Categories
Writers Solution

A windows PC with Microsoft Excel installed. If you need this software

Resources needed: 

1. A windows PC with Microsoft Excel installed. If you need this software, follow these steps to install it.

2. Ess13ch02_Questionfile.xlsx

In this exercise, you will learn how to use spreadsheet software to improve management decisions about selecting suppliers. You will filter transactional data about suppliers based on several criteria to select the best suppliers for your company.

Scenario: You run a company that manufactures aircraft components. You have many competitors who are trying to offer lower prices and better service to customers, and you are trying to determine whether you can benefit from better supply chain management. The Assignments area under Week 2, you will find a spreadsheet file (Ess13ch02_Questionfile.xlsx) that contains a list of all the items your firm has ordered from its suppliers during the past three months. The fields in the spreadsheet file include vendor name, vendor identification number, purchaser’s order number, item identification number and item description (for each item ordered from the vendor), cost per item, number of units of the item ordered (quantity), total cost of each order, vendor’s accounts payable terms, order date, and actual arrival date for each order.

Prepare a recommendation of how you can use the data in this spreadsheet database to improve your decisions about selecting suppliers. Some criteria to consider for identifying preferred suppliers include: 

· the supplier’s track record for on-time deliveries 

· suppliers offering the best accounts payable terms 

· suppliers offering lower pricing when the same item can be provided by multiple suppliers. (extra credit)

Use your spreadsheet software to prepare reports to support your recommendations.

Information about the data:

· At a minimum you will need to be able to sort the database by various criteria such as item description, item cost, vendor number, or A/P terms

· A/P terms is expressed as the number of days that the customer has to pay the vendor for the purchase. In other words, 30 designates net 30 days. The vendor that allows customers the longest amount of time to pay for an order would, of course, offer the most favorable payment terms

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services A windows PC with Microsoft Excel installed. If you need this software

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Microsoft Windows firewall uses

Using the Web or other resources, do a bit of research on the methodologies that Microsoft Windows firewall uses. Define a firewall. Define firewall security techniques. Consider the strengths and weaknesses of the Micosoftapproach.

Write between 300 and 350 words.

Categories
Writers Solution

Describe the impact of adding Active Directory to an existing Windows network.

Purpose

This course-wide project introduces you to a variety of tasks and skills that are required for an entry-level security administrator who is tasked with securing systems in a Microsoft Windows environment.

The following tools and resources will be needed to complete this project:

§ Course textbook

§ Access to the Internet

Learning Objectives and Outcomes

You will be able to:

§ Describe the impact of adding Active Directory to an existing Windows network.

§ Develop procedures for changing access controls.

§ Develop procedures for ensuring a malware-free environment.

§ Recommend Group Policy Objects for a Windows environment.

§ Develop procedures for auditing security in a Windows system.

§ Develop procedures for restoring a failed Windows system.

§ Recommend Windows hardening techniques.

§ Describe security goals and write policies for securing Windows applications.

§ Ensure the integrity of all evidence collected in a Windows environment.

Overall Project Scenario

Always Fresh Foods Inc. is a food distributor with a central headquarters and main warehouse in Colorado, as well as two regional warehouses in Nevada and Virginia.

The company runs Microsoft Windows 2019 on its servers and Microsoft Windows 10 on its workstations. There are 2 database servers, 4 application servers, 2 web servers, and 25 workstation computers in the headquarters offices and main warehouse. The network uses workgroups, and users are created locally on each computer. Employees from the regional warehouses connect to the Colorado network via a virtual private network (VPN) connection.

Due to a recent security breach, Always Fresh wants to increase the overall security of its network and systems. They have chosen to use a solid multilayered defense to reduce the likelihood that an attacker will successfully compromise the company’s information security. Multiple layers of defense throughout the IT infrastructure makes the process of compromising any protected resource or data more difficult than any single security control. In this way, Always Fresh protects its business by protecting its information.

Project Part 1: Active Directory Recommendations

Scenario

Assume you are an entry-level security administrator working for Always Fresh. You have been asked to evaluate the option of adding Active Directory to the company’s network.

Tasks

Create a summary report to management that answers the following questions to satisfy the key points of interest regarding the addition of Active Directory to the network:

1. System administrators currently create users on each computer where users need access. In Active Directory, where will system administrators create users?

2. How will the procedures for making changes to the user accounts, such as password changes, be different in Active Directory?

3. What action should administrators take for the existing workgroup user accounts after converting to Active Directory?

4. How will the administrators resolve differences between user accounts defined on different computers? In other words, if user accounts have different settings on different computers, how will Active Directory address that issue? (Hint: Consider security identifiers [SIDs].)

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Arial, size 12, double-space

§ Citation Style: Follow your school’s preferred style guide

§ Length: 2 to 4 pages

Self-Assessment Checklist

§ I addressed all questions required for the summary report.

§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines