Description
A.methods
B.constructors
C.function members
D.
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
a. mETHODS PLEASE BEST MY ANSWER GOD LUCK AND THANKS
Completion Status:
100%
Review
Review
Anonymous
Just what I needed. Studypool is a lifesaver!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
IT Security Policy Framework
IT Security Policy FrameworkEstablishing an effective Information Technology Security Policy Framework is critical in the ...
IT Security Policy Framework
IT Security Policy FrameworkEstablishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework. You may create and / or assume all necessary assumptions needed for the completion of this assignment. Write a three to five (3-5) page paper in which you: Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework. Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. The specific learning outcomes associated with this assignment are: Identify the role of an information systems security (ISS) policy framework in overcoming business challenges. Design a security policy framework. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
7 pages
Week 2 Discussion Question.edited 1
1. What is data remanence? Describe the four different approaches to eliminating data Many definitions fit data remanence. ...
Week 2 Discussion Question.edited 1
1. What is data remanence? Describe the four different approaches to eliminating data Many definitions fit data remanence. This discussion defines ...
Excel assignment condiments inventory
GO16_XL_CH02_GRADER_2G_AS - Condiments Inventory 1.2 Project Description: In the following project, you will edit ...
Excel assignment condiments inventory
GO16_XL_CH02_GRADER_2G_AS - Condiments Inventory 1.2 Project Description: In the following project, you will edit a worksheet that summarizes the inventory of Condiments and Toppings at the Pasadena facility. Instructions: For the purpose of grading the project you are required to perform the following tasks: Step Instructions Points Possible 1 Start Excel. Download and open the file named go16_xl_ch02_grader_2g_as.xlsx. 0.000 2 Change the Theme to Ion. Rename Sheet1 as Condiments and Sheet2 as Toppings. Click the Condiments sheet tab to make it the active sheet. 3.000 3 To the right of column B, insert two new columns to create new blank columns C and D. By using Flash Fill in the two new columns, split the data in column B into a column for Item # in column C and Category in column D. Type Item # as the column title in column C and Category as the column title in column D. Delete column B. Cut column C, Category, and paste it to column G. Delete the empty column C. Note, Mac users, after inserting the two columns, select the range B15:B42 and, on the Data tab, click Text to Columns. Select Other as the delimiters, and then type a hyphen (-). Set the destination cell as C15, and then finish the wizard. Continue with the remaining instructions. 5.000 4 Display the Toppings worksheet, and then repeat Step 3 on this worksheet. 5.000 5 Without grouping the sheets, make the following calculations in both worksheets: • In cell B4, enter a function to sum the Quantity in Stock data, and then apply Comma Style with zero decimal places to the result. • In cells B5:B8, enter formulas to calculate the Average, Median, Lowest, and Highest retail prices, and then apply the Accounting Number Format. 14.000 6 Without grouping the sheets, make the following calculations in both worksheets: • In cell B10, enter a COUNTIF function to determine how many different types of Relish are in stock on the Condiments sheet and how many different types of Salsa are in stock on the Toppings worksheet. 6.000 7 Without grouping the sheets, make the following calculations in both worksheets: • In cell G14 type Stock Level. In cell G15, enter an IF function to determine the items that must be ordered. If the Quantity in Stock is less than 75, the Value_if_true is Order. Otherwise, the Value_if_false is OK. Fill the formula down through all the rows. 8.000 8 Without grouping the sheets, apply the following formatting in both worksheets: • Apply Conditional Formatting to the Stock Level column so that Text that Contains the text Order are formatted with Bold Italic with a Font Color of Dark Red, Accent 1. Apply Gradient Fill Red Data Bars to the Quantity in Stock column. 