential customers identified, strategies for creating and delivering products and services must be developed, financial goals established and reported, legislative mandates followed, and many different stakeholders satisfied. To ensure that these objectives are met, businesses eventually develop a series of processes designed to produce the desired result. But the world is a dangerous place. Earthquakes, floods, tornadoes, pandemics, snowstorms, fire, and other natural disasters can strike at any time and interrupt these important processes. Terrorism, riots, arson, sabotage, and other human-created disasters can also damage your business. Accidents and equipment failures are guaranteed to happen. As an executive responsible for the well-being of your organization, it is critical that you have a plan in place to ensure that your business can continue its operations after such a disaster and to protect vital operations, facilities, and assets.

You do this just like you do any other important task; you analyze the situation and create a plan. A disaster recovery plan keeps you in business after a disaster by helping to minimize the damage and allowing your organization to recover as quickly as possible. While you can’t prevent every disaster, you can with proper planning mitigate the damage and get back to work quickly and efficiently. The key is having a well-thought-out and up-to-date disaster recovery plan. This chapter will lead you through the creation and implementation of a project plan for creating an effective disaster recovery plan.

Disaster recovery is to recover from a significant disaster, such as a roof collapse in the computer room or a fire in a significant portion of the offices. A disaster almost always requires rebuilding a portion of the business in a recovery area in a very short time. Business continuity, also known as business resilience, involves identifying and mitigating critical machines that may fail. For example, a failure of the database server may close down online customer orders, so a second server is clustered and the disk storage is mirrored to provide redundancy.

THE DISASTER RECOVERY PLAN PROJECT

Building a disaster recovery or business continuity plan is much like any other business project. A formal project management process is necessary to coordinate the various players and company disciplines required to successfully deliver the desired results of the project. This chapter will give you a high-level roadmap of what you should expect as you prepare to lead or manage a disaster recovery project. A sample project plan is included in the companion url accompanying this book. Adapt this chapter and the project plan to fit your business goals, company timeline, and scope of project.

Most projects tend to run in a well-defined sequence. For example, to build a new house, first you clear the land, then build the foundation, then build a floor, and so on. Many things cannot begin until the previous step is completed. A business continuity plan (BCP) project is a bit different. In the project’s early stages, most actions logically follow each other. However, once the basic elements are in place, the project bursts out onto parallel tracks, as each department documents its own area. How you proceed in your company is, of course, determined by your corporate culture, the resources available to work with to complete the process, and the level of visible support from the project’s sponsor. Most business continuity projects follow these steps:

1.An executive within the organization decides that a business continuity plan is needed. This might be due to an auditor’s report or the result of a business disruption that was more financially painful than it would have been if a plan had been in place. Or it could be that an alert employee realized that a good plan did not exist and brought this to the executive’s attention. This executive usually becomes the sponsor for the project.

2.The first (and most important) step that the sponsor takes is to select someone to lead the project. This person is most often called the Business Continuity Manager and is responsible for the successful completion of the project.

3.The project sponsor and the Business Continuity Manager meet to clearly define the scope of the project, the project timeline, and expectations. The Business Continuity Manager must be comfortable that the resources available are adequate to meet all the objectives of the project.

4.The Business Continuity Manager selects the team that will work together to complete the project. Both technical and political considerations are important in selecting a team that can successfully develop a workable business continuity plan.

5.The Business Continuity Manager together with the team now develops the project plan to be used in managing the project. Tasks are identified and assigned, task durations calculated, and activities are sequenced as the project plans are developed.

6.The project plans are executed. The Business Continuity Manager oversees the project as the plan unfolds, keeping everyone focused on completing their tasks and ensuring that milestones are met and that important stakeholders are kept informed as to the project’s progress. It is here where the actual continuity plans for the organization are created.

7.Once the business continuity plans have been developed and tested, the Business Continuity Manager closes the project by making sure that everything was documented properly and handing the project results over to the individual(s) responsible for keeping the plan up to date. Each affected department will usually have someone responsible for keeping their portion of the plan current. A report is also generated for the sponsor recapping the project and documenting lessons learned.

In many organizations, the job of Business Continuity Manager is not taken as seriously as it should be. Management in these organizations only wants you to write something, anything to make the auditors go away. That’s okay because as you build the plan, and as they begin to see the benefits, their interest and support will grow.

A project plan organizes the team so members focus their skills on specific actions to get the job done. This respects their time and brings the project to a prompt, but successful, solution.

INITIATING THE PROJECT

Every project starts with a sponsor. A sponsor should be a person with enough organizational influence to give the project credibility, financing, and strategic direction. The sponsor should also possess the management clout to ensure the willing cooperation of other departments and to ensure that the project is adequately funded. Building a business continuity plan in many cases involves changing people’s attitudes and some of their tried-and-true business processes. Business continuity planning is a logical step toward mistake-proofing a business. So, to suppress the reluctance to change or even participate in the project, it is important for the sponsor to be of sufficient stature as to overcome objections before they are raised.

Ideally, the sponsor is the company’s CEO, or the Vice President in charge of the local facility. However, sometimes it is a department manager who realizes that something must be done. Whoever assumes this role must remain involved with the project throughout its lifetime. As the sponsor’s interest fades, so will the interest of your team. Find out why they want to sponsor the project. It will tell you how much support to expect.

In some cases, the sponsor honestly believes the project is a good idea and is personally interested in seeing it is completed. In other cases, the sponsor may have been required to start this project due to an auditor’s citation of a poor business practice. In this situation, the sponsor may only want the minimum recovery plan to satisfy the audit citation. Spend some time early in the project digging out what is motivating support for this project. By understanding what motivates the sponsor, you can gauge how much time and money will be available to you. It is also possible for you to educate the sponsor on the many advantages of having a well-written company-wide plan.

