Exp19_Excel_Ch12_CapAssessment_Teaching_Schedule

 

Exp19_Excel_Ch12_CapAssessment_Teaching_Schedule

 

Exp19_Excel_Ch12_CapAssessment_Teaching_Schedule

#Exp19_Excel_Ch12_CapAssessment_Teaching_Schedule 

#Excelch12CapAssessmentTeachingSchedule

#You have just started your first career as a high school teacher. To jump start your planning process, you would like to create a teaching schedule template to help plan your weekly tasks. You will create a template, create custom macros to automatically insert dates, and inspect the document for issues.

#     

Clear   all data validation in the range A1:G19.

Delete the sample text in cell   B2

Type Teaching Schedule in cell B1.

Type prepared by: in cell F1.

Delete the value in cell G1.

Add the following comment in   cell G1 Enter Name.

#Type Monday in cell C4 and use the fill handle to fill the   range D4:G4 with the remaining days of the week. 

#Use the document inspector to   inspect the document. Remove document properties and personal information and   then click close.
 

  Note: Mac users, from the Excel menu, open your preferences, click Security,   and then click the check box to Remove personal information from this file on   save.

#Use the accessibility checker to   check the document for issues. Accept the recommended actions for merged   cells and use the recommended action to select Rose, Table Style Medium 23.   Close the accessibility checker pane.

#Record a macro named ClearSchedule using the shortcut   CTRL+SHIFT+J. Add the description #When run, this macro clears the values in the schedule (no period). When run, the   macro should delete the values in cell G1 and in the ranges C3:G3, C5:G6,   C8:G9, C11:G12, C14:G15, C17:G19, in that order.

#Create a form control button   that fills cell F2. Assign the ClearSchedule macro and edit the button text   to Clear.

#Create a form control button   that fills cell G2 and edit the button text to Insert Dates.

#Open the VBA editor and create a   new module named DateStamp. Create a procedure named InsertDate. Insert the comment Inserts   weekly dates,   then enter the following code Range(“C3:G3”) = Array(Date, Date + 1, Date +   2, Date + 3, Date + 4)   and exit the VBA editor.

#Assign the InsertDate macro to   the Insert Dates form control button.

#Test both macros and then open   the VBA editor. Locate the module containing the ClearSchedule macro. Copy   the code and paste it starting in cell B2 in the Code worksheet. 

#Locate the module containing the   InsertDate macro. Copy the code and paste it starting in cell D2.

Check the document for   compatibility with Excel 2010, 2013, and 2016.
 

  Note: Mac users, skip this step

Regular expression

  

Regular expression: From Wikipedia, the free encyclopedia

In computing, regular expressions (abbreviated as regex or regexp, with plural forms regexes, regexps, or regexen) provide a concise and flexible means for identifying text of interest, such as particular characters, words, or patterns of characters. Regular expressions are written in a formal language that can be interpreted by a regular expression processor, a program that either serves as a parser generator or examines text and identifies parts that match the provided specification.

Regular expressions are used by many text editors, utilities, and programming languages to search and manipulate text based on patterns. For example, Perl and Tcl have a powerful regular expression engine built directly into their syntax. Several utilities provided by Unix distributions—including the editor ed and the filter grep—were the first to popularize the concept of regular expressions.

7.1 Exercise – Fill in the following chart:

                   

   

Google Search

Number of Hits

 

Regex

1,39,00,000

 

Regex Linux

1,15,00,000

 

Regex   Windows

1,24,00,000

 

Regex Perl

57,10,000

 

Regex Java

2,31,00,000

 

Regex Vi

13,80,000

 

Regex egrep

1,28,000

 

Regex POSIX

4,62,000

In these notes we concentrate on POSIX regular expressions using egrep.

Wildcards:

Assume we have a directory with the following contents:

 

Using “wild cards:

 

7.2 The Grep Family

The UNIX grep utility marked the birth of a global regular expression print(GREP) tools. Searching for patterns in text is important operation in a number ofdomains, including program comprehension and software maintenance, structuredtext databases, indexing file systems, and searching natural language texts. Such awide range of uses inspired the development of variations of the original UNIXgrep. This variations range from adding new features, to employing fasteralgorithms, to changing the behaviour of pattern matching and printing. This

survey presents all the major developments in global regular expression printtools, namely the UNIX grep family, the GNU grep family, agrep, cgrep, sgrep,nrgrep, and Perl regularexpressions. Taken from man grep:

 

7.3 Regexs: Some Examples

Some Examples:We start with several simple examples. Assume we have a file fruits:

 

Matching characters “strings” by example: 

 

Metacharacters: Metacharacters are characters that have ‘special’ meaning. Here are the metacharacters that are defined.

 

. Matches anycharacter.

* “character*” specifies that the character can be matched zero or more times.

+ “character+” Matches that character one or more times. Pay careful attention to the 

difference between * and +; * matches zero or more times, so whatever’s being repeatedmay not be present at all, while + requires at least one occurrence. To use a similar example, ca+t will match “cat” (1 “a”), “caaat” (3 “a”‘s), but won’t match “ct”. 

? “character?” Matches that character either once or zero times; you can think of it as marking something as being optional. For example, home-?brew matches either “homebrew” or “home-brew”.

