Excel homework

Need help with my excel homework, just follow the below step and finish it.

1 Start Excel. Download and open the file named Exp19_Excel_Ch03_CapAssessment_Movies.xlsx. Grader has automatically added your last name to the beginning of the filename.

2 You want to create a pie chart to show the percentage each category contributes to the monthly movie downloads.

Select the ranges A5:A10 and F5:F10. Create a pie chart and move it to a chart sheet named April Pie Chart.

3 The chart needs a descriptive title that is easy to read.

Type April 2021 Downloads by Genre as the chart title, apply bold, 18 pt font size, and Black, Text 1 font color.

4 Percentage and category data labels will provide identification information for the pie chart.

Add category and percentage data labels in the Inside End position. Remove value data labels and the legend. Apply 14 pt font size and Black, Text 1 font color.

5 You want to focus on the comedy movies by exploding it and changing its fill color.

Explode the Comedy slice by 7% and apply Dark Red fill color.

6 A best practice is to include Alt Text for accessibility compliance.

Add Alt Text: The pie chart shows percentage of downloads by genre for April 2021. (including the period)

7 Next you want to create a combo chart to depict the monthly totals and percentages by category.

Display the Data sheet, select the ranges A4:A10 and F4:G10, and then create a Clustered Column – Line on Secondary Axis combo chart.

8 You want to position the chart below the data source.

Cut the chart and paste it in cell A13. Change the height to 3.5″ and the width to 6″.

9 Change the combo chart title to April 2021 Downloads. Apply Black, Text 1 font color to the chart title.

10 Axis titles will help distinguish the number and percentage of downloads.

Add a primary value axis title and type Number of Downloads. Add a secondary value axis title and type Percentage of Monthly Downloads. Apply Black, Text 1 font color to both value axis titles.

11 Now that you added an axis title for each vertical axis, you can remove the legend and format the secondary value axis to display whole percentages.

Remove the legend for the combo chart. Display 0 decimal places for the secondary value axis.

12 You want to add some color to the plot area for the combo chart.

Apply Light Gradient – Accent 1 gradient fill color for the plot area.

13 A best practice is to include Alt Text for accessibility compliance.

Add Alt Text: The combo chart shows the number and percentage of downloads by genre for April 2021. (including the period).

14 To provide a visual summary of the weekly totals for each genre, you will insert sparklines. 

Select the range B5:E11. Insert Line Sparklines in the range H5:H11. Apply Black, Sparkline Style Dark #4

15 Displaying the markers helps identify the specific points on the sparklines. You will also change the high point to a different color to stand out.

Show the high point and markers for the sparklines. Change the high point marker color to Red.

16 Your last major task is to create a bar chart for weekly downloads.

Select the range A4:E10. Create a stacked bar chart. Move the chart to new chart sheet. Type Weekly Downloads for the sheet name. Apply Style 8 chart style.

17 Add a chart title above the bar chart and type April 2021 Weekly Downloads by Genre.

18 Increasing the font size will make the chart elements easier to read.

Apply 11 pt font size to the category axis, value axis, and the legend for the bar chart.

19 Because the largest value is less than 9,000, you can reduce the maximum bound in the chart. In addition, you want to display the category labels in the same order that they are in the worksheet.

Change the maximum bounds for the value axis to 9000 and set the Major Units to 500 for the bar chart. Use the Axis Options to format the category axis so that the category labels are in reverse order in the bar chart.

20 Although the bar chart displays major gridlines, minor gridlines could improve the appearance.

Add primary minor vertical gridlines to the bar chart.

21 A best practice is to include Alt Text for accessibility compliance for the bar chart.

Add Alt Text: The stacked bar chart shows downloads by each week for each genre. (including the period).

22 Insert a footer with Exploring Series on the left, the sheet name code in the center, and the file name code on the right on all the sheets. Change to Normal view.

23 Save and close Exp19_Excel_Ch03_CapAssessment_Movies.xlsx. Exit Excel. Submit the file as directed.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Risk Management Plan Outline and Research

This project is divided into several parts, each with a deliverable. The first four parts are drafts. These documents should resemble business reports in that they are organized by headings, include source citations (if any), be readable, and be free from typos and grammatical errors. However, they are not final, polished reports. Please see the attached requirements.

Project Part 1: Risk Management Plan Outline and Research

For the first part of the assigned project, you will create a partial draft of the risk management plan. To do so, follow these steps:

  1. Research risk management plans.
  2. Create an outline for a basic risk management plan with anticipated section headings (as indicated in this numbered list). This plan will include a qualitative risk assessment, which is addressed later in the project.
  3. Write an introduction to the plan by explaining its purpose and importance.
  4. Define the scope and boundaries of the plan.
  5. Research and summarize compliance laws and regulations that pertain to the organization. Keep track of sources you use for citation purposes.
  6. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.
  7. Develop a proposed schedule for the risk management planning process.
  8. Create a draft risk management plan detailing the information above. Format the plan similar to a professional business report and cite any sources you used.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 4

1. What is CIGAR string? How is it generated and where will you find it?

2. What is BAI file and how is it made? Be specific?

3. Compare and contrast FASTA and FASTQ files

4. What is the relationship between SAM,BAM, and BAI? how is each of these generated? What information do they contain and why are they useful?

