Description
Hello i have an access and excel assignment. attached you will find the instructions needed to finish the task.
I will provide more very few more information to help you finish the assignment once assigned.
......................................................................................................
Unformatted Attachment Preview
Expense Spreadsheet (Excel) (20 points)
Create a spreadsheet with the information for all your employees. You need at
least 10 employees (enter any fictitious data). Your spreadsheet should include
the following:
TITLE
•
•
•
A title for your worksheet beginning in the A1 cell and it should be
merged and centered on all the cells to make a consistent looking title.
On your title you should have a thick box border
Format the worksheet title with a background color (you can use any
color)
DATA
Add the following fields to your worksheet for your employees:
• Last Name
• First Name
• Title
• Location of Store
o (Address, City, State, and Zip Code)
o You must have at least 2 separate locations and at least 2 separate
states.)
• Time In
• Time Out
• Total Hours Worked (make it vary for different people)
• Pay Rate (make it vary for different people)
•
•
Total PaySave as LastName-Expense Sheet
Create a formula that will calculate the Total Pay from the hours worked and
pay rate.
•
Submit to blackboard
Database (ACCESS) (20 points)
Create a blank database using following categories:
1.
2.
3.
4.
5.
6.
7.
Create a table and name it Employees
Import the excel LastName-Expense Sheet
Create a form and include all the fields from the Employees table in the
form.
Create a report from the Employees table with all the company
employees Last & First name only
Create a report from the Employees table with the Employees Last
Name, First, Name, & Salary
Create a query of all employees that live in the Same State
Save as LastName –Access
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Hello, here is the final version...
Completion Status:
100%
Review
Review
Anonymous
Goes above and beyond expectations!
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
4 pages
Data Science And Big Data Analytics Reflection
Data science happens to be an integrative sector that deploys scientific techniques, exercises, networks and algorithms to ...
Data Science And Big Data Analytics Reflection
Data science happens to be an integrative sector that deploys scientific techniques, exercises, networks and algorithms to extricate knowledge and ...
Athenaeum of Ohio Cyber Security & Vulnerabilities in Operating Systems Paper
Project 1: Requires the Following 2 Pieces 1. Security Assessment Report 2. Non-Technical Pres ...
Athenaeum of Ohio Cyber Security & Vulnerabilities in Operating Systems Paper
Project 1: Requires the Following 2 Pieces 1. Security Assessment Report 2. Non-Technical Presentation Slides Project 1 - Evaluation Criteria 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem. 5.4: Identify potential threats to operating systems and the security features necessary to guard against them 1. Security Assessment Report Discuss all topics below. Consider using the topic headers as subheaders to organize your report. Purpose and Scope Based on your scenario (i.e. hypothetical or real), briefly explain why is there a need for a security assessment in your organization (purpose) and explain which components will be assessed (scope) OS Overview In your SAR, provide the leadership of your organization a brief explanation of operating systems (OS) fundamentals and information systems architectures. Include the following: 1. Explain the user's role in an OS. 2. Explain the differences between kernel applications of the OS and the applications installed by an organization or user. 3. Describe the embedded OS. 4. Describe how operating systems fit in the overall information systems architecture, of which cloud computing is an emerging, distributed computing network architecture. OS Vulnerabilities Provide the leadership of your organization with an overview of OS vulnerabilities to include the following: 1. Explain Windows vulnerabilities and Linux vulnerabilities. 2. Explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices. 3. Explain the motives and methods for intrusion of MS and Linux operating systems. 4. Explain the types of security management technologies such as intrusion detection and intrusion prevention systems. 5. Describe how and why different corporate and government systems are targets. 6. Describe different types of intrusions such as SQL PL/SQL, XML, and other injections Preparing for the Vulnerability Scan Provide the leadership of your organization with the following: 1. Include a description of the methodology you proposed to assess the vulnerabilities of the operating systems. 