Excel_9G_Billing

Excel_9G_Billing

  

Project Description:

In this project, you will assist Erica Ramirez, Sales Manager, to create a macro that enters footer information on chart sheets. You will also create several check boxes to indicate manager approval on sales bonuses.

     

Open   the Excel workbook Student_Excel_9G_Billing.xlsx downloaded with this project.   Save the file in your Excel Chapter 9 folder as an Excel Macro-Enabled   Workbook.

 

Display the Mortgage Chart   sheet. Record a macro named Chart_Setup and assign the letter j as the Shortcut key. Store the macro in This Workbook.   As the description, type Create footers in chart sheets and then click OK to begin   recording the macro.

 

On the Page Layout tab, click   Margins, and then click Custom Margins. Display the Header/Footer tab, and   then insert a Custom Footer on the Mortgage Chart sheet that includes the   File name in the left section and the Sheet name in the right section, and   then Stop Recording the macro.

 

Display the Macro dialog box and   then Edit the macro code. Click after the apostrophe in the line below the   second comment—Create footers in chart   sheets—press SPACEBAR, and then type Inserts file name and sheet name 

 

Close and Return to Microsoft Excel.   Add the Chart_Setup macro to the Quick Access Toolbar. Modify the button by   changing it to the pie chart—in the second row, the ninth button. If the pie   chart button is not available, choose another button.

 

Display the Construction Chart   sheet, and then use the button you assigned to the Quick Access Toolbar to   insert the footer. View the Print Preview to verify that the footer was   inserted.

 

Display the Summary sheet.   Insert three ActiveX Check Box controls positioned at cell B10, B12, and B14   and assign the following properties:
 

  PROPERTY NAME CAPTION
CheckBox1 Billing Billing Verified
CheckBox2 Contact Contacts Verified
CheckBox3 Manager Manager Assigned

 

Select all three check box   controls so that you can modify the following properties at the same time.   Change the Height to 18 and the Width to 105 and then change the Font to Bold Italic. With all three check   boxes still selected, Distribute Vertically and then Align Left. Turn off   Design Mode and then select each check box.

 

Remove the pie chart icon from   the Quick Access Toolbar. Display the file properties. As the Tags, type billing   summary and as   the Subject, type your course name and section number. Under Related People,   be sure that your name displays as Author. Save your workbook.

 

On the Developer tab, in the   Code group, click Macros, and then with the Chart_Setup macro selected, click   Edit. Select and Copy the four green comment lines beginning with the Chart_Setup Macro line and ending with   the Keyboard Shortcut line. Be sure   to include the apostrophe at the beginning of the first selected line. Close   and Return to Microsoft Excel.
 

  Insert a new worksheet. Rename the sheet Macro Code and then Paste the comment code   to cell A1. AutoFit column A and then move the Macro Code sheet to the end of   the workbook after the Construction Chart sheet. Make the Summary sheet the   active sheet.

 

Click the File tab, and then   click Save As. Navigate to your Excel Chapter 9 folder, and then click the   Save as type arrow. Click Excel workbook. In the File name box, type Student_Excel_9G_Billing_VBA and then click Save. In the   displayed message box, click Yes. Close your workbook and submit your Student_Excel_9G_Billing_VBA file for   grading.

c program, bitpacker and its reverse app

 

Suppose a text file contains ASCII characters ‘0’ and ‘1’ representing bits in human readable form. For example, test.txt may contain 111111110000000 which means its size is 16 bytes. A simple method for compressing the file by a factor of 8 is to represent a block of 8 ‘0’ or ‘1’ ASCII characters as a single byte. Thus test.txt which is 16 bytes long can be compressed into a file that is 2 bytes long where the first byte contains all 1’s and the second byte all 0’s. The resultant compressed file is a binary file since the first byte is not an ASCII character.

Code an app, bitpacker, that reads from stdin the input filename which follows the same specification as Problem 3. However, instead of using getchar(), use the library function fgets() whose the second argument allows specifying how many bytes, at most, should be read which helps prevent array overrun. Process the data in the input file 8 characters at a time by reading them into a 1-D array, char rawdat[8]. Compact the eight ‘0’ and ‘1’ characters in rawdat[] into a single byte using the bit processing techniques discussed in class. Write the resultant byte into an output file with suffix “.P”. For the above example, test.txt.P. We will allow the size of the input file not to be a multiple of 8. Since we are compacting 8 ASCII characters ‘0’ and ‘1’ into a single byte, we will use padding to handle files whose size is not a multiple of 8. For example, if text file test1.dat contains characters 1111111100000000111 (file size is 19 bytes), we will pad the last three characters 111 with 00000 so that the byte containing bit values 11100000 is written to test1.dat.P. To note that we padded the original data with five 0 bit values, we will change the suffix of the output file to test1.dat.P5. For test.txt where no padding was needed, the output filename will be test.txt.P0. Thus the last character of the filename specifies how much padding (0-7) was added.

