Computer Science homework help

New Perspectives Excel 365/2021 | Module 10: SAM Project 1b

Corvallis Group Restore

ANALYZE DATA WITH POWER TOOLS

GETTING STARTED

  • Save the file NP_EX365_2021_10b_FirstLastNamexlsx as NP_EX365_2021_10b_FirstLastName_2.xlsx
    • Edit the file name by changing “1” to “2”.
    • If you do not see the .xlsx file extension, do not type it. The file extension will be added for you automatically.Computer Science homework help
  • To complete this Project, you will also need the following files:
    • csv
    • accdb
  • With the file NP_EX365_2021_10b_FirstLastNamexlsx open, ensure that your first and last name is displayed in cell B6 of the Documentation worksheet.
    • If cell B6 does not display your name, delete the file and download a new copy.
  • To complete this project, you need to add the Power Pivot tab to the ribbon as follows:
    • From the File tab, click the Options button. In the Data Options section of the Data tab, click the checkbox next to Enable Data Analysis add-ins: Power Pivot, Power View and 3D Map, and click OK.

ORDER A PLAGIARISM – FREE PAPER NOW

PROJECT STEPS

  1. Lucia Campos and three friends own a small business called Corvallis Group Restore, an upcycling business in Corvallis, Oregon, that sells useful and attractive products made from old or discarded materials. Lucia asks for your help in producing a sales report. She wants to analyze sales for the past year and project future sales. To create the report, you need to import data from various sources and use the Excel Power tools.Computer Science homework help
    Go to the Sales History worksheet, where Lucia wants to display a summary of the company’s annual sales since the business started in the year 2011. She has a text file that already contains this data.
    Use Power Query to create a query and load data from a CSV file into a new table as follows:

    1. Create a new query that imports data from the csv text file.
    2. Edit the query to remove the Items Sold and Notes columns.
    3. Close and load the query data to a table in cell B2 of the existing worksheet.
  2. Go to the Monthly Sales worksheet, which lists the sales per month for the previous year in a table and compares the sales in a chart. Lucia imported this data from the Orders table in an Access database. She wants to track the changes in monthly sales and project the first six months of this year’s sales.
    Create a forecast sheet as follows to provide the data Lucia requests:

    1. Based on the data in the range B2:C14, create a forecast sheet.
    2. Use 6/30/2025 as the Forecast End date to forecast the next six months.
    3. Use Jan to June Forecast as the name of the new sheet.
    4. Resize and move the forecast chart so that the upper-left corner is within cell C2 and the lower-right corner is within cell E13.

      ORDER A PLAGIARISM – FREE PAPER NOW

  3. Go to the Material Lucia wants to display information about products sold according to location and material. She has been tracking this data in an Access database. Import the data from the Access database as follows:

    1. Create a new query that imports data from the accdb database.
    2. Select the 2024_Orders, Products, and Sales tables for the import.
    3. Only create a connection to the data and add the data to the Data Model.

      On the Material worksheet, Lucia wants to show the material of the products sold in each of the company’s five locations during 2024.

    4. In cell B2 of the Material worksheet, use Power Pivot to insert a PivotTable based on the data in the 2024_Orders table.Computer Science homework help
  4. Edit the PivotTable as follows to provide this information for Lucia:
    1. Use the following fields from the 2024_Orders table in the PivotTable:
      Material field for the row headings
      · SiteCity field for the column headings
      · ItemQty field for the values
    2. Use Products Sold as the custom name of the Sum of ItemQty field.
    3. In cell B3, use Product Material to replace “Row Labels”, and then resize column B to its best fit.
    4. In cell C2, use Locations to replace “Column Labels”.
  5. Lucia occasionally would like to focus on the number of products sold in the five locations per month.
    Add a Timeline Slicer as follows to the Material worksheet:

