Exp19 Excel Ch11 ML1 Internships

 

Exp19 Excel Ch11 ML1 Internships

 

Project Description:

As the Internship Director for a regional university, you created a  list of students who are currently in this semester’s internship  program. You have some final touches to complete the worksheet,  particularly in formatting text. In addition, you want to create an  advanced filter to copy a list of senior accounting students. Finally,  you want to insert summary statistics and create an input area to look  up a student by ID to display his or her name and major.

You want to extract the last four digits of the student’s ID.
 

  #In cell B2 on the Students sheet, extract the last four digits of  the first student’s ID using the RIGHT function. Copy the function from  cell B2 to the range B3:B42.
   Hint: Formula is =RIGHT(Student ID, 4)

#After extracting the last four digits of the ID, you want to align the data.
 

  #Apply center horizontal alignment to the range B2:B42.
   Hint: The Home tab contains alignment options.

#The first and last names are combined in column C. You want to separate the names into two columns.
 

  Convert the text in the range C2:C42 into two columns using a space as the delimiter.
   Hint: Text to Columns is located on the Data tab.

#You want to convert the text in column F to upper and lowercase letters.
 

  #Use a text function in cell G2 to convert the text in cell F2 into  upper and lowercase letters. Copy the function to the range G3:G42.
   Hint: Formula is =PROPER(Major)

#Now that you have converted text from uppercase to upper and  lowercase, you will hide the column containing the majors in all capital  letters.
 

  Hide column F.
 

  Hint: The Home tab contains an option to hide a column.

You want to create a criteria range for the dataset.
 

  #Create a criteria range by copying the range A1:I1 and pasting it in cell   A44. Create conditions
   for   Senior Accounting   majors on row 45 and an OR condition for Junior Accounting majors in the respective cells   on row 46

You are ready to perform the advanced filter.
 

  #Create an output range by copying the range A44:I44 to cell A48.  Perform the   advanced filter by copying data to the output range. Use  the appropriate   ranges for list range, criteria range, and output  range
   Hint: The Data tab contains the option to perform an advanced filter.

On the Info worksheet, you want   to insert a database function based on conditions.
 

  #Display the Info worksheet and insert the DSUM function in cell B2  to   calculate the total tuition for junior and senior accounting  students. Use   the range A1:I42 for the database, Tuition for the field, and the criteria range.
 

You want to insert database   functions to perform calculations.
 

  In cell B3, insert the DAVERAGE function to calculate the average GPA for junior and senior   accounting students on the Students worksheet. Use mixed references in the   ranges.

You want to identify the highest   GPAs for junior and senior accounting majors.
 

  In cell B4, insert the DMAX function to identify the highest GPA for junior and senior   accounting students on the Students worksheet. Use mixed references in the   ranges.
 

In cell B5, insert the DMIN function   to identify the lowest GPA for junior and senior accounting students on the Students   worksheet. Use mixed references in the ranges.
 

In cell B6, insert the DCOUNT   function to count the number of junior and senior accounting
   students on the Students worksheet. Use mixed references in the ranges.
 

In cell B9, insert the DGET   function to retrieve the last name of  the student who has the ID listed in   cell A9. Use the column number  representing the Last Name column for the   field argument and use the  criteria range A8:A9. Edit the function to make the column letters  absolute. Copy the DGET function from cell B9 to cell C9.   Edit the  field number to represent the GPA column.
 

You want to format the results of the database functions.
 

  Format the range B3:B6 with Comma Style. Decrease the number of decimal   places to zero
   for cell B6.

You want to identify the location of a particular ID.
 

  Insert the MATCH function in cell B13 to identify the position of the ID   stored in cell B12. Use
   the range A2:A42 in the Student’s worksheet as the lookup_array argument and   look for exact
   matches only.
 

Insert the INDEX function in cell B14 with Students!A$2:I$42 as the  array, B$13 that contains the MATCH function as the row number, and 4 as the column number. Copy the function from cell   B14 to cell B15. Edit the function to change the column number to 7.

Change the ID in cell B12 to 11282378. The results of the MATCH and   INDEX functions
   should change.

You want to insert a function to display other functions as text.
 

  Insert the FORMULATEXT function in cell D2 to display the formula that is   stored in cell B2.
   Copy the function to the range D3:D6 and to the range D13:D15. In cell D8,   insert the
   FORMULATEXT function to display the function that is stored in cell B9, and   in cell D9, insert
   the FORMULATEXT function to display the function that is stored in cell C9.

