Tuesday, December 31, 2019

Lifetime Earnings Soar with Education

How much more is higher education worth in cold hard money than a high school diploma? Plenty. Men with a graduate degree earned more than $1.5 million in lifetime earnings than those with just a high school diploma, according to 2015 statistics from the Social Security Administration. Women earn $1.1 million more. A previous report by U.S. Census Bureau titled The Big Payoff: Educational Attainment and Synthetic Estimates of Work-Life Earnings noted: The large differences in average work-life earnings among the educational levels reflect both differential starting salaries and also disparate earnings trajectories, that is, the path of earnings over one’s life. The Bureau of Labor Statistics (BLS) figures from 2017 show median weekly wages progressively increasing with educational attainment: Professional degree: $1,836Doctoral degree: $1,743Masters degree: $1,401Bachelors degree: $1,173Associates degree: $836Some college, no degree: $774High school diploma, no college: $712Less than a high school diploma: $520 At most ages, more education equates with higher earnings, and the payoff is most notable at the highest educational levels, said Jennifer Cheeseman Day, co-author of the report. Who Earns the Most? Its not surprising that doctors and engineers do best. According to the BLS, anesthesiologists, surgeons, obstetrician-gynecologists, orthodontists, and psychiatrists all make well over $200,000 a year. Even general physicians, chief executives, dentists, nurse anesthetists, pilots and flight engineers, and petroleum engineers all make $175,000–$200,000. Still in the six-figure category are: information system managers, podiatrists, architectural and engineering managers, marketing managers, financial managers, attorneys, sales managers, natural sciences managers, and compensation and benefits managers. Of course, most people pursue their passion rather than the dollar when looking at career options, though earning potential is often a factor for many. Glass Ceiling on Earnings Intact While more American women than men have received bachelors degrees every year since 1982, men with professional degrees could expect to cumulatively earn almost $2 million more than their female counterparts over their work lives, according to the 2002 report. Even by 2017, women in the United States sill earned only 80% of the median pay of men, according to the Pew Research Center. The pay gap has remained steady for the past 15 years, according to Pew. Degrees Always Needed? There has been a backlash in recent years against the push for everyone to get a college degree. According to the argument, tuition costs have risen to such a level that even with higher-paying jobs, it has become almost impossible to pay off massive student loans in a timely fashion. Some professions, of course, require advanced degrees. But the lack of skilled tradespeople have raised wages in those professions, and some high school graduates are turning to the higher wage fields of electrician or plumber without tens of thousands of dollars of student loans to repay. Another trend to avoid student loan debt: skills training. Upwork CEO Stephane Kasriel writes that freelancers say updated skills training courses are more valuable to them than their college classes. And that appears to be what more employers are asking them about on job applications. Says Kasriel: The cost of a college education is so high now that we have reached a tipping point at which the debt incurred often isnt outweighed by future earnings potential.

Monday, December 23, 2019

Our Group Surveyed Homeless Individuals To Find Out What

Our group surveyed homeless individuals to find out what needs they thought were most important. We walked around downtown Asheville near Vance Memorial Park, Library and other parts of downtown to understand the environment the homeless live daily. I could only invest two hours on the project due to the lack of communication with BeLoved and finding ways of transportation that will work around everyone’s schedule. My next steps are to provide a data analysis on the information we collected. 2) Individually, people find themselves engaged in a variety of social environments and based on experiences of overlapping environments that determine the way in that one behaves. When we saw homeless people, it appears evident that the†¦show more content†¦It gives us the sense to connect with others on a more interactive level. It allows us to become active people in the community and become the voice for others. For example, watching members of Asheville city council and voice opinions about how the community should help provide services for the homeless. When several community members voice the same concerns, this helps unite a community under a purpose. From experiences, I have learned that people who see others help will most likely help if there are a strong structure and a mission behind it. BeLoved has done that for others. It has provided shelter, a safe place, food, clothes and most of all, love and faith for everyone that comes to BeLoved. The definition of being homeless can mean many things to different people. Some may think homeless are lazy people who are just unemployed or criminals trying to steal from others, or one would be sympathetic to their living conditions and they might have had a bad past that resulted in homeless. I think it is amazing to see that one word can have different meanings, after all this culture. Culture is how we create an understanding of socioeconomic status and practice our own interpretation. Therefore, culture is changeable depending on the structure. This allows us to see the struggles of healthcare among the homeless one way; however, the government canShow MoreRelatedCase Study : Building A Policy Briefing1699 Words   |  7 PagesA POLICY BRIEFING Stephana PEA Prof. Aaron Watches May 8, 2016 Submitted on April 11, 2016 University of Baltimore- Spring Quarter 2016 What can the Baltimore government/policy makers do about homeless in Baltimore? The purpose of this paper is to evaluate the policy and actions that can be taken to end the homelessness issue. Homeless is a serious multi-faceted issue that requires