  

Examples:

 

If you wish to search for a metacharacter the metacharacter must be escaped by preceding it with the backslash “”.As an example let’s assume we have a file such as:

 

And we wish to fine “209.204.146.22”. egrep ‘209.204.146.22’ ip will NOT work. We must escape the “.” character. 

 

Anchors:

Using ^ and $ you can force a regex to match only at the start or end of a line, respectively. 

^ Match at the start of a line

$ Match at the end of a line

 

As you can see, this regex fails to match both apple and grape, since neither starts with a ‘p’. The fact that they contain a ‘p’ elsewhere is irrelevant. Similarly, the regex e$ only matches apple, orange and grape:So ^cat matches only those lines that start with cat, and cat$ only matches lines ending with cat.

Mind the quotes though! In most shells, the dollar-sign has a special meaning. By putting the regex in single-quotes (not double-quotes or back-quotes), the regex will be protected from the shell, so to speak. It’s generally a good idea to single-quote your regexes.

Moving on, ^cat$ only matches lines that contain exactly cat. You can find empty lines in a similar way with ^$. If you’re having trouble understanding that last one, just apply the definitions. The regex basically says: “Match a start-of-line, followed by an end-of-line”. 

Week 6 assignment

Instructions

Week 6 Assignment:

In order to complete assignment #6 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Instructions:

Discuss three tools used for Windows Backup and Restore using the text, Internet, and/or your job as reference for full credit

Data Analysis

 Present the data below:

  • Last updated – Oldest to newest
  • List of Area coordinators with courses and highlighted updated date
  • Graph and data analyzing the percentage of courses that were last updated more than 5 years, 4 years, 3 years, 2 years, and 1 year.  

Course developer contact list

  • List of Area Coordinator with the list of their CDev’s teaching in their content area.
  • List of Course Developer with a list under their names with of instructors eligible to teach in their content area and a list of those who have taught in their area in the past 2 years with their contact information.

In the data, if there is a * for last contract, means that it’s too old and there is not date listed.  If there is a blank for last maintenance, this means the course has not been maintenance. 

Assignment 350 words 5 references – Search Engine Optimization

Instructions – Include the below details:

1. Abstract –  

One paragraph describing the research to be conducted

2. Introduction –  

Include 1 paragraph as the introduction

3. Problem statement

Include 1 paragraph describing the problem you plan to research

4. Relevance and significance 

Include 1 paragraph describing the research goal

5. Research questions

Add no more than 2 research questions as they relate to the research

focus

presentaion 2

topic :  what makes a good hash function. 

 Make sure to give specific details and examples of good hash functions. I need like 4 slides excluding introduction slide. please give detail explanation in note section of a slide so that I can understand

Cyberlaw Term Paper

 

This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law(s) that you are interested in researching. The paper must be 4-6 pages in length detailing the below questions. Before completing the below steps, please make sure that the topic is approved.

1. Thesis: What law are you researching (You are to choose a specific law. Please do not choose a topic)? What position do you want to take in regard to your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.

2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?

3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?

4. Adequacies: Discuss the positive aspects of the law?

5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).

6). Conclusion: Why should and how can your proposal be adopted?

A detailed implementation plan is NOT expected, but you should provide enough specifics for practical follow-up. In making recommendations, you are expected to draw on theories, concepts and reading.

The Term Paper is due at the end of Week 8. In addition to the 4-6 pages of the paper itself, you must include a title page and a reference page. You are to follow APA Guidelines for citing and referencing sources. Your paper must be in your own words, representing original work. Paraphrases of others’ work must include attributions to the authors. Limit quotations to an average of no more than 3-5 lines, and use quotations sparingly. It is always better to write the information in your own words than to directly quote.

When writing the term paper you must have a minimum of 3-5 outside sources cited and referenced in the paper following APA guidelines.

  1. When submitting the paper, it will automatically run through Turnitin for review. PAPERS WITH AN ORIGINALITY REPORT FROM TURNITIN OVER 15% OR OVER 2% FROM A SINGLE SOURCE WILL RESULT IN A ZERO GRADE.
  2. PER THE STUDENT HANDBOOK, YOU CANNOT SUBMIT A PAPER THAT HAS BEEN SUBMITTED IN ANOTHER COURSE.

wk-2

 Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems. 

Group research- legal

2. Pfizer, 

https://www.justice.gov/opa/pr/justice-department-announces-largest-health-care-fraud-settlement-its-history

Drugs: Bextra, Geodon, Zyvox, https://www.enjuris.com/pharmaceutical-liability/lyrica-cymbalta-lawsuits.html

The criminal fine was $1.3 billion, and the additional $1 billion was for civil allegations under the False Claims Act. Pfizer falsely promoted Bextra, antipsychotic drug Geodon, antibiotic Zyvox, and antiepileptic Lyrica. The company was also accused of paying kickbacks related to these drugs and submitting false claims to government health care programs based on uses that weren’t medically accepted.

Please explain the legal issue in the above mentioned case- Focus on the administrative law.

Must be 6-7 pages APA format-

Text-

Chapter 6

Title: Business ISBN: 9780357447642 Authors: Marianne M. Jennings Publication Date: 2021-01-01 Edition: 12th Edition