Description
i promise this excel is very easy, i hope someone can help me to finish it, thank you so much. i can give your more tip.
Unformatted Attachment Preview
Office 2016 – myitlab:grader – Instructions
Excel Project
YO16_XL_CH04_GRADER_PS2_AS - Express 1.3
Project Description:
Thomas Reynolds is the corporate buyer for vehicles put into service by Express Car Rental. Tom has the option
to buy several lots of vehicles from another rental agency that is downsizing. He wants to get a better idea of the
number of rentals nationwide by vehicle type. The corporate accountant has forwarded Tom a worksheet
containing rental data for last year. Tom wants to use this summarized data but feels that embedding charts will
provide a quicker analysis in a more visual manner for the chief financial officer at their meeting next week.
Instructions:
For the purpose of grading the project you are required to perform the following tasks:
Step
1
2
3
4
Points
Possible
Instructions
Start Excel. Open the file named e02ch04Express.xlsx. Save the file with the name
e02ch04Express_LastFirst, replacing LastFirst with your name.
0.000
Use the cells A5:A10 and O5:O10 on the AnnualData worksheet to create a 3-D Pie chart of
the number of annual rentals for the six car types. Reposition the chart so the upper left
corner is inside cell H12.
On the 3-D pie chart, change the title to Annual Rentals. Change the font of the title to Arial
Black, 16 pt, and bold.
Add data labels on the pie chart to include the category name and percentage only. Position
the label information on the outside end of the chart. Change the font size of the labels to 8
and apply bold. Remove the legend. Explode the slice of the chart that represents the auto
type with the lowest percentage of annual rentals by 20%.
13.000
8.000
12.000
5
Click the clustered column chart located below the monthly data. Change the chart type to
Line.
10.000
6
Increase the data used in the line chart to include the months of July, August, and September.
Switch the row and column data so that the months July to December are represented on the
x-axis.
9.000
7
Change the chart style to Style 6. On the line chart, add primary major vertical gridlines.
Change the chart title to Rentals by Auto Type for July to December.
9.000
8
Create a 3-D Clustered Column chart using the cells A5:10 and H5:H10 for the Semi-Annual
Total for all auto types on the AnnualData worksheet. The primary horizontal axis should be
the auto types.
15.000
9
Move the 3-D column chart from the AnnualData worksheet to a chart sheet, and then name
that worksheet SemiAnnualReport.
9.000
Updated: 05/02/2017
1
Current_Instruction.docx
Office 2016 – myitlab:grader – Instructions
Excel Project
Points
Possible
Step
Instructions
10
If necessary, add the chart title Semi-Annual Total to the chart. Bold the title. Adjust the 3D Rotation of the chart to have a X rotation of 30 and a Y rotation of 20. Add Data Labels to
the chart. Change the size of the data labels to 14 and then bold.
11
12
13
Reposition the SemiAnnualReport worksheet after the AnnualData worksheet.
5.000
Insert the File Name in the left footer section of AnnualData worksheet.
2.000
Save the workbook. Close the workbook and then exit Excel. Submit the workbook as directed.
Total Points
Updated: 05/02/2017
2
8.000
0.000
100.000
Current_Instruction.docx
Express Car Rental
Auto Type
Green Collection
Compact/Midsize
Full-size/Standard
SUV/Minivan
Sports car
Relic
Jan
300
500
250
150
200
50
Feb
250
700
355
260
350
122
Mar
366
890
652
555
355
224
Chart Title
1400
1200
1000
800
600
400
200
0
Oct
Nov
Dec
Annual National Rental Data/ Vehicles Rented by Type
Created by Thomas Reynolds
SemiAnnual
Total
Apr
May
Jun
Jul
Aug
522
477
699
2614
899
862
755
899
788
4532
566
425
553
650
800
3260
788
1056
456
556
652
2629
1230
1855
233
155
132
1425
355
523
126
98
155
775
189
166
Sep
566
655
852
658
458
137
Oct
855
547
544
578
598
199
Nov
588
689
455
355
168
99
Dec
288
588
977
1155
198
66
Annual
Total
6672
8002
7932
8460
3725
1631
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Thank you so much
Express Car Rental
Annual National Rental Data/ Vehicles Rented by Type
Created by Thomas Reynolds
Auto Type
Green Collection
Compact/Midsize
Full-size/Standard
SUV/Minivan
Sports car
Relic
Jan
300
500
250
150
200
50
Feb
250
700
355
260
350
122
Mar
366
8...