The sponsor’s first task is the selection of the Business Continuity Manager, who will act as the project manager. In most companies, the cynics say that if you raised the issue, then the job is yours! This isn’t a bad way to assign projects because only the people who believe in something would raise the issues. Still, the selection of the right Business Continuity Manager will help make this project a success and the wrong one will make success much more difficult to attain.

The sponsor has the additional duties of approving the plan’s objectives, scope, and assumptions. The sponsor must also obtain approval for funding.

THE BUSINESS CONTINUITY MANAGER

The selection of the person to spearhead this project is the single most important part of building a plan. The Business Continuity Manager should be someone who can gain the willing cooperation of team members and their supervisors. To help ensure the support of everyone in the organization, the Business Continuity Manager should be publicly assigned to this task with the sponsor’s unqualified support. This is essential to overcome internal politics and to let everyone know that their assistance is important and required. As the project moves forward, regular public displays of support are required if the project is to result in a complete and usable plan. Form 1-1 (see companion url) is an example of a letter appointing the Business Continuity Manager.

Some sponsors begin a business continuity project by hiring an outside consultant to build the plan. This can be a good way to get the project started and to mentor someone in the organization to assume the Business Continuity Manager position. More effort and expertise is needed to organize and develop the plan than to administer it. As the plan is built, the consultant teaches the Business Continuity Manager the ropes.

Understand that even though the consultant is guiding the project, the consultant should not assume the role of Business Continuity Manager. Every company, every facility, every computer site is unique. The actions necessary to promptly restore service are the result of the key people at each site writing down what to do and how to do it. Outside consultants can provide considerable insight into the basic services (electrical, telephone, water, data processing), but lack in-depth experience at your company. They don’t know your business processes. They don’t understand the pulse of your business and what its key elements are.

Building a solid plan will take a lot of time. An experienced consultant working with an internal Business Continuity Manager can help move the project along quicker. The Business Continuity Manager is also the logical candidate to become the plan’s ongoing administrator once the initial project is completed. This person will be responsible for keeping the plan relevant and current. Writing a plan and then filing it away is a waste of money. Whoever builds the plan will be intimately familiar with it. That person can easily continue responsibility for maintaining it and teaching others how to keep their portion of the plan current. Using an outside consultant as a Business Continuity Manager raises the possibility that no one has internal ownership to ensure it is updated and tested periodically. The plan must be kept up to date if it is to be useful when it is needed most.

As the plan administrator, the Business Continuity Manager will ensure that as new equipment enters the building, as new products are rolled out, and as new business processes are implemented, they are reflected in the business continuity plan. The Business Continuity Manager also schedules and evaluates the ongoing testing of the plan by department, or by a specific threat, such as the loss of electrical power, to ensure it works. Once the plan is written, the Business Continuity Manager’s role will evolve into ensuring the plan is an integral part of the company’s ongoing operations. No new company process or piece of equipment should begin operation until the mitigation and recovery plans have been tested and approved.

SCOPE OF THE PROJECT

One of the first tasks the Business Continuity Manager must perform is to come to an agreement with the project sponsor as to the scope of the project. The scope of the project defines its boundaries. It identifies what is included in the project and what is not. If the project is too vast, it will probably fail. If it is too small, then it would be best assigned to a single person like any other office detail. The scope of the project must be given a lot of thought. If in doubt, start with a narrow focus on a specific department or function to demonstrate the plan’s value and build up from there. One guideline commonly used is any event that would cost (in lost wages, sales, etc.) more than 5 percent of your quarterly revenues merits its own plan. So, if a temporary outage of a critical machine stops the entire factory, then it needs a plan. If the same machine stoppage means that three extra workers must drill holes with hand tools until the machine is repaired, then it probably does not need a plan.

A good way to approach the plan is to address areas that everyone uses, such as security, data processing, electrical, and so on. Don’t try to tackle too much, too fast. Start with building services, then security and safety, then data processing. In this way, if the project is killed, you still have some useful documents.

If your recovery plans will encompass many sites or a large complex, then start with a pilot project for a single building, a business function, or even for your Data Processing department. This will build your team’s expertise and confidence, resulting in a very useful document, and demonstrate real value to top management. The scope of the project will drive the resource requirements for the project in terms of how many people it will involve, how long it will take, and the budget required to complete it.

The project scope must be a written statement. Here are three examples with gradually narrowing requirements. As you read these scope statements, imagine what sort of implied tasks these statements carry (or as they say, “The devil is in the details!”). Follow up on the scope statement by clarifying the timelines, criteria for success, and overall expectations for this project. Otherwise, you would be digging up information and writing forever.

EXAMPLE #1

If you were in a factory’s Data Processing department, your scope statement might be:

Develop, implement, and provide ongoing testing for a business continuity plan for the factory’s automated systems to include the computer rooms, the internal and external telephone system, the shop floor control systems, and data connections to both internal and external sites. This plan will provide specific action steps to be taken up to and including emergency replacement of the entire computer and telecommunications rooms.

Note that this statement does not include the factory machines (drill presses, mills, conveyors, etc.) or the front offices. It is focused on the telephone system and the internal data processing functions.

EXAMPLE #2

If you were the Director for Building Security, your scope might be:

Write an emergency contingency plan to address the possibility of fire, personal injury, toxic material spill, and structural collapse. Include escalation procedures, emergency telephone numbers, employee education, and specific emergency actions. Make recommendations concerning potential mitigation actions to take before a disaster strikes. Ensure the plan conforms to all legal, regulatory, and insurance requirements.

The project scope described in this statement does not include flood controls or security actions. Although some security tasks may be implied, very little is called for.

