Determine if any points are out-of-control. If so, remove those data points and recalculate the limits.

In this assignment you need to consider a measure or metric that you want to track or improve upon. It needs to be something that you can measure and is relevant to either your work or personal life. The measurement may be one that is already tracked at your place of employment or a measurement that you track in order to monitor your personal or professional progress; something such as tracking your weight or blood pressure. More personal examples are: time to travel to work or school, dollars spent on groceries each week, number of missed calls each day, average wait time at a fast food restaurant. In the workplace you could measure number of errors made, number of requests for information, number of hours spent at the copier, number of documents that you print on a daily basis, number of daily emails. Watch the introductory video which discusses more details regarding this assignment and provides examples. Click to view Whatever you choose to measure, you will need at least 25 data points, i.e collect data at 25 different times. From these 25 points, calculate the control limits; either for X-bar and R chart or a p-chart. Determine if any points are out-of-control. If so, remove those data points and recalculate the limits. Once you have your limits, collect at five more data points and comment on whether or not the process is in control. Explain why. Comment on whether or not you found this assignment interesting and useful. This assignment must be done using excel and the excel file submitted in canvas. Include your write-up in the excel file. Refer to the videos in the week 3 module for ideas in the workplace, specifically the one for the healthcare industry. See this link if you are collecting variable data and one sample for every point in time. You can’t use the X-bar formulas provided in the book, you have to do a moving average and there is no R chart: https://en.wikipedia.org/wiki/Shewhart_individuals_control_chart (Links to an external site.)Links to an external site. Watch the video on calculating a moving range chart. Refer to the excel file for control chart examples. You can use this as a template. Chp 3 Control Chart Examples.xlsxPreview the document Your document should have the following elements: 1) summary of results and findings, 2) description of data collection methods and interpretation of data, 3) actual data, 4) calculations (show your work) 5) charts showing data points and control limits that are properly labeled. Grading rubric: element 1) 20 points for interpretation, element 2) 10 points for description of data element 3) 30 points for data collection element 4) 30 points for calculations element 5) 10 points for chart(s)

How many qualifying children does Mike have for the earned income credit?

Tracy is 40 years old, single, and a U.S. citizen with a valid Social Security number. She has a filing requirement.
• Tracy tells you she has chosen not to claim her son, Chris, as a dependent so he can get a higher refund.
• During the interview with Tracy, you determine the following facts:
• Tracy’s son Chris, age 19, is unmarried and was a full-time student during 2016.
• Chris’ income was $6,500 in wages. He does not provide more than half his own support.
• Chris lived with Tracy all year.
• Chris is a U.S. citizen with a valid Social Security number.
1. Chris can claim his own personal exemption since his mother has decided not to claim him as a dependent.

True
False
Using Publication 4012, Who Must File tab, Chart B, Chris has a filing requirement and must file a tax return.

True
False


Mike is 45 and made $36,000 in wages in 2016. He is single and pays all the cost of keeping up his home.
• Mike’s daughter, Brittany, lived with Mike all year.
• Brittany’s son, Hayden, was born in November 2016. Hayden lived in Mike’s home since birth.
• Brittany is 18, single, and had $1,700 in wages in 2016.
• Mike provides more than half of the support for both Brittany and Hayden.
• Mike, Brittany, and Hayden are all U.S. citizens with valid Social Security numbers.
• Mike and Hayden had health insurance that qualified as minimum essential coverage. Brittany did not have health insurance at all in 2016.
3. Who can claim Hayden as a dependent?

A. No one can claim Hayden because he was not a member of the household for more than six months.

B. Mike cannot claim Hayden because Hayden is not Mike’s child.

C. Brittany can claim Hayden because she is his parent.

D. Mike can claim Hayden; Brittany cannot claim Hayden because Brittany qualifies as Mike’s dependent.

4. How many qualifying children does Mike have for the earned income credit?

A. 0

B. 1

C. 2

If Brittany does not qualify for a health coverage exemption, Mike must make a shared responsibility payment.

True
False

• Henry and Claudia are married and want to file a joint return.
• They have one child, Alyssa, who is 5 years old and lived with them all year.
• Henry and Alyssa are U.S. citizens and have valid Social Security numbers.
• Claudia lives with Henry and Alyssa in the U.S. but is not lawfully present in the U.S and has an Individual Taxpayer Identification Number (ITIN).
• Claudia did not have any health insurance for all of 2016. Henry and Alyssa had minimum essential coverage (MEC) all year.
• Henry earned $37,000 in wages and had no other income. Claudia had $5,000 in earned income.
• Henry and Claudia provided all the support for Alyssa.
6. Henry and Claudia are eligible to claim the earned income credit.