Completion Status:
100%
Review
Review
Anonymous
Really helped me to better understand my coursework. Super recommended.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
Northern Virginia Community Networking Local Area Networks & Security Research
Ava’s company is in the process of designing and building one new local area network to support the newly expanded branc ...
Northern Virginia Community Networking Local Area Networks & Security Research
Ava’s company is in the process of designing and building one new local area network to support the newly expanded branch which is dedicated to provide bookkeeping services. All transactions and data records must be kept confidentially.A list of networking devices has been sent to you for your approval. This list includes 3 types of networking devices: hub, switch, and router.You are asked to either approve or disapprove each of these 3 types networking devices.For every type of networking device that you disapprove, you must provide at least one reason to support your decision.You do not need to provide any reason for the device that you approve.You need to fully understand the requirements. You also need to read and understand the “Hint” part of this assignment. If you did not, your solution is anticipated to be incorrect.HINT: All networking devices are subject to security vulnerability and risks. If a device can satisfy the requirements, it cannot be disapproved, regardless its capability, performance, intelligence, or cost. You are NOT asked to provide definitions nor capabilities of these devices, because you are required to fully understand these devices; otherwise, your decision cannot be right. You are NOT asked to make a selection or recommendation, because making a selection or recommendation concerns the cost. There is no mention of “cost” in the requirements. There is no mention of “performance” nor “traffic” in the requirements. If your solution talks about performance or efficiency, your solution is incorrect. No partial credits can be awarded. Why? If you made incorrect decisions, the new network will FAIL to satisfy the business and will put the business at risks. You may be asked to pay back the business loss. You will be fired. Yet, you would still ask for partial credits??!! A reason is a fact and is not an opinion. For example, “….not flexible…”, “…poor performance…”, “…more expensive….” are opinions.THERE IS ONLY ONE CORRECT SOLUTION Your solution is incorrect, if:o You disapproved a device for an incorrect reason.o You approved a device that will put Ava’s business at risks – You did not fully understand the device that you approved or you did not fully understand Ava’s business requirements.o You disapproved a device without providing your reason(s).o You included at least one incorrect statement in your solution; for example, 1 day has 36 hours or Internet is the same as World Wide Web.
Hashing Algorithms
Discussion topic you may see within the computer forensics (CF) industry is over what hashing algorithm is adequate and/or ...
Hashing Algorithms
Discussion topic you may see within the computer forensics (CF) industry is over what hashing algorithm is adequate and/or appropriate for CF purposes. This discussion has been going on for years as different algorithms have become the standard, however, this became quite heated a few years ago when researchers generated an MD5 collision, where they created 2 files that were not identical that generated the same MD5 hash value, created rogue CA certificates, and other collision issues.See: http://www.win.tue.nl/hashclash/rogue-ca/ and https://ad-pdf.s3.amazonaws.com/papers/wp.MD5_Collisions.en_us.pdf, among many others.You will find many other similar discussions/debates online about this topic. More recently, NIST released the new SHA-3 Cryptographic Hash Standard. https://www.nist.gov/news-events/news/2015/08/nist...What are your thoughts on algorithms for CF? Do you think one is more appropriate than others for CF purpose and why? Before you answer, keep in mind a few things: The longer the algorithm/hash value, the longer it takes your CF tools to generate the hash values…and in the field, time is a critical consideration. Does the fact that there are known collisions offset the fact that there is a 1 in 2^128 (3.402 x 10^38 or 340 billion billion billion billion) possible chances of a MD5 collision, and how does that compare to DNA validation statistics? Keep in mind that no matter what algorithm you choose, there is always a finite number of possible hash values but an infinite number of possible inputs…so there will ALWAYS be the possibility of collision. Does it matter that there are already millions of MD5 hash values in databases of known files, or should we regenerate them using SHA-1 or SHA-256 or other algorithm?