    1. Insert a Timeline Slicer that uses the OrderDate field from the 2024_Orders table.
    2. Move and resize the Timeline Slicer so that it covers the range B12:H19.
    3. Scroll the Timeline Slicer to display all periods.
  6. Lucia also wants to examine the percentage each type of product contributed to total sales in each location. Create a PivotChart as follows:
    1. Based on the PivotTable on the Material worksheet, create a 100% Stacked Column
    2. Move and resize the PivotChart so that its upper-left corner is in cell I2 and its lower-right corner is in cell N17.
  7. Go to the Product Types Lucia wants to compare products sold by category and vendor. This data is stored in the Sales and Products tables. Create a PivotTable as follows that provides the products sold by manufacturer information for Lucia:
    1. In cell B2, use Power Pivot to insert a PivotTable in the Product Types
    2. Use the following fields in the PivotTable:
      Vendor field from the Products table for the row headings
      · Category field from the Products table for the column headings
      · ItemQty field from the Sales table for the values
  8. In order to relate the data in the Products and Sales tables to make a proper comparison, use the Power Pivot window to create a relationship between the Sales and Products tables based on the ProductID
  9. Lucia asks for another way to visualize the products sold by vendor. Create a PivotChart as follows:
    1. Based on the PivotTable on the Product Types worksheet, create a Stacked Bar
    2. Move and resize the PivotChart so that its upper-left corner is within cell B24 and its lower-right corner is within cell I38.
    3. Hide all the field buttons in the PivotChart.
  10. Lucia also wants to be able to focus on a single category of product at a time.
    Add a slicer to the PivotChart as follows:

    1. Add a slicer based on the Category field from the Products table.
    2. Move the slicer below the PivotChart so that it covers the range J24:L37.
    3. Use the slicer to filter the PivotTable and PivotChart to show only products in the Housewares category.

Your workbook should look like the Final Figures on the following pages. Save your changes, close the workbook, and then exit Excel. Follow the directions on the website to submit your completed project.Computer Science homework help

Final Figure 1: Sales History

Final Figure 2: Jan to June Forecast Worksheet

Final Figure 3: Monthly Sales Worksheet

Final Figure 4: Material Worksheet

Final Figure 5: Product Types WorksheetComputer Science homework help

 

 

Computer Science homework help

You will complete a 7- to 10-slide PowerPoint® presentation that explains what are considered professional and unprofessional attire and behaviors for your chosen career. The presentation will also include information regarding best practices for other factors related to physical appearance and behaviors (hairstyles, tattoos, accessories, jewelry, piercings, communication, attitude, etc.). The presentation will demonstrate the importance of managing your professional image for career success. It will cover specific practices regarded as essential for professionals in your career. Computer Science homework help

ORDER A PLAGIARISM – FREE PAPER NOW

The PowerPoint presentation must include:

  • A title slide that includes the chosen career, your name, and class/section number
  • 5-8 content slides that include:
    • Explanations of 50–100 words in the speaker notes section for all slides
    • In-text citations, in the current APA format, located in the speaker notes for all slides
    • Two examples (including two images) of unprofessional attire and reasoning as to why they are unprofessional in your chosen career
    • Two examples (including two images) of professional attire and reasoning as to the importance of maintaining professional attire in your chosen career
    • Two examples (including two images) of unprofessional behaviors and reasoning as to why they are unprofessional in your chosen career
    • Two examples (including two images) of professional behaviors and reasoning as to the importance of maintaining professional behaviors in your chosen career
    • Two examples (including two images) of best practices for other factors related to appearance and behaviors (such as hairstyles, tattoos, accessories, jewelry, piercings, communication, attitude, etc.) and reasoning as to why they should be best practices in your chosen career
  • A reference slide with 2–3 references (not including images) in APA format. Computer Science homework help

Communication Security Protocols Computer Science homework help

Communication Security Protocols Computer Science homework help

For this week’s discussion, consider the following prompts:

A cipher can be created by using a keyword. For example, if we choose “statistic” as our keyword, our cipher would be determined as follows:

Method I. Write the word “statistic” without the repeated letters. Then complete the cipher with the unused alphabet characters.

ORDER PLAGIARISM FREE PAPER NOW

Standard sequence: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher sequence: S T A I C B D E F G H J K L M N O P Q R U V W X Y Z

In this case, the message HELLO becomes ECJJM. Comparing the standard sequence to the cipher sequence, you find that the letters U through Z are the same in both sequences. The number of letters that remain the same will depend upon the choice of the keyword. This can be avoided by using Method II. Communication Security Protocols Computer Science homework help

Method II. Using the same keyword “statistic,” another cipher can be created by writing it without its repeated letters and then writing the remaining alphabetical characters beneath the letters: S T A I C B D E F G H J K L M N O P Q R U V W X Y Z.

The cipher will be created by reading the table vertically and matching the letters to the standard sequence.

Standard sequence: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher sequence: S B H N U Z T D J O V A E K P W I F L Q X C G M R Y

Our message HELLO becomes DUAAP. A comparison of the standard sequence with the cipher sequence reveals that none of the characters are the same. Using Method II does not guarantee that there will be no matches; however, it does provide a better scrambled cipher than Method I.

