Building Excel

  • Microsoft Excel

You will analyze the data you collected and provided in your assignment last week. As you are working on each of the steps below, think about the analysis that you will provide to the research team. Follow the steps below to complete this analysis.

  1. Copy the file you created in week 5 and rename the new one “YourName_COMP150_W6_Assignment”.
  2. Open the file and duplicate the sheet where the initial table and data were created
  3. Rename the new sheet as “sorting & filters” and move it to the right of the original sheet
    1. Make the data look professional by using formatting options such as borders and table styles to place the data into a table.
    2. Select one of the text-based data columns such as names, cities, or addresses and sort the data by Z to A.
    3. Create a custom filter to any part of the data except where you did the sort. For example, if you sorted by patient’s name, then filter another set of data.
  4. Duplicate the original sheet again and rename it as “conditional formatting”. Move it right after the “sorting & filters” sheet.
    1. Implement conditional formatting to any of the number-based data sets. For example, showing higher numbers in green, while showing lower numbers in red.
    2. Add an IF function and apply it to the entire set. For example, you could create a function that says if x number is higher than x number, then you are at risk. The purpose is to show how an IF function works so creativity it is permitted in how you use the function.
  5. Use the “conditional formatting” sheet to create a pivot table.
    1. The pivot table needs to be on its own sheet.
    2. The pivot table needs to be meaningful so make sure to select data that will make it clear for your analysis.
    3. The pivot table should have data selected on the columns, rows, and values fields. Make sure to consider the data when adding the values selection
  6. Create a minimum of two charts. Make sure to select the right chart that explains your analysis. Each chart should be on its own sheet and should have a title. Make sure the purpose of the chart is self-explanatory just by looking at it.
  7. Update the documentation sheet
    1. Update the date.
    2. Add all the new rows for the sheets created.
    3. Provide a brief written analysis for each of the new sheets. Explain what you want the research team to learn about each sheet.
  8. Review all the sheets to ensure it looks professional. Try to keep the same style, colors, and formatting, Make sure the file is named “YourName_COMP150_W6_Assignment” and submit the file.

Technology discussion

 Referencing the Learning Resources for this week, choose a question in the research project list and answer it in relation to an issue in literature and technology. 

https://aeon.co/essays/how-ai-is-revolutionising-the-role-of-the-literary-critic

Human Activity Recognition Case Study_analysis report

 

Human Activity Recognition Case Study

The objective is to write a formal analysis report finishing the objectives set forth in the final case analysis document. A sample template for the final report is provided that contains minimum requirements for the report including the following sections: Introduction, Analysis and Results, Methodology, Limitations and Conclusion.

You are required to follow the report template and explain the findings including final models ran for the task.

Assignment

 Research a scholarly paper on Unified Modeling Language (UML)”  and reflect on one of the following topics:

  • “Benefit”: What UML diagrams are most beneficial for organizations? 
  • “Most”: What organizations use UML diagrams the most?
  • “Effort”: Is the effort to create a UML diagram worth their benefit to the organization?

NOTE:
You must copy and paste the topic (“Benefit” or “Most” or “Effort”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource.You must provide at least one APA reference for your resource and corresponding in-text citations..
You must provide the referenced resource URL/DOI in the APA reference.
Do not use the Textbook as a referenced resource. 

3/2 Reading

  1. Read Chapters 9–13 in your textbook (Textbook: Principles of Computer Security: CompTIA Security and Beyond)
  2. Using the discussion link below, respond to the following questions:
    1. What was the most useful takeaway for you from this workshop’s reading?
    2. What concept from the reading is the most applicable to you now in your profession, and how might you implement it?
  3. While responding to your classmates is not necessary for this discussion, read a couple of your fellow classmates’ posts to learn from their experiences. You must make your initial post first in order to see theirs.
  4. Your initial post is due by the end of the workshop.

access control, IT securities

Introduction

User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

Scenario

You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations.

Tasks

Your goals as the IT architect and IT security specialist are to:

  • Develop solutions to the issues that the specified location of IDI is facing.
  • Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability.
  • Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods.
  • Analyze the strengths and weaknesses in the current systems of IDI.
  • Address remote user and Web site user’s secure access requirements.
  • Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services.
  • Prepare detailed network and configuration diagrams outlining the proposed change to be able to present it to the management.
  • Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario.
  • Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location ( DUE ON SUNDAY).

quote

 

Part 1: Quoting

Required source: A professional journal article from the list  presented in the Library section of the classroom as explained above. Do  not look for quotes already presented in the article; your mission is  to find direct statements in the article and quote them yourself.

Quotation 1: Parenthetical citation

  • Choose a meaningful statement of 25–39 words from the article and  quote it without introduction, using in-text citation after the  end-quotation mark and before the final sentence punctuation.

Quotation 2: Narrative citation

  • Choose a different meaningful statement of 25–39 words from the same  article and quote it properly, starting your sentence with “According  to” or a similar introduction, and inserting proper citation as  explained in the reading.

Required adjustment:

  • Edit just one of your two quotes by correctly using brackets, an ellipsis, or [sic]. These techniques are explained in the reading.
  • If the original does not have an error, you cannot use [sic]  and must instead employ either brackets for a clarification or an  ellipsis to delete words. Note that British English spellings are not  considered errors.

Reference entry:

  • Provide a full 7th edition APA-standard reference entry for this journal article.

Part 2: Paraphrasing From Two Other Articles

Choose two other journal articles from the same Library list. It is  recommended that you pick articles that are relatively easy for you to  understand, especially if you are new to the technology field. Find a  section of each article that interests you and write paraphrases.

For each of your two paraphrases, separately:

  • Compose a descriptive title (a phrase) in your own words. Use title case.
  • Write a paraphrase of 170–220 words. If it is difficult to meet the  minimum length or to avoid writing more than the maximum, then a more  suitable section (or section size) from the original article must be  chosen.
  • Do not include any quotes.
  • Write the paraphrases in paragraph form (no lists).
  • Include proper citation as explained in the reading.
  • Provide a full 7th edition APA-standard reference entry.

500 words

 

Propose and defend a topic for your final project.  Write  500 words or more explaining why this topic is important for your peers to understand. 

The title is Virtual Machine

 

The Team CTF tests cyber skills in 10 categories, and each category has one question. You and each of your team members are required to solve one problem for this CTF competition. Divide the problems between team members. Use the table below to determine which of your team members will be attempting each problem.

You only need to do one problem per person and are not required to solve all the problems. Use the table below. No two students should be selecting the same category for their final PowerPoint presentation. Categories will be selected on a first-come, first-serve basis. Post your selection in the discussion. Any disputes over a category selection should be resolved with assistance from your instructor.

marketing strategies

  

After reviewing this week’s resources and your research, 350 words

how would you explain idea generation and the role it plays in the new product?

development process? Share one method of idea generation and apply it to a product you personally use. (Do not reuse the examples provided in the video.) 

Remember that all new products are not truly new but can be modified based on consumer feedback and/or moving towards a new market segment.

Week Resources:

What is Idea Generation? – Definition, Techniques and Success Factors

https://www.viima.com/blog/idea-generation 

Scamper Technique [BEST IDEA GENERATION METHODS]

https://www.youtube.com/watch?v=aFGAmk3lj1s&t=2s