System Analysis And Design

Assignment 1 Amended:

Back-end:

Per original assignment 1 (Available on UBLearns) Pages 16 and 17 you will be building an Access DB back-end table structure as shown on 16 with the Primary Keys/attributes shown on the schema from page 17. The tables will be related as shown via the keys and they will be populated with 8 records in each table that work seamlessly with the relationships provided. The only table not necessary to build is the “TravelerInRoom” table.

Front-end:

A form will be built that is driven by the back-end data. The student will identify the Use Cases/Events/functions the form will provide that serve a valid purpose based of the data in the back-end.

You will provide identified Use Cases/Events via a User Story with acceptance criteria as shown in the book from chapter 3 and shown below.

Output / Report:

On the front-end form there will be a button created that provides a report based off the information you have populated the form with. Often customers need a printed receipt or bill based off the information the user see’s on their form/screen. Building a report (CREATE an actual MS ACCESS Report not a printable form please) allows for the data to be viewed/printed for the customers records. The report button should show the report in “Report View”, do not choose the print report option – the report needs to be viewed on the screen not sent directly to the printer.

This will be an example of a mini system and you will complete true system analysis and design from start to end. You will create the entire system from scratch by building the tables, relationships, populating the tables via data mining and creating a front end form that performs the events identified as needed. You can populate the form with the table data via queries and macros or pure VBA. That option can be chosen by the student.

Case Scenario

Case Scenario: YieldMore -Task 1

 

© 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1

Introduction:

In managing risks in an organization, professionals in the information technology (IT)

department conduct research to identify threats, vulnerabilities, and threat/vulnerability pairs.

Then, the IT professionals determine the likelihood of each threat occurring. The IT

professionals present this information to IT management, whose role in risk management is to

determine and recommend approaches to manage these risks. IT management then presents

these recommendations to the senior management, whose role is to allocate resources,

specifically money and employees, to prepare for and respond to identified threats and

vulnerabilities appropriately.

 

This activity allows you to fulfill the role of IT professionals in a small business tasked with

identifying threats, vulnerabilities, and threat/vulnerability pairs; estimating the likelihood of

these threats occurring; and present this information to IT management.

 

Scenario:

YieldMore is a small agricultural company, which produces and sells fertilizer products. The

company headquarters is in a small town in Indiana. Outside its headquarters, there are two

large production facilities—one in Nebraska and other in Oklahoma. Furthermore, YieldMore

employs salespersons in every state in the U.S. to serve its customers locally.

 

The company has three servers located at its headquarters—Active Directory server, a Linux

application server, and an Oracle database server. The application server hosts YieldMore’s

primary software application, which is a proprietary program managing inventory, sales, supply-

chain, and customer information. The database server manages all data stored locally with

direct attached storage.

 

All three major sites use Ethernet cabled local area networks (LANs) to connect the users

Windows 7 workstations via industry standard managed switches.

 

The remote production facilities connect to headquarters via routers T-1 LAN connections

provided by an external Internet service provider (ISP), and share an Internet connection

through a firewall at headquarters.

 

 

Case Scenario: YieldMore -Task 1

 

© 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 2

 

Individual salespersons throughout the country connect to YieldMore’s network via virtual

private network (VPN) software through their individual Internet connections, typically in a home

office.

 

 

 

Case Scenario: YieldMore -Task 1

 

© 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 3

Task 1:

You will be assigned to a team where you need to assume the roles of IT professionals

assigned by YieldMore’s IT management to conduct the following risk management tasks:

1. Some of the possible roles that could be fulfilled by the team members are: server

manager, network manager, database manager, and security manager. You as a team

have to decide for which functional area each of you will be responsible and who will be

the team leader.

2. Identify threats to the seven domains of IT within the organization.

3. Identify vulnerabilities in the seven domains of IT within the organization.

4. Identify threat/vulnerability pairs to determine threat actions that could pose risks to the

organization.

5. Estimate the likelihood of each threat action.

6. Prepare a brief report or presentation of your findings for IT management to review.

 

Rubric:

1. Did the team establish an appropriate functional area for each member and pick a

leader?

2. Did the team identify all of the threats in the organization?

3. Did the team identify all of the vulnerabilities in the organization?

4. Did the team identify the threat/vulnerability pairs and use them to determine threat

actions that could pose risks to the organization?