Method III. The use of the first two methods results in one cipher for each keyword that is chosen. This type of code becomes relatively easy to break once the keyword is discovered. The use of a keyword and a setting word will generate multiple ciphers depending upon the number of characters in the setting word. For example, keeping our keyword as “statistic” and using “mode” as our setting word, the ciphers can be created as follows:

Using Method I, create the cipher:

Standard sequence: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher sequence: S T A I C B D E F G H J K L M N O P Q R U V W X Y Z

Using the letters of the setting word as the first character of the ciphers, four additional ciphers can be created.

Cipher 1: M N O P Q R U V W X Y Z S T A I C B D E F G H J K L
Cipher 2: O P Q R U V W X Y Z S T A I C B D E F G H J K L M N
Cipher 3: D E F G H J K L M N O P Q R U V W X Y Z S T A I C B
Cipher 4: E F G H J K L M N O P Q R U V W X Y Z S T A I C B D

Message: HELLO
Cipher 1: VQZZA
Cipher 2: XUTTC
Cipher 3: LHPPU
Cipher 4: MJQQV

Therefore, a message could be encoded using any one of the ciphers or a combination of the ciphers to make decoding by anyone but the intended receiver more difficult. Communication Security Protocols Computer Science homework help

Based on working through each of these methods, discuss why the need for communication security protocols is significant. First, decode each of the ciphers. Second, discuss how communication security measures are built upon these principles. Third, discuss which existing communication security protocol you believe bears the greatest significance with regard to the level of protection that is offered. Finally, in responding to your peers’ posts, discuss whether or not you believe there are any communication security protocols that were not mentioned but are of a greater significance.  Communication Security Protocols Computer Science homework help

Information Technology Essay Paper

Information Technology Essay Paper

The capability statement should contain the following sections:

Technical Skills
Non-Technical Skills
Education

ORDER A PLAGIARISM FREE PAPER NOW

Work Ethic/Motivation
Role
Social Media
Schedule/Availability Information Technology Essay Paper

Computer Science homework help

Objectives:

By the end of this week, you should be able to:

  • Articulate the difference between quality dimensions and usability evaluation through your research papers.
  • Discuss inspection methods and how they impact usability studies.

Articles

  • Hartson, R. (2003). Cognitive, physical, sensory, and functional affordances in interaction design. Behaviour & information technology, 22(5), 315-338. (Download)
  • Fallman, D. (2008). The interaction design research triangle of design practice, design studies, and design exploration. Design Issues, 24(3), 4-18. (Download)
  • Norman, D. (2019). Norman’s Three Levels of Design | Interaction Design, from https://www.interaction-design.org/literature/article/norman-s-three-levels-of-design Computer Science homework help

 

 

Research Paper

A usability evaluation examines the way users interact with products and services in order to achieve a goal. Often times, there are measures that are tied to those goals that are quantified. Academic literature has a robust catalog of research on studies that examine various perspectives that explore user attitudes and experiences. Such attitudes and experiences include:

Service Quality (Group 5, 6)

Remember, usability is not one-dimensional. It is a complex system of properties. Usability integrates many factors. It is subjective from user to user. And in this assignment, you will unravel each of the quality dimensions or how satisfaction ties back to a usability evaluation.

For this assignment, as a team, you are asked to explore the topic assigned to your group. You are to conduct an analytical research review of the assigned usability category/dimension above. Within each quality dimension or satisfaction measure, there are sub-measures! Explore them and better understand how they are important to usability evaluation. Computer Science homework help

ORDER   A PLAGIARISM-FREE PAPER   NOW

Each group will write a paper that covers the following:

Abstract

Title Page

Introduction

Literature Review of Concept

Make Recommendations of Additional Ideas For Future Literature Review Consideration

Conclusion

The paper should be a minimum of 8 pages content. This does not include the cover page, abstract, citations, and references. You must use APA format throughout the entire paper.

 

Grade Rubric

Technical Merit – 160 (53.33333%)

You explained the topic thoroughly by providing greater than 5 examples across 10 or more scholarly sources.

 

Business Merit – 50 (16.66666%)

You provide a minimum of five practical exemplars from literature to validate your topic in the form of research studies conducted using this topic. You present the results and explain the outcomes clearly and succinctly.

 

Grammar/Spelling – 40 (13.33333%)

Your paper does not contain any grammar or spelling errors.

 

APA – 30 (10.00%)

You provide a minimum of 10 quality academic peer reviewed journal sources (not blogs, wikis, or online websites) as evidence to support your topic. Your presentation of the content in APA is also accurate with less than 3 errors. Computer Science homework help

 

Organization – 20 (6.66666%)

Your organization fully meets the organizational structure as outlined in the assignment and is consistent with an academic literature review.

