I am attaching the code as well. All i need is just an .exe file. If you can send me an exe file i can pay you.
Solved Exp19_Excel_Ch08_CapAssessment_Employee_Satisfaction
Exp19_Excel_Ch08_CapAssessment_Employee_Satisfaction
Project Description:
You work as a data analyst for Camino Marketing, a U.S.-based web marketing company. You have been asked to conduct an employee satisfaction survey. As part of the survey, you will collect sample data to help provide insight into employee salaries, productivity within the three national offices, and to predict the growth of the New York office’s client base by 2025. Start Excel. Download and open the file named Exp19_Excel_Ch08_CapAssessment_EmployeeSatisfaction.xlsx. Grader has automatically added your last name to the beginning of the filename. Ensure the Employee Satisfaction worksheet is active, then use the FREQUENCY function to calculate the frequency distribution of job satisfaction in column D. Place your results in the range G5:G9. Enter a function in cell G12 to calculate the standard deviation of column c. Enter a function in cell G13 to calculate the variance between salaries. Enter a function in cell G14 to calculate the Covariance of the salaries and job satisfaction in the data set. Note this is a sample of data not a population. Enter a function in cell F17 to calculate the correlation coefficient between employee salary and job satisfaction. Ensure the Data Analysis ToolPak add-in is active. Use the Data Analysis ToolPak to create a histogram based on the salaries in column C. Use the range I4:I9 as the Bin Range. Ensure that Cumulative percentage, column labels, and chart output are included in the results. Place the results in cell K4. Edit the result text in cell K4 to display Salary, if necessary. Ensure the Office_Data worksheet is active. Use the Data Analysis ToolPak to perform a single factor ANOVA on the range C3:E35. Place the results starting in cell G3. Be sure to include column labels. Resize columns G:M as needed. Create a Forecast Sheet that depicts year over year growth in customer growth. Set the Forecast end year as 2025 and place the results on a new worksheet named 2025Forecast. Ensure the Customers worksheet is active then create a scatter plot chart that places the Years on the X axis and the Clients on the Y axis. Add a linear trendline to the chart that also shows the Equation and the R-square. Add the title Customer Growth. Enter a function in cell E4 to calculate the intercept of the linear trendline created in the prior step. Enter a function in cell F4 to calculate the Slope of the linear trendline. Enter a function in cell G4 to calculate the R-square of the linear trendline. Enter a function in cell H4 to calculate the Standard Error. Use the FORECAST.LINEAR function in cell E7 to the total number of customers by the end of 2021. Complete your analysis by added formulas in the range F7:G7 to calculate the high and low thresholds of the forecast. Save and close Exp19_Excel_Ch08_CapAssessment_EmployeeSatisfaction.xlsx. Exit Excel. Submit the file as directed.
Week 3 H
1. How do you describe the importance of data in analytics?
Can we think of analytics without data? Explain.
2. Considering the new and broad definition of business
analytics, what are the main inputs and outputs to the
analytics continuum?
3. Where do the data for business analytics come from?
What are the sources and the nature of those incoming
data?
4. What are the most common metrics that make for
analytics-ready data?
Exercise Question:
Go to data.gov—a U.S. government–sponsored data
portal that has a very large number of data sets on a
wide variety of topics ranging from healthcare to education,
climate to public safety. Pick a topic that you
are most passionate about. Go through the topic- specific
information and explanation provided on the site.
Explore the possibilities of downloading the data, and
use your favorite data visualization tool to create your
own meaningful information and visualizations.
Discussion :
Create a discussion thread (with your name) and answer the following question:
Discussion (Chapter 3): Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.
Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.
Your response should be 250-300 words. Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations
2 Discussions and 1 Weekly Summary
Discussion 3.1
What do you see as the strongest moral consideration in favor of capitalism? What do you see as the strongest objection to it?
Please cite and reference at least one source such as our Shaw textbook, a website via Google, or an EBSCOhost article.
Discussion 3.2
What do you see as the major economic challenges facing our society today and, in particular your generation?
Please cite and reference at least one source
Case Study 3.1
Read Case 4.3 : One Nation under Walmart (p. 144) and address the five questions on page146 in a three to five page paper (excluding title, abstract, and reference pages) include at least three peer reviewed sources found in the Potomac Library properly cited and referenced.