5. Were the team’s estimates the likelihood of each threat action logical and plausible?

6. Did the team create a professional, well-developed report with proper grammar, spelling,

and punctuation?

 

 

 

 

Case Scenario: YieldMore -Task 1

 

© 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 4

Introduction:

In an environment of compliancy laws, regulations, and standards, information technology (IT)

departments in organizations must develop comprehensive organizational policies to support

compliance. One specific area in which they must develop policies is the governance of

fiduciary responsibility (check the Sarbanes-Oxley law).

 

Scenario:

As changes occur in compliancy laws, regulations, and standards regularly, IT management of

YieldMore has decided to evaluate the governance of fiduciary responsibility within the

organization as it pertains to the IT department.

 

Your team has been assigned the task of evaluating how the governance of fiduciary

responsibility affects the organization’s risk.

 

Task 2:

You are asked to identify the relationship between fiduciary responsibility and organizational

risk, and present this information to the IT management of YieldMore.

1. Identify key stakeholders, their roles and responsibilities, and the impact of fiduciary

responsibility on each.

2. Determine the relationships among these stakeholders, the relationship between

fiduciary responsibility, and organizational risk for each.

3. Distinguish the identified relationships as they relate to strategic, operational, and

compliancy goals for the organization.

4. Develop an appropriate plan to govern fiduciary responsibility for the organization.

5. Prepare a brief report or presentation of your findings for IT management to review.

 

Rubric:

1. Did the team correctly identify key stakeholders, their roles and responsibilities, and the

impact of fiduciary responsibility on each?

2. Did the team correctly determine the relationships among these stakeholders, the

relationship between fiduciary responsibility, and organizational risk for each.

 

 

Case Scenario: YieldMore -Task 1

 

© 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 5

3. Did the team correctly distinguish the identified relationships as they relate to strategic,

operational, and compliancy goals for the organization.

4. Did the team correctly develop an appropriate plan to govern fiduciary responsibility for

the organization.

5. Did the team create a professional, well-developed report with proper grammar, spelling,

and punctuation?

 

 

 

 

 

Case Scenario: YieldMore -Task 1

 

© 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 6

Introduction:

Quantitative risk assessment techniques are valuable tools for organizations. They provide

management with solid numerical data regarding the value and potential loss of assets.

 

This activity allows you to use quantitative risk assessment techniques for YieldMore.

 

Scenario:

In order to help make better decisions regarding risk assessment data, senior management at

YieldMore has requested quantitative information relating to key information technology (IT)

assets.

 

Task 3:

Your team, as employees of YieldMore, has been given a task of providing quantitative risk

assessment information to senior management.

1. Estimate the value of at least five key IT assets in the organization.

2. Be sure you consider direct and indirect financial and business impact of the IT assets.

3. Calculate the single loss expectancy (SLE) of the IT assets. (For this exercise, you will

need to estimate this value.)

4. Calculate the annual rate of occurrence (ARO) for risk associated with the IT assets.

(For this exercise, you will need to estimate this value.)

5. Calculate the annual loss expectancy (ALE) of the IT assets.

6. Create a professional document to present your findings to senior management.

Rubric:

1. Did the team correctly identify and estimate the value of at least five key IT assets in the

organization?

2. Did the team correctly consider the direct and indirect financial and business impact of

the IT assets?

3. Did the team correctly calculate the single loss expectancy (SLE) of the IT assets and

was their estimate reasonable?

4. Did the team correctly calculate the annual rate of occurrence (ARO) for risk associated

with the IT assets and was their estimate reasonable?

5. Did the team correctly calculate the annual loss expectancy (ALE) of the IT assets.

 

 

Case Scenario: YieldMore -Task 1

 

© 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 7

6. Did the team create a professional, well-developed report with proper grammar, spelling,

and punctuation?

 

 

 

 

Case Scenario: YieldMore -Task 1

 

© 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 8

Introduction:

Risk management is critical to protect organizational assets and to ensure compliance with laws

and regulations. Many individuals and departments in organizations are involved in risk

management; this is especially true when creating a risk management plan.

 

Your team, as employees of YieldMore, is asked to create a risk management plan for the

organization.

