Assessing Security Culture Homework

Assessing Security Culture

This week we learned about security culture and how to promote it within organizations.

It’s important that all employees are aware of common security risks and treat security seriously. The majority of cyberattacks aim to exploit human weaknesses with methods like phishing.

For this reason, people are most often the weakest link in an organization’s security defenses.

Scenario

  • Employees at SilverCorp are increasingly using their own personal devices for company work.
  • Specifically, over half of all employees check their work email and communications via Slack on their personal mobile phones.
  • Another 25% of employees are doing other work-related activities using work accounts and work-related applications on their personal phone.
  • Allowing sensitive work information to be shared on employees’ personal devices has a number of security implications.
  • You must research these security risks and use the security culture framework to develop a plan to mitigate the concerns.

Instructions

Compose the answers to the following four steps on Word Document.

Step 1: Measure and Set Goals

Answer the following questions:

  1. Using outside research, indicate the potential security risks of allowing employees to access work information on their personal devices. Identify at least three potential attacks that can be carried out.
  2. Based on the above scenario, what is the preferred employee behavior?
    • For example, if employees were downloading suspicious email attachments, the preferred behavior would be that employees only download attachments from trusted sources.
  3. What methods would you use to measure how often employees are currently not behaving according to the preferred behavior?
    • For example, conduct a survey to see how often people download email attachments from unknown senders.
  4. What is the goal that you would like the organization to reach regarding this behavior?
    • For example, to have less than 5% of employees downloading suspicious email attachments.

Step 2: Involve the Right People

Now that you have a goal in mind, who needs to be involved?

  • Indicate at least five employees or departments that need to be involved. For each person or department, indicate in 2-3 sentences what their role and responsibilities will be.

Step 3: Training Plan

Training is part of any security culture framework plan. How will you train your employees on this security concern? In one page, indicate the following:

  • How frequently will you run training? What format will it take? (i.e. in-person, online, a combination of both)
  • What topics will you cover in your training and why? (This should be the bulk of the deliverable.)
  • After you’ve run your training, how will you measure its effectiveness?

This portion will require additional outside research on the topic so that you can lay out a clear and thorough training agenda.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

A node in a binary tree is called a(n) ____ if it has no left and right children.
edge
branch
leaf
path
A node in a binary tree is called a(n) ____ if it has no left and right children.
edge
branch
leaf
path
Every node in a doubly linked list has two pointers: ____ and ____.
previous; next
back; next
current; next
previous; current
In a graph G, if the edges connecting two vertices have weights assigned to them, the graph is called a ____ graph.
source
weighted
spanning
minimal
The edges connecting two vertices can be assigned a non-negative real number, called the ____ of the edge.
key
weight
width
height
The ____ executes when the object goes out of scope.
default constructor
destructor
copy constructor
iterator
Popping an element from an empty stack is called ____.
overflow
underflow
exception
overloading
The addition and deletion of elements of the stack occurs only at the ____ of the stack.
head
bottom
top
middle
In a graph directed G, for each vertex, v, the vertices adjacent to v are called ____ successors.
immediate
adjacent
path
parallel
The key of the right child below the root node of a search binary tree is 40. The value in the root node could be ____.
30
40
50
60
What is the purpose of the following code?current = head;while (current != NULL){    //Process current    current = current->link;}
Insertion of a node
Selection of a node
Traversal of a linked list
Creation of a new list
In a linked list, the order of the nodes is determined by the address, called the ____, stored in each node.
head
tail
link
first
A linked list is a collection of components, called ____.
elements
nodes
members
pointers
Which of the following is a basic operation performed on a queue?
push
pop
isEmptyQueue
top
The function ____ of the class linkedListType returns the last element of the list.
tail
lastNode
back
last
The ____ operation returns a pointer to the position before the first element in container ct.
ct.front()
ct.rbegin()
ct.rend()
ct.end()
In a binary search tree, the data in each node is ____ the data in the left child.
larger than
smaller than
equal to
larger or equal to
An iterator to a vector container is declared using the ____ iterator.
new
vector
typedef
typeiter
The ____ nodeType defines the node of a binary tree.
struct
class
template
array
Which of the following correctly initializes a doubly linked list in the default constructor?
head = NULL;back = NULL;
head = 0;back = 0;count = 0;
first = 0;last = 0;
first = NULL;last = NULL;count = 0;
Which of the following is a valid function of the class stackType?
int isEmptyStack() const;
void push();
void pop();
type pop();
Using the binary search algorithm, in an unsuccessful search, how many key comparisons are performed during the last iteration of the loop?
0
1
2
n, where n is the number of items in the list
The link field of the last node of a linked list is ____.
0
1
n-1
n
In a(n) ____ graph, the edges are drawn using arrows.
pointed
vector
directed
undirected
If data needs to be processed in a LIFO manner, use a(n) ____.
stack
linked list
queue
deque
Predicates are special types of function objects that return ____ values.
character
string
Boolean
Integer
Two well-known algorithms, Prim’s algorithm and ____’s algorithm, can be used to find a minimal spanning tree of a graph.
Euler
Dekart
Kruskal
Dijkstra
To describe a queuing system, we use the term ____ for the object receiving the service.
client
server
customer
provider
The initializeList operation on a doubly linked list can be done by using the operation ____.
empty
clear
destroy
delete
The ____ sort algorithm sorts the list by moving each element to its proper place in the sorted portion of the list.
bubble
quick
merge
insertion
The level of the children of the root node is ____.
0
1
2
3
When traversing a binary tree with the pointer current, the pointer current is initialized to ____.
NULL
llink
rlink
root
Each link (pointer) in a binary tree node points to a(n) ____ of that node.
parent
child
value
sibling
Given the unordered list [10, 7, 19, 5, 16], which of the following sequences represents the result of the first iteration of the bubble sort algorithm?
[7, 10, 19, 5, 16]
[10, 7, 5, 16, 19]
[19, 10, 7, 5, 16]
[7, 10, 5, 16, 19]
What is the output of the following code?stackType<int> stack;int x, y;x = 4;y = 2;stack.push(6);stack.push(x);stack.push(x + 1);y = stack.top();stack.pop();stack.push(x + y);x = stack.top();stack.pop();cout << “x = ” << x << endl;
x = 4
x = 5
x = 6
x = 9
What is the access modifier of the variable count in the linkedListType class?
public
private
protected
friend
The sequence of operations in a postorder search is ____.
traverse left; traverse right
traverse left; traverse right; visit
visit; traverse left; traverse right
traverse left; visit; traverse right
Suppose that the pointer head points to the first node in the list, and the link of the last node is NULL. The first node of the linked list contains the address of the ____ node.
head
first
second
tail
The postfix expression 5 6 + 4 * 10 5 / – = evaluates to ____.
10
30
42
44
A queue is a data structure in which the elements are ____.
added to the rear and deleted from the front
added to and deleted from the rear
added to and deleted from the front
added and deleted in the middle
Which of the following operations removes the first element from the deque object deq?
deq.front()
deq.push_front()
deq.pop_front()
deq.push()