the involvement of many agencies, policymakers, governments and faith-organizations. Having no home isRead MoreYouth Outreach Program At My Church1747 Words   |  7 Pages I am a very active individual within my church however we do not currently have a youth services program. This has become very popular and common in my area therefore I feel it is important to implement a youth outreach program at my church. Drift Pentecostal Church is an adult-driven church that has dissipated in youth over the last 10 years. Drift Pentecostal Church has not had a youth program since the early 70 s. The program has dwindled to a mere once a week Sunday School class that is separatedRead MoreWhen People Think Of Hollywood, They Think Of It Being1713 Words   |  7 PagesWhen people think of Hollywood, they think of it being very glamorous. In reality, it’s not all lights, camera, or action with celebrities in every corner instead having homeless and drug addicts in every corner. Drug abuse has become a bigger epidemic overtime. Many individuals have been exposed to drugs early on which has lead to their addiction. Falling into the habit of drugs does not lead down a good path when all a person desires are substances to make them feel delirious. The concept of drugsRead MoreEssay on SOME Help to the Homeless2501 Words   |  11 PagesSOME Help to the Homeless Every year approximately 2.3 to 3.5 million people go homeless in the United States of America. Twelve million adults in the US were homeless in the year 2001, or are still currently without a permanent home (â€Å"Homelessness in the U.S.†). How does this happen in â€Å"the land of opportunity?† We think of ourselves as one of the greatest nations in the world, yet citizens are living a life of poverty, often without food, clothing, and shelter. When most peopleRead MoreMental Illness and Public Administration Essay2070 Words   |  9 PagesMental illness is a prevalent issue in our country today. The Substance Abuse and Mental Health Services Administration estimated that 20-25% of our nations homeless suffer from mental illness (National Coalition for the Homeless, 2009). Many people with mental illness end up in prison without proper care and supportive housing (NAMI, 2011). Without proper care, people with severe mental illness cannot function as productive members of society (HCH Clinician’s Network, 2000). Proper housing, careRead MoreThe Challenges That We As Social Service Workers And Outside Of The Workplace1971 Words   |  8 Pageschallenges that individuals face while working in this industry, and touched on the areas I found most trying. While at Centennial College I learned a great deal about the importance of being non-judgemental and most importantly, learning to accept others beliefs and values even when they are different from our own. Critical Thinking is in my view the most valued skill to practice in order to offer the best of yourself to the clients you serve. I for one believe that we carry a lot of our own biasesRead MoreCase110038 Words   |  41 Pagesuse of X. LI, 2015. HKS751 Case Number 1989.0 Budget   Woes   and   Worse   Ahead†¦ Pine   Street   Inn,   Boston’s   Iconic   Homeless   Shelter,   Re-Thinks its Strategy In the early 2000s—after a 15-year push to create emergency shelters for the burgeoning homeless population in U.S. cities—shelter funding began to decline, nationwide.      For   Pine   Street   Inn,   Boston’s   foremost   homeless    shelter, with 715 beds in five facilities, the first sign of trouble came in the form of several consecutive yearsRead MoreGay, Bisexual, And Transgender Youth Suicide Essay1946 Words   |  8 Pagesproblem in many different countries but very limited data has been gathered about this social issue internationally. While it is well-known that it is still ongoing problem in many countries such as: Israel where a study of 1,134 teenagers were surveyed and results show that 20% of these teenagers have attempted suicide, which is 112 times the rate of the general population. The study also showed that the rate is even higher for LGBT teenagers who have religious backgrounds (Roberts, 2012). In AustraliaRead MoreCommunity and Population Health Task I4979 Words   |  20 PagesCensus Bureau, 2010a). Denver County’s population is approximately 50% male and 50% female (U.S. Census Bureau, 2010a). The ethnicity of Denver County is predominately White (52.2%), with Hispanic (31.8%) an d Black (9.8%) ethnic groups comprising the next largest population groups (U.S. Census Bureau, 2010a). The median household income in Denver County from 2008-2012 was is $49,091; compared to $58,244 for the entire state of Colorado (U.S. Census Bureau, 2010b). From2008-2012, 18.9% of households

Sunday, December 15, 2019

Microsoft Office and Figure Free Essays

string(156) " To change the style of numbering or bullets, select the last list you created and click on the downward arrow to the right of the bullet or number tool 6\." Table of Contents Introduction This session is targeted at those who wish to learn the new key features of MS Word 2007. It will cover use of the ribbon, adding tools to the Quick Access Toolbar and using live preview before making selections. By the time you have completed this session you should be able to: 1. We will write a custom essay sample on Microsoft Office and Figure or any similar topic only for you Order Now Work with the new ribbon in Word 2007 2. Add tools to the Quick Access Toolbar 3. Use the Office Button 4. Use Live Preview and make selection 5. Create, save and format a document 6. Indent paragraphs and change line spacing 7. Create bullet and number list 8. Change format of bullets and number list 9. Apply borders and shading to paragraphs 10. Add a header or footer and page numbers to documents 11. Select tools from the Mini Toolbar 12. Work with Super tool tips 13. Use Launchers to display dialog boxes 14. Create and modify tables 15. Add and remove items from the Status Bar 16. Select Word Options 17. Understand the new file formats 18. Use the Compatibility Checker 19. Understand and apply the different security features Documents needed for practical are contained within the EssentialsInWord folder on the desktop or download from http://www. qub. ac. k/student