Code bitpacker as a single main() function in main.c . Test and verify that it works correctlyCode an app, bitunpacker, that performs the reverse operation of bitpacker. bitunpacker reads the input filename from stdin using fgets() and checks that the suffix ends with .P[0-7] where [0-7] means that the last character must one of the digits 0, 1, …, 7. Strip the suffix in the name of the output file. Implement the app as a single main() function in main.c . Test and verify that it works correctly. 

response eric

 

In a world controlled by technology, the internet is something that has become a staple of any business. You have a range of options on how you choose to connect to the internet. DSL was one of the first options, carrying data through telephone lines, next came cable that uses buried ground lines serviced by cable companies. WiMax entered the industry around 2001 and uses wireless technology to carry data. Fiber is the newest technology, utilizing modulated light pulses.

In terms of security, DSL and cable are relatively equal as they are simple copper wires that can be tapped into with easily available equipment. WiMax is the least secure technology as wireless signals are easier to intercept than having to tap into a physical line. Fiber is the most secure option as it is expensive to get equipment for attempting to tap into and decode the data. The best security option is to protect your data inside your network and secure packets for transfer over the internet. You can use firewalls to ensure that your company’s data isn’t accessed without authorization in your network and encryption for when you transmit packets over your chosen connection medium.

STACK MACHINE

 

Implement a stack machine in the language of your choice to that a string is a palindrome. this is the string XXR The SM rules for this are as follows:

You may use the StackMachine.py class in your program, but you must use the Stack Machine to determine if the input string is a palindrome or not. Also, you may use the length of the input string to determine the mid-point of the string. Output from your program must be similar to that shown in the book:

Assignment – 500 words

Assignment Topic:

Research frequency-division multiplexing. Identify three everyday examples of FDM use. For each of these examples show how FDM is used and it works. Summarize your findings in a brief paper.

-Please include a separate cover page.

Your assignment is to be 500 words or two pages double spaced, in Word format. Do not use extraneous text that does not address the questions. Please use a grammar checker.  

Please include in-text citations in APA style. 

You must include at least two (2) references. Include a separate reference page. References are to be in APA style.

Submission does NOT need an introduction or a table of contents.

Instructions (from the syllabus):

Cases provide a vehicle for you to demonstrate your understanding and ability to apply course concepts. You must use at least two (2) appropriate sources (other than your course textbook) that are properly cited in APA style; do not solely use the case itself to support your position. You are strongly encouraged to use the following outline so that your analysis is organized appropriately:

  • Identify both the key issues and the underlying issues. In identifying the issues, you should be able to connect them to the principles which apply to this situation.
  • Discuss the facts which affect these issues. The case may have too much information. In your discussion, you should filter the information and discuss those facts which are pertinent to the issues identified above.
  • Discuss your proposed solution/recommendation to the problem and include how you would implement it. What actions would you propose to correct the situation, based on the knowledge you have gained in this course? Be sure to support your recommendation by citing references in the text and in the supplementary readings. You should also draw on other references such as business periodicals and journals. Remember that an ANALYSIS is more than simply a SUMMARY of the Writing Assignment.
  • Discuss follow-up and contingency plans (if necessary). How will the organization know that your proposed solution is working? What should they do if it does not work?
  • Word count is 500 words, not including references and figures. References should be in the APA style.

computer forensic

Research forensics as a career and locate available certifications. List at least 3 certifications and their requirements. Summarize what hardware, software and network components computer forensic investigators should know. Could you become a computer forensics specialist?

110/S1

There are four phases of the Certification and Accreditation Life Cycle. In summary format, explain what takes place in each phase, what resources are involved, and the outcome of each phase. After the explanation, summarize why each phase is important to the overall process.

Your assignment should be 2 – 4 pages double spaced with a cover page and reference page per the APA manual. Cover page and reference page are not included in the page count.