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

R Studio And Tweets homework help

R Studio And Tweets homework help

BUS 393 – Assignment 2

 

Please follow the steps and answer the questions:

Load the necessary packages first:

library(tm)

library(openNLP)

library(textstem)

 

1. Import the twitter dataset using readreadline() function.

2. Inspect the first 10 tweets from the data.

3. We will specifically look at a tweet at index number 8. Assign a variable name to this tweet. For example: tweet8.

4. Check the data type of tweet8. Before changing the tweet8 to String type, firstly allow tweet8 to go through stemming. How many words in this sentence has been stemmed? What are the original form and base form respectively?

5. Remove the stop words from stemmed tweet8. Compare the original tweet8 and transformed tweet8. What are the stop words removed?

6. Reassign the 8th tweet to tweet8. Lemmatize the tweet8. What are the words has been lemmatized? What are the original forms and base forms respectively?

7. Change tweet8 to String type.

8. Use sentence tokenization function to segment tweet8. How many sentences are generated after tokenization?

9. Use word tokenization function to divide the words from the sentences. How many words have been generated? Display the words and sentences.

10. Use part of speech tagging function to assign POS tag to each word. Check the word and POS frequency. How many words have been assigned POS tags “VBD” (verb past tense)? What are the words being assigned with POS tags “VBD”?

11. Use name entity recognition function to detect name entities from this tweet. Does this function detect any name entities?

12. Use parsing function to parse this tweet. How many verb phrases (VP) are there? What components compose the last verb phrase? (If your parser does not work, you could skip this question)

 

 

Submission:

 

Create a R script file and write the R commands for each question. Write down the answers to the questions such as “How many words in this sentence has been stemmed?” as R script comments in the same R script file. Submit the file on blackboard.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science project homework help

Project Description:

You are a real estate analyst who works for Mountain View Realty in the North Utah County area. You have consolidated a list of houses sold during the past few months and want to analyze the data. For a simple analysis, you will outline the data and use the Subtotal feature. You will then create two PivotTables and a PivotChart to perform more in-depth analysis.

 

Exp19_Excel_Ch07_Cap_Real_Estate

Project Description:

You are the office manager for a real estate company in northern Utah County. You tracked real estate listings, including city, agent, listing price, sold price, etc. Agents can represent a seller, a buyer, or both (known as dual agents). Your assistant prepared the spreadsheet structure with agent names, agent types, the listing and sold prices, and the listing and sold dates. You want to complete the spreadsheet by calculating the number of days each house was on the market before being sold, agent commissions, and bonuses. In addition, you will use conditional functions to calculate summary statistics. For further analysis, you will insert a map chart to indicate the average house selling price by city. Finally, you will create a partial loan amortization table and calculate cumulative interest and principal to show a potential buyer to help the buyer make decisions.

Steps to Perform:

 

Step

Instructions

Points    Possible

 

1

Start   Excel. Download and open the file named Exp19_Excel_Ch07_Cap_RealEstate.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

0

 

2

The spreadsheet contains codes (BA, DA, SA) to   represent agent roles (Buyer’s Agent, Dual Agent, Seller’s Agent). You want   to switch the codes for the actual descriptions.
In cell E12 of the Details sheet, insert the SWITCH function to evaluate the   agent code in cell D12. Include mixed cell references to the codes and roles   in the range J2:K4 for the values
and results arguments. use all cell references in the function. Copy the   function to the range E13:E39.

5

 

3

Now you   want to calculate the number of days between the list date and sale date.
In cell J12, insert the DAYS function to calculate the number of days between   the Listing Date and the Sale Date. Copy the function to the range J13:J39.

5

 

4

You want to calculate agent commissions based on   their role.
In cell K12, insert the IFS function to calculate the agent’s commission   based on the agent code and the applicable rates in the range L2:L4. Use   relative and mixed references correctly. Copy the function to the range   K13:K39.

5

 

5

You   want to calculate a bonus if the sold price was at least equal to the listing   price, and if the house sold within 30 days after being listed.
In cell L12, insert an IF function with a nested AND function to calculate a   bonus. The AND function should ensure both conditions are met: Sold Price   divided by the Listing Price is greater than or equal to 100% (cell L7) and   the Days on Market are less than or equal to 30 (cell L8). If both conditions   are met, the bonus is $1,000 (cell L9). Otherwise, the bonus is $0. Use mixed   cell references to the input values in the range L7:L9. Copy the function to   the range L12:L39.

5

 

6

The top-left section of the spreadsheet is designed   for summary statistics for one condition. You will calculate average selling   prices and the number of houses sold in each city (the condition).
In cell B2, insert the AVERAGEIF function to calculate the average Sold Price   for houses in the city of Alpine. Use mixed references for the range; use a   relative reference to cell A2. Copy the function and use the Paste Formulas   option to paste the function in the range B3:B5 so that the bottom border in   cell B5 is preserved.

5

 

7

You   want to count the number of houses in one city.
In cell C2, insert the COUNTIF function to count the number of houses in the   city of Alpine. Use mixed references for the range; and use a relative   reference to cell A2. Copy the function and use the Paste Formulas option to   paste the function in the range C3:C5 so that the border in cell C5 is   preserved.

5

 

8

You want to calculate the total commissions for   each agent (the condition).
In cell B7, insert the SUMIF function to total the commissions by agent. Use   mixed references for the ranges; and use a relative reference to cell A7.   Copy the function and use the Paste Formulas option to paste the function in   the range B8:B9 so that the borders are preserved.

5

 

9

The   top-middle section of the spreadsheet is designed for summary statistics for   multiple conditions. You will calculate the number of houses sold for each   agent when he or she served as a Dual Agent (DA). Use mixed references for   ranges and the agent code condition in cell J3. Use relative cell references   to the agent condition in cell E2. When you copy the formulas, use the paste   Formulas options to preserve border formatting.
In cell F2, insert the COUNTIFS function in cell F2 to count the number of   houses sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for   that house. Use all cell references in the function. Copy the function to the   range F3:F4 and preserve the bottom border for cell F4.