4.000 9 In the Condiments sheet, format the range A14:G42 as a table with headers and apply Table Style Light 20. Insert a Total Row, filter by Category for Relish, and then Sum the Quantity in Stock column. Record the result in cell B11. 3.000 10 Clear the filter from the table. Sort the table on the Item # column from Smallest to Largest, and then remove the Total Row. On the Page Layout tab, set Print Titles so that row 14 repeats at the top of each page. 3.000 11 In the Toppings sheet, format the range A14:G42 as a table with headers and apply Table Style Light 19. Insert a Total Row, filter by Category for Salsa, and then Sum the Quantity in Stock column. Record the result in cell B11. 3.000 12 Clear the filter from the table. Sort the table on the Item # column from Smallest to Largest, and then remove the Total Row. On the Page Layout tab, set Print Titles so that row 14 repeats at the top of each page, and then Save your workbook. 3.000 13 Group the two worksheets. Merge and center the title in cell A1 across the range A1:G1 and apply the Title cell style. Merge and center the subtitle in cell A2 across the range A2:G2 and apply the Heading 1 cell style. AutoFit Columns A:F. Center the worksheets Horizontally, and then change the Orientation to Landscape. 9.000 14 In Backstage view, on the left, click Save, and then click the Condiments sheet tab to cancel the grouping. Click the Toppings sheet tab, and then insert a new worksheet. Change the sheet name to Summary and then widen columns A:D to 20.63 width. Move the Summary sheet so that it is the first sheet in the workbook. 3.000 15 In cell A1, type Valley View Inventory Summary. Merge & Center the title across the range A1:D1, and then apply the Title cell style. In cell A2, type As of June 30, and then Merge & Center the text across the range A2:D2. Apply the Heading 1 cell style. 3.000 16 On the Condiments sheet, copy the range A4:A8. Display the Summary sheet and Paste the selection to cell A5. Apply the Heading 4 cell style to the selection. 1.000 17 In the Summary sheet, in cell B4, type Condiments. In cell C4 type Toppings. In cell D4 type Condiments/Toppings. Center the column titles, and then apply the Heading 3 cell style. 3.000 18 In cell B5, enter a formula that references cell B4 in the Condiments sheet so that the Condiments Total Items in Stock displays in B5. Create similar formulas to enter the Average Price, Median Price, Lowest Price, and Highest Price from the Condiments sheet into the Summary sheet in the range B6:B9. 5.000 19 Enter formulas in the range C5:C9 that reference the Total Items in stock and the Average Price, Median Price, Lowest Price, and Highest Price cells in the Toppings worksheet. 5.000 20 In the range D5:D9 of the Summary sheet, insert Column sparklines using the values in the Condiments and Toppings columns (insert in each cell individually). Format the sparklines using the styles in the first row as follows: D5: Sparkline Style Accent 1, Darker 50% D6: Sparkline Style Accent 2, Darker 50% D7: Sparkline Style Accent 3, Darker 50% D8: Sparkline Style Accent 4, Darker 50% D9: Sparkline Style Accent 5, Darker 50% 10.000 21 To the range B5:C5, apply Comma Style with zero decimal places, and confirm that the Accounting Number Format is applied to the range B6:C9. Center the Summary worksheet Horizontally and change the Orientation to Landscape. Insert a custom footer in the left section with the file name. 4.000 22 Ensure that the worksheets are correctly named and placed in the following order in the workbook: Summary, Condiments, Toppings. Save and close Excel. Submit the file as directed. 0.000 Total Points 100.000
Data Network , computer science assignment help
After reading the article, Mobile growth is about to be staggering (click on title to access the article), discuss the imp ...
Data Network , computer science assignment help
After reading the article, Mobile growth is about to be staggering (click on title to access the article), discuss the implications as related to business LANs and WLANs. Include your views about how you would prepare a LAN and WLAN for the increasing bandwidth demands of mobile/wireless devices. Support your views and make sure all information sources are appropriately cited.
CMGT 433 University of Phoenix Cybersecurity Awareness Campaign Paper
Wk 5 - Cybersecurity Awareness Campaign [due Mon]
Assignment Content
As a final project requirement, the executive staf ...
