Categories
Writers Solution

PHM Reliable Catering is a company that provides catering services to both small and large businesses

Computer Assignment MS Excel: Update Payroll

Using Microsoft Excel online or installed version of Microsoft Excel complete the following assignment

NOTE: To complete the assignment you will need to start with this file, Lab 3-2 PHM Reliable Catering Weekly Payroll Report

Problem: PHM Reliable Catering is a company that provides catering services to both small and large businesses. You have been asked to update the weekly payroll report to reflect changes in personnel, to update certain mandatory deductions, and to add overtime computations. The final worksheet is shown in Figure 3–87.

Computer Applications for Business – Week 6 Assignment MS Excel: Update Payroll Using Microsoft Excel online or installed version of Microsoft Excel complete the following assignment NOTE: To complete 1

1.    Open the workbook, Lab 3-2 PHM Reliable Catering Weekly Payroll Report.
 

2.    Save the file as CS155Week6LastnameFirstname. Ensure that you use your Lastname and Firstname in filename.

3.    Delete rows 12 through 14 to remove the statistics below the Totals row.

4.    Delete column B. Set column A width to 31.00 and columns B through K to 11.00. Select row 3 and set text to wrap in this row using the Wrap Text button (Home tab | Alignment group), and then set the row height to best fit.

5.    Delete the record for the employee Evans, Timothy. Add two blank lines directly above the row for Mi, Emily, and add the information for the two new employees listed in Table 3–11.
 

6.    Replace one of employee’s names with your name.

7.    If necessary, use the fill handle in cell E6 to copy the gross pay formula to the rows of the two new employees.

8.    Add the Tax Rates information shown in Figure 3–87 in cells A15:B20 to your worksheet.
 

9.    Change the font size in cell A1 to 28-point. Change the font size in cell A2 to 18-point. Change the font in cell A15 to 18-point italic and underlined. Change the row height for rows 1, 2, and 15 to best fit.

10.  Insert three columns to the right of the Gross Pay column. Add the column titles Taxable Income, Social Security, and Medicare in cells F3:H3. Center the contents of cells B3:K3. Calculate the Social Security and Medicare taxes in columns G and H by multiplying the tax rates in the Tax Rates table by the Gross Pay.

11.  Federal tax calculations must take into account two tiers of income tax, which are applied to the taxable income. Calculate the taxable income, which is the Gross Pay — (number of withholding allowances * $90).

12.  Calculate the federal tax withheld. If an employee has a taxable income of greater than or equal to $689, then the federal tax withheld equals $110.85 plus the federal tax rate found in cell B19 multiplied by the taxable income in excess of $689. If an employee’s taxable income is $689 or less, the federal tax withheld equals the taxable income multiplied by the federal tax rate found in cell B18. Use the IF function to calculate the federal tax in Column I.
 

13.  State tax is calculated as a percentage of federal tax. Use the tax rate in the Tax Rates table to calculate state tax in column J.
 

14.  Calculate Net Pay in column K, as Gross Pay — Social Security, Medicare, Federal Tax, and State Tax.

15.  Use the background color of your choice for the ranges A1:K2 and A15:B20.

16.  Center the range B4:B11. Apply the currency style with two decimal places, no dollar signs, and negative numbers in black and parentheses to the range C4:C11 and E4:K12.
 

17.  Apply a Thick Bottom Border to the range A3:K3. Apply a Thick Outside Border to the range A15:B20.

18.  Change the sheet tab name to Weekly Payroll and the tab color to match the color used as background color in cell A1.
 

19.  Preview the worksheet. In page setup fit the worksheet to one page in landscape orientation

WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER on PHM Reliable Catering is a company that provides catering services to both small and large businesses

Are You looking for Assignment and Homework Writing help? We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism.

TO BE RE-WRITTEN FROM THE SCRATCH

Categories
Writers Solution

Were the measurement instruments reliable and valid? Why or why not?

Instructions: Carefully read, summarize, and appraise your group’s assigned article.  The discussion board for this week should cover the following concepts in order to have a complete draft by the end of the week. Apply the concepts discussed in the lecture and the readings.  As you provide input to your peers, be sure to state a rationale for your claims. 

Identify and discuss the following:

dependent variable(s) and the instrument(s) used to measure them.

how the data for the dependent variable(s) were collected.

the intervention and procedures for delivering it.

the key results for the study, including any p-values, reported.

the conclusions the researchers drew.