5

 

10

You are ready to calculate the total value of those   houses for each agent when he or she served as a Dual Agent (DA). Use mixed   references for ranges and the agent code condition in cell J3. Use relative   cell references to the agent condition in cell E2. When you copy the   formulas, use the paste Formulas options to preserve border formatting.
In cell G2, insert the SUMIFS function to sum the selling prices of the   houses sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for   that house. Copy the function to the range G3:G4 and preserve the bottom   border for cell G4.

5

 

11

Now,   you will calculate the highest-price house highest-price house sold for each   agent when he or she served as a Dual Agent (DA). Use mixed references for   ranges and the agent code condition in cell J3. Use relative cell references   to the agent condition in cell E2. When you copy the formulas, use the paste   Formulas options to preserve border formatting.
In cell H2, insert the MAXIFS function in cell H2 to display the highest-price   house sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for   that house. Copy the function to the range H3:H4 and preserve the borders in   the range H3:H4.

5

 

12

The Map worksheet contains a list of cities, postal   codes, and average house sales. You will insert a map chart to depict the   averages visually using the default gradient fill colors.
Display the Map worksheet, select the range B1:C5 and insert a map chart.

5

 

13

Cut the   map chart and paste it in cell A7. Set a 2.31″ height and 3.62″ width.

5

 

14

You want to enter a meaningful title for the map.
Change the map title to Average Selling Price by Zip Code.

2

 

15

Display   the Format Data Series task pane, select the option to display only regions   with data, and show all labels. Close the task pane.

3

 

16

You are ready to start completing the loan   amortization table.
Display the Loan worksheet. In cell B8, type a reference formula to cell B1.   The balance before the first payment is identical to the loan amount. Do not   type the value; use the cell reference instead. In cell B9, subtract the   principal from the beginning balance on the previous row. Copy the formula to   the range B10:B19.

5

 

17

Now,   you will calculate the interest for the first payment.
In cell C8, calculate the interest for the first payment using the IPMT   function. Copy the function to the range C9:C19.

5

 

18

Next, you will calculate the principal paid.
In cell D8, calculate the principal paid for the first payment using the PPMT   function. Copy the
function to the range D9:D19.

5

 

19

Rows   21-23 contain a summary section for cumulative totals after the first year.
In cell B22, insert the CUMIPMT function that calculates the cumulative   interest after the first year. Use references to cells A8 and A19 for the   period arguments.

5

 

20

The next summary statistic will calculate the   principal paid after the first year.
In cell B23, insert the CUMPRINC function that calculates the cumulative   principal paid after the first year. Use references to cells A8 and A19 for   the period arguments.

5

 

21

Rows   25-28 contain a section for what-if analysis.
In cell B27, use the RATE financial function to calculate the periodic rate   using $1,400 as the
monthly payment (cell B26), the NPER, and loan amount in the original input   section.

5

 

22

In cell B28, calculate the APR by multiplying the   monthly rate (cell B27) by 12.

2

 

23

Create   a footer with your name on the left side, the sheet name code in the center,   and the file name code on the right side of each worksheet.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Project Part 1: Network Design homework help

Project Part 1: Network Design homework help

Project: Network Design and Plan

 

Purpose

This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation at various levels. You will play the role of an employee participating in network design and planning of a specific business situation.

Required Source Information and Tools

 

 

Web References: Links to web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on September 18, 2020.

 

 

The following tools and resources are needed to complete this project:

A web browser and access to the Internet to perform research for the project

(Optional) A tool for creating basic network diagrams, such as draw.io or Microsoft PowerPoint

Learning Objectives and Outcomes

Apply core competencies learned throughout the course to a single project.

Analyze and apply knowledge of firewalls, VPNs, and other network defense measures.

Demonstrate logical reasoning and decision-making skills.

Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.

Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.

You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the course Syllabus for submission dates.

Project Part 1: Network Design

Project Part 2: Firewall Selection and Placement

Project Part 3: Remote Access and VPNs

Project Part 4: Final Network Design Report

 

Project Part 1: Network Design

Scenario

The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.

The senior network architect has asked you to create a network design that includes the following components:

Current infrastructure elements

A logical topology that separates the Accounting and Sales departments

Redundant communications

Justification for continuing with IPv4 or upgrading to IPv6

Tasks

For this part of the project, perform the following tasks:

1. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.

2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.

3. Include a high-level plan that ensures communications are available 24/7.

4. Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.

5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.

6. Create a draft report detailing all information as supportive documentation.

7. Cite sources, where appropriate.

Required Resources

· Internet access

· Course textbook

Submission Requirements

· Format: Microsoft Word (or compatible)

· Font: Arial, size 12, double-space

· Citation style: Your school’s preferred style guide

· Length of report: 3–4 pages

Self-Assessment Checklist

· I determined the best network design to ensure the security of internal access while retaining public website availability.

· I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.

· I created a plan that ensures communications are available 24/7.

· I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.

· I created a basic network diagram that illustrates the current network and enhancements.

· I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

· I followed the submission guidelines.

 

Project Part 2: Firewall Selection and Placement

Scenario

The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.

Tasks

For this part of the project, perform the following tasks:

1. Research and select firewalls for the Corporation Techs network.

a. Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.

b. Address network, server, and workstation firewalls.

2. Describe a plan for creating a DMZ, and explain how it makes the network more secure.

3. Research network authentication and create a high-level plan for secure authentication to internal network resources.

4. Create a draft report detailing all information as supportive documentation.

5. Cite sources, where appropriate.

Required Resources

· Internet access

· Course textbook

Submission Requirements

· Format: Microsoft Word (or compatible)

· Font: Arial, size 12, double-space

· Citation style: Your school’s preferred style guide

· Length of report: 3–4 pages

Self-Assessment Checklist

· I researched and selected firewalls.

· I described each firewall, why I selected it, and where it should be placed for maximum effectiveness.

· I addressed network, server, and workstation firewalls.

· I described a plan for creating a DMZ and explained how it makes the network more secure.

· I created a high-level plan for secure authentication to internal network resources.

· I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

· I followed the submission guidelines.

 

 

Project Part 3: Remote Access and VPNs

Scenario

As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.

The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

Tasks

For this part of the project, perform the following tasks:

1. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.

2. Recommend any other forms of remote access that are relevant and describe how they would be used.

3. Create a draft report detailing all information as supportive documentation.

4. Cite sources, where appropriate.

Submission Requirements

· Format: Microsoft Word (or compatible)

· Font: Arial, size 12, double-space

· Citation style: Your school’s preferred style guide

· Length of report: 3–4 pages

Self-Assessment Checklist

· I researched and recommended an appropriate VPN technology.

· I described the VPN technology and explained why it is the best choice.

· I recommended other forms of remote access that are relevant and described how they would be used.

· I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

· I followed the submission guidelines.

 

Project Part 4: Final Network Design Report

Scenario

You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.