5. Using pseudocode, describe an algorithm that searches for all instances of ATC in a given sequence. What do you think the BigO will be for this algorithm and why?

APA format 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Stage3

For this assignment you will prepare the third part of your report in which you will identify key stakeholder expectations for the new technology solution and develop a set of requirements.

This section should not exceed four double-spaced pages and must include at least two references. Prior to beginning this assignment, be sure you have read all of the materials, completed the quizzes, participated in the discussions provided in Weeks 5 and 6, and completed the Stage 1 and Stage 2 Assignments. They will prepare you to be successful in writing your paper. Be sure to read and follow the assignment instructions carefully, and refer to the Week 5 reading, Developing Requirements for an IT System.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Riskmanagement6

  

1. Using the components of risk assessment documentation presented in the chapter, draft a tentative risk assessment of a lab, department, or office at your university. Outline the critical risks you found and discuss them with your class.

2. Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the text. Remember to work from right to left, with the pattern 1 > 3, 2 > 6, 3 > 8, 4 > 1, 5 > 4, 6 > 7, 7 > 5, 8 > 2 where 1 is the rightmost of the eight cells. Input the text ABCDEFGH as single characters into the first row of cells. What is displayed?

3. Go to the Web site of VeriSign, one of the market leaders in digital certificates. Determine whether VeriSign serves as a registration authority, certificate authority, or both. Download its free guide to PKI and summarize VeriSign’s services.

4. Go to csrc.nist.gov and locate “Federal Information Processing Standard (FIPS) 197.” What encryption standard does this address use? Examine the contents of this publication and describe the algorithm discussed. How strong is it? How does it encrypt plaintext?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Capstone Project: Literature Review Assignment

  PLEASE DONT USE PLAGARISM

Capstone Project: Literature Review Assignment Instructions

Overview

Title – Ultihub a new design of a hybrid Cloud architecture using key cloud technologies and Shared Security Responsibility Model, DevOps, and Zero Trust Architecture Using AI Based Techniques

The objective of the final capstone thesis project is to evaluate you on your ability to apply the program learning outcomes to a final, all-encompassing information systems (IS) or information technology (IT) thesis project. Successful capstones will follow an objective research methodology to collect or generate data that informs the analysis and design of a new computing system related to the primary domains identified by the Association for Computing Machinery (ACM): cloud architecture and/or computing, cybersecurity systems, databases and/or data analytics systems, enterprise architecture, information systems, integrated systems, internet of things systems, networks, platform systems, software development, user interfaces, virtual systems, and/or web and mobile applications.

You will have 3 separate Thesis Capstone projects to complete but for now just complete Phase 1

Subject Title for Capstone is Ultihub – a new design of a hybrid Cloud Architecture

Phase 1 – Capstone Project: Literature Review Assignment

Phase 2 – Capstone Project: Methods Assignment

Phase 3 – Capstone Project: Final Results Assignment

NOTE: Phase 2 and Phase 3 will be on my next assignment

Instructions

Phase I of the project consists of the following main headings at the minimum: 

Introduction,  375 words & 5 ref  Combined with Conclusions

Problem Statement,  250 words & 5 ref  Combined with Research questions

Research Question(s), with  

Literature Review, 1500 words 7 ref …….

Literature Review Findings and Gaps 400 words 2 ref

Conclusion

References and appendixes are also necessary. 

2500 words total & 20 ref total 

A primary goal is to develop new knowledge and contribute this knowledge to the computing field. A subsequent goal is to work toward a Master’s thesis that could one day be published in a respectable industry or academic publication to share this new knowledge with others.

The capstone project will be based upon a feasible gap and problem in scholarly literature that can be addressed in the timeframe of the capstone course. You must be familiar enough with the problem that you are able to perform a comprehensive research design and novel prototype design to solve the problem. Thus, it should be a specific computing domain where you consider yourself to have the most expertise. You must also have access to the applications, servers, systems, networks, and/or data necessary for data collection, programming, design prototyping, and/or configuration.

