After reading chapter 3, analyze the history of Caesar Cypher and its impact on cryptography. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted.
Exp19_Excel_Ch05_Cap_Apartments
Exp19_Excel_Ch05_Cap_Apartments
Project Description:
You manage several apartment complexes in Phoenix, Arizona. You created a dataset that lists details for each apartment complex, such as apartment number, including number of bedrooms, whether the unit is rented or vacant, the last remodel date, rent, and deposits. You will use the datasets to aggregate data to analyze the apartments at the complexes.
Steps to Perform:
Step
Instructions
Points Possible
1
Start Excel. Download and open the file named Exp19_Excel_Ch05_Cap_Apartments.xlsx. Grader has automatically added your last name to the beginning of the filename.
02Before subtotalling the data, you need to sort the data.
Select the Summary sheet. Sort the data by Apartment Complex in alphabetical order and further sort it by # Bed (the number of bedrooms) from smallest to largest.
3You want to use the Subtotal feature to display the average total deposit by number of bedrooms for each apartment complex.
Use the Subtotal feature to insert subtotal rows by Apartment Complex to calculate the average Total Deposit. Add a second subtotal (without removing the first subtotal) by # Bed to calculate the average Total Deposit by the number of bedrooms.
5
4
Use the outline symbols to display only the subtotal rows. Create an automatic outline and collapse the outline above Total Deposit.
2
5
You want to create a PivotTable to determine the total monthly rental revenue for occupied apartments.
Display the Rentals sheet and create a blank PivotTable on a new worksheet to the left of the Rentals sheet. Change the name of the worksheet to Rental Revenue. Name the PivotTable Rental Revenue.
7
6
Display the Apartment Complex and # Bed fields in Rows and the Rental Price field as Values.
6
7
Format the Sum of Rental Price for Accounting Number Format with zero decimal places and enter the custom name Total Rent Collected.
3
8
Select the Occupied field for the filter and set the filter to Yes to display data for occupied apartments.
3
9
You want to calculate the total monthly rental revenue if the rates increase by 5% for the occupied apartments.
Insert a calculated field to multiply the Rental Price by 1.05. Change the name to New Rental Revenue. Apply Accounting Number Format with zero decimal places.
15
10
Select the range B3:C3 and apply these formats: wrap text, Align Right horizontal alignment, and 30 row height. Select column B and set 9.29 column width. Select column C and set 14.43 column width.
5
11
Apply Light Orange, Pivot Style Medium 10 to the PivotTable and display banded rows.
5
12
Insert a slicer for # Bed so that you can filter the dataset by number of bedrooms. Change the slicer caption to # of Bedrooms.
5
13
Change the slicer height to 1.4 inches and width to 1.75 inches. Apply Light Orange, Slicer Style Light 2. Cut the slicer and paste it in cell E2.
6
14
Insert a timeline for the Last Remodel field. Change the time period to YEARS. Apply Light Orange, Timeline Style Light 2. Change the timeline height to 1.4 inches and with to 3.75 inches.
5
15
The Databases sheet contains two tables. You will create a relationship between those tables.
Display the Databases sheet. Create a relationship between the APARTMENTS table using the Code field and the COMPLEX table using the Code field.
5
16You want to create a PivotTable from the related tables.
Create a PivotTable using the data model on a new sheet. Change the sheet name to Bedrooms. Name the PivotTable BedroomData.
5
17
Select the Apartment Name field from the COMPLEX table for Rows, the # Bed field for Columns, and the # Bed field as Values. This will display the number of apartments with the specified number of bedrooms per apartment complex. Display the values as a percentage of row totals.
5
18
Create a Clustered Column PivotChart. Cut the chart and paste it in cell A13.
5
19
Select the 3-bedroom data series and apply the Black, Text 1, Lighter 50% solid fill color. Apply Black, Text 1 font color to the vertical axis and category axis. Change the chart height to 3 inches and the width to 5 inches, if necessary. Hide the field buttons in the PivotChart.
5
20
Create a footer on all worksheets with your name in the left, the sheet name code in the center, and the file name code in the right.
5
21
Save and close Exp19_Excel_Ch05_Cap_Apartments.xlsx. Exit Excel. Submit the file as directed.
0
Total Points
100
ETCM DISCUSSION-6
Discussion: Should be between 250-to-300 words.
