Reference no: EM131433440
SecureIT, Inc., is a small computer security contractor that provides computer security analysis, design, and software implementation for commercial clients. Almost all of SecureIT work requires access to classified material or confidential company documents. Consequently, all of the security personnel have clearances of either Secret or Top Secret. Some have even higher clearances for work that involves so-called black box security work.
While most of the personnel information for SecureIT resides in database systems, a basic employee worksheet is maintained for quick calculations and ad hoc report generation. Because SecureIT is a small company, it can take advantage of Excel’s excellent list management facilities to satisfy many of its personnel information management needs. You have been provided with a sample worksheet, 3. Employee_Data, to assist SecureIT with producing several worksheet summaries. Here is what is needed:
1. One worksheet that is sorted by last name and hire data.
2. One worksheet that uses a custom sort by department in this order: Marketing, Human Resources, Management, and Engineering.
3. One worksheet that uses a filter to display only those employees in the Engineering department with a clearance of Top Secret (TS).
4. One worksheet that uses a custom filter to display only those employees born between 1960 and 1969 (inclusive).
5. One worksheet that totals the salaries by department and the grand total of all department salaries. This worksheet should be sorted by department name first.
Importance of alignment of individual
: This unit introduces you to the importance of alignment of individual, job, and organizational needs analyses. While many organizations have created and delivered exciting training programs, unless the programs are aligned to the organizations' st..
|
What were some pros and cons of conducting this poll online
: Citizens’ annoyance with phone calls from salespeople prompted Congress to pass a law setting up a National Do-Not-Call Registry. The registry was soon flooded with requests to have phone numbers removed from telemarketers’ lists. Was an online surve..
|
What type of dispute would a med-arb process
: What type of dispute would a Med-Arb process be most beneficial, why? What type of dispute would an Arb-Med process be most beneficial, why?
|
Disaster recovery and business continuity plans
: Network diagram for both logical and physical topologies showing devices; and IP addresses for the main clients, hosts, servers and network devices - Comprehensive Network Security plan
|
Security contractor that provides computer security analysis
: SecureIT, Inc., is a small computer security contractor that provides computer security analysis, design, and software implementation for commercial clients. Almost all of SecureIT work requires access to classified material or confidential company d..
|
What is emotions and moods
: What is emotions and moods? How do emotions and moods influence behavior in organizations?
|
Decontamination and victim chain of survival
: For this assignment, you are required to read the article entitled "HazMat Emergencies: Decontamination and Victim Chain of Survival," by Gunderson, Helikson, and Heffner (2014), and write a review. The article may be found in the Academic Search ..
|
What have real countries done to deliberately influence
: Imagine you are the Head of State for a country and must prepare a presentation regarding the cultural significance of the country. The country is about the size and geography of Texas and it has a border with the ocean and another with a country ..
|
Whats the total profit of the batteries after replacement
: The marketing and production managers of a new car battery are planning to start a new advertising campaign. The most important message of the advertising is the lenght of the guarantee of battery life. The manager know that the life of the battery i..
|