Description
Can someone help me out with these 3 questions in the attachment
Answers should only fit on one page.
Unformatted Attachment Preview
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
This is great! Exactly what I wanted.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s anal ...
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s analysis of maintaining the accuracy of customers’ personal information and indicate aspects of their post that effectively address the issues of maintaining personal information accurately. Suggest additional issues not considered in their initial post. Support your suggestions and recommendations with evidence from your sources.
#1. Zackary
Data governance is a term that is used to describe the policies that a business or entity implements in order to maintain and ensure accuracy of collected data. “Data governance means that enterprises have a high quality of data management through all phases of the data lifecycle” (Watts, 2020). There are many reasons why maintaining the accuracy of customers’ personal information is important to both our business and the customer’s privacy. One of these reasons is that many companies use client demographic (and other) information to inform large business decisions with data analytics. “Advanced Analytics is required for complex tasks such as prediction, customer centricity, personalization and cross-channel attribution” (Odoscope).
As far as privacy concerns go, having incorrect customer data can lead to major consequences. One instance of this was when the U.S. government accidentally detained a mother and daughter because their records had mistakenly labeled them as “armed and dangerous” (EPIC). The mother was able to sue the government because of their lack of compliance with the Privacy Act (EPIC).
A more business-related consequence would be that inaccurate client information can lead to failed audits, legal repercussions, and data leaks. If the company has the incorrect address on file for a client, and they send out some personal information, that information is now in the hands of an unknown party. Another example would be if a client were to claim that an employee was acting unethically or illegally, but there are no accurate records of the company’s transactions with that client, there could be a lengthy legal battle. Also when a company is audited, having proof of accurate information can prevent suspicion of altered files. “An audit trail can be very useful as evidence to show that the records have been properly managed, thereby helping prove that no unauthorized alteration of the record or its associated metadata has occurred during the record’s life” (Griffy-Brown, 2005).
#2. Colmcilla
Explain the importance of maintaining the accuracy of customers’ personal information.
From the perspective of the company, the customer database is how we reach out to the people who give us money. Maintaining the accuracy of that database only makes sense so that we can contact those people to keep giving us money. Once a customer moves address or telephone number, and we lose the opportunity to influence them through direct marketing, we lose our opportunity to influence the customer towards us.
Explain how maintaining accurate personal information affects the privacy of a company’s customers.
Failing to maintain accurate personal information affects the privacy of a company’s customers because inaccuracies can lead to crossing entities and inadvertently releasing data to an incorrect source. As explained by Gupta and Schneider (2018), the opportunity for data associated with one entity to be sent to another entity with similar characteristics is high, and becomes higher as an organization accumulates more data.
Explain the ramifications on a customer’s privacy when an organization poorly maintains customer information.
Confidential customer data can be incorrectly released to the wrong person. For example, in a pharmacy database, if there are several “John Smith” entities, and one uses a blood pressure medicine, the pharmacy may send targeted coupons from the manufacturer of the drug. But, if the pharmacy fails to maintain accurate information on all of their John Smith entities, the wrong John Smith may receive the coupon, and now knows that some other John Smith is on blood pressure medicine. This is a violation of the customer’s HIPAA privacy rights.
For #3 and #4 here are the requirements:
Evaluate your peer’s Employee Privacy section language. Suggest at least one additional element for their language that might strengthen the efficacy of it. Recommend changes that might clarify any missing points or address issues that should be considered. Explain why you offered these suggestions.
Your responses should be a minimum of 200 words.
#3. Oyindamola
Many organizations have developed policies on the use of IT in the workplace in order to protect against employee abuses that reduce worker productivity or that exposes the employee to harassment lawsuits based on studies conducted that 60 to 80 percent of employees’ time online has nothing to do with work (Reynolds, 2015). For the purpose of this assignment, I researched the company Entrata Employee handbook under the section “Workplace Security & Monitoring” (p. 23-24) that addresses digital work activities and communication. The Entrata handbook states below:
Employees who regularly communicate with customers may have their telephone conversations monitored or recorded. Telephone monitoring is used to identify and correct performance problems through targeted training.
Computers furnished to employees are the property of the company; therefore, computer usage and files may be monitored or accessed.
