Need a wireframe created for a website. It should point out the flaws and address them in the wireframe.
Exp19 Excel Ch11 ML1 Internships
Exp19 Excel Ch11 ML1 Internships
Project Description:
As the Internship Director for a regional university, you created a list of students who are currently in this semester’s internship program. You have some final touches to complete the worksheet, particularly in formatting text. In addition, you want to create an advanced filter to copy a list of senior accounting students. Finally, you want to insert summary statistics and create an input area to look up a student by ID to display his or her name and major.
You want to extract the last four digits of the student’s ID.
#In cell B2 on the Students sheet, extract the last four digits of the first student’s ID using the RIGHT function. Copy the function from cell B2 to the range B3:B42.
Hint: Formula is =RIGHT(Student ID, 4)
#After extracting the last four digits of the ID, you want to align the data.
#Apply center horizontal alignment to the range B2:B42.
Hint: The Home tab contains alignment options.
#The first and last names are combined in column C. You want to separate the names into two columns.
Convert the text in the range C2:C42 into two columns using a space as the delimiter.
Hint: Text to Columns is located on the Data tab.
#You want to convert the text in column F to upper and lowercase letters.
#Use a text function in cell G2 to convert the text in cell F2 into upper and lowercase letters. Copy the function to the range G3:G42.
Hint: Formula is =PROPER(Major)
#Now that you have converted text from uppercase to upper and lowercase, you will hide the column containing the majors in all capital letters.
Hide column F.
Hint: The Home tab contains an option to hide a column.
You want to create a criteria range for the dataset.
#Create a criteria range by copying the range A1:I1 and pasting it in cell A44. Create conditions
for Senior Accounting majors on row 45 and an OR condition for Junior Accounting majors in the respective cells on row 46
You are ready to perform the advanced filter.
#Create an output range by copying the range A44:I44 to cell A48. Perform the advanced filter by copying data to the output range. Use the appropriate ranges for list range, criteria range, and output range
Hint: The Data tab contains the option to perform an advanced filter.
On the Info worksheet, you want to insert a database function based on conditions.
#Display the Info worksheet and insert the DSUM function in cell B2 to calculate the total tuition for junior and senior accounting students. Use the range A1:I42 for the database, Tuition for the field, and the criteria range.
You want to insert database functions to perform calculations.
In cell B3, insert the DAVERAGE function to calculate the average GPA for junior and senior accounting students on the Students worksheet. Use mixed references in the ranges.
You want to identify the highest GPAs for junior and senior accounting majors.
In cell B4, insert the DMAX function to identify the highest GPA for junior and senior accounting students on the Students worksheet. Use mixed references in the ranges.
In cell B5, insert the DMIN function to identify the lowest GPA for junior and senior accounting students on the Students worksheet. Use mixed references in the ranges.
In cell B6, insert the DCOUNT function to count the number of junior and senior accounting
students on the Students worksheet. Use mixed references in the ranges.
In cell B9, insert the DGET function to retrieve the last name of the student who has the ID listed in cell A9. Use the column number representing the Last Name column for the field argument and use the criteria range A8:A9. Edit the function to make the column letters absolute. Copy the DGET function from cell B9 to cell C9. Edit the field number to represent the GPA column.
You want to format the results of the database functions.
Format the range B3:B6 with Comma Style. Decrease the number of decimal places to zero
for cell B6.
You want to identify the location of a particular ID.
Insert the MATCH function in cell B13 to identify the position of the ID stored in cell B12. Use
the range A2:A42 in the Student’s worksheet as the lookup_array argument and look for exact
matches only.
Insert the INDEX function in cell B14 with Students!A$2:I$42 as the array, B$13 that contains the MATCH function as the row number, and 4 as the column number. Copy the function from cell B14 to cell B15. Edit the function to change the column number to 7.
Change the ID in cell B12 to 11282378. The results of the MATCH and INDEX functions
should change.
You want to insert a function to display other functions as text.
Insert the FORMULATEXT function in cell D2 to display the formula that is stored in cell B2.
Copy the function to the range D3:D6 and to the range D13:D15. In cell D8, insert the
FORMULATEXT function to display the function that is stored in cell B9, and in cell D9, insert
the FORMULATEXT function to display the function that is stored in cell C9.