The outcome of the research should contribute to a new artifact and/or statistical result. It should not be based upon and/or replicate in any form an existing contribution in industry or literature. It also should not repeat well known solutions. For example, designing a new enterprise resource planning (ERP) module for finance is not an acceptable project given thousands of these ERP modules already exist. Examples of new contributions in the final rubric accepted include either new code as an artifact and testing this in some form or a statistical analysis:

· New code/script/or configuration

o New application and/or software and testing its performance, security, etc

o Development of a new algorithm, database, protocol, etc and testing its efficiency, memory usage, security, etc

o Programming a new network, security, storage, and/or system script that solves an original problem and testing its level of automation, performance, etc

· Statistical analysis

o Note, please assure you understand Institutional Review Board (IRB) requirements if performing this type of capstone

o Statistical analysis using descriptive, correlational, quasi-experimental and/or experimental designs

o Big data analytics and/or predictive analytics using clustering, classification, and/or regression trees

How do you know your thesis problem is novel and original? By performing a comprehensive literature review and investigating what exists in related industry! 

Within the capstone, a comprehensive literature review of related and relevant concepts, theories, and research results should exist.  This involves study of relevant articles pertaining to the research question within top ranked peer reviewed information systems and/or IT journals. Thorough review and comprehension of this research will lead to the identification of gaps in the literature that exist and/or future recommendations, which require further research efforts and contributions to advance the topical area of study. The research question(s) is supported by the associated gaps found in literature, indicating a solution is needed to a problem that does not yet have a solution.

A research question that is too wide in scope will overwhelm your efforts. Yet, a research question that is too narrow will not meet the minimum requirements and quality expected of a Master’s capstone project. The research question is your anchor and guide. It provides a clear objective of what your Master’s thesis project will accomplish. 

Refer to the grading rubric in order to ensure successful completion of the capstone. The minimum proposal in Phase I will include:

I. Cover Page, Table of Contents, References, and Appendixes

a. Cover page includes your title/position and “in partial completion of an MSIS”

b. Appendixes will include screenshots of all diagrams and benchmark data

II. Research from optimal and relevant journal articles

a. Each section of the capstone must be well supported with scholarly peer reviewed journal articles

b. Although they do not count toward the minimum journal articles, industry whitepapers are also often relevant to elements like the prototype design as they provide best practices for the new software or system

c. Top ranked journals can be searched through the university library by going to electronic databases.

d. Not all journals are equal or relevant to the capstone. Journal articles that identify well-supported gaps in research are often performing new research. These articles will include testing new theory, hypotheses, and/or frameworks with a parallel research design that collects data for the test. Because they are generating new information, they are great sources to find areas where new research is needed. Journal articles that perform Meta studies or large literature reviews can also be helpful in identifying where new research is necessary.

e. Whereas scholarly journal articles often focus on theory that is not yet implemented in industry, industry whitepapers will assist with elements like standards and frameworks helpful in guiding the design of new systems. Both have their place in the capstone as a result but for different reasons.

III. Introduction & Conclusion

a. An introduction and conclusion of the primary objectives and outcomes of the master’s thesis project is necessary.

b. The introduction provides the roadmap for the capstone.

c. The conclusion is the last section of the project and provides a comprehensive overview of how the study was preformed and the primary outcomes of the results.

i. This also involves synthesizing and analyzing existing results in the domain of knowledge that the project has contributed.

IV. Statement of the Problem

a. Must be in one of the ACM domains identified for software or a system

b. What is an information systems or IT problem that needs resolution?

i. An unmet IT problem is succinctly and accurately defined.

ii. It is supported by a gap in scholarly literature not previously addressed.

c. The problem can feasibly be addressed in the timeframe of this course.

d. Sufficient data can be collected or generated to address the problem.

V. Research Questions (RQs)

a. Between 1–2 research questions must be given that detail what your thesis will achieve.

b. The research question(s) must:

i. Address all capstone objectives.

ii. Test new programming code/scripting/system configurations and/or perform some type of statistical analysis through data generation or collection.

iii. Solve a problem without an existing solution per a gap in literature.

iv. Include a minimum of one measure.

v. Include a population/sample.

vi. Include the ability to address reliability and validity of the results.

vii. Have accessible data or metrics to test the RQ measure such as a log file with comparable metrics (e.g. memory usage) or a public data set.

c. RQ Example

i. Is there a difference in the CPU performance (measurement) between an ICT-based KMS feature programmed using the XYZ framework (prototype or new artifact you create/code) and an ICT-based KMS feature programmed using the ABC framework in a Southeastern U.S. College (sample).

ii. New code will be developed for an ICT-based KMS feature that has not already been programmed (new prototype or artifact).

iii. The new software can then be benchmarked against framework ABC and XYZ (hypothetical frameworks).

iv. A measure exists with data that can be collected, CPU performance from a monitoring tool that is monitoring both applications in use (e.g. automated simulations of the software instead of actual users is acceptable for testing). The CPU measure can determine which framework results in a faster system. 

v. Reliability and validity is possible. The test can be run on the exact same system, in the same environment, with the same benchmarks.

vi. A sample exists, a Southeastern U.S. College, where the CPU performance data will be collected during the automated simulations on the new code created by the student.

