Example Budget Layout

Week 4 Project

 

Creating a Budget

In this assignment you will create a spreadsheet and a chart to help a hypothetical couple work out their budget. You will submit a Microsoft Excel spreadsheet following the directions below to the appropriate submission folder by the due date. You will name this file W4P_LastName.xlsx.

Click on the link below, Week 4 Project Tips, for some visual aids on how to tackle this week’s project.

Week 4 Project Tips

Please Note:Information to help you with this project is available in the Week 4 online lectures, your textbook, as well as Microsoft Excel Help (F1). Your professor is also a great resource. If you work ahead, you can post questions about this assignment on the Questions for the Professor discussion board and still submit your assignment on time.

Scenario

Tom and Sally were trying to get a handle on their budget. They heard that MS Excel could help them with that.  Tom is going to school and has cut back on his hours. Sally has finished her associate’s degree and is working full time. They want to look at the last three months of their income and expenses to see where they can make changes.

Part I – The Spreadsheet

First, in an Excel Spreadsheet, create a budget to show Tom and Sally’s income, expenses, and money leftover each month (Net). Create formulas in your spreadsheet for your calculations using the following data:

  • Tom brought home $1,000 a month for January, February, and March.
  • Sally brought home $1,900, $2,000, and $1,975 respectively for those three months.
  • They paid $1,000 for rent and utilities each month.
  • They paid $88 for insurance each month.
  • They paid $60 for cell phones and $60 for Internet/TV each month.
  • They spent $600, $750 (due to a big birthday bash), and $500 on food respectively.
  • Their car payment and gas came to $225, $250, and $300 respectively.
  • Entertainment and gifts were $75, $100, and $45 respectively.
  • They paid a little extra on their credit card $150, $125, and $100 respectively.
  • They allocated $200 each month for personal grooming and health care.
  • They put $100 each month into savings.
  • Miscellaneous Expenses came to $200, $100, and $400 respectively.

A sample budget layout is included below as an example of one way to lay out a budget.

Example Budget Layout

Part II – The Chart

Once you have worked out the budget spreadsheet, use the tabs at the bottom of the page to open another sheet. Here you will create a chart similar to the example below using the tools you learned about in the lectures and the textbook. On the new sheet:

  1. Create a column chart to visually represent their monthly expenses. If you have a challenge getting the chart on this sheet, research how to move your chart using your reading or Help (F1). You might also try right clicking on the chart.
  2. Add a descriptive title to the chart.

Example Line Chart

Part III – Changing Values

  1. Copy everything from Sheet 1 (the budget calculations) and paste it into a new worksheet.
  2. Change values for Sally’s March income to $200 more. Let’s say that they didn’t use as much heat in March and their utilities were $75 less (you could use a formula to figure out $75 less but you don’t have to). See how the totals change automatically if you used formulas correctly. If the values did not change, check your formulas and try them again. Seek help if you can’t figure this out.
  3. Rename each of your three spreadsheets with descriptive names.

By the due date assigned, submit this budget to the Submissions Area. In the message box, share how the process of creating this went for you, including any challenges, successes, or insights. In the Comments box, briefly share your experiences with completing this project.

Research paper

  

You work for a high-tech company with approximately 390 employees. Your firm recently won a large DoD contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.

This course project will require you to form a team of 2 to 3 coworkers (fellow students) and develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the “Tasks” section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies or controls in place.

victims of cyber breachers

company that has been victims of cyber breachers withing the past three years. 

 COMPANY is FACEBOOK

Include the following headings in your paper:

  1. Company Name—type of company—brief history—Industry—Customers (consumer, business, or both)
  2. Name of the exploit
  3. How the exploit was caused

Identifying Threats and Vulnerabilities in an IT Infrastructure

 

Risk Management Fundamentals Lab #1: Identifying Threats and Vulnerabilities in an IT Infrastructure

Critical infrastructure vulnerability assessments are the foundation of the National Infrastructure Protection Plan’s risk-based implementation of protective programs designed to prevent, deter, and mitigate the risk of a terrorist attack while enabling timely, efficient response and restoration in an all-hazards post-event situation.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Home work 5

 

Each student will  conduct a search online Library resources to find 1 recent peer reviewed article (within the past 3 years) that closely relates to Counter-offering in Negotiation. Your submission must include the following information in the following format:

Key Term:

  • Counter-offering in Negotiation

DEFINITION: a brief definition of the key term followed by the APA reference for the term; this does not count in the word requirement.