Appraise and debate the quality of the data collection methods and determine whether the conclusions of the study were supported by the statistical results.  Consider the following questions:

Were the measurement instruments reliable and valid?  Why or why not? 

Was treatment fidelity for the intervention ensured?  Why or why not?

Were the conclusions of the study were supported by the statistical results, as indicated by the variable values and the p-values if reported?

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Were the measurement instruments reliable and valid?  Why or why not? 

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

You are the system’s administrator of Reliable Power Supplies (RPS),

 Assignment 4 and 5Cryptography and Network Security
Question 1:
You are the system’s administrator of Reliable Power Supplies (RPS), a medium sized company that builds UPSs and switched power supplies for the computing industry. Your task is the analysis, design and configuration of a Firewall System that secures the inbound and outbound traffic at RPS. After conducting the needs analysis you have a clear picture of the type of firewall system that best suits RPS.
In the internal network, there is a special host (192.168.1.253/28) running an application that would be disastrous if it was compromised. Therefore for your design, you opt for a dual firewall system that you believe is the best option for this specific case. You also go for a demilitarized zone (Network Address 10.0.0.0/24) containing the e-mail (10.0.0.20/24) and Web services (10.0.0.30/24) of the company.
Apart from providing NAT services and Packet Filtering, the first firewall (part of the dual configuration) acts as a Web and FTP Proxy server. This first firewall is connected to the Internet via 200.27.27.10/25 and to the DMZ via 10.0.0.10/24.
The second firewall is used to filter traffic between the internal network and the DMZ. It is connected via 10.0.0.254/24 to the DMZ and via 192.168.1.254/28 to the internal network.
The internal network address is 192.168.1.240/28.
The security policy requirements used to configure the firewalls are outlined as follows.
RPS Web server contains public information including a product catalogue that is accessible to Internet users and it also provides secure online purchasing functionality using SSL/TLS. The internal users are also allowed to access all RPS WWW services; however they are allowed to access Internet WWW and FTP services only via the proxy located on the first firewall via port 3028.
As mentioned, the internal network has a special host (192.168.1.253/28) which has complete access to any host and any services without using proxy services configured in the first firewall system. The remaining internal hosts must go via proxy on first firewall.
The security policy requirements also dictate the e-mail server to receive from and send messages to hosts on the Internet and the internal users; however these internal users are to retrieve their messages via IMAP.
Any other service which is not explicitly outlined in the security policy should be restricted from RPS network.
A. Provide a network layout (network diagram) showing all the components of RPS network including both firewalls, the email and web servers, the DMZ, and all the internal hosts (Note that you should draw all the internal hosts. The number of internal hosts can be found from the internal network address given above). Ensure you label all hosts (servers, internal computers and firewalls) with appropriate names and write the IP addresses for each network interface.
B. You are required to develop two sets of rules for the dual firewall. One will process traffic travelling between the Internet to the DMZ and Intranet. The other will process traffic travelling between the Intranet and the DMZ. You need to also explain what each rule does. You should complete the following four (4) tables, adding rows where necessary.
Table 1 Internet Rules (Firewall 1)
Rule Protocol Transport protocol Source IP Source Port Destination IP Destination Port Action
Table 2 Internet Rules Explanations (Firewall 1)
Rule Number Explanation
1
2
3
Table 3 Intranet / DMZ rules (Firewall 2)
Rule Protocol Transport protocol Source IP Source Port Destination IP Destination Port Action
Table 4 Intranet/DMZ Rule Explanations (Firewall 2)
Rule
Explanation
1
2
3
Question 2:
The use of client-side scripting languages like JavaScript has been crucial in the development of the semantic web. However, in terms of security, it has also given the opportunity to computer criminals to conduct a wide range of cross-site scripting attacks. Historically, the Same Origin Policy has been one of the many mechanisms introduced to counteract this problem. With this policy in place, scripts are allowed to run on WebPages only when they originate from the same source or site. This means that for documents or WebPages to be retrievable, they have to belong to the same origin: same scheme or application layer protocol, same host or server and same port of a URL. Despite of its good intention, the SOP is seen as a nuisance by web developers. The claim is that the SOP is too restrictive and inflexible affecting the introduction of creative and innovate applications. In order to alleviate this problem, the World Wide Web Consortium (W3C) introduced the Cross-Origin Resource Sharing (CORS) as a mechanism to relax the SOP policy.
Based on this background information and your personal research, please address the following issues associated with the SOP and CORS policies.