The monitoring of phones and conversations is well stated and with reasons why it is been done while the monitoring or accessing of computers is just mentioned without stating why it may be accessed or monitored for. As an employee, I would like to know what is been monitored, why and the consequences when violations occur.
Employee Privacy Section (in my own words)
We value our employees and the time and effort put into getting your job done but, in the process, we have observed reduced productivity and would like to inform you of the company’s expectations while using devices and its monitoring policy.
“Any devices (phone, computer, laptop, iPads, tablets), software and tools provided by the company for conducting work should be used for work related purposes only. These devices are being monitored and recorded and could be accessed at any time to improve productivity, training and conduct disciplinary action. Using work devices for nonwork related could lead to several internal and external implications which may put the brand’s reputation and risk. Any immoral, unethical, or non-business related misconduct could lead to disciplinary action up to and including termination of employment”.
I believe the employee privacy section I created includes the why, what and how the company intends to monitor employees digital work activities and consequences for failing to comply.
#4. Keona
Large companies have created Code of Conducts, Policy Manuals and/ or Employee Handbooks in order set guidelines and expectations for every aspect of the business (Reynolds, 2015). Dress codes, attendance, role expectations, company privacy, and even emails or work cell phone usage will all be included in those documents. Entrata is a property management software company. The software is used to assist property owners, property managers and residents to renewal offers, residential transaction and many other areas of residential management. They assist in marketing, management, leasing, and residents (Inc).
Entrata has about 15 different sections in their employee handbook. There is a section labeled Workplace Etiquette and a subsection labeled Use of Communication Systems. In this section Entrata example that all electronic communication including but not limited to e-mails, telephones, cellphone etc. should be used for company use only. Voicemails and emails are maintained by company and it their property. It is also noted that company paid computers can only be used for company related business. It is also noted that all messages are monitored. Even if a message is deleted, it can be recovered using a backup system (Inc). Unlike some other companies, Entrata has a password override system and has been it clear in the employee handbook that personal passwords used within in the company is also company property.
Even though Entrata makes it clear what data they own. I believe they should actually have company issued equipment for all areas of business for better monitoring. The verbiage would be some similar to: Depending on the role and needs, company issues equipment (cellphone, computers, laptops, etc.) will issued and monitored regularly.
GO16_XL_CH03_GRADER_3G_HW - Expenses 1.2
GO16_XL_CH03_GRADER_3G_HW - Expenses 1.2 Project Description: In the following project, you will edit a worksheet ...
GO16_XL_CH03_GRADER_3G_HW - Expenses 1.2
GO16_XL_CH03_GRADER_3G_HW - Expenses 1.2 Project Description: In the following project, you will edit a worksheet that will be used to summarize the operations costs for the Public Works Department. Instructions: For the purpose of grading the project you are required to perform the following tasks: Step Instructions Points Possible 1 Start Excel. Download and open the file named go16_xl_ch03_grader_3g_hw.xlsx. 0.000 2 In the Expenses worksheet, calculate row totals for each Expense item in the range F5:F9. Calculate column totals for each quarter and for the Annual Total in the range B10:F10. 8.000 3 In cell G5, construct a formula to calculate the Percent of Total by dividing the Annual Total for Salaries and Benefits by the Annual Total for Totals by Quarter. Use absolute cell references as necessary, format the result in Percent Style, and then Center. Fill the formula down through cell G9. 12.000 4 Use a 3-D Pie chart to chart the Annual Total for each item. Move the chart to a new sheet and then name the sheet Annual Expenses Chart. 8.000 5 For the Chart Title, type Summary of Annual Expenses and format the chart title using WordArt Style Fill - Blue, Accent 1, Shadow. Change the Chart Title font size to 28. 6.000 6 Remove the Legend from the chart and then add Data Labels formatted so that only the Category Name and Percentage display positioned in the Center. Change the Data Labels font size to 12, and apply Bold and Italic. 8.000 7 Format the Data Series using a 3-D Format effect. Change the Top bevel and Bottom bevel to Circle. Set the Top bevel Width and Height to 50 pt and then set the Bottom bevel Width and Height to 256 pt. Change the Material to the Standard Effect Metal. Note, the bevel name may be Round, depending on the version of Office used. 4.000 8 Display the Series Options, and then set the Angle of first slice to 125 so that the Salaries and Benefits slice is in the front of the pie. Select the Salaries and Benefits slice, and then explode the slice 10%. Change the Fill Color of the Salaries and Benefits slice to a Solid fill using Green, Accent 6, Lighter 40%. 4.000 9 Format the Chart Area by applying a Gradient fill using the Preset gradients Light Gradient – Accent 4 (fourth column, first row). Format the Border of the Chart Area by adding a Solid line border using Gold, Accent 4 and a 5 pt Width. 