COMPUTER SCIENCE

 

As the manager of a small flower shop, you have just received an email from a customer that is quite negative. Your task is respond to the customer via email in using professional business etiquette. 

  • Use the article, “Watch Your Tone: Email Etiquette for Business” to help you.

   APA format 7th edition, two pages. Need it by friday 12pm eastern time.

Exp19_Excel_Ch12_CapAssessment_Teaching_Schedule

 

Exp19_Excel_Ch12_CapAssessment_Teaching_Schedule

 

#Exp19 Excel Ch12 CapAssessment_Teaching_Schedule 

#Exp19 Excel Ch12 CapAssessment_Teaching_Schedule 

#Excelch12CapAssessmentTeachingSchedule

#You have just started your first career as a high school teacher. To  jump start your planning process, you would like to create a teaching  schedule template to help plan your weekly tasks. You will create a  template, create custom macros to automatically insert dates, and  inspect the document for issues.

#     

Clear   all data validation in the range A1:G19.

Delete the sample text in cell   B2

Type Teaching Schedule in cell B1.

Type prepared by: in cell F1.

Delete the value in cell G1.

Add the following comment in   cell G1 Enter Name.

#Type Monday in cell C4 and use the fill handle to fill the   range D4:G4 with the remaining days of the week. 

#Use the document inspector to   inspect the document. Remove  document properties and personal information and   then click close.
 

  Note: Mac users, from the Excel menu, open your preferences, click  Security,   and then click the check box to Remove personal information  from this file on   save.

#Use the accessibility checker to   check the document for issues.  Accept the recommended actions for merged   cells and use the  recommended action to select Rose, Table Style Medium 23.   Close the  accessibility checker pane.

#Record a macro named ClearSchedule using the shortcut   CTRL+SHIFT+J. Add the description When run, this macro clears the values in the schedule  (no period). When run, the   macro should delete the values in cell G1  and in the ranges C3:G3, C5:G6,   C8:G9, C11:G12, C14:G15, C17:G19, in  that order.

Create a form control button   that fills cell F2. Assign the ClearSchedule macro and edit the button text   to Clear.

Create a form control button   that fills cell G2 and edit the button text to Insert Dates.

Open the VBA editor and create a   new module named DateStamp. Create a procedure named InsertDate. Insert the comment Inserts   weekly dates,   then enter the following code Range(“C3:G3”) = Array(Date, Date + 1, Date +   2, Date + 3, Date + 4)   and exit the VBA editor.

Assign the InsertDate macro to   the Insert Dates form control button.

Test both macros and then open   the VBA editor. Locate the module  containing the ClearSchedule macro. Copy   the code and paste it  starting in cell B2 in the Code worksheet. 

Locate the module containing the   InsertDate macro. Copy the code and paste it starting in cell D2.

Check the document for   compatibility with Excel 2010, 2013, and 2016.
 

  Note: Mac users, skip this step.

Unit 6 Assignment: Draft Final Project Part III: Securing and Maintaining the Network

Follow PDF 

attached are part 1 and 2 I need part 3 done 

when you complete it please answer the following question

  Provide the instructor with a short (8-12 sentence) reflection on the progress your group has made so far.

  • What do you like about the way the final project is going?
  • What are you unsure about?
  • What have you learned during this process that will be useful to you in your career? 

This is a chance to ask direct questions to your instructor before submitting your final project in Unit 7.  

msc640 week2

 

All assignment must be/have:
In APA with a separate Cover and Reference page
In 12 Font
Doubles spaced
In a Microsoft Word format
2-3 Pages of findings
Have 4-6 LIRN Library resources that are cited within the paper to show where they apply.

1)Explain the types of audit service providers and the skills and knowledge needed by professionals entering the external auditing profession.

Discuss corporate governance, identify the parties involved, and describe their respective activities.

2) Describe auditor liability under contract law, common law, and statutory law.

Explain the importance of the evidence concepts of appropriateness and sufficiency and explain how those concepts are influenced by the risk of material misstatement.

3)Explain the risks of material misstatement and describe how they relate to audit risk and detection risk.