EXAMPLE #3

An even narrower approach might be:

Document all the payroll procedures and recovery processes to ensure that paychecks are always on time and that the automated vacation balance tracking system is available even during an electrical outage.

Note that this scope statement does not include time clocks, exception reporting, or interfaces with your accounting system.

Most people do not have any idea of what a disaster plan would look like. They imagine some large book just sitting on the shelf. In this situation, you could demonstrate the usefulness of the plan by building it a piece at a time. You might build the part that covers the core utilities for a facility (electricity, gas, telecommunications, water, and heating and air conditioning). As you review with the sponsor how these essential services will be recovered after a disaster, the sponsor will begin to see the usefulness of your work. If your company has multiple sites, it might work better for you to build the plan one site at a time.

TIMELINES, MAJOR MILESTONES, AND EXPECTATIONS

The output of a scope statement is to build a list of goals for the project. These are specific results against which the success of the project will be judged. Detail any expectations as to a completion date or major milestone dates. If this project is in response to an internal audit item, then the due date might be when the auditor is scheduled to return. If the Board of Directors required this to be done, then progress reports might be due at every directors meeting. Ensure all key dates are identified and explain why they were selected.

The term “expectations” can also be described as the criteria for success. Be clear in what you are asking for. A business continuity plan should only include critical processes. A critical process is usually defined as a process whose interruption would cause a material financial and operational impact over some time interval that you define (5 percent or greater of quarterly revenues is standard). You can’t plan for what to do down to the front door being stuck open. That level of detail would be too difficult to maintain. Focus on the critical business functions and the processes that support them. Your long-run goal is that the business continuity planning process will become an integral part of how business will be conducted in the future.

Some example criteria for success include:

image Every department’s continuity plan must provide for employee and visitor safety by detailing to them any dangers associated with this device or type of technology.

image Each department’s continuity plan must be understandable to anyone familiar with that type of equipment or technology.

image A business continuity plan will be submitted for every critical piece of equipment or critical process in the facility.

image At the end of the project, the Business Continuity Manager will submit a list of known weaknesses in the processes or equipment along with long-term recommendations to address them.

image All continuity plans will be tested by someone other than the plan’s author and certified by the department manager as suitable for the purpose.

image This project shall commence on June 1 and be completed by December 31. By that time, all plans must be complete, tested, and approved by the department managers.

In terms of a timeline, the length of your project will depend on how supportive the team members are of this effort, how complex your operations are, and how detailed your plan must be. Generally, these projects have an initiation phase and then the various departments break off and work in parallel to write their respective plans. During this phase, they also perform initial testing of the plan. At the end, all the plans are compared and modified to avoid duplicate mitigation actions and to ensure one person’s mitigation step doesn’t cause problems for someone else. The capstone event is the system-wide disaster test.

As a general guideline, most plans can be completed in about six months, depending on the project’s scope, the degree of management support, the number of locations to be included in the plan, and the amount of resources available. One month is spent on the start-up administration and training. About three months are needed to draft and test the departmental plans. Be sure to stay on top of these people so they don’t forget about their plans! The final synchronization and testing should take an additional two months. However, as your team members are probably assigned to this project part-time, their level of participation will vary based on their availability. The Business Continuity Manager must be flexible but, in the end, is responsible for driving the project to its completion.

ADEQUATE FUNDING

One of the indicators of the seriousness of a project is the presence of a separate budget item to support its activities. It is the Business Continuity Manager’s responsibility to track the funds spent on the project and to demonstrate the benefit they provided. If a separate budget is not available, then clear guidelines on a spending ceiling for the project must be set.

Among the items to include in the project budget are:

image The Business Continuity Manager and key team members should attend formal business continuity planning training to obtain a thorough grounding in its principles. This speeds the project along and removes some of the guesswork of building a plan.

image You may need to pay a consultant to advise the project and mentor the Business Continuity Manager as the plan is being developed.

Sometimes the folks with the most knowledge about your processes are not available during normal working hours. For these people, you may need to schedule meetings on weekends or off-site to gain their full attention. This may incur overtime expense or the cost of a consultant to backfill the person while they work on the plan.

image Temporary help might be needed for administrative assistance, such as documenting the wiring of your data networks, transcribing notes for those without the time or inclination to type, or conducting an asset inventory.

image It is a good practice to build team spirit for the project to carry you over the rough times. This might be shirts, hats, special dinners, performance bonuses, and many other things to build team cohesion. It is amazing what bringing a few pastries into a meeting can do for attendance. Visible recognition also helps to maintain the team’s enthusiasm.

VISIBLE ONGOING SUPPORT

If the goal of this project was to determine which employees deserved to have their pay doubled, you would be inundated with folks clamoring to join your team. Unfortunately, an assignment to a business continuity planning team may not be considered a high-profile assignment. This could discourage the enthusiastic support of the very people you need to make this project a success. To minimize this possibility, the visible, vocal, and ongoing support of the sponsor is very important.

Once the sponsor and the Business Continuity Manager have agreed on the scope, the sponsor should issue a formal memo appointing the Business Continuity Manager in a letter to the entire organization. This letter should inform all departments of the initiation of the project and who has been appointed to lead it. It should also describe the project’s scope, its budget or budget guidelines, and major milestones and timelines, as well as alert the other departments that they may be called on to join the project and build their own recovery plans. This memo will detail who, what, where, when, why, and how the project will unfold. The closing paragraph should include a call for their assistance in ensuring the project will be a success.

The sponsor should provide periodic updates to senior management on the progress of this project, which should include milestones met and problems that need to be overcome. Regular visibility to senior management can go a long way toward the continued support of each department with which you’ll be working.