Tasks For this part of the project, perform the following tasks:

1. Create a final network diagram that includes the basic diagram and all relevant network enhancements.

2. Create a professional report that includes content from each draft report. Include details for all relevant information, persuasive justification for your recommendations, and methods to measure the success of each major network enhancement. Include a 1- to 2-page executive summary.

3. Use simple, clear language that primary stakeholders (non-IT) can understand easily.

Submission Requirements

· Format: Microsoft Word (or compatible)

· Font: Arial, size 12, double-space

· Citation style: Your school’s preferred style guide

· Length of final report: 10–16 pages, including executive summary and network diagram

Self-Assessment Checklist for Final Report

· I developed a network design that meets the requirements.

· I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

· I described technology recommendations, provided justification for those recommendations, and described methods to measure the success of each major network enhancement.

· I included an executive summary and a final network diagram.

· I included citations for all sources used in the report.

· I followed the submission guidelines.

 

© 2022 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Page 7

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Access Skills Approach homework help

Access Skills Approach homework help

A Skills Approach: Access 2016 Chapter 3: Working with Forms and Reports

1 | Page Challenge Yourself 3.3 Last Updated 9/18/17

Challenge Yourself 3.3 In this project you will continue working with the greenhouse database from Chapter 2, Challenge Yourself 2.3. You will

create a variety of forms for entering plant and maintenance information.

Skills needed to complete this project:

• Creating a Single Record Form Based on a Table or Query

• Moving and Arranging Controls

• Creating a Multiple Items Form

• Creating a Split Form

• Adding Fields to a Form in Layout View

• Creating a Form Using the Form Wizard

• Creating a New Blank Form in Layout View

• Resizing Controls

• Applying a Theme

• Modifying the Layout of a Form or Report

• Formatting Controls

• Adding Design Elements to Form and Report Headers

1. Open the start file AC2016-ChallengeYourself-3-3.

2. If necessary, enable active content by clicking the Enable Content button in the Message Bar.

3. The file will be renamed automatically to include your name. Change the project file name if directed

to do so by your instructor.

4. Create a Single Record form using the Plants table as the record source. Save the form with the name

PlantsSingleRecord and close it.

5. Create a Multiple Items Form using the Plants table as the record source. Save the form with the

name PlantsMultipleItems and close it.

6. Create a Split Form using the MaintenanceLog table as the record source. Save it with the name

MaintenanceLogSplit and close it.

7. Use the Form Wizard button to create a form showing employee information in the main form with a

subform showing related maintenance records.

a. Add the following fields to the form in this order:

From the Employees table: EmployeeID, LastName, FirstName, WeeklyHours

From the MaintenanceLog table: MaintenanceDate, Plant, Watered, Inspected, Pruned

b. Organize the form by the Employees table with data from the MaintenanceLog table as a subform.

c. Format the subform as a Datasheet form.

d. Name the main form: EmployeeWorkLog

e. Name the subform: EmployeeWorkLogSubform

f. Review the form in Form view, and then close it.

Step 1

Download start file

A Skills Approach: Access 2016 Chapter 3: Working with Forms and Reports

2 | Page Challenge Yourself 3.3 Last Updated 9/18/17

8. Create a form from scratch in Layout view.

a. Start with a new blank form in Layout view. Save the form with the name:

EmployeeDetails

b. Add the following fields from the Employees table to the form in this order:

EmployeeID, LastName, FirstName

c. Apply the Facet theme to the database.

d. Save and close the form.

9. Add controls to the MaintenanceLog form.

a. Open the MaintenanceLog form in Layout view.

b. Move the Plant label and bound text control above the Employee controls.

c. Add the Inspected field immediately below the Watered control.

d. Add the Pruned field immediately below the Inspected control.

e. There is an extra row in the form layout. Delete it.

10. Format controls in the MaintenanceLog form.

a. Change the MaintenanceDate label to: Date

b. Change the font color for all the label controls to the theme color Dark Green, Accent 2.

c. Modify the MaintenanceDate bound text box control to use the Long Date format.

d. Add the title Maintenance Log to the form header. Be sure to include a space between the

words in the title.

11. Save the form and close it.

12. Close the database and exit Access.

13. Upload and save the project file.

14. Submit project for grading.

Step 2

Upload & Save

Step 3

Grade my Project

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

IFSM 300 Information System in Organizations

UMUC Fall Session

Clinton Hodge

Chesapeake IT Consultants

Business Analysis and System Recommendation

November 17, 2017

 

Introduction 

Chesapeake IT Consultants (CIC) is an Information Technology consulting services firm that makes the most of IT and management technologies to successfully meet the demand of its customers. CIC has been successful and is now on the verge of growing significantly with two pending contracts that will require CIC to place significantly more IT consultants. Therefore CIC is requesting that a business analysis be done to identify an IT solution that will allow the company to hire and place consultants in a more efficient manner. This report will provide background on the hiring process and organizational analysis of the current hiring process. The report will also identify IT solutions and ways CIC can use IT to support the hiring process to help CIC reach its strategic and operational goals. Finally, this report will identify a hiring system and provide guidance for implementation of the system within CIC.

Organization Strategy

CIC’s business strategy is to provide “extraordinary consulting services” by hiring the best certified consultants that will keep up with the latest trends in IT and business. In order for CIC to meet its strategic goals, a new hiring process software is needed so that consultants can be placed effectively and efficiently. The new hiring process software will reduce the time it takes the hiring managers to evaluate a candidate’s skills and qualifications for placement with one of CIC’s customers. By reducing hiring and placement time, CIC will be able to compete for larger contracts and have the resources to hire international consultants.

Components of an Information System

In today’s society and organization people and technology plays an important role in organizations and businesses to achieve their objectives and goals. “Information system is the study of complementary networks of hardware and software that people and organizations use to collect, filter, process, create, and distribute data” (Bourgeois, 2014, p. 5).

People and Technology

CEO: Alvin Morrison is concerned that the company can meet the needs of its customers in a timely manner. Although he is not as involved in the details of hiring and placing the consultants, he needs the new system to expedite the hiring process so that the company has the necessary staff to meet the demands of the customers when contracts are awarded.

CFO: Marianne Cho would like a cost-effective IT solution to improve the current hiring process, as well as a system that can work long term and add other needed tools. Specifically, she would like the system to track skills and certifications of present CIC staff.

CIO: Fadil Abadi is primarily concerned that the new IT solution is safe and does not cause any security breaches in the existing system. He is also concerned that the new system be compatible with mobile computing and be compatible with the present CIC hardware and software systems. In addition, because CIC is expanding globally, the CIO would like the new software to have the capabilities to effectively function without any barriers.

