Excel_Ch11_CapAssessment_Deans | Excel Chapter 11 CapAssessment Deans

 

Excel_Ch11_CapAssessment_Deans | Excel Chapter 11 CapAssessment Deans

 

100% Marked on MYITLAB  

Project Description:

You work for the vice president’s office at a major university. Human Resources provided a list of deans and associate deans, the colleges or schools the represent, and other details. You will use text functions to manipulate text, apply an advanced filter to display selected records, insert database summary statistics, use lookup functions, and display formulas as text.

Start Excel. Download and open   the file named Exp19_Excel_Ch11_CapAssessment_Deans.xlsx. Grader has automatically added   your last name to the beginning of the filename.

First, you want to combine the year and number to create a unique ID.
 

  In cell C8, enter 2006-435 and use Flash Fill to complete the IDs for all the deans and   associate deans.

Next, you want to create a three-character abbreviation for the   college names.
 

  In cell E8, use the text function to display the first three characters of   the college name stored in the previous column. Copy the function to the   range E9:E28.

The college names are hard to read in all capital letters.
 

  In cell F8, insert the correct text function to display the college name in   upper- and lowercase letters. Copy the function to the range F9:F28.

You want to display the names in this format Last, First.
 

  In cell J8, insert either the CONCAT or TEXTJOIN function to combine the last   name, comma and space, and the first name. Copy the function to the range   J9:J28.

Columns K and L combine the office building number and room with the   office phone extension. You want to separate the office extension.
 

  Select the range K8:K28 and convert the text to columns, separating the data   at commas.

You decide to create a criteria area to perform an advanced filter   soon.
 

  Copy the range A7:M7 and paste it starting in cell A30. Enter the criterion Associate Dean in   the appropriate cell on row 31.

Now you are ready to perform the advanced filter.
 

  Perform an advanced filter using the range A7:M28 as the data source, the   criteria range you just created, and copying the records to the output area   A34:M34.

The top-right section of the worksheet contains a summary area. You   will insert database functions to provide summary details about the Associate   Deans.
 

  In cell L2, insert the database function to calculate the average salary for   Associate Deans.

In cell L3, insert the database function to display the lowest salary   for Associate Deans.

In cell L4, insert the database function to display the highest   salary for Associate Deans.

Finally, you want to calculate the total salaries for Associate   Deans.
 

  In cell L5, insert the database function to calculate the total salary for   Associate Deans. 

Format the range L2:L5 with Accounting Number Format with zero   decimal places.

The range G1:H5 is designed to be able to enter an ID to look up that   person’s last name and salary.
 

  In cell H3, insert the MATCH function to look up the ID stored in cell H2,   compare it to the IDs in the range C8:C28, and return the position number.

Now that you have identified the location of the ID, you can identify   the person’s last name and salary.
 

  In cell H4, insert the INDEX function. Use the position number stored in cell   H3, the range C8:M28 for the array, and the correct column number within the   range. Use mixed references to keep the row numbers from changing. Copy the   function to cell H5 but preserve formatting. In cell H5, edit the column   number to display the salary.

In cell D2, insert the function to display the formula stored in cell   F8.
  In cell D3, insert the function to display the formula stored in cell H3.
  In cell D4, insert the function to display the formula stored in cell H4.
  In cell D5, insert the function to display the formula stored in cell L3.

Create a footer with your name on the left side, the sheet name code   in the center, and the file name code on the right side.

Save and close Exp19_Excel_Ch11_CapAssessment_Deans.xlsx.   Exit Excel. Submit the file as directed.

Discussion Reply!!! About 50 words

 

Choose  a networking troubleshooting approach; there are some examples in the  text. Feel free to cover another that is not listed in the text, as long  as it is a suitable network troubleshooting approach.