SUMMARY: Summarize the article in your own words- this should be in the 150-200 word range. Be sure to note the article’s author, note their credentials and why we should put any weight behind his/her opinions, research or findings regarding the key term.

ANALYSIS: Using 300-350 words, write a brief analysis, in your own words of how the article relates to the selected chapter Key Term. An analysis is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts and opinions. This is the most important part of the assignment.

REFERENCES: All references must be listed at the bottom of the submission–in APA format. 

Be sure to use the headers in your submission to ensure that all aspects of the assignment are completed as required.

Any form of plagiarism, including cutting and pasting, will result in zero points for the entire assignment.

 

You should incorporate these topics into your analysis section. If you do, then the chances of earning a high grade are GREATLY increased, in fact, this is the FIRST thing I look for when grading your papers. 

1. Explain why you selected this particular article among all the articles you could have chosen on your selected term.

2. Explain why you agree or disagree with the author’s key positions in the article. 

3. Explain how the article was easy or difficult to understand and why? 

4. What did the author do well in your opinion? Explain.

5. Describe what you believe the author could have done better in your opinion?

6. What else should the author have included in the article and would the article benefit from a different perspective (such as from a different nationality or different industry or experience perspective). Explain. 

7. What other sources or methods could the author have used to improve the research in the article?  (Hint: look up the types of qualitative and types of quantitative research methods). 

8. What information / in-depth study / or further research should the author focus on as a follow up to this article and why? 

9. Explain what audience would gain the most benefit from your selected article and how they could apply it in their professional lives. 

10. What did you personally gain from this article and how has it shaped your thinking on the topic?  

11. What are the conflicting or alternative viewpoints of the author’s position? Or  What additional research backs up and confirms or adds to the author’s position?  (Hint: this will require you to find another peer-reviewed article that challenges, confirms, or adds to, or provides a different perspective to your chosen article.)

Next,  I look for the summary, writing quality, and formatting. 

I am typically very lenient on the writing because I am more focused on your content, but I will also point out how the paper could be better written. I only heavily penalize poorly written papers when there are excessive writing problems.

Why do I grade papers in this class this way?  

One of the key differences in a Bachelor’s vs Master’s level is critical thinking. Bachelor’s level basically challenges direct knowledge and recall of information. The Master’s level is more about analysis and critical thinking and defending your position in a scholarly way. The analysis section of these papers is your opportunity to exercise critical thinking (that’s why I call this portion of your papers critiques). 

Recalling or simply explaining the journal articles is a bachelor’s level task. When I see this in your papers I give the paper an automatic C. If the paper is poorly written it also gets an F. 

To get a B or an A – you must provide a critique of the paper and the author and how well the author did and what you think of the article. The questions listed above do this properly.  

I do not want to read your version of the journal article. I may as well read the journal article for myself.  Just briefly describe the article in your summary section  – but the analysis section is where you put in your personal critique – in other words, address the questions listed above and even add in additional thoughts based on your own creativity. 

Include at least one quote from each of 3 different articles

 

Write an essay of at least five hundred words discussing the use of encryption to protect data at rest, in motion, and in use. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.   Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

Access control Assignment 14

Discuss the importance of the testing phase of the Software Development Life Cycle.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

All paper are checked for plagiarism using SafeAssign, you can review your score.

It636week1

1.  Prepare a one page (minimum) paper on the use of Data Mining in the retail industry. You may use the internet for additional sources. Please double space your paper and cite your sources. 

2.  Prepare a one page paper on chapter 2, the Development of a Data Mining Study by briefly explaining the phases of a data mining project. You may use the internet for more information. Please double space your paper and cite your sources.