6.000 10 Display the Page Setup dialog box, and then for this chart sheet, insert a custom footer in the left section with the file name. 4.000 11 Display the Expenses worksheet, and then by using the Quarter names and the Totals by Quarter, insert a Line with Markers chart in the worksheet. Move the chart so that its upper left corner is positioned slightly inside the upper left corner of cell A12. Drag the center-right sizing handle so that the chart extends to slightly inside the right border of column G. As the Chart Title type City of Pacifica Bay Annual Expense Summary. 10.000 12 Format the Bounds of the Vertical (Value) Axis so that the Minimum is 2100000 and the Major unit is at 50000. Format the Fill of the Chart Area with a Gradient fill by applying the Preset, Light Gradient - Accent 3 (third column, first row). Format the Plot Area with a Solid fill using White, Background 1. 10.000 13 Copy the Annual Total in cell F10 and then use Paste Special to paste Values & Number Formatting in cell B35. In cell C35, construct a formula to calculate the Projected Expenses after the forecasted increase in cell B31 is applied. Fill the formula through cell F35, and then use Format Painter to copy the formatting from cell B35 to the range C35:F35. 10.000 14 Change the Orientation of this worksheet to Landscape, and then use the Scale to Fit options to fit the Height to 1 page. From the Page Setup dialog box, center the worksheet Horizontally, and insert a custom footer in the left section with the file name. 10.000 15 Ensure that the worksheets are correctly named and placed in the following order in the workbook: Annual Expenses Chart, Expenses. Save the workbook and exit Excel. Submit the file as directed. 0.000 Total Points 100.000
ITSY2401 Tarleton State University Network Design and Plan Purpose Project
Project: Network Design and PlanPurposeThis project provides you an opportunity to solve a comprehensive problem in firewa ...
ITSY2401 Tarleton State University Network Design and Plan Purpose Project
Project: Network Design and PlanPurposeThis project provides you an opportunity to solve a comprehensive problem in firewall and VPN implementation at various levels. You will play the role of an employee participating in the network security update planning process in a specific business situation.Required Source Information and ToolsThe following tools and resources will be needed to complete this project:A Web browser and access to the Internet to perform research for the projectAccess to the NetWitness Investigator applicationPacket trace files, vulnerability scans, and associated reports (provided by your instructor)general_comm.pcapencrypted_comm.pcapnmap_scan.xmltopology_fisheye_chart.pdfnessus_report.htmlLearning Objectives and OutcomesYou will be able to apply core competencies learned throughout the course to a single project.You will be able to analyze and apply knowledge of firewalls, VPNs, network diagrams, and defense measures.You will be able to demonstrate logical reasoning and decision-making skills.DeliverablesThe project is divided into two smaller assignments and one major assignment. Details for each deliverable can be found in this document. Refer to the Course Calendar for submission dates.Project Part 1: Network SurveyProject Part 2: Network DesignFinal Project: Network Security PlanProject Part 1: Network SurveyIntroductionNetwork defenses rely first on understanding the current configuration of hosts, services, and protocols in use within the organization. Before it is possible to plan to change anything, you must first understand what is present and where it is located within the network. The initial phase of any network security realignment process involves identifying existing resources.ScenarioYou have been working as a technology associate in the information systems department at Corporation Techs. The Corporation Techs’ management is concerned that they are losing business to a competitor whose bids are too accurately just under the bids offered by Corporation Techs––by an exact amount. A security firm was contracted to conduct a review of Corporation Techs' systems, identifying unauthorized access to the Web server as a potential source of compromise due to the shared reporting and public Web site functions. The packet trace and vulnerability scans gathered during this review are available for your use.The Web server provides public access to the organization's static Web site for contact information, while sales team members in the field transfer contract and bid documents using a site secured with a logon and password. Corporation Techs has budgeted for new networking hardware but does not want to add additional servers due to cooling issues. Your manager has asked you to create a security plan that will prevent unauthorized access, while making sure that both public and secured Web access remain available.TasksThe data and information you need to complete this part of the project are provided to you. (See the Required Source Information and Tools section at the beginning of this document.) In this part of the project, you need to conduct a survey of the existing hosts, services, and protocols within Corporation Techs' network. Specifically, you need to:Access the PCAP data using NetWitness Investigator.Identify hosts within the Corporation Techs’ network.Identify protocols in use within the Corporation Techs’ network.Develop a list of hosts and services provided by each.Create a professional report detailing the information above as the initial document for development of the network security plan.Write the network survey results as detailed in the instructions abfiles for the project https://drive.google.com/drive/folders/1VDSVdjeidT...https://drive.google.com/file/d/1Wa-IkwOrR4rx2yjSp...https://my.tccd.edu/bbcswebdav/pid-8303094-dt-cont...