VI. Literature Review

a. Review of related literature in one of the ACM domains defined.

b. What literature attempts to resolve your problem and research question(s)?

c. Within relevant literature, how does it address the following:

i. What has literature not resolved in regards to your defined problem?

ii. What are the primary research problems, questions, and hypotheses in these relevant articles?

iii. How does this relate to other relevant articles and your research problem?

iv. What was the population and sample? 

v. What research methods were used?

vi. What were the results of the research?

vii. What were the limitations? 

viii. What were the recommendations for future research?

d. Peer reviewed research must lead to an appropriate IT solution that has not yet been solved.

e. This should be exhaustive in the specific domain you are studying. 

i. If it is going to be too lengthy, it is likely that your defined problem and/or research question(s) are not sufficiently narrow. 

ii. If there are not sufficient articles to review in the specific domain you are studying it is very likely that your problem statement and/or research question(s) are not feasible. 

iii. If either is the case, you need to revise your problem statement and research question(s).

VII. Literature review findings and gaps

a. What were the primary findings from the literature review?

b. What gaps existed in the literatures that have not been solved by prior research?

c. How will the author address these gaps in the literature?

i. Performing a sufficient review of literature on your specific master’s project topic should identify where gaps in literature exist which need resolution, the literature must justify a feasible problem statement and the development of an appropriate research question(s).

ii. The master’s thesis project should solve an IT problem that does not already have a solution in industry or existing research.

iii. The exhaustiveness of the literature review is therefore critical and will determine whether an appropriate and feasible problem exists to solve.

The assignment submission must have over 4,000 original and unique words of original student authorship that directly relate to a feasible IT problem and research question and balanced properly between the required sections that show excellent mastery and knowledge of the content and be written in compliance with the current APA format. The student must utilize the support from over 20 unique scholarly peer-reviewed journal articles from well-respected and top ranked IT journals that directly relate to a feasible IT problem and research question with at least 5 being published in the last 3 years.

Note: Your assignment will be checked for originality via Turnitin plagiarism tool.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Python program: Prediction with Logistic Regression

 

The file Invistico_Airline_LR.csv contains information from an airline using the alias Invistico Airline on customer satisfaction, as well as details on each customer. The columns of interest are Gender, Age, Class, Arrival_Delay_in_Minutes, and satisfaction.

  • Read the file Invistico_Airline_LR.csv into a data frame.
  • Obtain user defined values female, age, economy, and delay.
  • Re-code the categorical variables Gender, Class, and satisfaction into dummy variables.
  • Create a new data frame X from the predictor variables Gender_female, Age, Class_Eco, and Arrival_Delay_in_Minutes, in that order.
  • Create a response variable Y from the dummy variable satisfaction_satisfied.
  • Perform logistic regression on X and Y.
  • Use the user defined values to predict the probability that a customer with those values is satisfied.

Ex: If the input is 1 34 0 10 the ouput is:

[0.62343979]

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

osint

 

You will develop a short 1300 word document.

Task: Describe how OSINT can be used to supplement your organizational collection plan, identify 10 sites that can be used to research sites/domains for:

  1. legitimacy
  2. sender verification
  3. list of domains (country codes/domains/extensions, organization domains, other IOC (indicators of compromise) that might need to be researched)

 https://github.com/dthroner/Hacking/blob/master/Google%20Hacking%20For%20Penetration%20Testers-Syngress%20(2015).pdf 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Comprehensive Cloud Plan

 

The plan is for your client, a federal government agency, which is preparing for a Microsoft Azure cloud pilot. The Comprehensive Cloud Plan is the first of a two-part assignment for your client’s CIO. The plan should be submitted in a Word document. The Comprehensive Cloud Plan should be eight to 10 pages, including cover page, images or tables, and references.

Your plan should include the following information for the CIO:

  • an executive summary to describe the requirements
  • at least three benefits of using Azure
  • a detailed explanation of the Azure cloud types and deployment models
  • definition of common Azure terms: tenants, management groups, subscriptions, resource groups, and resources 
  • the significance of FedRAMP 
  • the Azure governance model

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CYBERLAWS & ETHICAL HACKING

Task : Analyze the ethics of network sniffing and the practicality of encrypting all network traffic.
Assignment Requirements:

Network sniffing is the act of observing communications on the network in either a passive or an active mode. With sniffing, you can see what is being transmitted unprotected on the network and potentially intercept sensitive information. Attackers use sniffers to compromise the confidentiality of data as it flows across a network.

Answer the following question(s):

  1. 1. In a university environment, what ethical concerns might exist for administrators when sniffing traffic?
  2. 2. Should you encrypt all network traffic to protect against unauthorized network sniffing? Why or why not?

Fully address the question(s) in this task; provide valid rationale for your choices, where applicable.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now