Director of HR: William Bradley understands that the hiring staff is struggling to meet the demands of processing candidates in a timely manner. His primary concern is that the new hiring system will be user friendly and able to enhance processes, and for it to interface with the existing system.

Manager of Recruiting: Suzanne Rodriguez is very excited about the interest in a new IT solution to help with the hiring and placement of consultants. She knows from contacts in the industry that technology can reduce the hiring time by 15-20% and efficiently process applicants quickly. Her primary concern is that the system is up and running before the next set of contracts are awarded.

Recruiters: Paul O’brien, Mac Thompson, and Juliet Jackson will be the primary users of the new system. The new system will improve the current process by consolidating all applicants by providing automated schedules of interviewees in a database to streamline the hiring process. The new hiring system will improve the recruiters’ time to screen resumes and immediately provide applicant’s information and status.

Administration Assistant: Ted Anderson is challenged daily with a tremendous amount of applicants’ paperwork and tracking the status of the applicants. The new hiring system will have the ability to manage the workflow electronically and improve the routing of applications and resumes to the interview team.

Hiring Manager is interested in a new hiring system that will take the place of the manual process and allow the Manager to quickly identify qualified candidates, as well as key skills and experience of CIC current staff members.

Processes

Processes are an integral part of an information system because it helps an organization take strategic steps to achieve their goal or objective (Bourgeois, 2014, p. 7).

 

Hiring Process Step Responsible CIC Position
1. Recruiter receives application from job hunter via Postal Service Mail Recruiter
2. Initial review of resume to determine if candidate should be interviewed Recruiter
3. Forward resume to appropriate hiring manager Administrative Assistant
4. Determine whether candidate should be interviewed Hiring Manager
5. Contact candidate to inform her/him if s/he will be interviewed Recruiter
6. Schedule interview with interview team members Administrative Assistant
7. Interview the candidate Hiring Manager and Interview Team Members
8. Provide feedback about the candidate Hiring Manager and Interview Team Members
9. Make decision about whether to hire candidate Hiring Manager
10. Determine details of offer including pay and start date Hiring Manager
11. Inform candidate and negotiate offer if necessary Recruiter
12. Administrative Assistant prepares and sends Hiring Offer to Selected Candidate by mailing offer letter

 

Administrative Assistant

 

 

“It is important that each recruitment be properly closed, including the notification of those interviewed and not selected, as well as all documentation associated with the recruitment” (University of California, n.d.)

Data

Data are an integral part of an information system because an organization uses data to make decisions and how they can improve (Bourgeois, 2014, p. 7).

 

Data Element
1. Name and contact information of candidate
2. Candidates educational background and certifications
3. Description of assignment and customer’s needs
4. Interview schedule for candidates selected to interview
5. Feedback from the interviewers
6. Determination about whether to hire candidate
7. Where candidate is placed
8. Terms of placement (start date, pay, etc.)
9. Feedback from customer about candidate
10. Certifications and notable skills of all CIC employees

 

 

 

Decision-Making

Because of the current problem CIC is facing with its hiring process, CIC needs a new hiring process software that will provide information to assist the decision makers in the hiring process at the strategic, managerial, and operational levels.

Role Level Example of Possible Decision Supported by Hiring System.
Senior/Executive Managers

(Decisions made by the CEO and the CFO at CIC supported by the hiring system.)

 

Strategic

The CEO needs to decide whether CIC has the resources to handle a contract that requires consultants with certain certifications.

 

The new system will capture information about candidates and existing employees including specific certifications and skill sets they possess.

Middle Managers

(Decisions made by the Director of HR and the Manager of Recruiting supported by the hiring system.)

 

Managerial

The Director of HR needs to decide how many recruiting staff members are needed to process the candidates for the next round of contracts.

 

The new system will interface with the existing system, be user friendly and reduce the time it takes to process the candidates.

Operational Managers

(Decisions made by the line managers in the organization who are hiring for their projects supported by the hiring system.)

 

Operational

A hiring manager needs to identify 3 candidates that possess a level of expertise in a particular software.

 

The new system will help managers to better review and select new staff with the right certifications for the awarded CIC contracts.

 

 

 

 

 

 

Communication

The new hiring system will improve communication internally and externally to expedite the hiring process with the use of an electronic dashboard. The dashboard will allow applicants to check their status and to submit any additional information that may be required. The new system will be web based and able to compile data that each department needs to process the candidates’ applications and resumes. The new system will provide a means for the information to be updated with interview schedules, feedback, and ultimately a hiring decision.

Collaboration

The new hiring system will increase collaboration during the hiring process by allowing the necessary employees to access information about the candidates at the same time. The system will allow the employees who interview the candidates to provide feedback, and to view the feedback provided by others. This information will allow the hiring manager to make a decision without having to track down the interviewers or having to wait for paperwork to get their feedback on the candidates.

Relationships

The new hiring system will assist the HR department communicate more efficiently with candidates about the status of their application. The system will contain information about the progress of the interview process, and it will help to facilitate a smoother and faster process for the candidates. This will allow candidates to be informed so that they are not left in the dark about whether they are a good fit for CIC, and it will help the candidates view CIC as a technologically advanced company.

 

Structure

The new hiring system will help to add structure to the process by streamlining how applicants are processed. The system will create a consistent flow of information about the applicant’s background, interview schedule, feedback from the interviewers, and the hiring decision. This will help all of the CIC employees who are involved in the hiring process to understand their specific roles and when their input is required to move the process forward. The new system will also create structure by maintaining all of the candidates’ information in a central location where all of the hiring team members can access it, which will allow the process to be more efficient and effective.

Competitive Advantage

The new hiring system will help CIC to efficiently employ consultants with the “new business concepts and technology” which will allow CIC to win new IT contracts. The new system will allow CIC to respond more quickly to customers who are seeking IT consultants so that CIC obtains the contract before any competitor. In addition, by streamlining the hiring process CIC can save costs that can then be passed on to the customer for more competitive rates. Having skilled certified staffing will allow CIC to be a world class provider of IT consulting services.