Auburn Main Campus Role of Database Management Solutions Article Review
Using search engines, find 3 recent PEER REVIEWED ACADEMIC ARTICLES involving the Database Management Solutions. Describe ...
Auburn Main Campus Role of Database Management Solutions Article Review
Using search engines, find 3 recent PEER REVIEWED ACADEMIC ARTICLES involving the Database Management Solutions. Describe the role of "Database Management Solutions" in the text using your own words. Here is an example of an article citation as I would expect to see it in your write up. The writeup for your citation should be at least one paragraph long (7-9 sentences). Source Example:Chowdhury, M. J. M., Colman, A., Kabir, M. A., Han, J., & Sarda, P. (2018, August). Blockchain versus database: a critical analysis. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 1348-1353). IEEE.This is NOT a general paper on what is a database management system. Your entry on Blackboard should equal about 1-2 pages in length, double spaced, 12 point font Times New Roman.Your paper must contain a UNIQUE topic (see example above). Your paper must contain a MINIMUM of three unique academic journal articles and research sources. Blogs, Wikis, and Online News Sources will NOT be accepted. You must cite all references using APA and apply APA Style throughout the entire paper. 10% of your grade is based on APA Style.You must spell check / grammar check your paper. 10% of your grade is based on following this criteria.
CMGT 442 University of Phoenix Risk Assessment Matrix
This week you take on the role of the Senior Network Engineer for the organization you chose in Week 1. As a Senior Networ ...
CMGT 442 University of Phoenix Risk Assessment Matrix
This week you take on the role of the Senior Network Engineer for the organization you chose in Week 1. As a Senior Network Engineer, your responsibilities may include designing the network infrastructure, resolving network issues, addressing user needs, and suggesting improvements to network performance.
As a Senior Network Engineer for your chosen organization, one of your responsibilities is to formulate the IT Divisions Risk Assessment Plan, resolving network issues, addressing user needs, and suggesting improvements to network performance for the NexGen Network in the Middle East.
Research information about your chosen organization to complete this week's assignment.
Complete?a 4- to 6-page Risk Assessment in Microsoft® Word that includes:
A Risk Assessment Matrix
Identify five potential risks:
Describe each risk.
Determine the likelihood of each risk.
Outline the impact each risk has on the organization you chose.
Explain a mitigation strategy for addressing the risk.
Continuity Plan
Plan for business continuity.
Plan for IT disaster recovery.
Include risks and concerns to consider during recovery.
Similar Content
Harvard University Optimization Theory Raft Cluster Paper
1. In Raft, why do we need to update state machines of followers? Because logs are already stored in persistent devices, w...
Keys of clouding Computing
CIS_611_DFResearch "Barriers to Cloud Computing." In your initial post for the week, identify barriers to the adoption of...
UC Strategic Integration Discussion
Review the strategic integration section. Discuss the concept of strategic integration and describe how strategic in...
Essay on privacy, laws, and security measures
CIS 324 computer ethics privacy, laws,and Security measures...
Atlantis University Cybersecurity Literature Review
Chapter Two: Review of the LiteratureLiterature ReviewDeficiencies in the Current Body of Academic LiteratureChapter Three...
California State University Application of Artificial Intelligence Discussion
There are two articles to be read and would like a 1.5 page summary about the two and how the correlate with each other an...