SELECTING A TEAM

Once the sponsor and the coordinator have defined the scope of the project, the next step is to create a team. As you begin the project and start selecting your team, be ready for a chorus of resistance. Some departments will be indignant about being forced to join this project since they already have a plan (it’s just no one can find it). Even if they have a plan, it does not mean that it is a good plan, or it may have interdependences with other areas and needs to be linked to other plans. Some will already have a plan being developed, but under scrutiny you see it has been under development for the last 10 years.

So, with the naysayers in tow, prepare to select your team. In the case of existing, workable plans, ask that a liaison be appointed. For the plans under development, ask that those hardworking people join the project team. As for any parsimonious financial people trying to kill your project’s training request, ask the sponsor to override objections and allow the team to attend training on the latest business continuity best practices.

IDENTIFY THE STAKEHOLDERS

While forming your team, take time to identify the project’s stakeholders. A stakeholder is anyone who has a direct or indirect interest in the project. Most stakeholders just want to know what is going on with the project. Stakeholders need to be kept regularly informed about the project’s progress or problems with which they need to assist.

For all stakeholders, identify their goals and motivation for this project. Based on this list, you will determine what to communicate to them, how often, and by which medium. Some stakeholders’ interests are satisfied by a monthly recap report. Some will want to hear about every minor detail. Form 1-2 (see companion url) is a Stakeholder Assessment Map. Use it to keep track of what the key stakeholders are after in this project so you do not lose sight of their goals. The strategy is an acknowledgment that you may need to apply some sort of specific attention to an essential person to keep them supporting this important project.

FORM THE TEAM

The size and makeup of your team depends on how you will roll out the project. In the very beginning, it is best to start with a small team. Always respect people’s time. Don’t bring anyone into the project before they are needed. The initial team lays the groundwork for the project by arranging for instructors, coordinating training on building disaster plans, or helping to sharpen the focus of what each plan should contain.

The core team should consist of the sponsor, the Business Continuity Manager, an Assistant Business Continuity Manager, and an administrative assistant. This group will prepare standards, training, and processes to make the project flow smoother.

Several other key people will eventually need to join the team. You may want to bring them in early or as they are needed. This may include people such as:

image  Building Maintenance or Facilities Manager.  They can describe what mitigation steps are already in place for the structure, fire suppression, electrical service, environmental controls, and other essential services.

image  Facility Safety and Security.  They should already have parts of a disaster plan in terms of fire, safety, limited building and room access, theft prevention, and a host of other issues. If these plans are adequate, this may save you from writing this part of the plan. Be sure to verify that these plans are up to date and of an acceptable quality.

image  Labor Union Representative.  In union shops, the support of the union makes everyone’s job easier. Show union leadership how a carefully created plan will help keep their members working and they will be very helpful.

image  Human Resources.  The HR people have ready access to up-to-date information about the individuals who are important to the plan.

image  Line Management.  These individuals tend to know the most about what is critical for getting the work done in their areas of responsibility.

image  Community Relations.  A disaster may affect more than just your operations. You may need help from the surrounding community while recovering from a disaster.

image  Public Information Officer.  This is your voice to the outside world. The role is critical in getting accurate information out to customers and vendors when dealing with a disaster.

image  Sales and Marketing.  These people know your customers the best and can provide insight on what level of service is required before customers begin to fade away.

image  Finance and Purchasing.  These people know your vendors the best and can provide insight on what kind of support you can expect from vendors while recovering from a disaster.

image  Legal.  You need more than just common sense during an emergency. Your legal team can provide important insight on the legal ramifications of activities performed in response to an emergency.

The next step is to make a few tool standardization decisions. The company’s technical support staff usually makes these decisions for you. Announce to the group the standard word processing program, spreadsheet, and, most important, the project management software everyone will need on their workstations. Most people have the first two, but few will have the project management software already loaded. Be sure that as people join the team, copies of the software are loaded onto their workstations and training is made available on how to use this tool.

Provide example templates for the recovery documents. This step will ensure that the same type of information is found in all plans under the same headings. Also, it is easier to start writing if the basic document layout is already determined.

You will get the best results by investing some time training team members on how to write their portion of the plan and providing administrative help if they have a lot of paperwork to write up (such as network wiring plans). Every person reacts differently to a new situation, and being assigned to this team is no exception. If you will take the time to assemble a standard format for the plan and a process to follow to write it, then people will be a lot more comfortable being on the team.

A project of this type will generate a lot of paper. If possible, the accumulation of the various plans, wiring diagrams, manuals, and so on should be shifted from the Business Continuity Manager to an administrative assistant. An administrative assistant will also free the Business Continuity Manager from having to coordinate team meetings and track the project costs. Although these tasks are clerical in nature, they may also be given to the Assistant Business Continuity Manager. Another value of appointing an Assistant Business Continuity Manager is that it provides a contingency backup person in case something happens to the Business Continuity Manager, as this person will quickly learn about all aspects of the plan.

Once you are ready to roll out the project plan to the world, pull in representatives from the various departments involved. When tasking the department managers to assign someone, ensure they understand that they are still responsible for having a good plan so that they send the proper person to work on the team. This person need not know every aspect of their department, but they should understand its organization, its critical hardware and software tools, and its major workflows.

Depending on the project’s scope, you might end up with someone from every department in the company. This would result in too many people to motivate and keep focused at one time. Break the project down into manageable units. Start with an area you are most familiar with or that needs the most work. Involving too many people in the beginning will result in chaos. Plan on inviting in departments as you begin to review their area. An example is fire safety. Although it touches all departments, it is primarily a Safety/Security department function.

Given all this, just what skills make someone a good team member? An essential skill is knowledge of the department’s processes. This allows the team member to write from personal knowledge and experience instead of spending a lot of time researching every point in the plan. Members should also know where to find the details about their departments that they don’t personally know. Another useful skill is experience with previous disasters. Even the normal problems that arise in business are useful in pointing out problem areas or documenting what has fixed a problem in the past. And of course, if team members are to write a plan, they need good communications skills.