Increase the width of column D   to 50.

Create a footer with your name on the left side, the sheet name code  in the center, and the file name code on the right side on all sheets.

Analyze and visual

Kirk (2019) notes the importance of formulating your brief.  What does he mean by this?  Please expand this thought by noting how you would create a vision for your work.  Note any real-world examples to expand upon this thought.

Module 7 Writing Assignment

 600 words

In order to find the best design for your documents or site it is important that you have a firm grasp on what your goals are for any piece of writing. Do you want to entertain, to sell, to perform a task, or to teach? You must also keep your rhetorical strategy in mind as you consider document design. Are you planning to focus mainly on logos, pathos, or ethos? Perhaps you are trying to balance all three. What is the age and demographic of your target audience? What are their needs in relation to the document? Do they have a disability? Do they come from a different culture?

Select a technology oriented site (examples: Apple, Amazon, Intel) and review the site in the light of the design principles

The assignment is based off chapter 11

Final Paper

 

1. A project that involves research and/or implementation on a network security tool,

exploit, or security software. Provide research on the project showing implementation of

such tool/software/exploit and provide documentation for the outcome. The

documentation/research/testing analysis will need to be a minimum of 2000 words and

include screenshots or video capture of your project in action. If you submit a walkthrough

video for this portion of the project, you can use a screen capture tool and voice

over your presentation.

2. A detailed research paper that is related to one or more topics covered in the textbook.

The research paper will need to be a minimum of 2,000 words (not including title page

and references). A minimum of three library sources is required.

3. A case study involving your own industry experience and/or industry experiences of

others where security measures or best practices have been applied to create a more

secured network environment. The subject must be related to one or more topics covered

in this course, and library sources must be carefully cited. A minimum of three library

sources is required.

• All project papers will need to be a minimum of 2000 words.

Software Engineering

1)  In version control, there has been some debate on how to implement the internal storage of the different versions of an artifact. One argument is to keep the complete copy of each version. Another is to keep only the delta changes from version to version, with the first version being the only complete copy.

a. Give one reason why you may want to keep a complete copy of each version.

b. Give one reason why you may want to keep only the delta. 

c. What would be the drawback of each of these approaches?

2)  Visit the online customer support site of a software product company and compare the list of support functions it offers against your list from Review Question 1.

List three customer support functions that a customer support/service organization performs.

Cloud Security

 write a 2-page paper (APA format) on what you believe are the three (3) most important cloud security concepts you learned during the training AND why. 

It472 week 4

DQ4:  Most business processes are too complex to be explained in one DFD. Most process
models are therefore composed of a set of DFDs. The first DFD provides a summary
of the overall system, with additional DFDs providing more and more detail about each
part of the overall business process. Thus, one important principle in process modeling
with DFDs is the decomposition of the business process into a hierarchy of DFDs,
with each level down the hierarchy representing less scope but more detail.

1) Define what is meant by a process in a process model. How should a process be named? What
information about a process should be stored in the CASE repository?

2) Discuss how the analyst knows how to stop decomposing the process model into more and more levels of detail. 

3) Suppose that your goal is to create a set of DFDs. How would you begin an interview with a knowledgeable user? How would you begin a JAD session?

Security Governance

 

Write a paper discussing the following:

  • What is the purpose of Security Convergence. 
  • What are some of the key approached organization use to acheive Security Convergence
  • Briefly described a real-life project you researched where security convergence was achieved realizing at least three of the benefits below:
  • Significantly lower costs
  • Use existing servers to make the decisions. 
  • Use existing IT infrastructure (switches, cables, UPS systems) to keep the system running. 
  • Use existing IT redundancy and backup to protect in case of failures. 
  • Let the IT department protect valuable data and keep out cyber-intruders. 
  • Merge physical access (doors) and logical access (computers) into a single system. 
  • Let security worry about the “who, when, and where.” Let IT handle moving the data.
  • Take away remote databases not managed by IT, and reduce the ability of hackers to penetrate the access system and use it as a gateway to the rest of the IT system. 
  • Save significant hardware money tp spend on other security measures

 

  • Assignment Format: APA format
  • Submission Format: MS Word
  • Length: 6  pages (not including cover & references pages)
  • Citations Required: minimum 5 citations (At least 2 Scholarly and 3 from other reliable sources)