Increase the width of column D to 50.
Create a footer with your name on the left side, the sheet name code in the center, and the file name code on the right side on all sheets.
Analyze and visual
Kirk (2019) notes the importance of formulating your brief. What does he mean by this? Please expand this thought by noting how you would create a vision for your work. Note any real-world examples to expand upon this thought.
Module 7 Writing Assignment
600 words
In order to find the best design for your documents or site it is important that you have a firm grasp on what your goals are for any piece of writing. Do you want to entertain, to sell, to perform a task, or to teach? You must also keep your rhetorical strategy in mind as you consider document design. Are you planning to focus mainly on logos, pathos, or ethos? Perhaps you are trying to balance all three. What is the age and demographic of your target audience? What are their needs in relation to the document? Do they have a disability? Do they come from a different culture?
Select a technology oriented site (examples: Apple, Amazon, Intel) and review the site in the light of the design principles
The assignment is based off chapter 11
Mock Topic
Cyber Security In Healthcare
Final Paper
1. A project that involves research and/or implementation on a network security tool,
exploit, or security software. Provide research on the project showing implementation of
such tool/software/exploit and provide documentation for the outcome. The
documentation/research/testing analysis will need to be a minimum of 2000 words and
include screenshots or video capture of your project in action. If you submit a walkthrough
video for this portion of the project, you can use a screen capture tool and voice
over your presentation.
2. A detailed research paper that is related to one or more topics covered in the textbook.
The research paper will need to be a minimum of 2,000 words (not including title page
and references). A minimum of three library sources is required.
3. A case study involving your own industry experience and/or industry experiences of
others where security measures or best practices have been applied to create a more
secured network environment. The subject must be related to one or more topics covered
in this course, and library sources must be carefully cited. A minimum of three library
sources is required.
• All project papers will need to be a minimum of 2000 words.
Software Engineering
1) In version control, there has been some debate on how to implement the internal storage of the different versions of an artifact. One argument is to keep the complete copy of each version. Another is to keep only the delta changes from version to version, with the first version being the only complete copy.
a. Give one reason why you may want to keep a complete copy of each version.
b. Give one reason why you may want to keep only the delta.
c. What would be the drawback of each of these approaches?
2) Visit the online customer support site of a software product company and compare the list of support functions it offers against your list from Review Question 1.
List three customer support functions that a customer support/service organization performs.
Cloud Security
write a 2-page paper (APA format) on what you believe are the three (3) most important cloud security concepts you learned during the training AND why.
It472 week 4
DQ4: Most business processes are too complex to be explained in one DFD. Most process
models are therefore composed of a set of DFDs. The first DFD provides a summary
of the overall system, with additional DFDs providing more and more detail about each
part of the overall business process. Thus, one important principle in process modeling
with DFDs is the decomposition of the business process into a hierarchy of DFDs,
with each level down the hierarchy representing less scope but more detail.
1) Define what is meant by a process in a process model. How should a process be named? What
information about a process should be stored in the CASE repository?
2) Discuss how the analyst knows how to stop decomposing the process model into more and more levels of detail.
3) Suppose that your goal is to create a set of DFDs. How would you begin an interview with a knowledgeable user? How would you begin a JAD session?
Security Governance
Write a paper discussing the following:
- What is the purpose of Security Convergence.
- What are some of the key approached organization use to acheive Security Convergence
- Briefly described a real-life project you researched where security convergence was achieved realizing at least three of the benefits below:
- Significantly lower costs
- Use existing servers to make the decisions.
- Use existing IT infrastructure (switches, cables, UPS systems) to keep the system running.
- Use existing IT redundancy and backup to protect in case of failures.
- Let the IT department protect valuable data and keep out cyber-intruders.
- Merge physical access (doors) and logical access (computers) into a single system.
- Let security worry about the “who, when, and where.” Let IT handle moving the data.
- Take away remote databases not managed by IT, and reduce the ability of hackers to penetrate the access system and use it as a gateway to the rest of the IT system.
- Save significant hardware money tp spend on other security measures
- Assignment Format: APA format
- Submission Format: MS Word
- Length: 6 pages (not including cover & references pages)
- Citations Required: minimum 5 citations (At least 2 Scholarly and 3 from other reliable sources)