Click on the Training Materials link (under Useful Information), scroll down to Microsoft Office 2007. Click on the Zip files for Word Essential. zip and download either to desktop or H drive. Right click on the zip file and select Extract All (or unzip to here) This practical should take you approximately 2 hours to complete Microsoft Word’s 2007 Ribbon When Word 2007 is first opened, a new blank document is automatically created. The ribbon displayed across the top of the screen replaces the old toolbars and menus. The ribbon is divided into eight tabs (if Developer tab is shown), plus an additional tab if add-ins are being used. The number of items shown in the ribbon will vary depending on the size and resolution of the monitor. For example, figure 1 below shows four heading styles on the ribbon, whereas a larger monitor with a higher screen resolution would display six or more heading styles. By clicking on the downward arrow to the right of the styles, the full range of styles will be displayed. By selecting the tabs across the top of the ribbon, i. e. Insert, Page Layout, References, Mailings, Review and View, a different section of the ribbon will be displayed. Notice that the Home ribbon/tab contains many of the tools previously displayed on the Standard and Formatting toolbars. Figure [ 1 ]: The Ribbon (Home Position) To hide the ribbon, (which will allow more room on the screen) double click one of the tabs across the top. To access a tool from the collapsed ribbon, click once on the tab to expand the ribbon and select the tool. To bring the ribbon back, double click on a tab or use the keyboard option Ctrl+F1. Note that when the ribbon is collapsed it is possible to use the Alt key on the keyboard to show the shortcut keys. For example Alt+N will access the Insert tab. See . Figure [ 2 ]: Short Cut Keys for Ribbon ————————————————- Across the top of the ribbon (or just below it), at the left hand side of the Title Bar, you will notice the Quick Access Toolbar (see figure 3). To add tools from the ribbon to the toolbar, right click on the tool and select Add to Quick Access Toolbar. Note: tools on the Quick Access Toolbar are saved to the computer, therefore if you use a different computer, you will not be able to access tools saved earlier. Figure [ 3 ]: Quick Access Toolbar Many of the tools contained in the earlier Edit menu, can now be accessed from the Office Button See figure 4 for list. Note that if the current document is saved on a SharePoint server, there will also be a Server Tasks button, between Publish and close. 1. ————————————————- Click on the Office Button 2. ————————————————- Right click on the Save icon 3. ————————————————- Select Add to Quick Access Toolbar Note: If the tool is already on the Quick Access Toolbar, the option will be unavailable. If this is the case, select another tool of your choice to add to the toolbar. Office Button Click on the arrows to see an extended menu in each case Live Preview Live Preview shows formatting results on text such as heading styles, font colour, background colour, etc, without actually clicking on the choice. For example by highlighting text and moving the mouse over the styles, on the Home tab, a preview of the effect of each style will be displayed without actually selecting the style. Note that not all formatting options use live preview. Click on the Office Button and select Open Browse to where you have saved the Word Essentials folder and open the document ECDL Leaflet Select the first heading ECDL and ECDL Advanced Ensure the Home tab is selected and move the cursor over the heading styles Notice how the heading changes to allow a preview (without clicking on a style). Click the downward arrow to the right of the styles to access the full range. Select Heading1 style by clicking on it. (Note: the name of the style will appear as you move the cursor over each style). Bullets and Numbering 1. ———————————————— Under the heading Why Study for an IT Qualification, select the five lines of text after By studying for the ECDL at Queen’s†¦Ã¢â‚¬ ¦ 2. ————————————————- Select the Bullets tool from the Paragraph group on the Home tab. 3. ————————————————- Scroll down to the heading What will you learn and select the seven lines of text beginning Basic Concepts of IT and select the Numbering tool from the Paragraph group. 4. ————————————————- Under the heading Moving forward with ECDL Advanced, select the text Word processing, down to Presentations and select the bullets tool. 5. ————————————————- To change the style of numbering or bullets, select the last list you created and click on the downward arrow to the right of the bullet or number tool 6. You read "Microsoft Office and Figure" in category "Papers" ————————————————- Choose a style or select Define New Bullet to choose a picture/symbol. See figure 5. (Note Live Preview of bullets before selection) : Change Bullet types * Note: within the Paragraph group there is also a Multilevel list. See figure 6, which is a useful feature for creating sub level lists. Also under the font group there is a tool to remove all formatting from a document. See figure 7. : Multilevel List : Clear Formatting Borders and Shading 1. ————————————————- Ensure the Home tab is selected. 2. ————————————————- Select the last paragraph in the document beginning ECDL and ECDL Advanced and click on the downward arrow beside the Border tool (on the Paragraph group). See figure 8. 3. ————————————————- Select Outside Borders, see figure 8. Figure [ 7 ]: Border 4. ————————————————- With the paragraph still selected click on the downward arrow beside the Shading tool (next to the border tool) on the Paragraph group. 