 

Scenario:

In order to help protect the company and ensure it maintains compliance with laws and

regulations, senior management at YieldMore has decided to develop a formal risk

management plan.

 

As employees of YieldMore, your team has been given the task of creating a risk management

plan for the organization.

 

Task 4:

Your team will have a meeting to discuss YieldMore’s risk management plan. In this meeting

you will:

1. Review the responsibilities associated with your assigned role on the team.

2. Explain the specific responsibilities of your assigned role within the project.

3. Explain your role and the roles of the other team members to senior management. To

accomplish this you will write a short report explaining who your team is and what

function and responsibility each of you has on the team.

4. Create a Risk Management Plan that covers all of the requirements addressed in the

previous tasks you have performed and those covered in the course text and submit that

plan.

 

Rubric:

1. Did the report adequately explain the roles of the team members to senior

management?

 

 

Case Scenario: YieldMore -Task 1

 

© 2013 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 9

2. Did the team create a professional, well-developed Risk Management Plan that covers

all of the requirements addressed in the previous tasks and those covered in the course

text with proper grammar, spelling, and punctuation?

Information System Case Study

Chapter 12 Enhancing Decision Making

Case 2: IBM and Cognos: Business Intelligence and Analytics for Improved Decision Making

Tags: business decision making; business intelligence software; decision support systems; management reporting systems; executive dashboards; mobile delivery platforms.

Summary

In this video from the National Association of Broadcasters (NAB), Dan Fulwiler and Steve Segalewitz from IBM, discuss how understanding your online data more clearly can improve decision-making. Video demonstration of IBM/Cognos BI software applications.

In the accelerating media industry, discovering relevant business insights within the chaos of available information can lead to substantial competitive advantage. IBM Business Intelligence and Analytics is designed to integrate all data providers and in-house sources to reveal timely and actionable business insights. The software collects, connects and leverages information from consumers to suppliers. L= 5:06

URL: http://www.youtube.com/watch?v=NI59ZgyQqBc

 

Case

IBM has been known for most of its recent history as the world’s largest computer company. With over 388,000 employees worldwide, IBM is the largest and most profitable information technology employer in the world. It is still selling computers today, and is still one of the biggest computer companies in the world, and it has also been known to produce very efficient computers as well. IBM holds more patents than any other U.S. based technology company and has eight research laboratories worldwide.

Known for its highly talented workforce, the company has scientists, engineers, consultants, and sales professionals in over 170 countries. IBM employees have earned three Nobel Prizes, four Turing Awards, five National Medals of Technology, and five National Medals of Science. As a chip maker, IBM has been among the Worldwide Top 20 Semiconductor Sales Leaders in past years, and in 2007 IBM ranked second in the list of largest software companies in the world.

 

 

 

 

Copyright Notice

This work is protected by United States copyright laws and is provided solely for the use of instructors in teaching their courses and assessing student learning. Dissemination or sale of any part of this work (including on the World Wide Web) will destroy the integrity of the work and is not permitted. The work and materials from this site should never be made available to students except by instructors using the accompanying text in their classes. All recipients of this work are expected to abide by these restrictions and to honor the intended pedagogical purposes and the needs of other instructors who rely on these materials.

 

 

In addition to all of this, IBM also offers business intelligence and analytics tools through its Cognos division. Cognos (formerly Cognos Incorporated) is an Ottawa, Ontario based company which makes business intelligence (BI) and performance management software. Founded in 1969, Cognos employed almost 3,500 people and served more than 23,000 customers in over 135 countries. Cognos was originally known as Quasar and adopted its current name in 1982. On January 31, 2008, Cognos was officially acquired by IBM.

This video showcases one of Cognos’ flagship products, Cognos 8 BI, as well as other IBM Web site analytics tools. In the first segment, IBM describes the ability of its software to track consumers on their Web site and get detailed information about what they view, how long they view it for, and where they came from. Thanks to their partnership with Akamai, they can do the same for the video featured on their site.

The second segment describes Cognos 8 BI and its ability access all data from any and all sources across the enterprise. Cognos 8 BI is useful to users analysts, executives, and people just needing a report. It is accessible via desktop and laptop computers, BlackBerries, and many other mobile devices. The information it provides is viewable in a number of ways (dashboard, metrics, scorecards, reports) based on the needs of the user.