ITS 415 CSUGC Cyber Terrorism & Cyber Espionage Countermeasures Discussion
Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment ch ...
ITS 415 CSUGC Cyber Terrorism & Cyber Espionage Countermeasures Discussion
Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment choice in the title of your submission.Option #1: Cyber EspionageCyber espionage is term used to illicit access to confidential information. Spying or deploying malware to steal or destroy data within a computer network. This can apply to a government agencies or enterprise.Describe corporate espionageDefine at least three ways to prevent itYour paper should meet the following requirements:Be 2-3 pages in length, not including the cover page and reference page.Follow the CSU Global Writing Center (Links to an external site.). Each paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusion.Support your answers with the readings from Module 4 and at least one scholarly journal article. The CSU Global Library (Links to an external site.) is a great place to find resources.Be clearly and well written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style, start with Tools for Effective Writing at the CSU Global Library (Links to an external site.), accessible from the Library's homepage.Option #2: Cyber TerrorismIn a well-written paper, write a response to one of the following questions:Is cyber terrorism a serious threat? Is the United States making adequate preparations against cyberterrorism?In recent years, several cyber-attacks supported by national governments are believed to have taken place. Have these attacks generally achieved their goals? Were the governments wise to launch the attacks?Your paper should meet the following requirements:Be 2-3 pages in length, not including the cover page and reference page.Follow the CSU Global Writing Center (Links to an external site.). Each paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusion.Support your answers with the readings from Module 4 and at least one scholarly journal article. The CSU Global Library (Links to an external site.) is a great place to find resources.Be clearly and well written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style, start with Tools for Effective Writing at the CSU Global Library (Links to an external site.), accessible from the Library's homepage.
discussion data mining 3
Weekly Post topics:Answer anyone one main question… 1. Many partitional clustering algorithms that automatically de ...
discussion data mining 3
Weekly Post topics:Answer anyone one main question… 1. Many partitional clustering algorithms that automatically determine the number of clusters claim that this is an advantage. List two situations in which this is not the case.OrConsider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?Or3) You are given two sets of 100 points that fall within the unit square. One set of points is arranged so that the points are uniformly spaced. The other set of points is generated from a uniform distribution over the unit square.Is there a difference between the two sets of points?If so, which set of points will typically have a smaller SSE for K=10 clusters? The random set of points will have a lower SSE.What will be the behavior of DBSCAN on the uniform data set? The random data set?
a matrix mapping of a key IT-related organizational
Week Three Assignment Paper B1 Paper B1: a matrix mapping of a key IT-related organizational ...
a matrix mapping of a key IT-related organizational
Week Three Assignment Paper B1 Paper B1: a matrix mapping of a key IT-related organizational (or personal) ethical issue concerning privacy. This assignment gives you an opportunity to analyze a key IT-related organizational (or personal, if not in the job force) ethical issue, related to privacy subject to relevant laws, regulations, and policies. Both of the following sites provide sources, and an excellent backdrop for issues relating to privacy protection and the law. See EPIC Privacy Issues at: http://epic.org/privacy/ See List on left and/or: EFF Privacy at https://www.eff.org/issues/privacy [see list in center on this page]. This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics. Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical (or personal, if not in the job force) issue and how this issue is affected by laws, regulations, and policies. Use the list of normative ethics principles below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.Prepare the Ethical Issue matrix and include the following explanation (200 words) —double-space your narrative—below the matrix: Why I chose the dilemma;Why I chose the three principles; andAn analysis of the research used to identify the actions in the matrix. The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders. Submit the matrix for grading to the LEO Assignments Module.Indicate appropriate APA in-text and source citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style. This assignment is directly related to Paper-B2. The ethical issue identified in this assignment will be used in your Paper B2 Assignment. Paper B2 asks you to write a policy that corrects the ethical