Department managers should appoint a representative to the business continuity planning project team by way of a formal announcement. However, the Business Continuity Manager must approve all team members. If someone with unsuitable qualifications is sent to represent a department, they should be sent back to that manager with a request to appoint someone who is more knowledgeable about that department’s processes. When rejecting someone from the team, be sure to inform your sponsor and the originating manager as to why that person is unsuitable.

The people on the initial project team are the logical ones to spread the good word of business continuity planning back to their departments. Time spent educating them on the continuity planning principles and benefits will pay off for the company in the long run. They can also learn more about the company by proofreading the plans submitted by the other departments. This has an additional benefit of broadening the company perspective of many of the employees. Use Form 1-3 (see companion url) to map out the responsibilities of each member of the team.

ROLLING OUT THE PROJECT TO THE TEAM

Team meetings are an opportunity to bring everyone together so they all hear the same thing at the same time. This is when you make announcements of general interest to everyone. It is also a good time to hear the problems that the team has been encountering and, if time permits, to solicit advice from the other team members on how to approach the issue. A properly managed meeting will keep the team members focused on the project and the project moving forward.

In the beginning, conduct a project rollout meeting with an overview of why this project is important and an explanation of what you are looking for. This is your most critical team-building meeting (you never get a second chance to make a good first impression). In most meetings, you will work to bring out from the people their thoughts and impressions on the project. But at the first meeting, be prepared to do most of the talking. Lay out the roles of each player and set their expectations about participation in the project. Information makes the situation less uncertain and the people can begin to relax. This is your first big chance to teach, cheerlead, and inspire your team! Sell your project to them!

The team members should leave the meeting with a clear idea that this project is of manageable size—not a never-ending spiral of work. Use this meeting and every meeting to informally teach them a bit about business continuity planning.

As the project progresses, you will be surprised how hard it is to get business continuity information out of people. Some people are worried that others will use it to dabble with their systems. Some folks just don’t know what they would do in a disaster and intend to ad lib when something happens, just like they always have. Have patience, ask leading questions, and get them to talk. When they have declared their plan complete (and you know it is only a partial plan), conduct a meeting with the team member, their manager, and the sponsor to review the plan. Step through it item by item. By the time that meeting is over, team members will realize that they will be accountable for the quality of their plans.

PLANNING THE PROJECT

Refer to the sample plans included in the companion url for ideas to include in your plan. Any plan that you use must be tailored to your site and management climate. Always keep your plan in a software tool like Microsoft Project. Such programs will recalculate the project’s estimated completion date as you note which tasks are complete. It can also be used to identify overallocated resources.

Okay, now it is time to build the project plan. This is best done with input from your team. There are four basic processes to building your plan: identifying the activities, estimating how long each task will take, deciding who should do what (or what skills this person should have), and then sequencing the tasks into a logical flow of work. The general term for this is a work breakdown schedule, which describes it quite nicely.

IDENTIFYING THE ACTIVITIES

What must be done? Your core project team members can be a great help here by identifying the steps they see as necessary to complete this project. Although some tasks will logically seem to follow others, the focus here is to identify what needs to be done. How deeply you “slice and dice” each task is up to you. Unless it is a critical activity, you should rarely list any task that requires less than eight hours of work (one day). The times in the sample plan are calendar time, not how long the task will take. This is because your team members may only work on this project part-time.

Write a brief paragraph describing each task. This will be very useful in estimating the time required to complete it. It also keeps the task’s scope from spiraling out of control. You may understand what you mean for a task, but remember, someone else will probably execute the task, so an explanation will be very useful.

Always document your planning assumptions. A planning assumption is something that you believe is likely to be true but you are not sure. Each assumption has a risk of being false. Assumptions enable planning to move forward. For example, one assumption is that specific people will be available at a specific date to perform a task in the plan. This is not a fact because there is a risk they will quit, become ill, etc. Still it is reasonable to assume it is true. As assumptions are proven to be true or false, they can be marked as “complete” on the list.

When discussing the plan with others later, this explanation of what you were thinking at the time the plan was drafted will be very useful. By listing your assumptions, you can discuss them point-by-point with the team and your sponsor to avoid areas that the plan should not address and to identify why a specific course of action was followed. The sponsor may also confirm assumptions as true.

Along with the assumptions, list all the known constraints for the project. This might be a specific due date to meet a business or legal obligation; it might be project funding issues or even a limit on the number of people available to be on the team. A major benefit of listing your project constraints is that upon examination they may be less than you think or can be used to prevent the scope of the project from expanding.

DETERMINING ACTIVITY DURATIONS

Once the tasks are laid out, estimate how much time should be set aside for each task to be completed. Creating reasonable time estimates for someone else is tough. You may think you know what needs to be done, but you could underestimate the true work required. Also, not everyone has your strengths—or weaknesses. Therefore, the estimates you assign at this stage are a starting point.

When a task is assigned to a team member, take the time to discuss with them what each task involves and see how long they think it will require. Be sure that they understand what each task entails so they can estimate accordingly. Update the plan with their estimated task durations and start dates. It is unfair to the team members to drop a task on them and demand a date without any further explanation.

Once you negotiate the duration of a task with someone, encourage them to stick with it. Other people further along in the project may be depending on this task to be completed before they can start.

WHO SHOULD DO IT?

Some tasks are easy to assign. If the task is to validate the key locker security, it will go to the Security Manager. If that person chooses to delegate it to someone else, then it is still his responsibility to ensure the task is properly completed on time. Some tasks will be more general in nature and need to be spread around the team fairly. If a task is not needed, don’t hesitate to delete it. If it is necessary, don’t hesitate to assign it!