According to CompTia, the troubleshooting methodology is as follows;

  1. Identify the problem
  2. Establish a theory of probable cause
  3. Test the theory to determine the cause
  4. Establish a plan of action to resolve the problem and implement the solution
  5. Verify full system functionality, and, if applicable, implement preventive measures
  6. Document findings, actions and outcomes

In my experience, I usually try to identify all of the components in a  signal path, pick a halfway point, and test for the correct signal  there. If I get correct results, I move backwards until I don’t. Then I  know which component is faulty. Once I know which component is faulty, I  begin diagnosis and work towards resolution. Typically, it involves a  great deal of research on open source intelligence sites,  trial-and-error, and sometimes I just have to replace the component.  This is something I learned while repairing helicopters in the Army, but  the theory is the same for just about anything that needs repairs. The  biggest take-away that has guided me towards faster repairs is this: my  problem is not unique. Someone has experienced it before and knows the  answer. Someone has also posted that solution somewhere, I just have to  spend the time to look for it.

Why did you choose this networking troubleshooting approach?  

I chose that approach from years of experience, and many failures  that I learned from those failures. It is easy to get frustrated or  overwhelmed when a problem is in front of you and you don’t know the  next step to resolve it. There is always a solution out there, and  someone knows that answer. Although this is not directly related to  networking, the theory of troubleshooting is the same. I was informed  that the drain pipe to my kitchen sink was damaged and water was leaking  into my crawl space. I called a plumber, who quoted me $3.5k to repair  it. I decided that it was time for me to learn basic plumbing. I went  underneath my house, looked at the problem, took pictures of every angle  I could, went online, researched basic plumbing techniques, then went  to a plumbing store to get some advice. I brought him a six pack and he  shared his wisdom. Then he filled my cart with everything I would need  to fix the problem and showed me how to do it. An hour and a half later,  and $14.35 later, the pipe was fixed. I didn’t realize it at the time,  but I was following CompTia’s troubleshooting methodology (maybe not  step 6).

Take your networking troubleshooting approach and apply it to  the issue you chose. Summarize the steps you would take to troubleshoot  the issue. 

Choosing an issue; cannot connect get on the internet. I chose that  issue because it happened to several computers I was managing today.  First, I was alerted about the issue, so I researched to find out  exactly the extent of it. Is it everyone? Is it post-wide? Is it  DISA-wide? It turned out to be just our building. Knowing that other  buildings had network and that everyone in our building did not  eliminated several possible problems. I knew it had nothing to do with  the individual machines or their configuration, and I knew that there  was a chance I could re-establish network connectivity. The only  elements between the laptops and the post-wide network devices were the  modem, router, switch, and patch. I went into the server room and  noticed that the lights on the switch weren’t blinking like they usually  did. I called the Network Enterprise Center and had them reach out to  that switch (I don’t have admin rights on garrison level network  devices) and they were able to reset the switch. It turns out that a  power outage the night before reset the switch and it lost  authentication. I then verified that everyone in the building had  network access. I had to fill out a few forms with the NEC after all of  that was done. 

Reference:

Garn, D. M. (2022, October 5). Use a Troubleshooting Methodology for More Efficient IT Support. Default. https://www.comptia.org/blog/troubleshooting-methodology

Problem 6- Planning Project

1.Cost reimbursable contract calculation.

  1. A contract calls for a total payment of $800,000 with a guarantee. Essentially the contractor is guaranteed to make at least $200,000 above his costs. If the contractor can demonstrate his costs exceed $600,000, the project will pay the difference, with a $50,000 ceiling on the overage. The contractor demonstrates he spent $623,000. How much (gross) must the project remit to the contractor?
  2. Another option for the same contract has the contractor guaranteed to be paid his costs plus 20%, for costs that exceed $600,000. With the same initial assumption—guarantee of $800,000 gross payment (no requirement to itemize costs), but if the contractor can show that costs exceed $600,000, the project will pay $800,000 plus the costs that exceed $600,000, plus 20% of those excess costs, with a ceiling of $900,000 gross. The contractor demonstrates he spent $623,000. How much (gross) must the project remit to the contractor?
  3. Under option 1.b, at what dollar amount of total costs would the contractor be assuming all of the excess costs beyond that point?
  4. In which option did the project assume more of the risk of a cost overrun? Explain.

2. Prepare a Pareto chart of the possible causes for a student to fail a final examination in a university course.

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

ISBN: 978-1-77420-013-1 

Authors: Adrienne Watt 

Publisher: BCcampus 

Publication Date: August 14, 2014 

Edition: 2nd Edition

file management system

 Your assignment for this unit is to complete the following five activities. Your completed scholarly activity should be at least two pages in length.