issue described in Paper B1. Normative Ethics List Autonomy: is the duty to maximize the individual's right to make his or her own decisions. Beneficence: is the duty to do good both individually and for all. Confidentiality: is the duty to respect privacy of information and action. Equality: is the duty to view all people as moral equals. Finality: is the duty to take action that may override the demands of law, religion, and social customs. Justice: is the duty to treat all fairly, distributing the risks and benefits equally. Non-maleficence: is the duty to cause no harm, both individually and for all. Understanding/Tolerance: is the duty to understand and to accept another viewpoint if reason dictates doing so is warranted. Publicity: is the duty to take actions based on ethical standards that must be known and recognized by all who are involved. Respect for persons: is the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end. Universality: is the duty to take actions that hold for everyone, regardless of time, place, or people involved. This concept is similar to the Categorical Imperative. Veracity: is the duty to tell the truth. A sample template for the matrix is shown below. To reconstruct the sample template, you may use the Table Tool in MS Word or copy and paste this template. Ethical issue: Stakeholders (Principle 1) (Principle 2) (Principle 3) 1 2 3 4 Step 1: Identify the ethical issue that you want to analyze, as described above. An example might be the falsification of your personal profile in a social networking site. Step 2: Identify the stakeholders involved. You, someone who reads your personal profile in a social network site, potential employers, etc. Be sure that each stakeholder category is unique and not similar to another category you use. Step 3: Choose any three (only three) of the principles that might apply to your issue such as autonomy, publicity, and veracity. Step 4: identify how the ethical issue affects each stakeholder based on the principles you identified. Put this statement in the matrix next to the stakeholder. Sample Completed Matrix Ethical issue: falsifying your profile on a social networking site Stakeholders autonomy publicity veracity 1: Yourself You have the duty to maximize the right to make your own decisions. You have the duty to take actions based on ethical standards that must be known and recognized by all who are involved. You have the duty to tell the truth 2: Other users of the networking site They have the duty to make their own decisions They make these decisions based on ethical standards that should be recognized by the person falsifying their profile They assume that the person falsifying the profile has the duty to tell the truth. 3: The social networking site The autonomy of the site is limited by law (Goldman, 2007) Users of social networking sites are content publishers, as such the site must take actions based on legal and ethical standards and must notify users of these standards so they are known by all. As providers of content the site must conform to the laws regarding truth or be held responsible for legal issues as defamation (making harmful false statements about someone else) or copyright infringement. (Goldman, 2007) Reference: Goldman, E. (2007, May). Social Networking Sites and the Law. Retrieved from http://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf
University of Cumberland Week 5 Bitcoin and Business Discussion
Journal Week 5 - Bitcoin and BusinessThis week’s reading introduced an overview of blockchain and its impact on business ...
University of Cumberland Week 5 Bitcoin and Business Discussion
Journal Week 5 - Bitcoin and BusinessThis week’s reading introduced an overview of blockchain and its impact on business. What impact could implementing a blockchain solution at your organization have? Think of ways that using blockchain could affect your role. Would anything change? Is there any aspect of your role that would be better with blockchain? Or perhaps implementing blockchain would make something more difficult. Would you welcome those changes? Discuss your thoughts.
Similar Content
Oakland Community College Week 3 TechTarget Network Website Discussion
Find a website or article that offers accurate, relevant, and useful information referencing this week's(Excel) focu...
Outsourcing Challenges in IT Discussion
IPrior to beginning work on this assignment, read Chapters 3, 7, and 9 in the Eiras and Scott (2010) Practical CIO: A Comm...
IT 243 SEU Difference Between Waterfall SDLC and Agile Methodologies Questions
College of Computing and Informatics
System Analysis and Design
IT243
Assignment # 1
Deadline: Monday 18/07/2022 @ 23:59...
Networking Class U2IP
Given this scenario:ScenarioA former dot com company, Verbania, Inc., shut down in 2001 because of the Internet bubble bur...
New England College Pepsi Branding Discussion
This activity/assignment will help students understand the concept of brands and its importanceActivity: Identify a compan...
Databases Question
College of Computing and Informatics
Assignment 1
Deadline: Sunday 18/09/2022 @ 23:59
[Total Mark for this Assignment is ...