CMGT 433 University of Phoenix Cybersecurity Awareness Campaign Paper
Wk 5 - Cybersecurity Awareness Campaign [due Mon]
Assignment Content
As a final project requirement, the executive staff requested recommendations to address the following:
Strategy for staff awareness
Strategy for ongoing security maintenance
The best way to get the message across is to have a solid mission statement to share with the organization. You decide to create an awareness campaign for the organization to address the executive staff member's request. Your campaign consists of the following three items:
Mission statement
Poster campaign
Message to organization via the intranet
Create an approximate 90-word security policy mission statement for Dayton Soft Products.Develop a poster campaign consisting of 3 posters for security awareness to display in the workplace and to distribute virtually. Each poster must include the security policy mission statement. Highlight at least 5 legal and ethical issues across the 3 posters. You may use any program to create your posters.Write a message for the company's internal website to a diverse workforce announcing the cybersecurity awareness material. You will need to submit a draft of your announcement message to the executive staff in the form of a Microsoft® Word document.Provide the following elements in your announcement message:
The reason the corporate security policy was established
Mission statement
Employees' role to meet the mission
Announce launch of the poster campaign
Large images of the three posters
Strategies and tools for ongoing monitoring and enforcement of security policy
Similar Content
ITEC 640 United Medical and Dental College Gantt Chart Discussion
Read discussions and respond to peers in 100 words minimum. Please references should be APA style compliant.
Peer 1:...
Discussion
Topic: Their is little doubt we are living at a time when technology is advancing at a pace that some believe is too fast ...
Reducing Cyber Attacks Discussion
•Chapter 9 – Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cybe...
University of The Cumberlands Risk Management Questions
Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With...
System model, computer science homework help
Select one of the following system model, explain what it is all about, and also how it is used- CONTEXT MODEL-INTERACTION...
ASU Artificial intelligence Paper
Question 1
Answer the following questions
1. What is a local search algorithm?
2. What is an optimization problem? Give an...
Article Review
As a software developer, I have found it useful to be present as a solution provider. Being approachable has been a boon i...
20200314093138intrusion Detection
IDS: Gathers and analyzes information from different areas in a computer or a network to find a possible security breach w...
Network Assessment 2
The main objective of this vulnerability report is to access the firewall installations in this company, identify loophole...
Related Tags
Book Guides
A Separate Peace
by John Knowles
Underground A Human History of the Worlds Beneath our Feet
by Will Hunt
Cant Hurt Me - Master Your Mind and Defy the Odds
by David Goggins
The Aftermath
by Rhidian Brook
The Outsiders
by S.E. Hinton
The Two Towers
by J. R. R. Tolkien
Cat on a Hot Tin Roof
by Tennessee Williams
Catching Fire
by Suzanne Collins
The Secret Life of Bees
by Sue Monk Kidd
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
IT Security Policy Framework
IT Security Policy FrameworkEstablishing an effective Information Technology Security Policy Framework is critical in the ...
IT Security Policy Framework
IT Security Policy FrameworkEstablishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework. You may create and / or assume all necessary assumptions needed for the completion of this assignment. Write a three to five (3-5) page paper in which you: Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework. Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. The specific learning outcomes associated with this assignment are: Identify the role of an information systems security (ISS) policy framework in overcoming business challenges. Design a security policy framework. Use technology and information resources to research issues in security strategy and policy formation. Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
7 pages
Week 2 Discussion Question.edited 1
1. What is data remanence? Describe the four different approaches to eliminating data Many definitions fit data remanence. ...
Week 2 Discussion Question.edited 1
1. What is data remanence? Describe the four different approaches to eliminating data Many definitions fit data remanence. This discussion defines ...
Excel assignment condiments inventory
GO16_XL_CH02_GRADER_2G_AS - Condiments Inventory 1.2 Project Description: In the following project, you will edit ...
