I have an excel workbook with a few sheets. Our main focus are sheets “Step 2” a

I have an excel workbook with a few sheets. Our main focus are sheets “Step 2” and “Step 3”. If you notice, the workbook is a Macro enabled workbook. The goal is to achieve the same results of the macro using a formula, instead of the macro and getting rid of the macro all together. 
Please review my video (attached) for instructions. 

  PC-3.2: Interact with others in a professional manner using appropriate commun

 
PC-3.2: Interact with others in a professional manner using appropriate communication and presentation skills.
Purpose
The ability to make presentations is important for any professional. This assignment reinforces your ability to develop a presentation for upper management. 
Assignment Instructions
Based on the knowledge you have achieved thus far in this class, compose a minimum 10-slide research presentation using the current APA version with title and reference slides using Microsoft PowerPoint. Prepare the slides for a 15-minute professional presentation on the topic of cybersecurity policies contains a policy recommendation of some type. Your presentation will be to upper management in an enterprise firm with over 2,000 employees and six locations throughout the world. Your presentation needs to include a title slide and follow APA formatting guidelines. 
Note: Be sure to use the notes portion within the slides to include additional content.
Then, compose a 1-page paper explaining how you will utilize interpersonal skills, including communications skills, problem solving, decision making, listening skills negotiation, and assertiveness to obtain management buy-in for your policy recommendation. 
Assignment Requirements
Include a title slide.
10 slides in length, not counting the title and reference slides
Includes a highly developed viewpoint and purpose and exceptional content
Paper and slides demonstrate superior organization and are well ordered, logical, and unified.
Free of grammar and spelling errors
No evidence of plagiarism
At least three outside references on the topic of cybersecurity policies
One-page paper using the most current APA formatting
Your work should demonstrate a comprehensive understanding and expert-level usage of interpersonal skills to embody professional demeanor using all of the following skills: communication skills, problem solving, decision making, listening skills, negotiation, and assertiveness. Make sure to show how you would apply all of the skills in a professional situation.
For assistance with APA requirements, please go to Academic Writer. You will find the link in the Academic Tools section of the course.
Directions for Submitting Your Assignment
Compose your assignment using Microsoft PowerPoint and Word and save them as IT484_YourName_Unit_9_ Assignment 2 and submit them separately to the Assignment 2 Dropbox for Unit 9.
see unit 9-2 rubric

  In this case, the parties eventually settled, and Dr. Lee went on to run the

 
In this case, the parties eventually settled, and Dr. Lee went on to run the Google China initiative. If you were running Microsoft, what would you have done differently in this situation?
Considering that this is a common scenario, how do you recommend companies to respond in the future?
Read the case study on pp. 345-346 of the textbook and answer the following questions:
Based on the standards articulated in the case summary, should the state be allowed to impose a use tax on Quill even though it does not have a physical presence in the state?
Is this the right decision? Should a state be able to impose income taxes on a company whether or not it has a physical presence, as the state supreme court held? Or was the U.S. Supreme Court correct?

  In this discussion, we are going to focus on non-repudiation. Non-repudiation

 
In this discussion, we are going to focus on non-repudiation. Non-repudiation establishes accountability when two parties enter into a transaction. It provides assurance that parties can enter in an agreement independent of their locations. This requirement is the foundation of digital commerce.
Discuss at least three transactions that you have entered in during the last 5 years where non-repudiation was important

  1. Two of the main VPN encryption protocols are TLS/SSL and IPSEC. Both protoc

 
1. Two of the main VPN encryption protocols are TLS/SSL and IPSEC. Both protocols establish handshakes to exchange parameters which will be used to set up VPN connections. In this paper you will first describe the TLS/SSL VPN handshake followed by a the IPSEC handshake. Compare the two protocols and explain, according to you which one is better.
Analysis
0 – 40 points
41 – 90
Demonstrates a lack of understanding of the TLS/SSL and IPSEC protocols
Demonstrates an understanding of the TLS/SSL and IPSEC protocols
Writing Quality & Adherence to Format Guidelines
0-6 points
9-10 points
Paper shows a below average/poor writing style lacking in elements of appropriate standard English and following proper APA guidelines.
Paper is well written and clear using APA guidelines and standard English characterized by elements of a strong writing style.

  You must submit an Index by the end of Week 6. The Index will provide key word

 
You must submit an Index by the end of Week 6. The Index will provide key words that will help those looking for a specific topic. Please reference the link below to create your index.
A link from Microsoft that will show you step by step how to do these…
Index:
https://support.microsoft.com/en-us/office/create-and-update-an-index-cc502c71-a605-41fd-9a02-cda9d14bf073

  In the news we are constantly hearing about security breaches, invasion of per

 
In the news we are constantly hearing about security breaches, invasion of personal privacy, and the increasing prevalence of our digital footprint. The increased availability of digital information presents concerns and challenges of privacy, accuracy, intellectual property rights, security, and censorship. As a global citizen, you need to be aware of these issues and how they impact your life (CO6).
Your instructor will set-up two (2) conversation groups this week in which you will select one topic to discuss which interests you.
Conversation Group: Privacy

Privacy, as it relates to social media, video surveillance, drones, digital footprint or other topics as they relate to digital privacy.
How does the electronic environment impact one’s right to privacy?

Conversation Group: Security

Security, as it relates to social media, video surveillance, drones, digital footprint or other topics as they relate to digital privacy.
How does the electronic environment impact one’s personal security?

Using the Richard G. Trefry Library or another credible source, locate and read a quality article regarding digital privacy or security. Be sure to provide attribution for your source in the forum. As you are formulating your initial post consider the following questions:
What is the issue? Tell us about it as if we know nothing on the topic.
What are the pros and cons of the issue?
Why is the issue important?
How might the issue impact your life?
You are required to participate in one group, and are welcome to participate in the other. Once the conversation is flowing, participate substantively with your peers to teach from one another.

  Analyze techniques to effectively compose a major IT document after watching t

 
Analyze techniques to effectively compose a major IT document after watching the videos or by conducting research by addressing the questions below:
Video: How to format a book in MS Word (Part III: Front matter, back matter and section breaks): https://www.youtube.com/watch?v=R-5kJl5rN6E
Video – Front Matter, Body & End Matter in Technical Documents: https://study.com/academy/lesson/front-matter-body-end-matter-in-technical-documents.html(This is not a mandatory video you must watch; however, there is a special offer for 7 days usage–Try it first for 7 days. Special Offer!)
Explain the purpose of front matter in a technical document and provide examples.
Explain the items found in the body of a technical document.
Explain the purpose of back (end) matter in a technical document and provide examples.

 Considering that there are many security concerns surrounding wireless networks

 Considering that there are many security concerns surrounding wireless networks, and many tools are freely available, how does and administrator or even an individual user go about ensuring the security of their wireless network?  List a minimum of two methods/techniques, and explain the rationale for your decision?

  What citation style does your program of choice use? APA After researching

 
What citation style does your program of choice use? APA
After researching this citation style, what types of challenges will you face when using this citation style?
How does collecting other people’s research help when trying to synthesize information for your own academic endeavors (CO8)?
What are the ethical ramifications of not quoting, citing, or referencing other people’s research in your academic work (CO4)?