2. Provide an explanation and reasoning of how the methodology you propose, will determine the existence of those vulnerabilities in the organization’s OS. 3. Include a description of the applicable tools to be used, limitations, and analysis. 4. Provide an explanation and reasoning of how the applicable tools you propose will determine the existence of those vulnerabilities in the organization’s OS. 5. In your report, also discuss: the strength of passwords any Internet Information Sevices' administrative vulnerabilities SQL server administrative vulnerabilities, security updates and management of patches as they relate to OS vulnerabilities Vulnerability Assessment Tools for OS and Applications (Lab) Use the vulnerability scanning tool to complete/determine the following for Window OS: 1. Determine if Windows administrative vulnerabilities are present. 2. Determine if weak passwords are being used on Windows accounts. 3. Report which security updates are required on each individual system. 4.The tool provides dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other grouping. 5. Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment. In this case, a tool such as OpenVAS will create and store individual XML security reports for each computer scanned and will display the reports in the graphical user interface in HTML. For the Linux OS: 1. Determine if Linux vulnerabilities are present. 2. Determine if weak passwords are being used on Linux systems. 3. Determine which security updates are required for the Linux systems. 4.You noticed that the tool you used for Linux OS (i.e., OpenVAS) provides dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other grouping. 5.Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment ** Findings and Recommendations 1.Include a section where the findings (i.e. your lab findings) and your recommendations are enumerated. This is an important section of your report, since your feedback/report will help the leadership of your organization allocate the necessary resources to ensure the risks you identified will be mitigated. Each finding should have a corresponding recommendation. E.g. Finding 1. It was found that …. Recommendation 1. It is recommended that …. Finding 2.... Recommendation 2...... 2. Include a brief risk assessment associated with the security recommendations to propose ways to address the risk either by accepting it, transferring it, mitigating it, or eliminating it. Explain your answer. Security Assessment Report Feedback 2. Presentation Slides (narration not required) Design a presentation directed to the leadership of your organization (technical and non-technical audience) that includes: 1. Title Slide 2. Use of Readable Fonts and Color 3. Summarized SAR 4. Summary of Findings and Recommendations at High Level Presentation Slides Feedback Your lab report should include: 1. Summary of lab experience 2. Vulnerabilities identified and explained for both Windows and Linux systems 3 4. Ensure a summary of your results is included in your SAR I need assistance on step which is the actual report and step 2 which is the presentation of the report
15 pages
Credible And Non Credible Source
It sometimes proves to be hard to determine the credibility of a Establishing the credibility of any information is very e ...
Credible And Non Credible Source
It sometimes proves to be hard to determine the credibility of a Establishing the credibility of any information is very essential in
Troy University Data Analytics DAX4 Widget Inc Labour Regression Model Memorandum
In this exercise, students will conduct a simple Linear Regression using SAS. The student will create a summary report of ...
Troy University Data Analytics DAX4 Widget Inc Labour Regression Model Memorandum
In this exercise, students will conduct a simple Linear Regression using SAS. The student will create a summary report of their analysis and create an informative graphic that is included in a business memorandum that provides a recommendation based on their analysis of the dataset.Our research question is "What factors influence $/hr for position 1 and 2 employees?" You need to turn this question into a statistical questions that you can answer using this data (The first is supplied to you in the memo). Note: An Example of a Regression Analysis Results Table (An Example Only - Not DAX 4 results) that must be submitted to prove a Regression Analysis was conducted. Choose to open either the following PDF or Docx file below: Example Regression Results Tables.pdfExample Regression Results Tables.docxCorrection as of 9/3/2020 : use the DAX 4 Instructions below in "Red": DAX4 Instructions 2020-ver 3.docxDAX 4 Memo 2020.docxDeliverable Business memoRubricDAX4 (Fall 2020)DAX4 (Fall 2020)CriteriaRatingsPtsThis criterion is linked to a Learning OutcomeBusiness