Innovation.edited 2
In the entrepreneurship world, there is a constant demand for new and better goods. This brings about the need for innovat...
New Distributed Network Storage
The name itself is self explanatory, it is disk subsystem which is a part of host computer and is It provides the host exc...
Section 2 Management Plan.edited
IT Governance and Strategy are very crucial for the success of a Venture. The senior managers at Vision Company must apply...
Related Tags
Book Guides
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
Northern Virginia Community Networking Local Area Networks & Security Research
Ava’s company is in the process of designing and building one new local area network to support the newly expanded branc ...
Northern Virginia Community Networking Local Area Networks & Security Research
Ava’s company is in the process of designing and building one new local area network to support the newly expanded branch which is dedicated to provide bookkeeping services. All transactions and data records must be kept confidentially.A list of networking devices has been sent to you for your approval. This list includes 3 types of networking devices: hub, switch, and router.You are asked to either approve or disapprove each of these 3 types networking devices.For every type of networking device that you disapprove, you must provide at least one reason to support your decision.You do not need to provide any reason for the device that you approve.You need to fully understand the requirements. You also need to read and understand the “Hint” part of this assignment. If you did not, your solution is anticipated to be incorrect.HINT: All networking devices are subject to security vulnerability and risks. If a device can satisfy the requirements, it cannot be disapproved, regardless its capability, performance, intelligence, or cost. You are NOT asked to provide definitions nor capabilities of these devices, because you are required to fully understand these devices; otherwise, your decision cannot be right. You are NOT asked to make a selection or recommendation, because making a selection or recommendation concerns the cost. There is no mention of “cost” in the requirements. There is no mention of “performance” nor “traffic” in the requirements. If your solution talks about performance or efficiency, your solution is incorrect. No partial credits can be awarded. Why? If you made incorrect decisions, the new network will FAIL to satisfy the business and will put the business at risks. You may be asked to pay back the business loss. You will be fired. Yet, you would still ask for partial credits??!! A reason is a fact and is not an opinion. For example, “….not flexible…”, “…poor performance…”, “…more expensive….” are opinions.THERE IS ONLY ONE CORRECT SOLUTION Your solution is incorrect, if:o You disapproved a device for an incorrect reason.o You approved a device that will put Ava’s business at risks – You did not fully understand the device that you approved or you did not fully understand Ava’s business requirements.o You disapproved a device without providing your reason(s).o You included at least one incorrect statement in your solution; for example, 1 day has 36 hours or Internet is the same as World Wide Web.
Hashing Algorithms
Discussion topic you may see within the computer forensics (CF) industry is over what hashing algorithm is adequate and/or ...
Hashing Algorithms
Discussion topic you may see within the computer forensics (CF) industry is over what hashing algorithm is adequate and/or appropriate for CF purposes. This discussion has been going on for years as different algorithms have become the standard, however, this became quite heated a few years ago when researchers generated an MD5 collision, where they created 2 files that were not identical that generated the same MD5 hash value, created rogue CA certificates, and other collision issues.See: http://www.win.tue.nl/hashclash/rogue-ca/ and https://ad-pdf.s3.amazonaws.com/papers/wp.MD5_Collisions.en_us.pdf, among many others.You will find many other similar discussions/debates online about this topic. More recently, NIST released the new SHA-3 Cryptographic Hash Standard. https://www.nist.gov/news-events/news/2015/08/nist...What are your thoughts on algorithms for CF? Do you think one is more appropriate than others for CF purpose and why? Before you answer, keep in mind a few things: The longer the algorithm/hash value, the longer it takes your CF tools to generate the hash values…and in the field, time is a critical consideration. Does the fact that there are known collisions offset the fact that there is a 1 in 2^128 (3.402 x 10^38 or 340 billion billion billion billion) possible chances of a MD5 collision, and how does that compare to DNA validation statistics? Keep in mind that no matter what algorithm you choose, there is always a finite number of possible hash values but an infinite number of possible inputs…so there will ALWAYS be the possibility of collision. Does it matter that there are already millions of MD5 hash values in databases of known files, or should we regenerate them using SHA-1 or SHA-256 or other algorithm?