Describe the sampling process used to gather evidence about misstatements in account balances and assertions.

4)Explain how to use planning analytical procedures to identify possible material misstatements for cash accounts, disclosures, and assertions.

Explain the significant accounts, disclosures, and relevant assertions in the acquisition and payment cycle.

5)Explain how to determine appropriate tests of controls and consider the results of tests of controls in auditing long-lived assets.

Explain how to determine appropriate responses to identified risks of material misstatement in auditing long-lived assets.

6)Explain how to determine and apply sufficient appropriate substantive audit procedures in auditing debt obligations and stockholders’equity transactions.

Describe financial statement audits requiring an adverse report and identify the appropriate audit report modifications.

7)In technology the act of continual learning is critical. Technology changes rapidly and the need to stay up-to-date in this every changing field is critical.  Explain what areas you enjoyed researching the most over the past 9 weeks. IT is a never ending discipline that required constant research. What additional areas of the class would you like to explore more after the course ends.

Se492 week 9

1. Describe why a project manager needs good verbal and written communication skills.

2. What is meant by the term interpersonal skills? Give some examples of interpersonal skills and explain why they are important.

Lab exercise

   

Payroll Lab

You will be taking in a file (payroll.txt) which details a number of departments (at least 1) and in each department are a set of employees (each department will have at least 1 employee or it would not appear on the payroll sheet). Your job is to read the file in separate out each employee and calculate the total values (hours, salary, number of employees) for each department and in each category (F1, F2, F3, F4). In your final submission please include the .cpp file which should work for any kind of payroll file I supply (which will naturally match the format of the examples below). Be sure to indicate in your submission text if you have attempted any of the bonus points .

   

An example file:

The IT Department
Bill 8 7 8 9 7 F1
Bob 205103 0.08 F3
Betty 8 8 7 8 8 F2
Brandon 10 10 9 6 9 F2
Brad 9 8 10 9 9 4 1 F4

The Sales Department
Kyle 88840 0.105 F3
Tyler 105203 0.085 F3
Konner 8 6 7 6 9 F2
Sam 309011 0.045 F3
Kent 9 8 9 9 9 0 0 F4
EOF

An additional example file:

The Sales Department
Mike 5 6 1 3 5 F1
Mark 98103 0.115 F3
Jill 8 8 8 8 8 F2

Frank 106101 0.095 F3

Mark 76881 0.091 F3

Department of Records
Konner 8 6 7 6 9 F2
Tammy 7 3 7 2 8 F1

Anika 8 8 8 8 8 F2

Marta 1 0 0 5 2 F1
Kent 9 8 9 9 9 0 0 F4
EOF

   

Last in the row after the hours comes the pay grade (F1, F2, F3, F4). The number of hours recorded is based on the pay grade of the employee. F1 and F2s will have 5 numbers for their hours. F3s are commission based where a sales amount and a commission percentage is given. F3s are also assumed to work 30 hours if their commission is 10% or below and 40 hours if their commission is above 10%. F4s will have 7 numbers (as they are on-call during the weekend). Each of the pay grades will also have different pay calculations which are as follows:

F1 = The total number of hours * 11.25
F2 = (The total number of hours – 35) * 18.95 + 400
F3 = The total sales amount * the commission rate
F4 = The first 5 hourly totals * 22.55 + Any weekend hourly totals (the last 2) * 48.75

Your output to the screen should start with the department name, followed by the total pay for all of the employees, then the total number of hours, and the total number of employees. After that you should have a breakdown of each category of employee: F1 total pay and total hours, F2 total pay and total hours…

Each department will have at least 1 employee and each department will contain the word “Department.”

The IT Department
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##
Roster: Bill, Bob, Betty, Brandon, Brad 

   

F1:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F2:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F3:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F4:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

   

The Sales Department
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##
Roster: Kyle, Tyler, Konner, Sam, Kent

   

F1:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F2:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F3:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

F4:
Total Salary: $##.##
Total Hours: ###
Total Number of Employees: ##

   

Before coding your solution, take the time to design the program. What are the possible things that the file can have that you need to anticipate? What are the actions that you need to take (read the file, add up hours…)? Are those actions things that could be placed in separate functions? What about the function – can you guess some of the things that will happen? Such as, using substring to pull out part of a line in the file maybe using stoi to convert a string to an integer to add it to the total or creating variables to hold the employee type you find before passing it to another function. Finally, how are these functions called, what is the order and what information is passed to and from? 