Excel assignment condiments inventory
GO16_XL_CH02_GRADER_2G_AS - Condiments Inventory 1.2 Project Description: In the following project, you will edit a worksheet that summarizes the inventory of Condiments and Toppings at the Pasadena facility. Instructions: For the purpose of grading the project you are required to perform the following tasks: Step Instructions Points Possible 1 Start Excel. Download and open the file named go16_xl_ch02_grader_2g_as.xlsx. 0.000 2 Change the Theme to Ion. Rename Sheet1 as Condiments and Sheet2 as Toppings. Click the Condiments sheet tab to make it the active sheet. 3.000 3 To the right of column B, insert two new columns to create new blank columns C and D. By using Flash Fill in the two new columns, split the data in column B into a column for Item # in column C and Category in column D. Type Item # as the column title in column C and Category as the column title in column D. Delete column B. Cut column C, Category, and paste it to column G. Delete the empty column C. Note, Mac users, after inserting the two columns, select the range B15:B42 and, on the Data tab, click Text to Columns. Select Other as the delimiters, and then type a hyphen (-). Set the destination cell as C15, and then finish the wizard. Continue with the remaining instructions. 5.000 4 Display the Toppings worksheet, and then repeat Step 3 on this worksheet. 5.000 5 Without grouping the sheets, make the following calculations in both worksheets: • In cell B4, enter a function to sum the Quantity in Stock data, and then apply Comma Style with zero decimal places to the result. • In cells B5:B8, enter formulas to calculate the Average, Median, Lowest, and Highest retail prices, and then apply the Accounting Number Format. 14.000 6 Without grouping the sheets, make the following calculations in both worksheets: • In cell B10, enter a COUNTIF function to determine how many different types of Relish are in stock on the Condiments sheet and how many different types of Salsa are in stock on the Toppings worksheet. 6.000 7 Without grouping the sheets, make the following calculations in both worksheets: • In cell G14 type Stock Level. In cell G15, enter an IF function to determine the items that must be ordered. If the Quantity in Stock is less than 75, the Value_if_true is Order. Otherwise, the Value_if_false is OK. Fill the formula down through all the rows. 8.000 8 Without grouping the sheets, apply the following formatting in both worksheets: • Apply Conditional Formatting to the Stock Level column so that Text that Contains the text Order are formatted with Bold Italic with a Font Color of Dark Red, Accent 1. Apply Gradient Fill Red Data Bars to the Quantity in Stock column. 4.000 9 In the Condiments sheet, format the range A14:G42 as a table with headers and apply Table Style Light 20. Insert a Total Row, filter by Category for Relish, and then Sum the Quantity in Stock column. Record the result in cell B11. 3.000 10 Clear the filter from the table. Sort the table on the Item # column from Smallest to Largest, and then remove the Total Row. On the Page Layout tab, set Print Titles so that row 14 repeats at the top of each page. 3.000 11 In the Toppings sheet, format the range A14:G42 as a table with headers and apply Table Style Light 19. Insert a Total Row, filter by Category for Salsa, and then Sum the Quantity in Stock column. Record the result in cell B11. 3.000 12 Clear the filter from the table. Sort the table on the Item # column from Smallest to Largest, and then remove the Total Row. On the Page Layout tab, set Print Titles so that row 14 repeats at the top of each page, and then Save your workbook. 3.000 13 Group the two worksheets. Merge and center the title in cell A1 across the range A1:G1 and apply the Title cell style. Merge and center the subtitle in cell A2 across the range A2:G2 and apply the Heading 1 cell style. AutoFit Columns A:F. Center the worksheets Horizontally, and then change the Orientation to Landscape. 9.000 14 In Backstage view, on the left, click Save, and then click the Condiments sheet tab to cancel the grouping. Click the Toppings sheet tab, and then insert a new worksheet. Change the sheet name to Summary and then widen columns A:D to 20.63 width. Move the Summary sheet so that it is the first sheet in the workbook. 