  1. Conduct a search on the Internet and/or CSU Online Library, and identify the functions and purpose of the following operating systems (OS): Microsoft Windows, Mac OS X, Linux, iOS, Blackberry OS, and Android. Identify the advantages and disadvantages of each.
  2. Describe the file management system on your desktop or laptop computer. In addition, either provide a screenshot or create a table of your file structure to include files, folders, and subfolders.
  3. Explain the process and programs used to backup both Windows and the Mac OS.
  4. Explain the function and importance of each of the following system utilities: disk cleanup utility, disk checking utility, and disk defragmenter utility.
  5. Discuss three common computer problems and the actions you would take to troubleshoot the problems.

Your scholarly activity must be at least two pages in length, double-spaced. You are required to use at least two outside sources, one of which must come from the CSU Online Library. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying APA citations. 

SE491 week4 discussion

Answer the following questions based on this scenario.

Problem: Write a program that reads 10 username and password values into parallel arrays. After the arrays have been loaded, the program should behave like a login screen, prompting for a username and a password. Based on the data read and stored in the arrays, the program should respond appropriately with one of three output messages: “Username not found.”, “Username and password does not match.” or “Access granted.”

Question 1: Would you write this program asking a user to enter the usernames and passwords or would you use a file that contains all the username and passwords as input?  Explain why you would choose one over the other.  

Question 2: Will your answer remain the same if the number of username and password values change to 40, and why?

___________________________________________________________

Discussion

.Select three topics of interest and note:

  • What you learned about the topic
  • Why you selected the topic
  • How you will utilize the topic in the future
  • Also, write a reflection of the material you’ve learned in the course.  What did you like?  What could be improved?

Note: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  

 topics:

  • security advantages of cloud-based solutions.
  • Discuss how a cloud-based solution provider may reduce the risk of a DDoS attack.
  • Define and discuss guest-hopping attacks. 
  • Define and describe virtualization.
  • Defend the following statement: Virtualization is not a new concept within computer science.
  • Describe the various types of virtualization.

The following program draws an BB-8 as shown below. Modify the program to move the BB-8 left or right using the arrow keys. The program can be download from the CMS. Please use Javafx

  

The following program draws an BB-8 as shown below.  Modify the program to move the BB-8 left or right using the arrow keys.  The program can be download from the CMS. Please use Javafx 

36361018

import javafx.application.Application;

import javafx.scene.Scene;

import javafx.scene.input.KeyCode;

import javafx.scene.layout.Pane;

import javafx.scene.paint.Color;

import javafx.scene.shape.Circle;

import javafx.scene.shape.Line;

import javafx.stage.Stage;

public class MovingBB8 extends Application {

     @Override // Override the start method in the Application class

public void start(Stage primaryStage) { 

           BB8Pane pane = new BB8Pane();

           pane.setOnKeyPressed(e -> { 

               // Write code here

           });

           // Create  scene and place it in the stage

           Scene scene = new Scene(pane, 400, 120);

           primaryStage.setTitle(“MovingBB8”);

           primaryStage.setScene(scene);

           primaryStage.show();

           pane.requestFocus();

     }

class BB8Pane extends Pane {

private Circle circle1 = new Circle(200, 50, 15);

private Circle circle2 = new Circle(200, 70, 20);

private Line line = new Line(200, 25, 200, 35);

public BB8Pane() {

           line.setStroke(Color.BLACK);

           circle1.setFill(Color.CORAL);

           circle2.setFill(Color.CORAL);

           getChildren().addAll(circle1, circle2, line);

     }

public void moveLeft() {

           // Write  code here

     }

public void moveRight() {

     // write  code here

     }

}

Wrapping Up

 

As we reach the end of our time together in this course, we have covered a wide variety of topics across security. Hopefully, this sparked some interest and excitement in you. Describe a topic in the broad field of security, covered in this course or not, that interests you in learning further. I choose cybersecurity so describe cybersecurity  in the broad field of security, covered in this course or not, that interests you in learning further

Parameters 

 

  • Posts should be 250 to 300 words in length
  • Must include at least one source outside of your textbook, and it should be included in the reference list at the end of the post
  • All sources should be used in the content of the post using APA format