Memo submitted on time.10.0 ptsFull Marks0.0 ptsNo Marks10.0 ptsThis criterion is linked to a Learning OutcomeCorrect salutation, date, subject line, etc.5.0 ptsFull Marks0.0 ptsNo Marks5.0 ptsThis criterion is linked to a Learning OutcomeParagraph 2 provides an explanation of any steps and discusses if the linear model is appropriate to run on this data. Tables and graphs should be referenced.20.0 ptsFull Marks15.0 ptsMostly Correct10.0 ptsPartially Correct5.0 ptsMostly Incorrect0.0 ptsNo Marks20.0 ptsThis criterion is linked to a Learning OutcomeAppropriate tables and graphs. This should include graphs/plots to verify the assumptions, a summary table, the parameter estimates table, and a correlation table.20.0 ptsFull Marks15.0 ptsMostly Correct10.0 ptsPartially correct5.0 ptsMostly incorrect0.0 ptsNo Marks20.0 ptsThis criterion is linked to a Learning OutcomeParagraph 3 summarizes the results discussing whether the model is significant, states which parameter estimates are significant and interprets them, discusses the root MSE, R-Squared, and if the results are meaningful. Tables and graphs should be referenced.25.0 ptsFull Marks19.0 ptsMostly Correct13.0 ptsPartially Correct7.0 ptsMostly Incorrect0.0 ptsNo Marks25.0 ptsThis criterion is linked to a Learning OutcomeParagraph 4 is a summary Paragraph with a conclusion, a recommendation, and the impact of the recommendation.The conclusion is the plain language answer to the research question and the use of the regression equation to make a recommendation on the 2 employees.20.0 ptsFull Marks15.0 ptsMostly Correct10.0 ptsPartially Correct5.0 ptsMostly incorrect0.0 ptsNo Marks
Online Marketing Business Process Essay
Note the following:
-The current business process itself.
-The industry the business process is utilized in.
After explain ...
Online Marketing Business Process Essay
Note the following:
-The current business process itself.
-The industry the business process is utilized in.
After explaining the current situation, take the current learning from the course and:
Explain a new technology that the business should deploy.
Be specific, don’t only note the type of technology but the specific instance of technology. (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
Note the pros and cons of the technology selected.
Note various factors the business should consider prior to deploying the new technology.
Similar Content
Campbellsville University Car Assembly in the Automotive Industry Essay
Assignment: Discuss a current business process in a specific industry. Note the following:-The current business process it...
Campbellsville Noise and False Positive & Danger of Ignoring True Incidents Essay
Topic: What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between...
University of the Cumberlands Current State of IOT Security Paper & Presentation
Current State of IOT Security4-5 Pages Paper and Presentation, for Security Outlook for IOT as a whole, include required c...
UML diagram for community board of realtors
Refer to the Running Case Studies, Community Board of Realtors found on page 116 of your textbook.Complete the three domai...
ITS4110 College of Saint Benedict HTML5 For Audio and Video Report
To support your work, use your course and text readings and also use outside sources. As in all assignments, cite your sou...
technical information about passwords and encryption, and how to recover data protected by these mechanisms.
This week's reading gives you basic technical information about passwords and encryption, and how to recover data protecte...
Blockchain Response
I agree with you that blockchain has played a critical role in the way we share information. Recently, we have observed va...
Please Answer Below Question
Any company providing large internet services to multiple users may hire It professionals within or without the company to...
Update Authentic Assessment Plan 1
World-Wide Trading Company is need of a secure network infrastructure that supports its business needs as well as customer...
Related Tags
Book Guides
The 5 Love Languages
by Gary Chapman
The Tipping Point
by Malcolm Gladwell
The Lost Man
by Jane Harper
What Happened
by Hillary Clinton
12 Rules for Life
by Jordan Peterson
The Elegant Universe
by Brian Greene
Alice in Wonderland
by Lewis Carroll
White Fang
by Jack London
Fear - Trump in the White House
by Bob Woodward
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
4 pages
Data Science And Big Data Analytics Reflection
Data science happens to be an integrative sector that deploys scientific techniques, exercises, networks and algorithms to ...
Data Science And Big Data Analytics Reflection
Data science happens to be an integrative sector that deploys scientific techniques, exercises, networks and algorithms to extricate knowledge and ...