5. ————————————————- Select a shade of grey, i. e. 25% * The MiniBar/Mini Toolbar Select any line of text in the ECDL leaflet document. Notice that the mini toolbar appears. See Figure 9. At first the toolbar will be quite faint but as the cursor is moved closer to the toolbar it becomes more solid. Moving the cursor off the mini toolbar and back may cause it to disappear. Right click on the selected text and it will reappear. Note that the mini toolbar does not produce live preview results. Figure [ 8 ]: Mini Toolbar By right clicking on text such as bullets or numbering, extended shortcut options will appear (see figure 10). Figure [ 9 ]: Extended Short Cut Menu * Super Tooltips Move the cursor over the tools on the ribbon. Notice that an extended tool tip appears. For example in Figure 11 below, the mouse was hovered over the Format Painter tool. In most cases the keyboard short cut keys also appear. Figure [ 10 ]: Super Tooltip for Format Painter * Dialog Boxes and Launchers Dialog boxes can be displayed in several ways. One example is to use the launchers. These are indicated by the small arrow in the lower right hand corner of ribbon groups, see figure 12. Click on the launcher to open the dialog box. Note that not a lot of changes have been made to dialog boxes in Word 2007 see figures 13a and 13b for one example. Figure [ 11 ]: Launcher Launcher Figure [ 12 ]a: Paragraph in 2007 Figure 13b: Paragraph in 2003 The Insert Ribbon Click on the Office Button and create a new blank document. Click on the Insert tab to display the insert section of the ribbon, see figure 14. Figure [ 13 ]: Insert Ribbon From the Pages group there is the option to insert a cover page, a blank page or page break. Section breaks can now be accessed from the Page Layout tab (covered later). Note that page breaks can also be accessed from the Page Layout tab. Tables Click on the downward arrow under tables and select a three column by three row table. See figure 15. Alternatively select Insert Table to make your selection. See figure 15. Figure [ 14 ]: Insert Table Three columns by three rows Note the table tools in the ribbon with Design and Layout tabs. See figure 16 with Design tab selected and Figure 17 with Layout tab selected. Design tab Layout Table Tools Border Launcher Figure [ 15 ]: Table Tools (Design) 1. ————————————————- Click into the first cell of the table and ensure the Layout tab is selected (see figure 17) 2. ————————————————- Select the top row of the table and click on the Merge Cells button within the Merge group 3. ————————————————- Select the Design tab and from the table styles (use the arrow key to the right of the styles), select Light List Accent 2 style, i. e. move the cursor over the styles and a name box will appear. Figure [ 16 ]: Table Tools (Layout) 1. ————————————————- Select the table and with the Design tab still selected, click on the Draw Borders launcher (see figure 16) to access the full range of borders and shading options. Alternatively click the downward arrows next to the borders and shading buttons to see the full range of options (within table styles of the Design tab). 2. ———————————————— Select All borders 3. ————————————————- Select 1 point width for the b order and the colour blue. 4. ————————————————- Right click within a table cell to bring up additional options such as insert row/column, delete row/column, etc. See figure 18. 5. ————————————————- Alternatively, select the Layout tab, see figure 17 to insert rows, columns, delete table, etc. 6. ————————————————- Using figure 19 as a guide, complete the remaining cells within the table. . ————————————————- Save the document as Table Example within the WordEssentials folder and close the document. Figure [ 17 ]: Table options Courses Microsoft Office 2007 Training Courses| October| Word| Essentials| October| Excel| Essentials| October| PowerPoint| Essentials| October| Access| Essentials| November| Word| Advanced| November| Excel| Advanced| November| PowerPoint| Advanced| November| Access| Advanced| A range of other course are available in each Microsoft application Shapes and SmartArt Click on the Office button and create a new document and ensure the Insert tab is selected. The Illustrations group on the Insert tab has buttons for inserting pictures, ClipArt, Shapes and Charts, there is also an option to use SmartArt which is a new feature on the Insert ribbon. 1. ————————————————- Click on the downward arrow below shapes. A range of shapes, lines, arrows are available. See figure 18. Note the option New Drawing Canvas at the bottom of the list (this appeared automatically in Word 2003) 2. ————————————————- Select three flow chart shapes of your choice and draw them on the page, one beneath the other. Draw connecting lines from the first shape to the second and a line from the second to the third shape. Figure [ 18 ]: Shapes 1. ————————————————- With the Insert tab still selected, click on Blank Page (from the Pages group). 2. ————————————————- Click on the SmartArt control and browse through the different categories down the left hand side. See figure 21 3. ————————————————- Select Block cycle from the Cycle category and click OK. See figure 21 with block cycle selected. Note the SmartArt ribbon appears. See figure 22. Figure [ 19 ]: SmartArt Figure [ 20 ]: SmartArt Ribbon Add Shape Change Colours 4. ————————————————- Click into each area of the cycle in turn and type the tasks associated with completing the ECDL qualification. See figure 23. 5. ————————————————- Click anywhere on the page when the cycle is complete. To access the SmartArt ribbon, double click on the shape and it will reappear. 6. ————————————————- To change the colour of the cycle, click on the Change Colours control, see figure 22. 7. ———————————————— To delete a shape, selec t the shape and press delete on the keyboard. 8. ————————————————- To insert a shape, select a shape next to where you want the new shape and click on Add Shape, see figure 22 9. ————————————————- To change the layout use the arrows to the right of the Layouts group and click a layout to select. 10. ————————————————- To change the SmartArt style, click on the arrows to the right of the Styles group and click the style to select. Figure [ 21 ]: Steps to complete ECDL Note: for more advanced features of SmartArt, see Advanced courses in Word and PowerPoint. Headers and Footers 1. ————————————————- Ensure the Insert tab is selected. Click the downward arrow under Header, (within the Header Footer group) to see the full range of header styles. Click the arrow beneath Footer and Page Number to view the styles available. See figure 24. 2. ————————————————- Click on the Footer button and select Alphabet style. Type your name in the [Type Text] box. The page number will appear on the right of the footer. . ————————————————- Notice the view of the ribbon/tab has changed, i. e. a design tab for header and footer appears. See figure 25. 