 

 

Visual Analytics Assignment

Visual Analytics Assignment

Visual Analytics

First phase the assignment idea:

The first task is to find a dataset and identify a business problem or a series of interesting questions. You must analyze and visualize real-world data. In order for you to have the greatest chance of success with the final outcome, it is important that you choose a manageable dataset.

  1. The data should be readily accessible and large enough that multiple relationships can be explored. As such, your dataset must have at least 8 Measures and 8 dimensions. (exceptions can be made but you must discuss with me first).
  2. To assist you in choosing a feasible problem and dataset, check with me by email about your idea for approval by 04/12/2022.
  3. Informal discussions with the professor can help to refine the assignment.
  4. Here are some links you can check to get data (but not limited to, so you can still do your search and find a dataset):

Popular open data repositories:

UC Irvine Machine Learning Repository: http://archive.ics.uci.edu/ml/index.php

Kaggle datasets: https://www.kaggle.com/datasets

Amazon’s AWS datasets: https://registry.opendata.aws/

Data Portals: http://dataportals.org/ Visual Analytics Assignment

Open Data Monitor: https://opendatamonitor.eu/frontend/web/index.php?r=dashboard%2Findex

ORDER   A PLAGIARISM-FREE PAPER   NOW

Assignment Requirements:

You need to use and apply the Visual Analytics concepts that we discussed in the class.

  1. Data Discovery: Show how to use Tableau as a tool to explore the dataset to understand what data you have visually. For example, you can generate at least four graphs to discover some relationship between fields.
  2. Questions: Your visualization must be able to answer the proposed questions. A good question may involve in two or more attributes (variables) and related to time or spatial information. You may need to revise your questions several times to tell a good story. You must have five questions.
  3. Calculations: You must use Table calculations along with another type of calculations (like Row-Level, Aggregate calculations or LoD expressions). Explain why you used this type of calculation. You need to use at least 4 calculations.
  4. Visualization: At least 8 or more different visualizations must be used. Use different types of visualizations. Make sure to follow the guidelines to create informative and effective charts.
  5. Dashboard : must be included. The dashboard must be interactive. You need to have at least one parameter. You need to design the dashboard by following the dashboard format guidelines.

 

Assignment Report (Word Document):

A narrative description of the business problem should be addressed.

  1. Introduction: Start with a draft of the introduction section of your assignment. This introduction should introduce your business problem and the potential solution. Visual Analytics Assignment
  2. Explore the Data: Describe what Tableau Techniques you used to discover and understand the data. List all the charts that you created with enough description about each.
  3. Questions: Clearly state all the five business questions.
  4. Calculations: Describe all the calculations that have been made to the data. Include the functions, charts and the results.
  5. Visualization: Include screenshots for all the generated charts along with the Dashboard. Under each graph, discuss how this chart answered the business question and the find the insights.
  6. Conclusion: Write down your final results and conclusion about the findings. Suggest solutions/actions that the business needs to take in order to solve the problems.
  7. Format: APA

 

Submission Checklist:

  1. Dataset file: original file and the modified one in case if you did any modifications.
  2. Tableau workbook (.twbx).
  3. Report document (.doc). Visual Analytics Assignment

Computer Science homework help

Part A

Think about the last time you utilized a mobile application or attempted to build your own mobile website.  What planning process did you go through before you began your project?  You may have considered the steps or tasks you needed to perform.  You may also have considered the resources and platforms needed for your outcome.  For example, which model fits your business domain needs?  Do you have time constraints that will make completing the web application/site difficult within a reasonable period of time?  You may also have considered the myths that surround developing mobile apps and the difficulties generally associated with mobile app development.

  • How does design & utility make a difference between good vs great websites? Explain
  • How is deciding between a mobile application vs a mobile website an important consideration by developers? Explain.
  • Why are push notifications the preferred method of communication over instant messaging among young people?

ORDER A PLAGIARISM FREE PAPER NOW

 

PartB

The seven domains of a typical IT infrastructure include the User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. As you’ve learned, each domain has business, technical, and security policy challenges that affect organizations.Computer Science homework help

Answer the following question(s):

  1. What is an advantage of organizing IT security policies by domain?
  2. What is a disadvantage of organizing IT security policies by domain?
  3. Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.