Scoring Breakdown

25% program compiles and runs
30% program reads in and calculates the figures for output
10% the program is appropriately commented
35% outputs the correct information in a clear format 

5% bonus to those who can output the F# responses in a columned output like that shown above.

5% order the employees in the roster according to their F status, F1’s first, then F2’s and so on.
5% bonus to those who do a chart comparing the data at the end to show the relation between the pay grades and the amount of salary spent in each (they style of chart is up to you and more points may be given for more difficult charts (like a line chart):

   

B Department
F1 – 00000000
F2 – 000000
F3 – 00000
F4 – 000000000000 

K Department
F1 – 0
F2 – 0000
F3 – 0000000000
F4 – 0000000 

  

Or event something like this instead:

0
0 0
0 0 0
0 0 0 0
0 0 0 0
F1 F2 F3 F4

Network diagram

Security

 

  1. Objectives
  • To practice the formal procedure of system/network security analysis and planning.
  • To examine the vulnerability and security needs of a private organization.
  • To devise strategies to overcome potential malicious attacks, threats, and risks.
  1. Target Network

You have just been hired as an Information Security Officer (ISO) for a mobile app development company. The organization network structure is identified in the below network diagram and some services may inadequate and absent. 

Network diagram

The network specifically contains:

  • 2-Switches
  • 1-Web/FTP server with Linux operating system using port 80 and port 21
  • 1-Email Server with Exchange 2010 using port 25
  • 2-Active Directory Domain Controllers (DC) with Windows Server 2016 operating system
  • 2-Domain Name Service (DNS) Servers with Windows Server 2016 operating system
  • 2-Windows file servers using port 21
  • 3-Wireless Access Points (WAP) encrypted with WEP protocol.
  • 100 – Desktop/Laptop computers with Windows 10 operating system
  • 2- Multifunction printers (print, copy, scan, fax)
  • 1- Voice Over IP (VOIP) telephone system with 100 IP phones

The company is in a single, two story building with no fencing. The entire building is accessed using a permanent 4-digit pin.  A single security guard is located on the second floor of the building.  The security guard works Monday – Friday, 8AM to 5PM. Users are in open area cubicles on the first floor of the building. The employee work area is an open floor with no wall separating areas. The data closet is also located on the first floor of the building near the front entrance and the HVAC system in the middle of the first floor. The data closet is accessible by anyone who knows the 4-digit permanent pin that is distributed to all employees.  The facility maintenance generally cleans the building on the weekends when building with no employees or security personnel present.

  1. Assignment Details

The Chief Information Officer (CIO) has seen reports of malicious activity increasing and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first work assignments with the company, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. In addition, the CIO would like you briefly explain each item and potential impact it could have on the organization.

Write a four to six (4-6) page paper in which you:

  • Analyze five (5) or more specific potential malicious attacks and/or threats that could be carried out against the network and organization.
  • Explain in detail the potential impact of the five (5) or more selected malicious attacks.
  • Propose at least nine (9) – 3 of each type of security controls (administrative, logical/technical, and physical) that you would consider implementing to protect against the selected potential malicious attacks.
  • Analyze three (3) or more potential risks for data loss and data theft that may exist in the documented network and applications.
  • Explain in detail the potential impact of the three (3) or more selected risks for data loss and data theft.
  • Propose at least three (3) – 1 of each type of security controls (administrative, logical/technical, and physical) that you would consider implementing to protect against the selected risks for data loss and data theft.
  • List and provide a product overview of only two (2) alternatives for each logical/technical security control for both data loss/theft and malicious attacks. Include web links to the products and why those products should be considered.

Expectations

  • Use at least five credible and quality resources. Your external resources should not be more than two to three (2-3) years old.