4. ————————————————- Click Close Header and Footer (see figure 25). Note: Another way to access headers or footers is to double click the header or footer area of the page. Figure [ 22 ]: Headers and Footers Note: When in the header or footer area the header and footer tools/controls appear, see figure 25. To return to the main document, click the Close Header and Footer button see figure 25. Figure [ 23 ]: Header and footer tools Quick Parts and Building Blocks Quick Parts and Building Blocks provide a menu of reusable document parts, for example headers, footers, cover page, tables, etc. 1. ————————————————- With the Insert tab selected, click on Quick Parts from the Text group. Any quick parts created will be displayed. In figure 26 below, a cover sheet for IT courses has been created and saved as a quick part. 2. ————————————————- Click on Building Blocks Organizer to see the full list and type. Select a building block and note the preview displayed. To use a building block, select it and click Insert Figure [ 24 ]: Quick Parts 1. ————————————————- With the Building Blocks Organizer open, click on the heading Name, to sort items by name. To sort by Gallery, Category or Template, click on the particular heading. 2. ————————————————- Select one of the building blocks and click Edit properties. The Modify Building Block box opens (see figure 27). Changes can be made, click OK Figure [ 25 ]: Modify Building Blocks 1. ———————————————— To add a document part to Quick Parts or Building Blocks, select the item (for example to create a heading with QUB l ogo): 2. ————————————————- Ensure the Insert tab is selected, click Header and select Edit Header 3. ————————————————- Click on Picture within the Insert tab and insert Logo_QUB from the folder saved to your desktop. 4. ————————————————- Click on the downward arrow next to Quick Parts and select Save selection to Quick Part Gallery (see figure 27). . ————————————————- Type a name for the Quick Part, i. e. QUBLogo, select the Header gallery from the drop down list. See figure 28 Figure [ 26 ]: Create Quick Part 1. ———â€⠀Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- Open a new blank document 2. ————————————————- Click on the arrow next to Quick Parts and select Building Blocks Organizer 3. ————————————————- Click on Name to sort by name and scroll down to QUBLogo 4. ————————————————- Click Insert The Page Layout Ribbon Click the Page Layout tab to display the page layout section of the ribbon, see figure 29. Figure [ 27 ]: Page Layout Ribbon Margins 1. ————————————————- Ensure the ECDL Leaflet document is opened. 2. ————————————————- Within the Page Setup group, click the downward arrow under Margins, to change the margins of the document 3. ————————————————- Note the range of page set up styles provided but in this case choose Custom Margins 4. ————————————————- Change the top margin to 3. cm and the bottom to 3. 00 cm (see figure 30). 5. ——â⠂¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€Ã¢â‚¬â€- Note the option to change page orientation (leave as Portrait) 6. ————————————————- Click OK Figure [ 28 ]: Page Set up Indents and Spacing 1. ————————————————- Select the first paragraph of text under the heading â€Å"Is your CV missing something? † 2. ————————————————- Ensure the Page Layout tab is selected and click on the launcher button to the right of the Paragraph group (see figure 12 for launcher button) 3. ———————————————â⠂¬â€ Ensure the Indents and Spacing tab is selected and from Special select First line indent (see figure 31). 4. ————————————————- Change the line spacing to 1. 5 lines with 10 pt spacing after the paragraph (see figure 31). Click OK Figure [ 29 ]: Indents and Line Spacing As mentioned earlier section breaks can be inserted from the Page Layout tab, from within the Page Setup group, (click the arrow beside Breaks to select section breaks), see figure 29. The References Ribbon Click on the References tab to display the ribbon, see figure 32. The References tab is used for working with long documents, i. e. generating a table of contents and index, inserting footnotes and endnotes, inserting captions for tables and figures, etc. It will not be covered in this practical. Figure [ 30 ]: References Ribbon The Mailings Ribbon Click on the Mailings tab to display the ribbon, see figure 33. Tools on the Mailings tab are used to create mail merged documents, labels and envelopes. A document has been created named ExamResults containing student exam results (three topics) for seven students. Figure [ 31 ]: Mailings Ribbon 1. ————————————————- Open the document StudentResults and ensure the Mailings tab is still selected 2. ————————————————- Click on the Start Mail Merge button and select Normal Word document 3. ————————————————- Click on the downward arrow next to Select Recipients and choose Use Existing List 4. ————————————————- Browse to the WordEssentials folder and select the file ExamResults. Click Open 5. ————————————————- Position the cursor after the text Student Name and click on the downward arrow beneath Insert Merge Field 6. —————†”—————————— Select Student Title (see figure 34), leave a space and repeat, inserting Student_First_Name and Student_Surname 7. ————————————————- Position the cursor in the first blank cell of the table (beneath Module Result) 8. ————————————————- Insert fields for Introduction to Pure Maths, 9. ————————————————- Repeat point 8 above for Applied Maths and Programming (should resemble figure 35) Figure [ 32 ]: Insert Merge Field Merged Fields 10. ————————————————- Click on Finish and Merge 11. ————————————————- Click Edit Individual documents, select OK 12. ————————————————- Exam results for 7 students should be completed. The Review Ribbon Click on the Review tab to display the ribbon, see figure 36. The Tracking group is used to track changes made to a document and the Changes group is used to accept or reject changes. These will not be covered in this practical. The spell and grammar checker, thesaurus word count and translate tools can be accessed from the Proofing group of the Review tab. To spell check the ECDL leaflet, click on Spelling