Excel_Ch11_CapAssessment_Deans | Excel Chapter 11 CapAssessment Deans

 

Excel_Ch11_CapAssessment_Deans | Excel Chapter 11 CapAssessment Deans

 

100% Marked on MYITLAB  

Project Description:

You work for the vice president’s office at a major university. Human Resources provided a list of deans and associate deans, the colleges or schools the represent, and other details. You will use text functions to manipulate text, apply an advanced filter to display selected records, insert database summary statistics, use lookup functions, and display formulas as text.

Start Excel. Download and open   the file named Exp19_Excel_Ch11_CapAssessment_Deans.xlsx. Grader has automatically added   your last name to the beginning of the filename.

First, you want to combine the year and number to create a unique ID.
 

  In cell C8, enter 2006-435 and use Flash Fill to complete the IDs for all the deans and   associate deans.

Next, you want to create a three-character abbreviation for the   college names.
 

  In cell E8, use the text function to display the first three characters of   the college name stored in the previous column. Copy the function to the   range E9:E28.

The college names are hard to read in all capital letters.
 

  In cell F8, insert the correct text function to display the college name in   upper- and lowercase letters. Copy the function to the range F9:F28.

You want to display the names in this format Last, First.
 

  In cell J8, insert either the CONCAT or TEXTJOIN function to combine the last   name, comma and space, and the first name. Copy the function to the range   J9:J28.

Columns K and L combine the office building number and room with the   office phone extension. You want to separate the office extension.
 

  Select the range K8:K28 and convert the text to columns, separating the data   at commas.

You decide to create a criteria area to perform an advanced filter   soon.
 

  Copy the range A7:M7 and paste it starting in cell A30. Enter the criterion Associate Dean in   the appropriate cell on row 31.

Now you are ready to perform the advanced filter.
 

  Perform an advanced filter using the range A7:M28 as the data source, the   criteria range you just created, and copying the records to the output area   A34:M34.

The top-right section of the worksheet contains a summary area. You   will insert database functions to provide summary details about the Associate   Deans.
 

  In cell L2, insert the database function to calculate the average salary for   Associate Deans.

In cell L3, insert the database function to display the lowest salary   for Associate Deans.

In cell L4, insert the database function to display the highest   salary for Associate Deans.

Finally, you want to calculate the total salaries for Associate   Deans.
 

  In cell L5, insert the database function to calculate the total salary for   Associate Deans. 

Format the range L2:L5 with Accounting Number Format with zero   decimal places.

The range G1:H5 is designed to be able to enter an ID to look up that   person’s last name and salary.
 

  In cell H3, insert the MATCH function to look up the ID stored in cell H2,   compare it to the IDs in the range C8:C28, and return the position number.

Now that you have identified the location of the ID, you can identify   the person’s last name and salary.
 

  In cell H4, insert the INDEX function. Use the position number stored in cell   H3, the range C8:M28 for the array, and the correct column number within the   range. Use mixed references to keep the row numbers from changing. Copy the   function to cell H5 but preserve formatting. In cell H5, edit the column   number to display the salary.

In cell D2, insert the function to display the formula stored in cell   F8.
  In cell D3, insert the function to display the formula stored in cell H3.
  In cell D4, insert the function to display the formula stored in cell H4.
  In cell D5, insert the function to display the formula stored in cell L3.

Create a footer with your name on the left side, the sheet name code   in the center, and the file name code on the right side.

Save and close Exp19_Excel_Ch11_CapAssessment_Deans.xlsx.   Exit Excel. Submit the file as directed.

Java programming, network

You are required to write an Echo Client and an Echo Server program. The echo client communicates with the echo server using UDP. The programs should fulfill the following requirements:

Client:

1. Prompts the user to input the IP address, port number of the server, and a message to send to that server.

2. Sends the message to the server.

3. Display the server replay by using the same socket.

4. Displays an error message if the IP address or port number were entered incorrectly.

5. The client should be able to send multiple messages to the server. You may need to consider using the infinite loop as we discussed in the class.

Server

1. Receives the message from the client.

2. Change the letters of the message to “capital letters” and send it back to the client by using the same socket.

3. The server should be able to send multiple messages to the client. You may need to consider using the infinite loop as we discussed in the class.

Note:

1. Java language should be used.

2. Do NOT hard code the server address and port number in your source code.

3. Your program should work under MS-DOS window (command line). You need to compile your code by using JavaC.

Project Part 1: Risk Management Plan Outline and Research

 Please read the following outline and the attached file carefully.

Project Part 1: Risk Management Plan Outline and Research

For the first part of the assigned project, you will create a partial draft of the risk management plan. To do so, follow these steps:

  1. Research risk management plans.
  2. Create an outline for a basic risk management plan with anticipated section headings (as indicated in this numbered list). This plan will include a qualitative risk assessment, which is addressed later in the project.
  3. Write an introduction to the plan by explaining its purpose and importance.
  4. Define the scope and boundaries of the plan.
  5. Research and summarize compliance laws and regulations that pertain to the organization. Keep track of sources you use for citation purposes.
  6. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.
  7. Develop a proposed schedule for the risk management planning process.
  8. Create a draft risk management plan detailing the information above. Format the plan similar to a professional business report and cite any sources you used.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages

How to win 1v1 lol game?

Learn about 1v1 lol, an online third-person shooting and construction simulator. Enjoy game types including battle royale, build fights, box fights, zone wars, and more!

Competitors in the online third-person shooter known as “1v1 lol” use strategic map-building to outmaneuver their opponents. You can strengthen your defenses and gain an edge by constructing ramps, platforms, and walls. The primary mode is a deathmatch, where the winner is the person who is still alive at the end of the match.

With 1v1 lol, we were able to design an online shooting pvp simulator where you could battle against your opponents and utilize various construction options to hide from the adversaries. To accomplish your 1v1 lol build combat triumph, you may protect yourself with a ramp, wall, or ceiling, evade your actual opponents’ bullets, and attack them with your chosen weapons. 

Digital Forensics – 6

Two complete papers, one with title page and one with reference page. Combined total of 4 pages.

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Religion -5

 

Choose three points that interest you from three different religions we have studied.

1. Explain how these points function differently in each of the religious systems.

2. Alternatively, show that these points function in similar ways.

4. Cite and reference as usual.

Information Compliance

  1. Write an initial response to the following key question(s) or prompt(s):
    1. What are the similarities and differences between a security management plan and a risk management plan?
    2. Identify the importance of each plan.

attached response, please review and write 750 words of review and what is learned from the attached document.

3 APA references needed

Hacking

Research security-related matters affecting the common good and write a 500-750 word document reflecting “Hacking” and the impact current technologies and practices have on society’s ability to justly and humanely address associated concerns.

You must use APA style to include cover sheet, abstract, text, and references. You must cite at least three sources, with a minimum of two from refereed or edited publications.

Explore the ethical dimensions and dilemmas associated with “Hacking”, and reflect on how your experiences have shaped your perspective.