This is a good time to identify any gaps in your available labor. If you see a large time commitment for the Data Network Manager and little likelihood that team members will be available to do the assigned work, you might generate a task to bring in some temporary help to assist them. Other time issues may be on the horizon. For example, if you need to involve the Accounting Controller, and the project will run over the calendar time for closing the fiscal year accounts, then you would schedule their project participation to avoid this time.

SEQUENCING THE ACTIVITIES

Now, put all the tasks in some sort of order. In this type of project, the beginning of the project is somewhat sequential. Later, many tasks will run in parallel when the various groups break off to write their respective plans. Select an estimated start date and then place some dates on your plan. With the plan held up against a calendar, check to see if any tasks need to be resequenced or if they conflict with some other critical company activity.

If your task contingencies are in place, the project management software will fill in the plan dates for you. If when you save the plan you select the option to save without a baseline, you can easily change the start date later.

Next, you should level your resources so that one person isn’t asked to complete more than eight hours of work in one day. This occurs when people are assigned too many tasks that are running simultaneously.

PLAN RISK ASSESSMENT

So now that you have a rough plan, with time estimates and sequenced in some sort of a logical flow, it is time to scrutinize the plan for problems. Are there any labor resources overextended? Look at each task area. What is the risk that an item won’t be completed on time? Yes, there is always a risk that a key person won’t be available. List any other underlying potential problems.

Most projects share the same basic risks to their success. In addition, each project has its own risks unique to what you are trying to accomplish and to your environment. Common project plan risks include:

image The amount of experience the Business Continuity Manager has in leading this type of project. Less experience adds risk to the project timeline. Extensive experience lowers the risk.

image The level of management support for the project. If you have low management support, you will have high project risk to the budget and timeline for team cooperation, and vice versa.

image Adequate funding to complete the project with a top-quality result. Don’t let needed training, support activities, or mitigation actions be cut from the budget.

image The number of locations involved in the project at one time. The more locations there are involved, the greater the project’s risk of failure. If possible, run a separate project for each site and do not attempt to do them all at the same time.

image The number of departments involved with the project at one time. Like trying to work across too many sites, trying to handle too many departments will fragment the Business Continuity Manager’s time and increases the likelihood of failure. Consider tackling fewer departments at one time.

image The frequency and length of business interruptions to the project. This could be an upcoming ISO audit, it could be a quarterly wall-to-wall inventory, it might even be the end of the fiscal year. The more interruptions to the project’s flow that you can foresee, the higher the risk of failure.

image The knowledge and quality of the people assigned by the various departments. The time required to complete your business continuity plans will depend on the experience of the people involved. Typically, the Data Processing department has the most to write and will take the longest.

image A mandated completion date, which may not be realistic.

EXECUTING AND CONTROLLING

Now you have a project sponsor, a budget, the project plan, and a core team assigned. It is time to get your project under way! A Business Continuity Manager must be the inspiring force behind the project. At those times when everyone is piling work on your team members’ desks, you must be the driving force in keeping this job as a priority project until it is finished.

As the project progresses, you will make decisions as to what is included in your project charter and what is not. This “scope verification” may mean that as the project progresses, you discover that it must involve specific actions that were not foreseen when the project was started. It may also involve the nice-to-have things that pop up as a project moves on. In either case, recognize these things as they occur and make a conscious decision to accept or reject them. Do not let anyone else add tasks to the plan without your approval or your tightly planned project will turn into an untamed monster!

COMMUNICATIONS PLAN

Every person within your organization has different information needs and preferred channels for receiving that information. The sponsor shouldn’t be burdened with minute details; the department managers should be responsible for tracking what their people are doing. To provide the right level of information to the right person at the appropriate time, you need to build a communications plan. The more people involved with your project, the greater your need for communication.

A communications plan details who needs to report about what and when. For example, who should receive project status reports? Who needs copies of the team meeting minutes? Who needs to know about minor project delays? To manage this, build a matrix that accounts for the information needs of all stakeholders. Your communications plan will address a wide range of audiences. Be sure to identify the person responsible for generating the communication and its major focus.

Evaluate every report and every meeting in your communications plan as to whether it will be worth the effort to prepare for it. Some reports may require more effort than they are worth. Some meetings are just a waste of time. Effective communication is important for focusing a team to a goal, but you must strike a balance between enough communication and the time wasted generating too much. Use Form 1-4 (see companion url) to plan who is responsible for what communications.

The communications plan will encompass more than memos floating around the office. It should include meetings with your team, meetings with your sponsor, and presentations to the various departments. Another important communications task is to raise the awareness of the employees of your project and how it impacts them. Posters, newsletter articles, and open meetings all serve to answer their questions and are useful for instilling a business continuity culture in your company.

The information that you need to communicate falls into three main categories:

1.Mandatory communications are things that must be done, such as status reports to the sponsor and meeting minutes to the team members. Skipping a mandatory communication may affect your project’s support or credibility.

2.Informational communications include reports to the interested and curious. Many people will see the plan under development and believe that it directly or indirectly will involve them. Your informational communications will pass on project accomplishments, testing schedules, and things that may not directly affect them but they would want to know about. Informational communications can help to shape expectations, so interested people can better understand what is next instead of being surprised or disappointed.

3.Informational communications are similar to marketing communications. Here you are out to build a positive image of your project to the rest of the company. Your marketing communications will help to educate the entire company on the business continuity planning principles (risk analysis, mitigation, documentation, etc.) and how they can relate to every employee’s work processes. One effective method is to give a presentation on business recovery planning to each of the various department staffs. The more they understand it, the greater your support is across the company.