Grammar. As with previous versions of Word, suggestions will be given, along with the option to add to dictionary. Figure [ 33 ]: Review Ribbon Proofing group The View Ribbon Click on the View tab to display the ribbon, see figure 37. Within the Document Views group the various views with text description is displayed. Also note the views are displayed in the status bar across the bottom of the window. Figure [ 34 ]: View Ribbon Developers Ribbon To show the Developers ribbon, click on the Office Button and select Word Options. Ensure the Show Developer tab in ribbon is ticked. See figure 38. The Developers tab is not covered in this practical. Figure [ 35 ]: Show Developer Tab in Ribbon Click on the Developer tab to display the ribbon, see figure 39. Figure [ 36 ]: Developer Tab * The Status Bar The Status Bar is positioned across the bottom of the window, see figure 40. There are over 20 choices on the bar, see figure 41. To display the Customize Status Bar dialog box, right click on the Status Bar. Items with a tick beside them will appear on the Status bar. To add an item, click on it. To remove an item, click on the ticked item. Figure [ 37 ]: Status Bar Figure [ 38 ]: Status Bar Options Word Options Previously Word options were accessed from the Tools menu by selecting Options. Word Options is now accessed by clicking on the Office button and selecting Word options. The Word Options menu will then appear. See figure 42. Click on the tabs down the left hand side to access features associated with the tab. In figure 42, the Popular tab is selected showing the top options for working with Word. Figure [ 39 ]: Word Options Customize Quick Access Toolbar 1. ————————————————- With Word options still open, click on Customize 2. ————————————————- Click on the downward arrow next to Choose Commands From (see figure 43). Notice all the tabs are listed along with options to add tools not displayed on the ribbon. 3. ————————————————- Select the Insert Tab and select Convert Text to Table. See figure 43 4. ————————————————- Click the add button to add the tool to the Quick Access Toolbar 5. ————————————————- Click OK. See figure 43 Figure [ 40 ]: Add to Quick Access Toolbar File Formats Most Word files created in 2003 can still be opened in 2007. Word 2007 uses four file extensions: 1. .docx – file ending for ordinary Word 2007 documents 2. .docm – file ending for macro enabled documents 3. dotm – file ending for Word 2007 templates (does not contain macros) 4. .dotm – file ending for macro enabled templates By clicking on the Office Button and selecting Save As, you have the option to save as a Word Document (2007 version), Word Template, Word 97-2003 or select Other Formats, see figure 29. Even if the document is saved in Word 2007 format, Word 97/2003 users can still open it if they have downloaded the compatibility pack from Microsoft online. Figure [ 41 ]: File Formats Note: Word’s . doc used binary, whereas . docx uses XML. .docx creates smaller files than . doc and are less likely to become corrupt. Use SaveAs to save one type of document as another Save the Document 1. ————————————————- Click on the Office Button and select Save As 2. ————————————————- Save the document as ECDL Information (notice the file ending), see figure 45 3. ———————————————— Save it in the WordEssentials folder, see figure 45 4. ——— —————————————- Close the application Figure [ 42 ]: Save Compatibility Checker Provided Word 2000-2003 users download the free Office 2007 compatibility pack, they will be able to read and write to Word 2007 files. Occasionally users will get a message stating that certain features might be lost when converting between these different formats. Word automatically runs compatibility checks if a document is being saved in a different format from the current one. If you prefer, you can run a compatibility check at any time to find out if features would be lost in saving to another file format. To run the compatibility checker, click on the Office button and select Prepare, Run Compatibility Checker. See figure 46 Figure [ 43 ]: Run Compatibility Checker Ensure the Check compatibility when saving in Word 97-2003 formats check box is ticked. See figure 47. If the checker is turned on, whenever you use a feature in Word 2007 that is not supported in Word 97-2003 the Compatibility Checker will pop up highlighting the issue, see figure 48. Figure [ 44 ]: Compatibility Checker Security Features There are a range of different types of protection methods that can be used with Word 2007 Restricting Permission: Information Rights Management: This option allows users to access Microsoft’s service to restrict access to those who can open or make changes to a document. Click on the Office Button, select Prepare, Restrict permission and Restricted Access, see figure 48. Note you may need to download the software from Microsoft (see figure 47) and sign up to the service the first time you use it, see figure 50. Figure [ 45 ]: Restricted Access Figure [ 46 ]: Information Rights Management At this stage it is a free trial service but it is possible Microsoft might charge for the service in the future. Figure [ 47 ]: Sign Up Style Formatting, Tracked changes, comments and filling forms Restrictions * Restricts formatting to particular styles * Protection is by password * Accessed from Review ribbon, Protect Document, Restrict Formatting and Editing (see figure 51). * Make selection from Restrict formatting and Editing pane, see figure 52. Figure [ 48 ]: Formatting Restrictions Limit formatting to a selection of styles – tick box Figure [ 49 ]: Restrict Formatting and Editing Select type of editing allowed from drop down list Click Yes, Start Enforcing Protection to enter password Password to Open/modify Click the Office Button, select Save As – Tools – General Options and enter the password to either open and modify or modify only, see figure 53. Figure [ 50 ]: General Options Inspect Document To inspect a document to see if it contains personal data or comments, click the Office Button, select Prepare, Inspect Document. Click Inspect on the Document Inspector, see figure 54. Figure [ 51 ]: Inspect Document Mark as Final A document can be marked as final if it had no further modifications