Electronic Innovation And Government
According to Professor J. A Tylor’s article entitled “ Governance and Electronic Innovation”, electronic innovation ...
4step Analysis
List the relevant facts. State facts in complete sentences. (List more than five facts.) At the end of your list, cite ref...
Fcaps Network Management
FCAPS is a network management model that is important for the purpose of management of operations involving networks. FCAP...
Related Tags
Book Guides
The Hunger Games
by Suzanne Collins
The Secret Garden
by Frances Hodgson Burnett
Into Thin Air
by Jon Krakauer
Flowers For Algernon
by Alice Walker
The Underground Railroad
by Colson Whitehead
Invisible Man
by Ralph Ellison
The Restless Wave
by John McCain
Little Fires Everywhere
by Celeste Ng
The Good Earth
by Pearl S. Buck
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s anal ...
ISM 644 Ashford University Module 6 Audi Start Stop App Discussion Response
Please provide a response to each discussion question
For #1 and #2 here are the requirements:
Evaluate your peer’s analysis of maintaining the accuracy of customers’ personal information and indicate aspects of their post that effectively address the issues of maintaining personal information accurately. Suggest additional issues not considered in their initial post. Support your suggestions and recommendations with evidence from your sources.
#1. Zackary
Data governance is a term that is used to describe the policies that a business or entity implements in order to maintain and ensure accuracy of collected data. “Data governance means that enterprises have a high quality of data management through all phases of the data lifecycle” (Watts, 2020). There are many reasons why maintaining the accuracy of customers’ personal information is important to both our business and the customer’s privacy. One of these reasons is that many companies use client demographic (and other) information to inform large business decisions with data analytics. “Advanced Analytics is required for complex tasks such as prediction, customer centricity, personalization and cross-channel attribution” (Odoscope).
As far as privacy concerns go, having incorrect customer data can lead to major consequences. One instance of this was when the U.S. government accidentally detained a mother and daughter because their records had mistakenly labeled them as “armed and dangerous” (EPIC). The mother was able to sue the government because of their lack of compliance with the Privacy Act (EPIC).
A more business-related consequence would be that inaccurate client information can lead to failed audits, legal repercussions, and data leaks. If the company has the incorrect address on file for a client, and they send out some personal information, that information is now in the hands of an unknown party. Another example would be if a client were to claim that an employee was acting unethically or illegally, but there are no accurate records of the company’s transactions with that client, there could be a lengthy legal battle. Also when a company is audited, having proof of accurate information can prevent suspicion of altered files. “An audit trail can be very useful as evidence to show that the records have been properly managed, thereby helping prove that no unauthorized alteration of the record or its associated metadata has occurred during the record’s life” (Griffy-Brown, 2005).
#2. Colmcilla
Explain the importance of maintaining the accuracy of customers’ personal information.
From the perspective of the company, the customer database is how we reach out to the people who give us money. Maintaining the accuracy of that database only makes sense so that we can contact those people to keep giving us money. Once a customer moves address or telephone number, and we lose the opportunity to influence them through direct marketing, we lose our opportunity to influence the customer towards us.
Explain how maintaining accurate personal information affects the privacy of a company’s customers.
Failing to maintain accurate personal information affects the privacy of a company’s customers because inaccuracies can lead to crossing entities and inadvertently releasing data to an incorrect source. As explained by Gupta and Schneider (2018), the opportunity for data associated with one entity to be sent to another entity with similar characteristics is high, and becomes higher as an organization accumulates more data.
Explain the ramifications on a customer’s privacy when an organization poorly maintains customer information.
Confidential customer data can be incorrectly released to the wrong person. For example, in a pharmacy database, if there are several “John Smith” entities, and one uses a blood pressure medicine, the pharmacy may send targeted coupons from the manufacturer of the drug. But, if the pharmacy fails to maintain accurate information on all of their John Smith entities, the wrong John Smith may receive the coupon, and now knows that some other John Smith is on blood pressure medicine. This is a violation of the customer’s HIPAA privacy rights.
For #3 and #4 here are the requirements:
Evaluate your peer’s Employee Privacy section language. Suggest at least one additional element for their language that might strengthen the efficacy of it. Recommend changes that might clarify any missing points or address issues that should be considered. Explain why you offered these suggestions.