Strategic Outcomes

 

Strategic Goal (from case study) Objective

(clear, measurable and time-bound)

Explanation

(2-3 sentences)

Increase CIC Business Development by winning new contracts in the areas of IT Consulting Increase the number of skilled and certified consultants by 15% within 3 months. The new hiring system will reduce the time it takes to process applicants and make hiring decisions, which will allow CIC to hire more consultants in a shorter timeframe.
Build a cadre of consultants internationally to provide remote research and analysis support to CIC’s onsite teams in the U. S. Increase international recruiting efforts and employ 5 research analysts in the next 12 months. The new hiring system would allow applicants from around the world to apply online, increasing the number of international applicants. It would enable the recruiters to carefully monitor the applications for these positions, identify the necessary research and analysis skills needed, and screen resumes for these key skills. Recruiters could quickly view the number of applicants and identify when additional recruiting efforts are needed to meet the objective.
Continue to increase CIC’s ability to quickly provide high quality consultants to awarded contracts to best serve the clients’ needs Reduce the time it takes to identify current CIC employees that have the required skills and certifications for a particular contract by capturing all of the current employees’ certifications within one month. The new system will store data about each employees’ certifications in a searchable format so that the hiring managers can quickly identify how many consultants they have, and how many additional consultants they may need to hire. The new system will also identify the candidates that meet the criteria so that hiring managers can prioritize their applications.
Increase CIC’s competitive advantage in the IT consulting marketplace by increasing its reputation for having IT consultants who are highly skilled in leading edge technologies and innovative solutions for its clients

 

Increase competitive advantage by lowering the cost of CIC’s services by 10%. The new hiring system will allow CIC to hire new staff from other countries, which will likely reduce the cost of labor. By reducing the cost that CIC pays out to its employees, CIC is able to pass along the cost savings to its customers.

 

 

Process Analysis

 

CIC Hiring Process

 

As/Is Process (copied from Stage 1)  

To/Be Process

Business Benefits of Improved Process
1. Recruiter receives application from job hunter via Postal Service Mail. Receive application via on-line submission through CIC Employment Website and files in applicant database. More efficient submission process presents positive image to applicants and decreases time needed to receive and begin processing applications.
2. Initial review of resume to determine if candidate should be interviewed Software conducts automated search of key words relevant to the job description

 

Automated initial review is more efficient and does not require time from HR staff.
3. Forward resume to appropriate hiring manager Based on automated review, resumes for qualified applicants are automatically forwarded to hiring manager via email Automated process allows hiring managers to receive pre-screened resumes more quickly to determine whether candidate should be interviewed.
4. Determine whether candidate should be interviewed New system will prompt hiring manager to input whether candidate should receive interview The hiring manager’s decision will be captured in the system which will allowing team members to have faster access to the initial decision.
5. Contact candidate to inform her/him if s/he will be interviewed The system will generate an email to inform the candidate that they have been selected for an interview, and it will notify HR to follow up to get the candidates availability. An automated email will keep the candidates informed more quickly which will make the company more attractive to the candidate.
6. Schedule interview with interview team members New system will provide automated interview schedules for the selected applicants to streamline the hiring process A streamlined process will allow candidates to be interviewed more quickly and allow HR staff to focus on other tasks.
7. Interview the candidate The system can provide sample interview questions and assign key areas to assess for each interviewer. A more organized interview process will allow the company to gather more information about each applicant.
8. Provide feedback about the candidate The new system will collect feedback from the interviewers The feedback will be accessible to all of the hiring team so that a final decision can be reached more quickly.
9. Make decision about whether to hire candidate The system will send the hiring manager the feedback from the interviewers and prompt the manager to make a decision A streamlined process will allow the hiring team to make a faster decision, which will give the company a competitive advantage.
10. Determine details of offer including pay and start date The system could suggest a comparative salary range and benefit package based on the job requirements and the applicant’s background. The system will compile salary information based on skills and experience, which will help the company to make competitive offers.
11. Inform candidate and negotiate offer if necessary Once the details of the offer are completed, the system will prompt the hiring manger to contact the candidate to make the job offer. The system will notify the hiring manger, which will save time and staff resources.

 

 

12. Administrative Assistant prepares and sends Hiring Offer to Selected Candidate by mailing offer letter  Ted prepares job offer letter by selecting information needed for specific candidate; system completes the template with stored information and Ted reviews and emails to candidate. Recruiter selects offer information for candidate and electronically routes to Ted for processing and electronic mailing to candidate.

 

Requirement

 

Requirement Number Requirement Source (individual) from Case Study – name and title
U-1 New system to expedite the hiring process so that the company has the necessary staff to meet the demands of the customers  

CEO: Alvin Morrison

U-2 New system be compatible with mobile computing and be compatible with the present CIC hardware and software systems  

CIO: Fadil Abadi

U-3 New system to track skills and certifications of present CIC staff CFO: Marianne Cho
U-4 New hiring system will be user friendly and able to enhance processes, and for it to interface with the existing system Director of HR: William Bradley
UR-1 An electronic dashboard for status report Director of HR: William Bradley, Hiring Manager

 

Recruiter

SS-1 New IT solution system is safe and does not cause any security breaches in the existing system. CIO: Fadil Abadi
SS-2 The new system will allow international candidates to apply online Director of HR: William Bradley
SP-1 The new system will be web based and able to compile data that each department needs to process the candidates’ applications and resumes. Director of HR: William Bradley

 

Hiring Manager

SP-2 The new hiring system will increase collaboration during the hiring process by allowing the necessary employees to access information about the candidates at the same time. Hiring Manager

 

Recruiter

SP-3 The new hiring system will help to add structure to the process by allowing all parties to view the candidates’ information such as the interview schedule Hiring Manager

 

Recruiter

 

 

Systems Recommendation

 

 

A. Benefits of an Enterprise Solution:

 

 

 

B. Proposed IT Solution: The vendor I chose is Bamboo HR SAAS system. Bamboo HR SAAS system which is capable of creating custom workflows to be more efficient in your decision-making processes. Also, a great onboarding experience means increased retention and engagement. Find the right people faster. Helps HR reps get the best candidates. Save time, money, and trees with esignatures. Remove the hassle of distributing and collecting signed paperwork.

C. Proposed IT Solution: down-arrow

D.

 

 

 

 

E. How the proposed IT solution meets the requirements:

Req.

Number

Requirement

(from Requirements table in Section III)

Explanation of How the Proposed System Meets the Requirement
U-1 New system to expedite the hiring process so that the company has the necessary staff to meet the demands of the customers
U-2 New system be compatible with mobile computing and be compatible with the present CIC hardware and software systems
U-3 New system to track skills and certifications of present CIC staff
U-4 New hiring system will be user friendly and able to enhance processes, and for it to interface with the existing system
UR-1 An electronic dashboard for status report
SS-1 New IT solution system is safe and does not cause any security breaches in the existing system.
SS-2 The new system will allow international candidates to apply online
SP-1 The new system will be web based and able to compile data that each department needs to process the candidates’ applications and reduce the hiring time by 15-20%.
SP-2 The new hiring system will increase collaboration during the hiring process by allowing the necessary employees to access information about the candidates at the same time.
SP-3 The new hiring system will help to add structure to the process by allowing all parties to view the candidates’ information such as the interview schedule

 

 

 

F. Implementation Steps: First, insert an introductory opening sentence for this section

 

 

 

Implementation Areas:

 

1. Vendor agreement

 

2. Hardware and telecommunications SaaS vendors provide users with software and applications via a subscription model

 

3. Configuration: Bamboo HR SaaS system can assist CIC as needed with the system on-boarding. Bamboo HR SaaS HR Project Managers will take CIC’s company data and spreadsheets, migrate them into the BambooHR system, and will guide the entire process to have CIC up and running in no time.