Athenaeum of Ohio Cyber Security & Vulnerabilities in Operating Systems Paper
Project 1: Requires the Following 2 Pieces 1. Security Assessment Report 2. Non-Technical Pres ...
Athenaeum of Ohio Cyber Security & Vulnerabilities in Operating Systems Paper
Project 1: Requires the Following 2 Pieces 1. Security Assessment Report 2. Non-Technical Presentation Slides Project 1 - Evaluation Criteria 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem. 5.4: Identify potential threats to operating systems and the security features necessary to guard against them 1. Security Assessment Report Discuss all topics below. Consider using the topic headers as subheaders to organize your report. Purpose and Scope Based on your scenario (i.e. hypothetical or real), briefly explain why is there a need for a security assessment in your organization (purpose) and explain which components will be assessed (scope) OS Overview In your SAR, provide the leadership of your organization a brief explanation of operating systems (OS) fundamentals and information systems architectures. Include the following: 1. Explain the user's role in an OS. 2. Explain the differences between kernel applications of the OS and the applications installed by an organization or user. 3. Describe the embedded OS. 4. Describe how operating systems fit in the overall information systems architecture, of which cloud computing is an emerging, distributed computing network architecture. OS Vulnerabilities Provide the leadership of your organization with an overview of OS vulnerabilities to include the following: 1. Explain Windows vulnerabilities and Linux vulnerabilities. 2. Explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices. 3. Explain the motives and methods for intrusion of MS and Linux operating systems. 4. Explain the types of security management technologies such as intrusion detection and intrusion prevention systems. 5. Describe how and why different corporate and government systems are targets. 6. Describe different types of intrusions such as SQL PL/SQL, XML, and other injections Preparing for the Vulnerability Scan Provide the leadership of your organization with the following: 1. Include a description of the methodology you proposed to assess the vulnerabilities of the operating systems. 2. Provide an explanation and reasoning of how the methodology you propose, will determine the existence of those vulnerabilities in the organization’s OS. 3. Include a description of the applicable tools to be used, limitations, and analysis. 4. Provide an explanation and reasoning of how the applicable tools you propose will determine the existence of those vulnerabilities in the organization’s OS. 5. In your report, also discuss: the strength of passwords any Internet Information Sevices' administrative vulnerabilities SQL server administrative vulnerabilities, security updates and management of patches as they relate to OS vulnerabilities Vulnerability Assessment Tools for OS and Applications (Lab) Use the vulnerability scanning tool to complete/determine the following for Window OS: 1. Determine if Windows administrative vulnerabilities are present. 2. Determine if weak passwords are being used on Windows accounts. 3. Report which security updates are required on each individual system. 4.The tool provides dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other grouping. 5. Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment. In this case, a tool such as OpenVAS will create and store individual XML security reports for each computer scanned and will display the reports in the graphical user interface in HTML. For the Linux OS: 1. Determine if Linux vulnerabilities are present. 2. Determine if weak passwords are being used on Linux systems. 3. Determine which security updates are required for the Linux systems. 4.You noticed that the tool you used for Linux OS (i.e., OpenVAS) provides dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other grouping. 5.Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment ** Findings and Recommendations 1.Include a section where the findings (i.e. your lab findings) and your recommendations are enumerated. This is an important section of your report, since your feedback/report will help the leadership of your organization allocate the necessary resources to ensure the risks you identified will be mitigated. Each finding should have a corresponding recommendation. E.g. Finding 1. It was found that …. Recommendation 1. It is recommended that …. Finding 2.... Recommendation 2...... 2. Include a brief risk assessment associated with the security recommendations to propose ways to address the risk either by accepting it, transferring it, mitigating it, or eliminating it. Explain your answer. Security Assessment Report Feedback 2. Presentation Slides (narration not required) Design a presentation directed to the leadership of your organization (technical and non-technical audience) that includes: 1. Title Slide 2. Use of Readable Fonts and Color 3. Summarized SAR 4. Summary of Findings and Recommendations at High Level Presentation Slides Feedback Your lab report should include: 1. Summary of lab experience 2. Vulnerabilities identified and explained for both Windows and Linux systems 3 4. Ensure a summary of your results is included in your SAR I need assistance on step which is the actual report and step 2 which is the presentation of the report
15 pages
Credible And Non Credible Source
It sometimes proves to be hard to determine the credibility of a Establishing the credibility of any information is very e ...
