need to do axcel and access homework. the solutions are on a step by step video with how to do it and with the answer. i will give access to the link and video just need someone to do it for me. look at the instructions on the attachment.
here is the question…
10-20. EXCEL APPLICATION: Citywide Community College The IT Department at Citywide Community College devel-oped a computer security incident response plan that requires users to provide information for each security incident. Louis Hermann, the IT manager, inventoried the major components of the college’s computer systems and created a spreadsheet to track the equipment by manufacturer, model number, and serial number. He decided to confine the list to major computer components, and he does not try to track keyboards, mice, and so forth. Louis then created a spreadsheet to track systems security incident facts including information about the depart-ment reporting the incident, target-specific information (host machine name, etc.), source-specific information (source IP address), and information about the type of security incident or attack. Louis has asked you to use the data provided in the CCC Security spreadsheet, Ch10Ex01, to identify (1) the department reporting the highest number of security incidents and (2) the most prevalent type of intrusion. Use the “countif” function to count the number of security incidents in which the computer system was compromised. Use a memo format to submit a summary of your findings to Louis.
10-21. ACCESS APPLICATION: Citywide Community College
Louis Hermann, IT manager at Citywide Community College, is working with two spreadsheets to manage computer secu-rity incident reporting. One spreadsheet tracks the major components of the college’s computer systems, and the other spreadsheet tracks security incident facts. To provide for bet-ter reporting capabilities, Louis wants you to set up an Access database that tracks college departments, computer systems, and security incidents. Download the spreadsheet Ch10Ex02 and import the worksheets to create the database shown in Figure 10-26. Create a report that lists the number of secu-rity incidents reported by each department. Create a second report that lists the number of attacks in which the system was compromised for the department having the greatest num-ber of security incidents. What other reports would Louis find useful?
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more