to be made. This option will render the document read only. Users with Word 2007 can remove the feature if necessary. Users with earlier versions of Word, even with the compatibility pack won’t even see the file as Read Only. Word Help To access Word help, click on the question mark at the right hand top of the window. Type keyboard shortcuts in the box provided and click on Search. See figure 55. Links to a range of possible solutions will be provided. See figure 55 Figure [ 52 ]: Help The Get Started Ribbon For additional help on using the Office 2007, download to your own computer the Get Started ribbon (also provided for Excel, PowerPoint). See figure 56. A range of interactive materials, videos, online training and discussion forum is provided. See figure 56. To download the Get Started Ribbon (when you return to your own computer), open a web browser and go to http://office. microsoft. com/en-us/help/HA102146851033. aspx Figure [ 53 ]: Get Started Ribbon Bibliography TitleAuthor(s)Publisher Goal Directed Project ManagementE S. Anderson et al. Kogan Page Coopers Lybrand, 1987 The Handbook of Project ManagementTrevor L YoungInstitute of Directors, 1999 Introducing Prince – The Structured Project Management MethodC. BentleyNCC Blackwell, 1992 Project Management – 5th EditionDennis LockGower, 1994 Project Management – A Managerial Approach 4th EditionJ. R. Meredith S. J. Mantel, Jr. John Wiley and Sons Inc, 2000 Project Management – A Systems Approach to Planning, Scheduling, and ControllingHarold KerznerJohn Wiley and Sons, Inc, 1998 Project Management ToolsJacques SurveyerSoftware Development Magazine, July 1997 Project Management for the 21st CenturyB. P. Lientz K. P. ReaAcademic Press, 1998 Project SkillsSam Elbeik Mark ThomasButterworth Heinemann, 2000 Step by Step – Microsoft Project 2000C. S. Chatfield T. D. JohnsonMicrosoft Corporation, 2000 How to cite Microsoft Office and Figure, Papers

Saturday, December 7, 2019

IT Risk Management Robust Economy

Question: Describe about the IT Risk Management for Robust Economy. Answer: Introduction: New South Wales is the most preferred site in the region of Asia-Pacific because it had a robust economy. NSW government is working on securing property and personal. It also focuses on risk management program. It works on providing structure to the on-going risk management Mark, 2014). The activities like documentation and record keeping are also generated with the development of risk management program. The most important step correspondent to the security purposes is the regular monitoring of the activities and evaluation. The activities which are associated with the risk management program are divided into four sections which are named as framework for security risk management, control for core security risk, control for security risk should be provided in priority areas, and control for security risk should be provided in unplanned activities (Moodley, 2011). Objective: The objectives of the government of NSW are summarized below: Confidentiality of the information: It restricts the unauthorized access and the disclosure of the information (Taylor, 2008). Integrity of the information: it helps in protecting the information for unauthorized alteration of the data and prevents it from challenges faced in providing authenticity. Availability: The authorized user of the information should be provided reliable and timely access of the information and data. Compliance: The security controls should comply with the applicable regulations, policies, legislation, and contractual obligation which are essential for the information to be lawfully available to the users (Jin, 2011). Assurance: The assurance should be provided to the government for accessing the confidential information. Diagram: Explanation of the Diagram: Identification of Hazard for Security: The nature of work should be observed Proper review should be carried out of incident reports, hazard reports, and any other relevant data. Proper review should be carried out of results of the recent security incident Proper review should be carried out of the operational reviews. Consultation should be done with staff to predict the data which they consider as the hazards (Taylor, 2008) Consultation should be done with the stakeholders to predict the external agencies data which they consider as the hazards Inspection and audits should be done of the workplace Development of the scenarios which can be predict as the consequence of the incident which is relevant to the security (Richard, 2011) Proper analysis of the breaches and the incidents Establishing of the risk factors which are associated with the information. Factors responsible for the security risk: Frequency and exposure of the hazard The potential of the loss which is associated with the risk Occurrence of the damage or loss Risk associated with the property Control strategies which are taken into consideration. Process of Risk assessment: Consultation with the staff members Experience at the workplace should be examined Reviewing of the incident Reviewing of the guiding material Security Risk Analysis: Source of the risk Action associated with it Cracker Profiling of the system Social engineering concept Intrusion in the system Accessing of the unauthorized system Computer criminals Cyber crime Act of frauds Bribery of the information Spoofing of the system Intrusion in the system Botnets Spam Activity of phishing Terrorist Penetration of the system Tampering of the system Espionage of the industries Exploitation of the economy Theft of the information Penetration of the system Social engineering Unauthorized access of the system Insiders Blackmailing Computer abuse Theft and the fraud Loss of personal information Misuse of personal information Creation of the system bugs Creation of the system intrusion The magnitude of the risk can be categorized as high, low, and medium which are summarized in the table below: Impact of the Risk Explanation High The costly loss of Assets is categorized as High Medium The risks which are associated with violating and harming operational activities are categorized as medium Low Some Loss of assets and operational activities are categorized as low The table below shows scaling