Your responses should be a minimum of 200 words.
#3. Oyindamola
Many organizations have developed policies on the use of IT in the workplace in order to protect against employee abuses that reduce worker productivity or that exposes the employee to harassment lawsuits based on studies conducted that 60 to 80 percent of employees’ time online has nothing to do with work (Reynolds, 2015). For the purpose of this assignment, I researched the company Entrata Employee handbook under the section “Workplace Security & Monitoring” (p. 23-24) that addresses digital work activities and communication. The Entrata handbook states below:
Employees who regularly communicate with customers may have their telephone conversations monitored or recorded. Telephone monitoring is used to identify and correct performance problems through targeted training.
Computers furnished to employees are the property of the company; therefore, computer usage and files may be monitored or accessed.
The monitoring of phones and conversations is well stated and with reasons why it is been done while the monitoring or accessing of computers is just mentioned without stating why it may be accessed or monitored for. As an employee, I would like to know what is been monitored, why and the consequences when violations occur.
Employee Privacy Section (in my own words)
We value our employees and the time and effort put into getting your job done but, in the process, we have observed reduced productivity and would like to inform you of the company’s expectations while using devices and its monitoring policy.
“Any devices (phone, computer, laptop, iPads, tablets), software and tools provided by the company for conducting work should be used for work related purposes only. These devices are being monitored and recorded and could be accessed at any time to improve productivity, training and conduct disciplinary action. Using work devices for nonwork related could lead to several internal and external implications which may put the brand’s reputation and risk. Any immoral, unethical, or non-business related misconduct could lead to disciplinary action up to and including termination of employment”.
I believe the employee privacy section I created includes the why, what and how the company intends to monitor employees digital work activities and consequences for failing to comply.
#4. Keona
Large companies have created Code of Conducts, Policy Manuals and/ or Employee Handbooks in order set guidelines and expectations for every aspect of the business (Reynolds, 2015). Dress codes, attendance, role expectations, company privacy, and even emails or work cell phone usage will all be included in those documents. Entrata is a property management software company. The software is used to assist property owners, property managers and residents to renewal offers, residential transaction and many other areas of residential management. They assist in marketing, management, leasing, and residents (Inc).
Entrata has about 15 different sections in their employee handbook. There is a section labeled Workplace Etiquette and a subsection labeled Use of Communication Systems. In this section Entrata example that all electronic communication including but not limited to e-mails, telephones, cellphone etc. should be used for company use only. Voicemails and emails are maintained by company and it their property. It is also noted that company paid computers can only be used for company related business. It is also noted that all messages are monitored. Even if a message is deleted, it can be recovered using a backup system (Inc). Unlike some other companies, Entrata has a password override system and has been it clear in the employee handbook that personal passwords used within in the company is also company property.
Even though Entrata makes it clear what data they own. I believe they should actually have company issued equipment for all areas of business for better monitoring. The verbiage would be some similar to: Depending on the role and needs, company issues equipment (cellphone, computers, laptops, etc.) will issued and monitored regularly.
GO16_XL_CH03_GRADER_3G_HW - Expenses 1.2
GO16_XL_CH03_GRADER_3G_HW - Expenses 1.2 Project Description: In the following project, you will edit a worksheet ...