 

4. Testing: CIC can use the free trial option to get an idea of what they will be paying for and make the decision if they will move forward with the software. By using the free trial they will have a better understanding of the software and if it meet their needs and demands. During the free trial CIC can test the Bamboo Hr system for requirement SP-2 by checking that the system is allowing the necessary employees to access information about potential candidates at the same time. Also, allowing the necessary employees to collaborate during the hiring process by giving and receiving feedbacks in real time. .

 

5. Employee preparation: The vendor has a dozen free videos and tutorials to help learn the system. Some of the topics include: Getting started, time off requests and approvals, understanding files and documents and configuring permission groups, and also the help section. If needed, CIC can also purchase custom training sessions and in-depth webinars to train your team or entire company on specific features.

 

 

a. Leadership

 

 

b. Change Management

 

 

c. Training

 

 

6. Data migration Data is secure in the cloud; equipment failure does not result in loss of data

7.

 

 

8. Maintenance Users do not have to manage, install or upgrade software; SaaS providers manage this

 

 

 

 

G. Conclusion

 

 

 

 

 

 

 

 

 

 

 

 

References

 

Bourgeois, D. (2014). Business processes. Information Systems for Businesses and Beyond, Washington, D.C.: The Saylor Foundation

CIPHR. (n.d.). Cloud HR Software | HR SaaS Solutions | CIPHR. Retrieved from http://www.ciphr.com/products/ciphr-saas/

University of California, Riverside. (n.d.). Human Resources: Recruitment & Selection Hiring Process. Retrieved from https://hr.ucr.edu/recruitment/guidelines/process.html

 

In-text Citations

(CIPHR, n.d.)

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Exp19_Excel_Ch07_CapAssessment_Shipping

Exp19_Excel_Ch07_CapAssessment_Shipping

Exp19 Excel Ch07 Cap Assessment Shipping

 

Exp19_Excel_Ch07_CapAssessment_Shipping

Project Description:

You work for a company that sells cell phone accessories. The company  has distribution centers in three states. You want to analyze shipping  data for one week in April to determine if shipping times are too long.  You will perform other analysis and insert a map. Finally, you will  prepare a partial loan amortization table for a new delivery van.

Start   Excel. Download and open the file named Exp19_Excel_Ch07_CapAssessment_Shipping.xlsx. Grader has automatically added   your last name to the beginning of the filename.

The Week worksheet contains data   for the week of April 5.
In cell D7, insert the appropriate date function to calculate the  number of   days between the Date Arrived and Date Ordered. Copy the  function to the   range D8:D35.

Next, you want to display the   city names that correspond with the city airport codes.
In cell F7, insert the SWITCH function to evaluate the airport code  in cell   E7. Include mixed cell references to the city names in the  range F2:F4. Use   the airport codes as text for the Value arguments.  Copy the function to the   range F8:F35.

Now you want to display the   standard shipping costs by city.
In cell H7, insert the IFS function to identify the shipping cost  based on   the airport code and the applicable shipping rates in the  range G2:G4. Use   relative and mixed references correctly. Copy the  function to the range   H8:H35.

Finally, you want to calculate a   partial shipping refund if two conditions are met.
In cell I7, insert an IF function with a nested AND function to  determine   shipping refunds. The AND function should ensure both  conditions are met:   Total Days is grater than Total Days Delivery Goal  (cell C3) and Order Total   is equal to or greater than Order Total  Threshold (cell C2). If both   conditions are met, the refund is 50%  (cell C4) of the Shipping Cost.   Otherwise, the refund is $0. Use mixed  references as needed. Copy the   function to the range I8:I35.

The Stats worksheet contains   similar data. Now you want to enter summary statistics.
In cell B2, insert the COUNTIF function to count the number of  shipments for   Austin (cell B1). Use appropriate mixed references to  the range argument to   keep the column letters the same. Copy the  function to the range C2:D2.

In cell B3, insert the SUMIF   function to calculate the total orders  for Austin (cell B1). Use appropriate   mixed references to the range  argument to keep the column letters the same.   Copy the function to the  range C3:D3.

In cell B4, insert the AVERAGEIF   function to calculate the average  number of days for shipments from Austin   (cell B1). Use appropriate  mixed references to the range argument to keep the   column letters the  same. Copy the function to the range C4:D4.

Now you want to focus on   shipments from Houston where the order was greater than $1,000.
In cell C7, insert the COUNTIFS function to count the number of  orders where   the Airport Code is IAH (Cell D1) and the Order Total is  greater than $1,000.

In cell C8, insert the SUMIFS   function to calculate the total  orders where the Airport Code is IAH (Cell   D1) and the Order Total is  greater than $1,000.

In cell C9, insert the MAXIFS   function to return the highest order  total where the Airport Code is IAH   (Cell D1) and the Order Total is  greater than $1,000.

On the Map worksheet, insert a   map for the states and revenues. Cut and paste the map in cell C1.

Format the data series to show   only regions with data and show all map labels.

Change the map title to April 5-9   Gross Revenue.

Use the Loan worksheet to   complete the loan amortization table.
In cell F2, insert the IPMT function to calculate the interest for  the first   payment. Copy the function to the range F3:F25. (The results  will update   after you complete the other functions and formulas.)

In cell G2, insert the PPMT   function to calculate the principal  paid for the first payment. Copy the   function to the range G3:G25.

In cell H2, insert a formula to   calculate the ending principal balance. Copy the formula to the range H3:H25.

Now you want to determine how   much interest was paid during the first two years.
In cell B10, insert the CUMIPMT function to calculate the  cumulative interest   after the first two years. Make sure the result is  positive.

In cell B11, insert the CUMPRINC   function to calculate the  cumulative principal paid at the end of the first   two years. Make sure  the result is positive.

You want to perform a what-if   analysis to determine the rate if the monthly payment is $1,150 instead of   $1,207.87.
In cell B15, insert the RATE function to calculate the necessary  monthly rate   given the NPER, proposed monthly payment, and loan. Make  sure the result is   positive.

Finally, you want to convert the   monthly rate to an APR.
In cell B16, insert a formula to calculate the APR for the monthly rate in   cell B15.