of the risk: Portability of the Risk Low Medium High High (1.0) Medium 10 * (10 * 0.1) Medium 20 (20 * 0.1) High 30 * (30 * 0.1) Medium (0.5) Low 10 * (10 * 0.5) Medium 10 (20 * 0.5) Medium 15 (30 * 0.5) Low (0.1) Low 1 (10 * 0.1) Low 2 (20 * 0.1) Low 3 (30 * 0.1) Comparative Analysis of Deliberate and Accidental threats Deliberate threats are the threats which are caused to the sensitive data by unauthorized accessing of the data (Gordon, 2015). Failure of the equipment and software etc are come under the category of accidental threats. Sequential order of the threats is given below: Failure due to power Failure of errors in network infrastructure Obsolescence in technology Errors or failure in the hardware Errors or failure in the software Issues in operation Interception in communication Repudiation Espionage of the communication Attacks of Social engineering Deliberation attack of data Misusing of the system Unauthorized accessing of the resources Shortage of the staff Threats due to environment Reduction in the quality of service Misusing of the web application Incomplete policies or planning for the organization Fraud in finance Unauthorized access of information Equipment theft The difference between the concepts of Risk and Uncertainty: NSW government works on providing structure to the on-going risk management. The risk associated with the information security is amalgamation of the likelihood and the result associated with the incident (Brightwell, 2014). The risks are associated with the threats and threat can exploit the vulnerabilities of the information system. The situation which arises from imperfect and unknown information is known as uncertainty (Mahmood, 2015). It may arise due to the internal or external accidental loss of data. Evaluation of Risk Control: Economic Appraisal Management of the risk Management of the values Objective specification Identification of the option Modification of the option according to the reviewing of the risks Evaluation of the option Selection of the option For each option available: Establishment of the content of risk Identification of the risk associated with each option Assessment of the magnitude Development of the strategies Development of the option Identification and evaluation of the risk Evaluation of the option Preparation of the report Process of Risk Management: Familiarization of the proposal: Objective Definition Identification of the criteria Definition of the key elements Analysis of the risk Identification of the risk Assessment of the risk Ranking of the risk Risk associated with screen minor Planning of the response: Identification of the responses Selection of the best response Development and management of action Report Generation Management of the schedules and measures Implementation: Schedule management effect Monitoring and reviewing of the plan Security risk controls: Substitution of the hazard which can give rise to the hazard Isolation of the hazard by putting it on the risk Minimization of the risk by using the engineering process Minimization of the risk by using the administrative process Equipments should be used for personnel protection Inspection and audits should be done of the workplace Development of the scenarios which can be predict as the consequence of the incident which is relevant to the security Proper development of the hazard report, incident report, incident management report, incident investigation report, injury management report, and others. Principles: The key principles on which the policies are based are as follows: The objective is to provide services which are in the welfare of the people. The information related to the person should be securely managed so that the privacy and confidentiality of the data can be preserved Security should be provided to the critical and sensitive information The level of security should be determined for securing the information Policy for digital information security is classified as M2012-15 Awareness program should be organized for educating the people about the security to the digital information The information which is released should be comply with the current state of the legislation The controls for securing the information should be implemented to mitigate from the risk associated with the sensitive information. Eight Rules of Information Security: Least privileged rule: For example; creation of the security policies Change rule: For example; Backup of the test server Trust rule: For example; accuracy in the perception Weakest link rule: For example; Identification of the environment weakest link Separation rule: Isolation of services and data Three fold process rule: It is the combination of implementation, monitoring, and maintenance Preventative action rule: Awareness of security issues Immediate and proper response rule: Quick reaction References: Mark, S. (2014). Regulation of the legal services in the E-world (1st ed.). Retrieved from https://www.olsc.nsw.gov.au/Documents/regulation_of_legal-services_working_paper_oct2011_part1.pdf Moodley, K. (2011). Electronic Information Security Policy - NSW Health s (1st ed.). Retrieved from https://www0.health.nsw.gov.au/policies/pd/2013/pdf/PD2013_033.pdf Gordon, T. (2015). Useful Security Information for Business (1st ed.). Retrieved from https://www.secure.nsw.gov.au/what-you-can-do/useful-security-information-for-business/ Brightwell, L. (2014). NSW Electoral Commission (1st ed.). Retrieved from https://www.elections.nsw.gov.au/__data/assets/pdf_file/0007/193219/iVote-Security_Implementation_Statement-Mar2015.pdf Mahmood, F. (2015). Eight Rules of Information System Security (1st ed.). Iversion. Retrieved from https://blog.iversion.com.au/eight-rules-of-information-system-security/ Taylor, A. (2008). Information Security Management Principles (1st ed.). BCS. Retrieved from https://www.bcs.org/upload/pdf/infosec-mgt-principles.pdf Richard, M. (2011). Risk Management Guideline (1st ed.). Retrieved from https://www.treasury.nsw.gov.au/__data/assets/pdf_file/0009/5103/risk_management.pdf Jin, Z. (2011). Vulnerability Analysis Approach To Capturing Information System Safety Threats and Requirements (1st ed.). Retrieved from https://www.sersc.org/journals/IJSEIA/vol5_no4_2011/7.pdf