Form 1-5 (see companion url) is a sample stakeholder reporting matrix. Modify it to reflect your project team and business requirements. In this matrix, you will identify which persons might only want to see monthly status reports with summary comments, such as the sponsor. Department managers might need a weekly status report with specific accomplishments. Short stories on accomplishments might be suitable for the facility’s employee newsletter. The stakeholder reporting matrix also indicates the best way to deliver these reports. Do some of your executives ignore their email? Do some require face-to-face reports? Indicate the method of delivery to which they would be most receptive.

REPORTING USING THE COMMUNICATIONS PLAN

As the project progresses, you should occasionally revisit the project’s risk assessment. Things change; people come and go on a project; and what was once a looming challenge may at closer glance appear to be nothing at all. In addition, business conditions are in constant flux and that must also be figured into the update of your risk analysis.

Controlling is the process used to identify variation from the plan in the areas of:

imageChange control

imageScope control

imageCost control

imageQuality control

imagePerformance reporting

imageRisk response

Your best tool for focusing the team on its goals will be a weekly team meeting. There are many fine books dealing with the proper way to conduct a meeting, but a few basics follow:

image First, always publish an agenda before the meeting. It acts as an anchor to keep people from drifting too far off the subject.

image Second, keep the meeting pertinent. Focus on recent achievements over the past 2 weeks and upcoming events of the next 2 weeks.

image Third, keep the meeting under an hour. People lose focus the longer a meeting drones on. Side conversations should be stopped and taken outside the meeting. If you are finished in a half-hour, cut it off! People will respect the meeting time limit as much as you do, so set a good example.

image Have your meeting at the same place and time every week, even if not much is happening. Try to make it a habit for them.

image When planning your team meetings, involve a bit of showmanship to keep people involved. If they sit there passively, ask specific people questions, but never to embarrass them if they are late. If the discussions seem tedious, jump into the conversation to keep them focused and interesting.

image Use slack time in the agendas to fill in with short training topics and visits by the sponsor or department managers.

image Publish a meeting recap as soon after the meeting as possible. Detailed meeting minutes may become too burdensome but a recap of the high points gives you a document to talk from at the beginning of the next meeting.

image Always include a copy of the updated project plan.

TEST “COMPLETED” PLANS

The quickest way to snap people out of lethargy is to publicly test the first plans submitted. You don’t need to pull the plug on a computer to do this. An easy test is to verbally walk through it. If the plan’s authors know that it is really to be read and see how you test it, they will be more thorough.

Do the first desktop walk-through with the plan’s author. You will uncover glossed-over steps where they clearly knew what to do but where, based on the plan, you had no clue as to what was next. After updating that version, do the same walk-through with the author’s manager (who may very well be called on to execute this plan) and look for gaps.

Reward those contributors who complete their plans on time. This is where your sponsor comes in. Everyone likes to be appreciated, and some liberal rewards for the first few completed plans will go a long way toward motivating the rest of the team. You’d be surprised how fast this kind of word spreads throughout a company.

SET UP AND ENFORCE A TESTING SCHEDULE

As the departmental plans roll in, update the project plan’s testing schedule. Testing will uncover gaps and inconsistencies in the current draft. Usually, this is a multiple step process:

image The team member and the manager initially check completed plans by using a desktop walk-through.

image The next level is to walk through the plan with someone familiar with the area, but not involved with the plan development.

image Run a departmental test.

image Once enough plans are ready, it is time to schedule a simulated major disaster. This might be over a holiday period or whenever the systems are lightly used. Testing will teach people some of what to expect in a disaster. It will also make them more familiar with the procedures of other functions.

image Always follow testing or a disaster event with an “after-action” meeting and report detailing the lessons learned and updates made to the plan. Be sure to praise its high points and to privately express what it is lacking. Depending on how well your group members know one another, you can use team members for a peer evaluation. People must feel free to speak at these meetings without fear of retaliation or their full value will not be realized.

After-action reviews are a very powerful learning tool. They require a moderator to keep them focused and moving through five key questions. An after-action discussion follows a simple format:

imageWhat happened?

imageWhat should have happened?

imageWhat went well?

imageWhat went poorly?

imageWhat will we do differently in the future?

Appoint someone to take notes on these lessons learned. Send a copy to each participant, and the Business Continuity Manager should maintain a file of these reports. Refer to this file when updating the plan.

CLOSING THE PROJECT

Once you have your plan written and the initial tests are completed, it is time to close the project. All good things come to an end, as when the plan is transformed from a project to an ongoing business process. The transition involves reporting the project results to management, closing out the project’s budget, identifying known exposures for future action, and thanking your team members for their efforts. Closing the project involves the following steps:

image  Turn all files over to the Plan Administrator.  What was once your project may become someone else’s regular responsibility. If the Business Continuity Manager is not to be the Plan Administrator, accumulate all files pertaining to this project and hand them over to the Plan Administrator. It is now the administrator’s job to ensure the ongoing test plan is enforced and that plan updates are issued in a timely fashion.

Make a final update to the project plan. It may be useful if sister companies want to use it for building their own business continuity plans. You can also refer to it when estimating task duration for future projects.

image  Report results to management.  To wrap up your project, draft a recap of the progression of the project to management. In this, point out any major successes that occurred during the project, such as low-cost solutions found to important problems, materials found stashed away in closets that could be put to good use, and so on. In the report, be sure to point out the benefit of the cross-functional training received by the project team as they worked with each other during plan development and testing.

You should provide a final account of the funds spent on the project, broken down as to what part of the project they supported. This will assist in estimating the funds required for similar projects in the future.

image  Identify known exposures.  A business reality is that not every worthwhile activity can be funded. During your risk analysis and mitigation efforts, you very likely uncovered many critical single points of failure that called for redundant solutions, unmasked obsolete equipment that must be replaced, or identified other mitigation actions that would make your business processes more stable.