ITS 415 CSUGC Cyber Terrorism & Cyber Espionage Countermeasures Discussion
Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment ch ...
ITS 415 CSUGC Cyber Terrorism & Cyber Espionage Countermeasures Discussion
Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment choice in the title of your submission.Option #1: Cyber EspionageCyber espionage is term used to illicit access to confidential information. Spying or deploying malware to steal or destroy data within a computer network. This can apply to a government agencies or enterprise.Describe corporate espionageDefine at least three ways to prevent itYour paper should meet the following requirements:Be 2-3 pages in length, not including the cover page and reference page.Follow the CSU Global Writing Center (Links to an external site.). Each paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusion.Support your answers with the readings from Module 4 and at least one scholarly journal article. The CSU Global Library (Links to an external site.) is a great place to find resources.Be clearly and well written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style, start with Tools for Effective Writing at the CSU Global Library (Links to an external site.), accessible from the Library's homepage.Option #2: Cyber TerrorismIn a well-written paper, write a response to one of the following questions:Is cyber terrorism a serious threat? Is the United States making adequate preparations against cyberterrorism?In recent years, several cyber-attacks supported by national governments are believed to have taken place. Have these attacks generally achieved their goals? Were the governments wise to launch the attacks?Your paper should meet the following requirements:Be 2-3 pages in length, not including the cover page and reference page.Follow the CSU Global Writing Center (Links to an external site.). Each paper should include an introduction, a body with at least two fully developed paragraphs, and a conclusion.Support your answers with the readings from Module 4 and at least one scholarly journal article. The CSU Global Library (Links to an external site.) is a great place to find resources.Be clearly and well written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. If you need assistance with your writing style, start with Tools for Effective Writing at the CSU Global Library (Links to an external site.), accessible from the Library's homepage.
discussion data mining 3
Weekly Post topics:Answer anyone one main question… 1. Many partitional clustering algorithms that automatically de ...
discussion data mining 3
Weekly Post topics:Answer anyone one main question… 1. Many partitional clustering algorithms that automatically determine the number of clusters claim that this is an advantage. List two situations in which this is not the case.OrConsider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?Or3) You are given two sets of 100 points that fall within the unit square. One set of points is arranged so that the points are uniformly spaced. The other set of points is generated from a uniform distribution over the unit square.Is there a difference between the two sets of points?If so, which set of points will typically have a smaller SSE for K=10 clusters? The random set of points will have a lower SSE.What will be the behavior of DBSCAN on the uniform data set? The random data set?
a matrix mapping of a key IT-related organizational
Week Three Assignment Paper B1 Paper B1: a matrix mapping of a key IT-related organizational ...
a matrix mapping of a key IT-related organizational
Week Three Assignment Paper B1 Paper B1: a matrix mapping of a key IT-related organizational (or personal) ethical issue concerning privacy. This assignment gives you an opportunity to analyze a key IT-related organizational (or personal, if not in the job force) ethical issue, related to privacy subject to relevant laws, regulations, and policies. Both of the following sites provide sources, and an excellent backdrop for issues relating to privacy protection and the law. See EPIC Privacy Issues at: http://epic.org/privacy/ See List on left and/or: EFF Privacy at https://www.eff.org/issues/privacy [see list in center on this page]. This includes sub-topics discussing information privacy, privacy laws, applications and court rulings (case law is usually an extension of the basic law based on the facts from specific cases and real-world court decisions), and key privacy and anonymity issues. While the sites provide many interesting topics, be sure to focus on our class IT topics. Use the template below and the list of suggested workforce privacy topics from one of the sites above to produce a matrix to map a key organizational ethical (or personal, if not in the job force) issue and how this issue is affected by laws, regulations, and policies. Use the list of normative ethics principles below to help you complete the matrix. Choose any three (only three) of the following list of twelve (12) principles of normative ethics described below.Prepare the Ethical Issue matrix and include the following explanation (200 