True
False

7. Claudia must make a shared responsibility payment.

True
False
• Martin is married, but did not live with or have contact with his spouse this tax year. He does not know where she is. He indicated on the intake sheet that he is not legally separated.
• Martin does not have any dependents.
• Martin worked as a clerk and earned $36,000 in wages. He had no other income.
• In 2016, he took a computer class at the local university to improve his job skills.
• Martin has a receipt showing he paid $1,095 for tuition. He paid for all his educational expenses and did not receive any assistance or reimbursement.
• He paid $350 for a course book from an online bookseller. Purchase of the book was not a requirement of enrollment.
• Martin paid $90 for a parking permit. It was not a requirement of enrollment.
• Martin does not have enough deductions to itemize.
• He is a U.S. citizen with a valid Social Security number.
8. Martin’s filing status is Single.

Grandparents World

Grandparents World
Name
Institution

Grandparents World
Cooking and baking are some of the events that young individuals and old people should be involved in. This mostly applies from grandparents to their grandchildren. It becomes even more of amusing when the grandchildren are to taste some of the guidelines, hand over some ingredients, clean the veggies, add or stir elements or even set the table.
Menu planning and Restaurant concerns should be conventional in terms of price, nutrients, food composition or even recipe price. It is also very important to keep diet when planning a menu. In consideration, you should also get to know your customers, if the café is in a small town full of plant employees, you may need to increase ration sizes of proteins to ensure that your customers are pleased enough for another turn up.
In hotel lodging, swimming pool, free unscrewed WIFI and even cleaning services are some of the concerns to be keyed in. This helps mostly in relaxation of one’s mind, excising of the body and timeless charts with friends and relatives R. A. (2006). . It is also a one way to get more and more customers to venture in the hotels.
In a matter of fact, there are also several major customer issues in these organizations. Some of the clients are usually irritated or even upset because they are confused of the mistake you or your firm have made, or even having a bad day. Some of the clients may also ask for a markdown you cannot give, this may be a way of promoting your clients but on the other hand you may be risking or degrading the perception of your brand where, one’s you offer a reduction it becomes harder to get people to purchase at a full price again.

Grandparents World

A simple summary of a baked cake, is a sweet baked food made from a combination of flour, sugar, eggs, milk and other ingredients such as butter prepared in to a solid piece then baked or hovered R. A. (2006). .
The very essential details of a cake may comprise, Boston cream cake, white sponge cake divided by vanilla custard and topped with a decadent chocolate glaze and snowy chocolate sprinkle.
Due to the combined ingredients used to make this product, it will be extra-large and having some benefits to human health. A chocolate cake baked and taken in the morning as breakfast may help to reduce weight and still may help to add some needed nutrients to human body.
The target market for selling baked cake may be stationed in terms of demographic or even geographic features. Demographic criteria mostly include age, gender, family status or even income. While geographic segmentation will involve the regions climate and population density. Using the population estimates from the last census, a bakery can estimate the number of potential customers and plan its operations accordingly.
The cost of production will be estimated when you review the cost to run your bakery or even the identification of variable cost from your fixed cost. The variable products may comprise of those that increase and decrease to how much food you make and sell, while the fixed costs remain constant. Some of the costs may comprise electricity used to run the equipment on which
Grandparents World

you cook food e.g ovens, payroll work costs used to pay employees changes with their production on the amount of food they make, supplies and packaging items and even the ingredients e.g. wheat, butter etc. when they increase the cost of production will also increase with a certain fraction.
The product can be made from home and may be sold at weddings, famer’s market or even in bistros. The business will use a print media where it will use make a beautiful magazine-style collection of the cakes designs R. A. (2006).
When it comes to magazine advertising, the business will use the minor or even the local publications which charges less than the national magazines. Though size, occurrence, regional rates, color, sitting or even negotiate may rise the charges, where a full pages will charge $10,000, frequency will go for $ 2,000 etc. it’s a better bet for small industries depending on your industry R. A. (2006). .
In conclusion, the business will give ad e.g. free delivery until destination points, free tasting samples, discount and even after sale serves in order to promote its customers.

Network Topology

I. Network Design

A. Network Topology

Technical Requirements

In this section, you will assess UMUC’s technical requirements. Use the information provided in the scenario to analyze the need for network topology, cables and connectors, networking and internetworking devices, wide area networking design, and computer systems. If you need more information, feel free to ask your instructor or make some assumptions. If you make assumptions, be sure to list them. This section should be used to describe the technical requirements of the task at hand. That is, you will be making explicit the requirements as you understand them, which will lead to the next section (your proposed solution).

Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that students and faculty health, well¬being, and morale have a significant impact on the learning experience and productivity of the academic institution. Secure Network Contractors understands the following technical requirements. The university has invested in a new building that will bestow an academic ambience while providing students and faculty a world class research and learning environment. The university has hundreds of Faculty that teach and perform research within the new academic building. Faculty should be able to seamlessly transition between the newly leased building, and other buildings on the UMUC campus. Students will be required to have a similar experience as classes take place in multiple buildings across campus each day. Faculty and students will be required to print regardless of location, and therefore needs shared printing resources. All computers should be able to communicate, but the human resources department should operate on a separate network due to the sensitive and personally identifiable information they handle. We understand that the newly leased building will need to wirelessly communicate with other buildings on campus, and we will address this in the Wide Area Network (WAN) section that follows. Etc. (students should continue to explain the technical requirements).

Proposed Topology

Select one or more topologies to use for this design (i.e., star, bus, mesh, ring, and please note that the star topology is the most commonly used). This section should be used to provide the details of your proposed solution. Be specific and include the model, manufacturer, features, and cost of devices where appropriate. Students should include a visual representation of the topology selected. Topologies can be created using Microsoft Visio, or you can create a free account at draw.io (https://www.draw.io) and create diagrams. Be sure to review the types of topologies and highlight the benefits and drawbacks for each.

Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that from a comparison of all the types available a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). We believe a ring topology satisfies the requirements of forming a single, continuous pathway for data to be transmitted through each node. A ring network topology in where each node connects to exactly two other nodes. A node on a network can be considered a computer, laptop, printer, or mobile device. Each node has a unique network address, which is referred to as the Media Access Control (MAC) address. The MAC address provides… Etc. (students should continue to explain their proposal).

Justification

This section should be used to justify your proposed solution based on the requirement(s). That is, you are explaining why you proposed the solution in the aforementioned paragraph, based on the technical requirement you made explicit in aforementioned paragraph.

Example (Note: The paragraph that follows is an example. It is expected that students will use this as a reference only. Remember to include references and cite your work according to IEEE-style format.)

Secure Network Contractors believes that a ring topology is the best solution based on the requirements described by the University of Maryland University College (UMUC). Specifically, the requirement that data flows in one direction, reducing the chance of packet collisions. The ring topology reduce the need for network servers because they are not needed to control network connectivity between each workstation. Etc. (students should continue to explain their proposal).

B. Cables and Connectors

Note: (Students shouldconsider the needs for both a wired and wireless implementation as your proposal should include both.)

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to cables and connectors. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Cables and Connectors

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions., The justification should explain why you chose what you did and how it meets the UMUC’s goals for training and presentation to students

C. Networking and Internetworking Hardware

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to networking and internetworking hardware. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Networking and Internetworking Devices

This section should be used to provide the details of your proposed LAN solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions.

D. Wide Area Network (WAN) Design

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to the Wide Area Network (WAN) design. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Wide Area Network (WAN) Design

This section should be used to provide the details of your proposed ISP solution, Be sure to cover what options are available through leased lines, metro Ethernet, and dedicated connections are based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions.

E. Computer Systems Hardware

Technical Requirements

In this section, you will assess UMUC’s technical requirements related to the computer systems hardware for both classroom end points and servers as well as what would be needed for dedicated IT use. You will need to make assumptions where appropriate. When making assumptions, list each and make sure to justify the solution in the Justification section.

Proposed Computer Systems Hardware

This section should be used to provide the details of your proposed solution, based on the technical requirements and assumptions. Student should be specific when discussing the models, types, and costs.

Justification

This section should be used to justify your proposed solution based on the technical requirements and assumptions.

II. Network Addressing and Security

A. Subnetting

Overview

Subnetting is a process of breaking a large network into small networks known as subnets. Subnetting happens when we extend the default boundary of the subnet mask. Basically, we borrow host bits to create networks (i.e., subnets).

We have been assigned the network address 192.168.2.0. Based on the chart below, we know this is a Class C address. This is determined by observing the first octet of the IP address, which is 192. This octet falls in between 192 and 223.

Class
Octet Decimal Range
A
1 – 126
B
128 – 191
C
192 – 223

Each class has a predefined default subnet mask that tells us the octets, which are already part of the network portion, as well as how many bits we have available to work with.