Write a program to calculate
Write a program to calculate and print out cellular phone bills for one month, and write a test plan to test the program.
The rates will vary depending on the calling plan of the customer:
Fixed rate plan (code F),
per Minute charge plan (code M),
Home customer plan (code H),
home Plus customer plan (code P), or
Business customer plan (code B).
The rates are as follows:
• Code F: A flat $150.00 fee for unlimited minutes (not available to businesses)
• Code M: A charge of $5, plus 21 cents a minute
• Code H: $40 for the first 600 minutes used, plus 19 cents for each additional minute.
• Code P: $64 for the first 1000 minutes used, plus 17 cents for each additional minute
• Code B: $150 for up to 2,000 minutes; $210 for up to 3,000 minutes, and $240 if over
3,000 minutes
No other codes should be accepted. Remember to define constants for all fixed values. Use double precision floating point variables for all dollar & cents figures.
The program should first explain the program to the user.
Then prompt for a 5-digit customer account number (no leading zeros allowed) and error check that the value entered is valid. Re-prompt until a valid value is entered. This input should be read and error checked from within the main function.
Next call display a menu of plan codes, along with descriptions of each, to the user. Prompt for the plan code and error check that the user entered a valid plan code (accepted in upper or lowercase). Re-prompt until a valid value is entered.
If necessary (all plans except plan F), also prompt for the number of minutes used and error check that the number entered is not negative (i.e. must be at least 0). Minutes used will always be whole numbers. Re-prompt until a valid value is entered.
©2012, Regis University
Calculate the bill total and display the results.
The output should display: the customer account number, the plan chosen in words, the number of minutes used (unless the plan chosen was F), and the total amount of the bill. Display neatly with descriptive text.
After displaying the results, ask the user whether to execute the program again, and do so, as long as the user wishes to continue.
At a minimum, the program must implement three separate functions (in addition to main), as described on the next page:
• One function to read and validate the plan choice, and if necessary, to read and
validate the number of minutes used. Both the plan choice and the number of minutes
used will be passed back to main via reference parameters.
• One function to calculate the amount of the bill and return the bill amount. Pass in
any necessary data as input parameters.
• One function to display the bill output. Pass in any necessary data as input
parameters.
Use of global variables is NOT allowed. The functions must use parameters to pass required
Data Breaches
Data Security
Dissertation PhD Begininng to Ending
Hello ,
I Need to select a topic for Start the Dessertation on it and get Approval from IRB. I am studying in Cumberlands university.
I need topic Related to IT infrastructure. I Like related to Devops skills like Ansible,Puppet,Chef, Cloud like AWS related topic. please suggest and if you can work on that recommended topic . we can work together
Mobile -3a
An EARCON is the sound your phone makes (PCs and do this too) when a particular event happens. There’s the “Swooshing” sound when you get an email for instance.
Question 1 Have you set-up any unique EARCONS on your phone?
Question 2 Do you think mobile phone should have a different sound to the caller if your phone is busy?
Question 3 Would you like to set-up your phone so that if persons A, B, or C (your favorite people) call you and you’re on your phone would you like them to hear something other than “beep … beep …. beep” (means your phone is busy)?
Question 4 Would you like your favorites to hear some other message on their phone when you’re busy – like maybe a warble tone or a siren sound or something else which means “You’re my favorite person, call me back right away”?
Question 5 What role do you think EARCONs play in applications?
Question 6 Would you like the EARCON to tell you more information than things like “Yes you got your ordering basket loaded correctly” such as maybe “What a great section of — product ” etc.
Question 7 What innovations would you like to see in EARCONS?
–//–
Cryptography
part 1
Using Internet and/or the Library, research and complete the following:
In 1,000 or more words respond to the following:
Explain the Stuxnet virus. Be sure to cover what its goals were thought to be, how successful it was in accomplishing those goals, the possible methods of initial system infections, how it was discovered, and the long-term implications of Stuxnet relative to cyber-warfare.
part 2:
In 200 or more words for each answer, respond to the following:
- Construct a security policy for the physical domain.