Advanced Operating Systems Project

CSE 461 Project I

The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :

 

ORDER A PLAGIARISM FREE PAPER NOW

Class Sdisk
{
public :
Sdisk(string diskname, int numberofblocks, int blocksize);
int getblock(int blocknumber, string& buffer);
int putblock(int blocknumber, string buffer);
int getnumberofblocks(); // accessor function
int getblocksize(); // accessor function
private :
string diskname;        // file name of software-disk
int numberofblocks;     // number of blocks on disk
int blocksize;          // block size in bytes
};

An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize)
    This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocksblocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure :
    Bytes 0 – blocksize-1Block 0Bytes blocksize – 2*blocksize-1Block 1Bytes 2*blocksize – 3*blocksize-1Block 2……Bytes ?-?Block numberofblocks-1
  • getblock(blocknumber,buffer)
    retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer)
    writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program. Advanced Operating Systems Project

Computer Science homework help

Please use all 600 words to summarize the following topics (be specific and use terminology from the class):https://youracademichelper.com/please-use-all-600-words-to-summarize-the-following-topics-be-specific-and-use/anthropology/
Evolution:
Explain Darwin’s theory of evolution. What is natural selection? What makes an organism naturally fit?
Primatology:https://reliableacademichelpers.com/learning-goal-im-working-on-a-health-medical-question-and-need-an-explanatio-4/health-medical/
Why do we study non-human primates? What are some distinctive features of primate evolution?
Human Origins

ORDER A PLAGIARISM FREE PAPER NOW

Define Punctuated equilibrium and Phyletic gradualism. What are advantages of being bipedal?
Prompt:
Why is Homo https://ultimatehomeworkhelpers.com/writing-prompt-write-a-response-to-the-article-helping-students-use-textual-so/english/ Erectus being a big game hunter a debated fact? Why is it important? Computer Science homework help
Format:
The document MUST be 600 or more words, and typed in Times New Roman 12-point font, being either single or double-spaced. In the header please include https://youracademichelper.com/test-1-december-1-2021-20-of-course-grade-four-questions-5-marks-each/sociology/ your name, date, and class (ANTH 37). Failure to do this will result in an immediate 5-point deduction. https://reliableacademichelpers.com/learning-goal-im-working-on-a-business-discussion-question-and-need-support-to-5/business/ DO NOT USE ONLINE RESOURCES. Use information provided to you through the textbook and powerpoints.

Cpsc 1050 Networking Data Packets

Cpsc 1050 Networking Data Packets

  1. Start the “TCP/IP” (reliable connection simulator) applet.
  2. In the text field labeled “Your message:”, type the following: “Computer networking is essential in our world today.“. Then press the button “Send a message.”
  3. Watch the entire sequence of packets that are sent for the sample message. How many “DAT” packets were sent? How many “ACK” packets were sent?
  4. If each character or blank in a packet header counts for one character, and all “DAT” packets except the last carry 10 characters (including the blanks), and “ACK” packets have no data characters (though they do have a header), count up how many characters were sent in total.
  5. There are 52 characters in the above message, including blanks and punctuation. Subtract 52 from the total number of characters sent in both directions in all packets. Divide this number by the total number of characters to get the overhead (those characters which are not really data but yet you have to transmit them), represented as a percentage.

    ORDER A PLAGIARISM FREE PAPER NOW

  6. Imagine that you have a million-character message to send, perhaps a large file. How many characters in total (and to your best estimate) would be sent in all packets necessary to move it from node 0 to node 1?
  7. What would be an obvious way to decrease the overhead?
  8. Repeat Steps 1 and 2. Cpsc 1050 Networking Data Packets
  9. Select “Delete packets that are touched“.
  10. Delete some data packets by clicking on them as they move along the wire and watch the retransmission after timeout.
  11. What happens if you delete the re-transmitted packet?
  12. Now try deleting some ACK or NAK packets. What happens?
  13. See if you can compute the checksum as TCP/IP does. Run the applet, using any message. Select a data packet, but don’t select the last packet because it might be too short, less than 10 characters. Count up the characters, including blanks. If they do not equal 10, assume there are blanks at the end so that the character count is 10.
  14. Using the “Text Encoding in ASCII” applet, type in the characters from the data packet, and click on “translate text“.
  15. Add up the values for each of the characters. Then calculate the modulus of this number using 256.
  16. Compare your manually computed checksum for the first packet of the message “Introduction to Computer Science” against what the applet shows for the packet. Do they match?
  17. Now damage your packet by altering one character. Re-compute the checksum. You should realize how the applet can spot errors.
  18. Think of a way that a packet can be damaged and still have the same checksum as the undamaged version. Give one example for this scenario. Cpsc 1050 Networking Data Packets