3.000 15 In cell A1, type Valley View Inventory Summary. Merge & Center the title across the range A1:D1, and then apply the Title cell style. In cell A2, type As of June 30, and then Merge & Center the text across the range A2:D2. Apply the Heading 1 cell style. 3.000 16 On the Condiments sheet, copy the range A4:A8. Display the Summary sheet and Paste the selection to cell A5. Apply the Heading 4 cell style to the selection. 1.000 17 In the Summary sheet, in cell B4, type Condiments. In cell C4 type Toppings. In cell D4 type Condiments/Toppings. Center the column titles, and then apply the Heading 3 cell style. 3.000 18 In cell B5, enter a formula that references cell B4 in the Condiments sheet so that the Condiments Total Items in Stock displays in B5. Create similar formulas to enter the Average Price, Median Price, Lowest Price, and Highest Price from the Condiments sheet into the Summary sheet in the range B6:B9. 5.000 19 Enter formulas in the range C5:C9 that reference the Total Items in stock and the Average Price, Median Price, Lowest Price, and Highest Price cells in the Toppings worksheet. 5.000 20 In the range D5:D9 of the Summary sheet, insert Column sparklines using the values in the Condiments and Toppings columns (insert in each cell individually). Format the sparklines using the styles in the first row as follows: D5: Sparkline Style Accent 1, Darker 50% D6: Sparkline Style Accent 2, Darker 50% D7: Sparkline Style Accent 3, Darker 50% D8: Sparkline Style Accent 4, Darker 50% D9: Sparkline Style Accent 5, Darker 50% 10.000 21 To the range B5:C5, apply Comma Style with zero decimal places, and confirm that the Accounting Number Format is applied to the range B6:C9. Center the Summary worksheet Horizontally and change the Orientation to Landscape. Insert a custom footer in the left section with the file name. 4.000 22 Ensure that the worksheets are correctly named and placed in the following order in the workbook: Summary, Condiments, Toppings. Save and close Excel. Submit the file as directed. 0.000 Total Points 100.000
Data Network , computer science assignment help
After reading the article, Mobile growth is about to be staggering (click on title to access the article), discuss the imp ...
Data Network , computer science assignment help
After reading the article, Mobile growth is about to be staggering (click on title to access the article), discuss the implications as related to business LANs and WLANs. Include your views about how you would prepare a LAN and WLAN for the increasing bandwidth demands of mobile/wireless devices. Support your views and make sure all information sources are appropriately cited.
CMGT 433 University of Phoenix Cybersecurity Awareness Campaign Paper
Wk 5 - Cybersecurity Awareness Campaign [due Mon]
Assignment Content
As a final project requirement, the executive staf ...
CMGT 433 University of Phoenix Cybersecurity Awareness Campaign Paper
Wk 5 - Cybersecurity Awareness Campaign [due Mon]
Assignment Content
As a final project requirement, the executive staff requested recommendations to address the following:
Strategy for staff awareness
Strategy for ongoing security maintenance
The best way to get the message across is to have a solid mission statement to share with the organization. You decide to create an awareness campaign for the organization to address the executive staff member's request. Your campaign consists of the following three items:
Mission statement
Poster campaign
Message to organization via the intranet
Create an approximate 90-word security policy mission statement for Dayton Soft Products.Develop a poster campaign consisting of 3 posters for security awareness to display in the workplace and to distribute virtually. Each poster must include the security policy mission statement. Highlight at least 5 legal and ethical issues across the 3 posters. You may use any program to create your posters.Write a message for the company's internal website to a diverse workforce announcing the cybersecurity awareness material. You will need to submit a draft of your announcement message to the executive staff in the form of a Microsoft® Word document.Provide the following elements in your announcement message:
The reason the corporate security policy was established
Mission statement
Employees' role to meet the mission
Announce launch of the poster campaign
Large images of the three posters
Strategies and tools for ongoing monitoring and enforcement of security policy
Earn money selling
your Study Documents