GO16_XL_CH03_GRADER_3G_HW - Expenses 1.2
GO16_XL_CH03_GRADER_3G_HW - Expenses 1.2 Project Description: In the following project, you will edit a worksheet that will be used to summarize the operations costs for the Public Works Department. Instructions: For the purpose of grading the project you are required to perform the following tasks: Step Instructions Points Possible 1 Start Excel. Download and open the file named go16_xl_ch03_grader_3g_hw.xlsx. 0.000 2 In the Expenses worksheet, calculate row totals for each Expense item in the range F5:F9. Calculate column totals for each quarter and for the Annual Total in the range B10:F10. 8.000 3 In cell G5, construct a formula to calculate the Percent of Total by dividing the Annual Total for Salaries and Benefits by the Annual Total for Totals by Quarter. Use absolute cell references as necessary, format the result in Percent Style, and then Center. Fill the formula down through cell G9. 12.000 4 Use a 3-D Pie chart to chart the Annual Total for each item. Move the chart to a new sheet and then name the sheet Annual Expenses Chart. 8.000 5 For the Chart Title, type Summary of Annual Expenses and format the chart title using WordArt Style Fill - Blue, Accent 1, Shadow. Change the Chart Title font size to 28. 6.000 6 Remove the Legend from the chart and then add Data Labels formatted so that only the Category Name and Percentage display positioned in the Center. Change the Data Labels font size to 12, and apply Bold and Italic. 8.000 7 Format the Data Series using a 3-D Format effect. Change the Top bevel and Bottom bevel to Circle. Set the Top bevel Width and Height to 50 pt and then set the Bottom bevel Width and Height to 256 pt. Change the Material to the Standard Effect Metal. Note, the bevel name may be Round, depending on the version of Office used. 4.000 8 Display the Series Options, and then set the Angle of first slice to 125 so that the Salaries and Benefits slice is in the front of the pie. Select the Salaries and Benefits slice, and then explode the slice 10%. Change the Fill Color of the Salaries and Benefits slice to a Solid fill using Green, Accent 6, Lighter 40%. 4.000 9 Format the Chart Area by applying a Gradient fill using the Preset gradients Light Gradient – Accent 4 (fourth column, first row). Format the Border of the Chart Area by adding a Solid line border using Gold, Accent 4 and a 5 pt Width. 6.000 10 Display the Page Setup dialog box, and then for this chart sheet, insert a custom footer in the left section with the file name. 4.000 11 Display the Expenses worksheet, and then by using the Quarter names and the Totals by Quarter, insert a Line with Markers chart in the worksheet. Move the chart so that its upper left corner is positioned slightly inside the upper left corner of cell A12. Drag the center-right sizing handle so that the chart extends to slightly inside the right border of column G. As the Chart Title type City of Pacifica Bay Annual Expense Summary. 10.000 12 Format the Bounds of the Vertical (Value) Axis so that the Minimum is 2100000 and the Major unit is at 50000. Format the Fill of the Chart Area with a Gradient fill by applying the Preset, Light Gradient - Accent 3 (third column, first row). Format the Plot Area with a Solid fill using White, Background 1. 10.000 13 Copy the Annual Total in cell F10 and then use Paste Special to paste Values & Number Formatting in cell B35. In cell C35, construct a formula to calculate the Projected Expenses after the forecasted increase in cell B31 is applied. Fill the formula through cell F35, and then use Format Painter to copy the formatting from cell B35 to the range C35:F35. 10.000 14 Change the Orientation of this worksheet to Landscape, and then use the Scale to Fit options to fit the Height to 1 page. From the Page Setup dialog box, center the worksheet Horizontally, and insert a custom footer in the left section with the file name. 10.000 15 Ensure that the worksheets are correctly named and placed in the following order in the workbook: Annual Expenses Chart, Expenses. Save the workbook and exit Excel. Submit the file as directed. 0.000 Total Points 100.000
ITSY2401 Tarleton State University Network Design and Plan Purpose Project
Project: Network Design and PlanPurposeThis project provides you an opportunity to solve a comprehensive problem in firewa ...