Note: Wikipedia and similar websites do not constitute as credible and quality resources.

  • Single Word document
  • Double spaced
  • Times New Roman, size 12 font
  • One-inch margin on all sides
  • Citations and references must follow APA format
  • Include a cover page containing:
    • Title of the assignment
    • Student’s name
    • Professor’s name
    • Course title
    • Assignment due date

Note: The cover page and reference page are not included in the assignment page length requirement.

Programming

  

Programming-

JAVA

You have been hired to produce a report for a marketing research company.

Yellow Bird Marketing, Inc. has collected information from across the country regarding five different products.

They would like to follow up with 1% of these households.

Yellow Bird needs a third party to choose 1% of the households for one of the products.

Choices must be random.

You have been hired by Yellow Bird to develop a program that will use a random number generator to select 1% of the households for one product.

Each household is mapped to a unique number ranging from 1 to the number of households as listed below.

Choose one product from the following:

1. Product 1 (toothpaste) 37,650 households

2. Product 2 (vacuum cleaner) 38,135 households

3. Product 3 (motor oil) 36,785 households

4. Product 4 (grass seed) 40,125 households

5.Product 5 (television remote) 35,790 households

Requirements: Develop a program to select the households for follow up. Choose your product.

Create your code to randomly select 1% of the households for one of the five products.

You must use the random method.

Your code would generate houseHoldNumbers for 1% of the available household population.

For example, there are 37,650 households for product one.

The households are individually numbered from 1 to 37,650.

You need to generate 376 random houseHoldNumbers between 1-37,650.

A table containing these houseHoldNumbers should be produced and printed to the screen.

The table must not contain duplicates. Print 10 houseHoldNumbers per row.

You need to use at least one repetition statement, at least one array and the random method in this code.

For generating random houseHoldNumbers you should use the random() static method of class Math.

It returns a double so you will need to cast it as an integer.

If you chose product 1 you would set the generator numberOfHouseHolds to 37,650 and generate random houseHoldNumbers for 1% (376) of the households.

C++ programming essentials functions

Purpose

The purpose of this assignment is to modify the existing code from Assignment 5 into a more maintainable and readable program by implementing various functions. You will be required to utilize void and value returning functions as well as value and reference parameters.

Programming Instructions:

1. Start with the provided solution to Assignment 5. This is NOT an option, you must use the solution code provided as your starting point.

2. Break up the main function code into the following separate functions:

a. DisplayIntro: Displays the title screen

b. PlayGame: This function holds most of the game logic that is held in the main function of the start point program

c. InitializeGameData: Initializes the game variables to the starting state. This is where you will set the card variables to the appropriate values for the game.

d. InitializeGameDisplay: Initializes the game board display variables to the starting state

e. DisplayInstructions: Displays the instructions for the game

f. DisplayBoard: Displays the concentration game board

g. GetValidBoardPosition : Prompts the player for a board position, validates it is a legal choice (1 – 6). The function should also not accept a position that has been used all ready. Hint: Check if it is not set to “*”, that will tell you if it has been used.

h. MatchMessage: Displays the match message to the player

i. NoMatchMessage: Displays the no match message to the player

j. DisplayCredits: Displays the game credit screen

3. You must add the additional functionality to the existing solution.

a. GameMenu: Displays 2 options, 1 to play the game and 9 to quit. Since the game now has a menu the player can now choose to play another game through the menu.

b. Provide at least 3 different game boards that the game can randomly select from at the start of each game.

4. The main function code for this lab is provided for you and is posted on Blackboard. The main function in your assignment must be very similar. As I do not wish to crimp your creative freedom you may change the name of the functions, if so desired, but their functionality must remain the same.

Resources:

1. Sample program posted on Blackboard

2. Main function text file posted on Blackboard

Business Intelligence Discussion

 

Discussion  (Chapter 9): What are the common business problems addressed by Big Data analytics?  In the era of Big Data, are we about to witness the end of data warehousing? Why?

Your response should be 250-300 words.  Respond to two postings provided by your classmates.
There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.