DUE DATE: Wednesday End of Day USA time (3 days from now)
Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)
DUE DATE: Saturday End of Day USA time (6 days from now)
Topic:
There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
C programming
Create a word count server that can do the following: converts first alphabet of every word to upper-case alphabet, counts the number of words, counts the number of alphabets, and finally counts the number of vowels in a given sentence.
Assignment 3
Instructions
You introduce functions with a program that calls – or makes use of – two functions. So, you have main(), which is included in every program, and you have firstFunction() and secondFunction(). Each time a function finishes, program control is returned to whatever called the function. In this case, that is main(). The code and output are as follows:
(PLEASE SEE THE UPDATES BELOW THE ORIGINAL PROGRAM PROVIDED.)
UPDATES
If you have any issues with the code as provided, please try the following updates to the program.
- The compiler is looking for the data types of the return values for the function prototypes.
In this example, the two functions do not return values, so void is used to indicate no value will be returned.
Example:
- As usual this term, add a 0 to the return line. We discussed why we do this during Unit 3’s lecture and in Unit 2’s discussion board.
Example:
- Since we indicated in our function prototypes that our functions would not return values, we’ll need to indicate the same in our function definitions. Add void in the place of the return data type for each function.
Example:
Notice the functions are “prototyped,” that is, the function definition is written above main() and followed with a semi-colon.
The flowchart for the code is as follows:
Submission Instructions
Now, you try copying the code, and writing the flowcharts.
Upload flowgorithm file, your .c file, and a screenshot of your code output saved in a Word document
MS 2
Scenario:
You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.
The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.
The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.
Answer should follow below instructions
——————————————————–
You will develop an annotated bibliography with a minimum of 10 peer reviewed scholarly articles. Additionally, you will write the literature review for the project. The entire task should be a minimum of 6 pages with 10 peer reviewed scholarly articles and formatted to APA 7 style.
Note:
Below are some examples for formatting your bibliography.
· https://guides.library.cornell.edu/annotatedbibliography
· https://sites.umgc.edu/library/libhow/bibliography_tutorial.cfm
· https://columbiacollege-ca.libguides.com/mla/annot_bib
Here are some resources to complete a literature review:
· https://uscupstate.libguides.com/c.php?g=627058&p=4389968
· https://www.youtube.com/watch?v=-ny_EUJXHHs
· https://umb.libguides.com/litreview
· https://writingcenter.unc.edu/tips-and-tools/literature-reviews/
· https://writingcenter.ashford.edu/writing-literature-review
P13.7 and P13.8 computer science C++ coding assignment
computer science C++ coding assignment
Please see the attachments for the instruction of this assignment
Additional info:
In the instruction, it says that ” Implement an iterator that produces the moves for the Towers of Hanoi puzzle described in Worked Example 13.2 “, however, worked example 13.2 is the wrong section. It’s supposed to be Worked Example 11.2 so I attached it.
week 2 application security
Write 200 to 300 words describing a multi-layed defense and why it is used.
Cluster Analysis
Need 10 page paper(APA format) discussing the strengths and weaknesses of Cluster Analysis.
ERM w7
here becomes a considerable increase in capital requirements especially when new rules are applied to financial markets with high-risk parameters, such as emerging markets are. The increased cost due to higher capital requirements could be a disincentive to investment in markets with higher risk profiles than the developed markets, taking also into account that diversification benefits deriving from investing in emerging economies have shown a decrease over time. The reduction of institutional investors can thus represent a brake on the process of innovation and evolution of emerging markets.
In your initial post, please discuss an example of one risk that countries or companies in emerging markets face today. Describe the impact this risk has on the micro- and macro-economies of an emerging market. For example, one such risk is that of pandemics and other health crises (fast-traveling pathogens such as COVID-19, or other developing world disease such as HIV/AIDS), which could jeopardize supply chain operations, consumers, employees, and others.
Respond substantively to at least two other students’ posts. Please describe what strategy you would recommend to address and mitigate the risk mentioned in your peer’s original post. For example, a collaborative mitigation strategy could provide improved information resulting from improved dialogue and data analysis around the risk issue, producing benefits such as improved mechanisms for identification, mitigation, and monitoring.
*please remember to include at least one credible scholarly reference with your initial post!