Credible And Non Credible Source
It sometimes proves to be hard to determine the credibility of a Establishing the credibility of any information is very essential in
Troy University Data Analytics DAX4 Widget Inc Labour Regression Model Memorandum
In this exercise, students will conduct a simple Linear Regression using SAS. The student will create a summary report of ...
Troy University Data Analytics DAX4 Widget Inc Labour Regression Model Memorandum
In this exercise, students will conduct a simple Linear Regression using SAS. The student will create a summary report of their analysis and create an informative graphic that is included in a business memorandum that provides a recommendation based on their analysis of the dataset.Our research question is "What factors influence $/hr for position 1 and 2 employees?" You need to turn this question into a statistical questions that you can answer using this data (The first is supplied to you in the memo). Note: An Example of a Regression Analysis Results Table (An Example Only - Not DAX 4 results) that must be submitted to prove a Regression Analysis was conducted. Choose to open either the following PDF or Docx file below: Example Regression Results Tables.pdfExample Regression Results Tables.docxCorrection as of 9/3/2020 : use the DAX 4 Instructions below in "Red": DAX4 Instructions 2020-ver 3.docxDAX 4 Memo 2020.docxDeliverable Business memoRubricDAX4 (Fall 2020)DAX4 (Fall 2020)CriteriaRatingsPtsThis criterion is linked to a Learning OutcomeBusiness Memo submitted on time.10.0 ptsFull Marks0.0 ptsNo Marks10.0 ptsThis criterion is linked to a Learning OutcomeCorrect salutation, date, subject line, etc.5.0 ptsFull Marks0.0 ptsNo Marks5.0 ptsThis criterion is linked to a Learning OutcomeParagraph 2 provides an explanation of any steps and discusses if the linear model is appropriate to run on this data. Tables and graphs should be referenced.20.0 ptsFull Marks15.0 ptsMostly Correct10.0 ptsPartially Correct5.0 ptsMostly Incorrect0.0 ptsNo Marks20.0 ptsThis criterion is linked to a Learning OutcomeAppropriate tables and graphs. This should include graphs/plots to verify the assumptions, a summary table, the parameter estimates table, and a correlation table.20.0 ptsFull Marks15.0 ptsMostly Correct10.0 ptsPartially correct5.0 ptsMostly incorrect0.0 ptsNo Marks20.0 ptsThis criterion is linked to a Learning OutcomeParagraph 3 summarizes the results discussing whether the model is significant, states which parameter estimates are significant and interprets them, discusses the root MSE, R-Squared, and if the results are meaningful. Tables and graphs should be referenced.25.0 ptsFull Marks19.0 ptsMostly Correct13.0 ptsPartially Correct7.0 ptsMostly Incorrect0.0 ptsNo Marks25.0 ptsThis criterion is linked to a Learning OutcomeParagraph 4 is a summary Paragraph with a conclusion, a recommendation, and the impact of the recommendation.The conclusion is the plain language answer to the research question and the use of the regression equation to make a recommendation on the 2 employees.20.0 ptsFull Marks15.0 ptsMostly Correct10.0 ptsPartially Correct5.0 ptsMostly incorrect0.0 ptsNo Marks
Online Marketing Business Process Essay
Note the following:
-The current business process itself.
-The industry the business process is utilized in.
After explain ...
Online Marketing Business Process Essay
Note the following:
-The current business process itself.
-The industry the business process is utilized in.
After explaining the current situation, take the current learning from the course and:
Explain a new technology that the business should deploy.
Be specific, don’t only note the type of technology but the specific instance of technology. (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
Note the pros and cons of the technology selected.
Note various factors the business should consider prior to deploying the new technology.
Earn money selling
your Study Documents