Insert a footer on all sheets   with your name on the left side, the  sheet name code in the center, and the   file name code on the right  side.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

Office 2013 – myitlab:grader – Instructions Exploring – Excel Chapter 4: Homework Project 1

Mountain View Realty

 

Project Description: A coworker developed a spreadsheet listing houses listed and sold during the past several months. She included addresses, location, list price, selling price, listing date, and date sold. You need to convert the data to a table. You will manage the large worksheet, prepare the worksheet for printing, sort and filter the table, include calculations, and format the table.

 

Instructions: For the purpose of grading the project you are required to perform the following tasks: Rule 1: If an object is selected and a new tab appears, it is 95% in that new tab. Rule 2: If you are ever confused, right click on the selected item. Formulas: + = Addition – = Subtraction * = Multiplication / = Division Step Instructions Points Possible 1 Start Excel. Open the downloaded file named exploring_e04_grader_h1.xlsx. In File, use the SAVE AS function to save the document in Computer / Z Drive as Excel Chapter 4 Capstone 0 2 In the Sales Data worksheet, freeze the top row. Be sure row 1 is the top row before you freeze it. 5 3 In the Sales Data worksheet, click cell A1, convert the data to a table and apply Table Style Medium 17. 6 4 In the Sales Data worksheet, remove duplicate records in the table using default settings. 5 5 In the Sales Data worksheet, insert a new column to the right of the Selling Price field. Name the new field Percent of List Price. Select the range E2:E43 and format the fields with Percent Style with on decimal place. 6 6 In the Sales Data worksheet, enter a formula in cell E2 with structured references to calculate the percent of the list price, meaning the Selling Price divided by the List Price. A Structured reference uses the column as the reference rather than the cell. Ex: Percent of List Price =[Selling Price]/[List Price] 6 7 In the Sales Data worksheet, type in cell H1 the header Days on Market. Enter a formula with structured references to calculate the number of days on the market, meaning the Sale Date minus the Listing Date. If the data does not appear as number, select ALL the Days on Market data and change the format to Number with zero decimals. 6 8 In the Sales Data worksheet, add a total row to display the average percent of list price and average number of days on market. For the Days on Market average, be sure there are no decimal places. Type Averages in cell A44. 10 9 In the Sales Data worksheet, sort the table by City in alphabetical order and add a second level to sort by Days on Market with the houses on the market the longest at the top within each city. 8 10 In the Sales Data worksheet, select the Listing Date and Sale Date fields and set a column width of 11.00. Wrap the column labels in the range E1:H1. 6 11 In the Sales Data worksheet, within print titles, repeat the table headers on all pages. 5 12 Display the Sales Data worksheet in Page Break Preview and move the page break to occur between rows 26 and 27, and then change back to Normal view. 5 13 Switch to the Filtered Data worksheet. Within Table Tools Design, convert to range the table of data. 5 14 Within Data / Sort & Filter, filter the data to display the cities of Alpine, Cedar Hills, and Eagle Mountain. 6 15 Use a number filter to filter the days on market data to display records for houses that were on the market 30 days or more. 5 16 Select the Days on Market values (E2:E69) and apply a Conditional Formatting Icon Set of the 3 Arrows (Colored). 5 17 Select the Selling Prices values and apply a conditional Formatting Gradient Fill of the Light Blue Data Bar. 5 18 Select the Percent of List Price values and apply a conditional format using highlight cell rules to values greater than 98%. Apply a custom format: Yellow fill (fourth color in the bottom row) Bold font 6 19 Ensure that the worksheets are correctly named and placed in the following order in the workbook: Sales Data, Filtered Data. Save the workbook. Close the workbook and then exit Excel. Submit the workbook as directed. 0 Total Points 100

 

Updated: 04/04/2013 2 E_CH04_EXPV1_H1_Instructions.docx

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

W7- Case Study Question Assignment help

W7- Case Study Question Assignment help

Note: – Must require——–

APA format (Times New Roman, size 12 and 2 space)

MS Visio diagram OR MS Word Smart Art

Minimum 3 or more References including Sharda mentioned below.

W7: Case Studies – Graded Case Study Assignment (Pages 589-591 and 630-631)

Graded Assignment:  Case Studies – (Follow all steps below)

Carefully review and read both case studies found in your textbook from Pages 589-591 and 630-631

Sharda, R., Delen, D., & Turban, E. (2015) Business intelligence and analytics: Systems for decision support (10th ed.). Boston: Pearson.

Digital: ISBN-13: 978-0-13-340193-6 or Print: ISBN-13: 978-0-13-305090-5

After reading and analyzing both studies, address all case study questions found within the case studies in scholarly detail prepared in a professionally formatted APA paper.

When concluding the paper, expand your analytical and critical thinking skills to develop ideas as a process or operation of steps visually represented in a flow diagram or any other type of created illustration to support your idea which can be used as a proposal to the entity or organization in the cases to correct or improve any case related issues addressed.  This is required for both cases.

When developing illustrations to support a process or operation of steps, Microsoft Word has a tool known as “Smart Art” which is ideal for the development of these types of illustrations or diagrams.  To get acquainted with this tool, everyone can visit www.youtube.com using a keyword search “Microsoft Word Smart Art Tutorials” to find many video demonstrations in using this tool.

Minimum Paper Expectations

· Page Requirements:  The overall paper supporting both cases will include a minimum of “4” pages of written content.

· Research Requirements:  The overall paper will be supported with a minimum of “3” academic sources of research and one of the sources can be the textbook.

· Application Technology:  Microsoft Word will be used to prepare this paper.

· Professional Format: APA will be used to prepare the professional layout and documentation of research.

· Important Note:  Do not fall below minimum page and research requirements.

======

Questions from the text Book which we need to elaborate in our case study

QUESTIONS FOR THE END-OF-CHAPTER APPLICATION CASE (Page 589- 591)

INTRODUCTION —

1. How big is Big Data for Discovery Health?

2. What big data sources did Discovery Health use for their analytic solutions?

3. What were the main data/ analytics challenges Discovery Health was facing?

4. What were the main solutions they have produced?

5. What were the initial results/benefits? What do you think will be the future of Big Data analytics at Discovery?

Diagram flow – MS word ART or MS Visio etc… (This is must)

QUESTIONS FOR THE END-OF-CHAPTER APPLICATION CASE (Page 630-631)

INTRODUCTION —-

1. What is main business problem faced by Southern States Cooperative?

2. How was predictive analytics applied in the application case?

3. What problems were solved by the optimization techniques employed by Southern States Cooperative?

Diagram flow – MS word ART or MS Visio etc… (This is must)

CONCLUSION

<xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>

Reference info. Minimum 3 or more.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!