a) Using the Case domain (www.case.edu.pk) explain and provide your own illustrative example of how the SOP policy works
b) Assume that in the Case server you have an html page (your_homePage.html) identified by the URL: www.case.edu.pk/your_homePage.html
Provide two examples of URLs (web links) found in your_homePage.html for which the retrieval of the documents is allowed. Similarly, provide two examples of URLs (web links) in your_homePage.html for which the retrieval of the documents is denied. Use the following table to provide the URLs and give the reasons for the outcome of the retrieval of the pages.
Your examples (URLs) Retrieval Allow/Deny Explain the reason
Allow
Allow
Deny
Deny
c) In your own words explain the concept behind the CORS policy
d) Using the two examples given above where the retrieval of the pages was denied, explain the interaction on how the access would be enabled using CORS. Make sure that in describing the interaction the Origin and the AccessControl-Allow-Origin are used in the HTTP headers.
Question 3:
Note: for this question, you need to download a PCAP file located in the course Moodle web site.
Peter is the Network Security Manager for a small spare parts business. The organisation uses an e-sales application to provide a front-end for its e-sales business. Customers are complaining that in the last two or three days the system has become very slow, taking them longer than normal to place their orders. This information has been corroborated by staff complaining that they are not happy with the slow response of the system to complete their daily activities. Peter suspects that the system has been the target of criminal hands and before he starts responding to the attack, he decides to investigate the issue a little further. First, he reviews the firewall logs and notices something abnormal in the type of traffic directed to a number of internal hosts including the organisation’s web server. Curious about this traffic, Peter uses Wireshark to capture a trace of the traffic. [A section of this trace can be accessed from the course Moodle web site].
Based on the above fictional scenario and the provided PCAP:
(a) Identify the anomaly in the traffic this organisation is going through. What sort of evidence do you have to make this claim?
(b) What sort of utility or tool do you think the “attacker” is using to conduct this attack?
(c) Provide the IP address of the host used by the perpetrator. Based on this information, what can you tell about the profile of this individual? Explain why.
Question 4:
DNS and ARP poisoning attacks are similar; however there are fundamental differences between the two. You are to research these specific differences contrasting the way the attacks are conducted and some of the countermeasures available. Ensure you use at least three in-text academic references to contrast these attacks (include neither your textbook nor Wikipedia in these references. Failure to do so may not give you marks).
Remember that you are not to repeat in your research what DNS and ARP poisoning attacks are. We already know that from our discussions in class. In writing about the differences between the two types of attacks, contrast for example the complexity of the attacks (which one is easy to conduct and why), the impact (consequences) of the attacks, which one is more common and the different mechanisms available to counter the attacks. Write no more than 300 words (about a page including in-text references).
Question 5:
In this hypothetical case study, you should use the Internet to assist you in developing responses to three questions. Use of the text only is not sufficient to attract full marks. SafeBank recently received a series of reports from customers concerning security breaches in online banking. Customers reported having money transferred from their accounts, usually after they have found that their password has changed. A full security audit revealed that the money transfers and changes to user passwords all originated from an Eastern European country on servers within the domain of crazyhackers.com – however – the question remained: how did the hackers undertake the attack? Given that legitimate account numbers and passwords were used, it was initially assumed that it could be some form of phishing attack. However, no evidence of such emails was found. The only commonality between the victims was that they all used the same ISP.
You are required to answer the following questions. Please reference all sources – do not copy directly from sources.
A. Based on the information provided, what type of attack has been performed? Justify your answer.
Hint: In order to capture account numbers and passwords, how would a hacker
“redirect” users to their servers instead of SafeBank’s?
B. Describe in detail how the attack occurred – you may wish to include one or more diagrams. You will need to make assumptions about host names, domains and IP addresses – document these. You need not concern yourself with the technical details of the capture and reuse of SafeBank’s customer details (eg. Fake web sites/malware) – you are documenting how it was possible from a network perspective.
C. What steps would you advise to prevent such attacks? What limitations does this form of attack have?
Hint: Would this attack only have to be performed once?
Assignment statusSolved by our Writing Team at CapitalEssayWriting.comCLICK HERE TO ORDER THIS PAPER AT CapitalEssayWriting.com