Roll up these exposures into a report to management. List each item separately along with a narrative explanation of why it is important. Detail the advantages and disadvantages of this course of action along with estimated (or known) costs. These narratives may not be reviewed again for many months, so the clearer your explanation of the business reasons behind funding this action, the better. When your capital budgeting cycle rolls around, use this list as input to the budget.

image  Thank the team.  Hopefully, careful notes were kept during the project so that team members could be recognized for their contributions to the project. In particular, those team members who overcame major obstacles to complete their plan and thoroughly test them are due special recognition. Acknowledgment of a job well done should be made as soon as possible after the fact. At the end of the project, it is time to again acknowledge these well-done jobs to remind everyone, especially management, of the individual accomplishments during the project.

CONCLUSION

After reading this chapter, you should now have a good idea of the overall strategy for developing a useful business continuity plan. Your odds for a successful project increase dramatically when you have a well-thought-out plan. The major steps for getting your project off to a good start are as follows:

1.Make sure the scope of the project is clearly defined. You need adequate time, funding, and support to be successful.

2.Carefully select the right team members. They must have a good understanding of the important processes within their departments and be able to clearly communicate the importance of the project back to their coworkers.

3.Identify the activities required, their durations, and who should do the work.

4.Communicate not only within the team but with the entire organization that what you are doing is important for everyone’s survival.

5.Test, test, test. If a plan isn’t tested, you won’t know whether it will work until it’s too late.

 

2

BUILDING THE BUSINESS CASE

Measuring the Impact on the Business

If you don’t know where you are going, any road will get you there.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Word Document Edit homework help

Word Document Edit homework help

  1. Open the VaccinationSchedule-04.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.

NOTE: If group titles are not visible on your Ribbon in Word for Mac, click the Word menu and select Preferences to open the Word Preferences dialog box. Click the View button and check the Show group titles check box under Ribbon. Close the Word Preferences dialog box.

  1. Select the tabbed text in the middle of the document and convert it to a table (accept default settings). Don’t include the blank line below the tabbed text.
  2. Select the entire table and apply the following changes:
    1. Select Banded Rows in the Table Style Options group [Table Tools Design tab] and deselect all
    2. Apply the List Table 1 Light – Accent 2 table style (Figure 4-120).
    3. Change the font size on all the text in the table to 10 pt.
    4. AutoFit the table and choose AutoFit Window.
    5. Change row height to 0.25″.
    6. Center all text vertically within each cell. (Hint: Use the Cell tab in the Table Properties dialog box.)
    7. Sort the table by Name of Vaccine in Ascending order. Be sure to select Header row in the My list has area of the Sort dialog box.
  3. Make the following changes to the table:
    1. Insert a row above the first row.
    2. Merge the three cells in the new first row and type the following:
      RECOMMENDED VACCINATION SCHEDULE
    3. Bold and center the first row and change the font size to 11 pt.
    4. Bold and italicize the column headings in the second row.
    5. Select the first row and apply borders with the following settings: solid lineBlack, Text 1 color (second color in the first row of Theme Colors), 1 ½ pt. width, and apply a top and bottom
    6. Select the second row and apply a border with the following settings: solid lineBlack, Text 1 color, 1 ½ pt width, and apply a bottom border. Do not remove the top border applied in the previous step.
    7. Select the last row and apply a border with the following settings: solid lineBlack, Text 1 color, 1 ½ pt width, and apply a bottom border.
    8. Align Center [Table Tools Layout tab, Alignment group] the column headings.
    9. Align Center the text in the third column.
  4. Insert the following information alphabetically into the table. Insert rows where needed.

This table lists text to be typed in a table

Meningococcal conjugate (MCV)

At 11-12 years

1

Hepatitis B (HepB)

At birth, 1-2 months, and 6 months

3

  1. Modify the title of the document (“Vaccination Schedule”).
    1. Apply the Title style to the title of the document.
    2. Change the After paragraph spacing to 8 pt.
    3. Center the title horizontally.
    4. Apply small caps and bold formatting to the title.
  2. Insert and modify a picture.
    1. Place the insertion point after the title and insert the CMPLogo-04 picture downloaded from the Resources link. Use the Insert Picture dialog box.
    2. Change text wrapping to Top and Bottom.
    3. Change the height of the logo to 1″. Verify the logo remains proportional.
    4. Apply the Offset: Bottom Right shadow picture effect (Outer category).
    5. Set the Horizontal Absolute position to 0.2″ to the right of Page.
    6. Set the Vertical Absolute position to 0.2″ below Page.
  3. Insert a picture and add a caption.
    1. Place the insertion point at the end of the first body paragraph and insert the Vaccination-04 picture downloaded from the Resources link. Use the Insert Picture dialog box.
    2. Change the text wrapping to Square.
    3. Change the height of the picture to 1.3″. Verify the graphic remains proportional.
    4. Drag the picture to the right of the first and second paragraphs.
    5. Insert a caption, delete the caption placeholder text, and type Don’t neglect your vaccinations! as the caption text.
    6. Center the caption text, change the font color to Red, Accent 2 (sixth color in the first row of Theme Colors), and turn off italics if it is applied to the text.
    7. Select the caption and the picture and Align Center.
    8. Group the caption and the picture.
    9. Set the Horizontal Absolute position to 6″ to the right of Margin.
    10. Set the Vertical Absolute position to 0.8″ below Margin.
  4. Edit the alt text of the graphic objects.
    1. Edit the alt text of the CMP logo and type Courtyard Medical Plaza logo as the alt text.
    2. Edit the alt text of the graphic of a doctor, type Graphic of a doctor as the alt text, and close the Alt Text pane.
  5. Save and close the document (Figure 4-121).
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!