ITSY2401 Tarleton State University Network Design and Plan Purpose Project
Project: Network Design and PlanPurposeThis project provides you an opportunity to solve a comprehensive problem in firewall and VPN implementation at various levels. You will play the role of an employee participating in the network security update planning process in a specific business situation.Required Source Information and ToolsThe following tools and resources will be needed to complete this project:A Web browser and access to the Internet to perform research for the projectAccess to the NetWitness Investigator applicationPacket trace files, vulnerability scans, and associated reports (provided by your instructor)general_comm.pcapencrypted_comm.pcapnmap_scan.xmltopology_fisheye_chart.pdfnessus_report.htmlLearning Objectives and OutcomesYou will be able to apply core competencies learned throughout the course to a single project.You will be able to analyze and apply knowledge of firewalls, VPNs, network diagrams, and defense measures.You will be able to demonstrate logical reasoning and decision-making skills.DeliverablesThe project is divided into two smaller assignments and one major assignment. Details for each deliverable can be found in this document. Refer to the Course Calendar for submission dates.Project Part 1: Network SurveyProject Part 2: Network DesignFinal Project: Network Security PlanProject Part 1: Network SurveyIntroductionNetwork defenses rely first on understanding the current configuration of hosts, services, and protocols in use within the organization. Before it is possible to plan to change anything, you must first understand what is present and where it is located within the network. The initial phase of any network security realignment process involves identifying existing resources.ScenarioYou have been working as a technology associate in the information systems department at Corporation Techs. The Corporation Techs’ management is concerned that they are losing business to a competitor whose bids are too accurately just under the bids offered by Corporation Techs––by an exact amount. A security firm was contracted to conduct a review of Corporation Techs' systems, identifying unauthorized access to the Web server as a potential source of compromise due to the shared reporting and public Web site functions. The packet trace and vulnerability scans gathered during this review are available for your use.The Web server provides public access to the organization's static Web site for contact information, while sales team members in the field transfer contract and bid documents using a site secured with a logon and password. Corporation Techs has budgeted for new networking hardware but does not want to add additional servers due to cooling issues. Your manager has asked you to create a security plan that will prevent unauthorized access, while making sure that both public and secured Web access remain available.TasksThe data and information you need to complete this part of the project are provided to you. (See the Required Source Information and Tools section at the beginning of this document.) In this part of the project, you need to conduct a survey of the existing hosts, services, and protocols within Corporation Techs' network. Specifically, you need to:Access the PCAP data using NetWitness Investigator.Identify hosts within the Corporation Techs’ network.Identify protocols in use within the Corporation Techs’ network.Develop a list of hosts and services provided by each.Create a professional report detailing the information above as the initial document for development of the network security plan.Write the network survey results as detailed in the instructions abfiles for the project https://drive.google.com/drive/folders/1VDSVdjeidT...https://drive.google.com/file/d/1Wa-IkwOrR4rx2yjSp...https://my.tccd.edu/bbcswebdav/pid-8303094-dt-cont...
Auburn Main Campus Role of Database Management Solutions Article Review
Using search engines, find 3 recent PEER REVIEWED ACADEMIC ARTICLES involving the Database Management Solutions. Describe ...
Auburn Main Campus Role of Database Management Solutions Article Review
Using search engines, find 3 recent PEER REVIEWED ACADEMIC ARTICLES involving the Database Management Solutions. Describe the role of "Database Management Solutions" in the text using your own words. Here is an example of an article citation as I would expect to see it in your write up. The writeup for your citation should be at least one paragraph long (7-9 sentences). Source Example:Chowdhury, M. J. M., Colman, A., Kabir, M. A., Han, J., & Sarda, P. (2018, August). Blockchain versus database: a critical analysis. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 1348-1353). IEEE.This is NOT a general paper on what is a database management system. Your entry on Blackboard should equal about 1-2 pages in length, double spaced, 12 point font Times New Roman.Your paper must contain a UNIQUE topic (see example above). Your paper must contain a MINIMUM of three unique academic journal articles and research sources. Blogs, Wikis, and Online News Sources will NOT be accepted. You must cite all references using APA and apply APA Style throughout the entire paper. 10% of your grade is based on APA Style.You must spell check / grammar check your paper. 10% of your grade is based on following this criteria.
CMGT 442 University of Phoenix Risk Assessment Matrix
This week you take on the role of the Senior Network Engineer for the organization you chose in Week 1. As a Senior Networ ...
CMGT 442 University of Phoenix Risk Assessment Matrix
This week you take on the role of the Senior Network Engineer for the organization you chose in Week 1. As a Senior Network Engineer, your responsibilities may include designing the network infrastructure, resolving network issues, addressing user needs, and suggesting improvements to network performance.
As a Senior Network Engineer for your chosen organization, one of your responsibilities is to formulate the IT Divisions Risk Assessment Plan, resolving network issues, addressing user needs, and suggesting improvements to network performance for the NexGen Network in the Middle East.
Research information about your chosen organization to complete this week's assignment.
Complete?a 4- to 6-page Risk Assessment in Microsoft® Word that includes:
A Risk Assessment Matrix
Identify five potential risks:
Describe each risk.
Determine the likelihood of each risk.
Outline the impact each risk has on the organization you chose.
Explain a mitigation strategy for addressing the risk.
Continuity Plan
Plan for business continuity.
Plan for IT disaster recovery.
Include risks and concerns to consider during recovery.
Earn money selling
your Study Documents