words) —double-space your narrative—below the matrix: Why I chose the dilemma;Why I chose the three principles; andAn analysis of the research used to identify the actions in the matrix. The completed matrix allows you to weigh the different issues involved and assign a rank as to the importance of the actions based on the effect on the stakeholders. Submit the matrix for grading to the LEO Assignments Module.Indicate appropriate APA in-text and source citations for all sources. In addition to critical thinking and analysis skills, your assignment should reflect appropriate grammar and spelling, good organization, and proper business-writing style. This assignment is directly related to Paper-B2. The ethical issue identified in this assignment will be used in your Paper B2 Assignment. Paper B2 asks you to write a policy that corrects the ethical issue described in Paper B1. Normative Ethics List Autonomy: is the duty to maximize the individual's right to make his or her own decisions. Beneficence: is the duty to do good both individually and for all. Confidentiality: is the duty to respect privacy of information and action. Equality: is the duty to view all people as moral equals. Finality: is the duty to take action that may override the demands of law, religion, and social customs. Justice: is the duty to treat all fairly, distributing the risks and benefits equally. Non-maleficence: is the duty to cause no harm, both individually and for all. Understanding/Tolerance: is the duty to understand and to accept another viewpoint if reason dictates doing so is warranted. Publicity: is the duty to take actions based on ethical standards that must be known and recognized by all who are involved. Respect for persons: is the duty to honor others, their rights, and their responsibilities. Showing respect others implies that we do not treat them as a mere means to our end. Universality: is the duty to take actions that hold for everyone, regardless of time, place, or people involved. This concept is similar to the Categorical Imperative. Veracity: is the duty to tell the truth. A sample template for the matrix is shown below. To reconstruct the sample template, you may use the Table Tool in MS Word or copy and paste this template. Ethical issue: Stakeholders (Principle 1) (Principle 2) (Principle 3) 1 2 3 4 Step 1: Identify the ethical issue that you want to analyze, as described above. An example might be the falsification of your personal profile in a social networking site. Step 2: Identify the stakeholders involved. You, someone who reads your personal profile in a social network site, potential employers, etc. Be sure that each stakeholder category is unique and not similar to another category you use. Step 3: Choose any three (only three) of the principles that might apply to your issue such as autonomy, publicity, and veracity. Step 4: identify how the ethical issue affects each stakeholder based on the principles you identified. Put this statement in the matrix next to the stakeholder. Sample Completed Matrix Ethical issue: falsifying your profile on a social networking site Stakeholders autonomy publicity veracity 1: Yourself You have the duty to maximize the right to make your own decisions. You have the duty to take actions based on ethical standards that must be known and recognized by all who are involved. You have the duty to tell the truth 2: Other users of the networking site They have the duty to make their own decisions They make these decisions based on ethical standards that should be recognized by the person falsifying their profile They assume that the person falsifying the profile has the duty to tell the truth. 3: The social networking site The autonomy of the site is limited by law (Goldman, 2007) Users of social networking sites are content publishers, as such the site must take actions based on legal and ethical standards and must notify users of these standards so they are known by all. As providers of content the site must conform to the laws regarding truth or be held responsible for legal issues as defamation (making harmful false statements about someone else) or copyright infringement. (Goldman, 2007) Reference: Goldman, E. (2007, May). Social Networking Sites and the Law. Retrieved from http://www.ericgoldman.org/Resources/socialnetworkingsitesandthelaw.pdf
University of Cumberland Week 5 Bitcoin and Business Discussion
Journal Week 5 - Bitcoin and BusinessThis week’s reading introduced an overview of blockchain and its impact on business ...
University of Cumberland Week 5 Bitcoin and Business Discussion
Journal Week 5 - Bitcoin and BusinessThis week’s reading introduced an overview of blockchain and its impact on business. What impact could implementing a blockchain solution at your organization have? Think of ways that using blockchain could affect your role. Would anything change? Is there any aspect of your role that would be better with blockchain? Or perhaps implementing blockchain would make something more difficult. Would you welcome those changes? Discuss your thoughts.
Earn money selling
your Study Documents