The goal of Cognos 8 BI is to allow many different kinds of users, working on a variety of systems, to take information, analyze it, and understand it better in order to make better decisions.

Case Study Questions

1. How does improving decision making add value for a business?

2. Explain why it might be useful to have detailed Web site metrics like those IBM provides.

3. Use the Web to find out some of the specific capabilities of Cognos 8 BI.

4. Describe the differences between the ways executives and lower-level employees would use business intelligence software.

5. How is gathering data about consumers different from gathering internal data from within a company’s own systems?

 

Copyright © 2009 Kenneth Laudon. Copyright © 2009 Pearson Education.

BSBMKG507 Interpret Market Trends And Developments

AUD vs USD Data

F11 EXCHANGE RATES
Title A$1=USD
Description AUD/USD Exchange Rate
Frequency Monthly
Type Indicative
Units USD
Consolidated Data
Source 2 RBA Publication date 29-Jan-2016
Series ID FXRUSD
DATE VALUE
1980-01-01 1.1069
1980-02-01 1.0987
1980-03-01 1.0831
1980-04-01 1.1145
1980-05-01 1.1426
1980-06-01 1.1576
1980-07-01 1.1525
1980-08-01 1.1656
1980-09-01 1.169
1980-10-01 1.1726
1980-11-01 1.1643
1980-12-01 1.1807
1981-01-01 1.1707
1981-02-01 1.1566
1981-03-01 1.1684
1981-04-01 1.1505
1981-05-01 1.1385
1981-06-01 1.148
1981-07-01 1.1356
1981-08-01 1.1508
1981-09-01 1.1414
1981-10-01 1.135
1981-11-01 1.1514
1981-12-01 1.1279
1982-01-01 1.0994
1982-02-01 1.074
1982-03-01 1.0503
1982-04-01 1.0608
1982-05-01 1.0482
1982-06-01 1.0223
1982-07-01 0.9958
1982-08-01 0.9643
1982-09-01 0.9493
1982-10-01 0.9367
1982-11-01 0.9548
1982-12-01 0.9806
1983-01-01 0.9718
1983-02-01 0.9606
1983-03-01 0.8629
1983-04-01 0.868
1983-05-01 0.882
1983-06-01 0.8745
1983-07-01 0.881
1983-08-01 0.8785
1983-09-01 0.8965
1983-10-01 0.916
1983-11-01 0.9128
1983-12-01 0.902
1984-01-01 0.9178
1984-02-01 0.9429
1984-03-01 0.935
1984-04-01 0.9201
1984-05-01 0.8992
1984-06-01 0.8613
1984-07-01 0.83
1984-08-01 0.8488
1984-09-01 0.833
1984-10-01 0.8487
1984-11-01 0.8596
1984-12-01 0.8278
1985-01-01 0.815
1985-02-01 0.7138
1985-03-01 0.7051
1985-04-01 0.6523
1985-05-01 0.658
1985-06-01 0.6655
1985-07-01 0.7271
1985-08-01 0.7034
1985-09-01 0.7077
1985-10-01 0.7002
1985-11-01 0.685
1985-12-01 0.6809
1986-01-01 0.7155
1986-02-01 0.7012
1986-03-01 0.7119
1986-04-01 0.7391
1986-05-01 0.7166
1986-06-01 0.6772
1986-07-01 0.598
1986-08-01 0.6085
1986-09-01 0.6274
1986-10-01 0.642
1986-11-01 0.6488
1986-12-01 0.6648
1987-01-01 0.6608
1987-02-01 0.6748
1987-03-01 0.7053
1987-04-01 0.7048
1987-05-01 0.7137
1987-06-01 0.7203
1987-07-01 0.6978
1987-08-01 0.7124
1987-09-01 0.7194
1987-10-01 0.6757
1987-11-01 0.7052
1987-12-01 0.7225
1988-01-01 0.7138
1988-02-01 0.7198
1988-03-01 0.7388
1988-04-01 0.7585
1988-05-01 0.8051
1988-06-01 0.794
1988-07-01 0.8045
1988-08-01 0.8069
1988-09-01 0.7829
1988-10-01 0.8256
1988-11-01 0.8781
1988-12-01 0.8555
1989-01-01 0.889
1989-02-01 0.7996
1989-03-01 0.8194
1989-04-01 0.7928
1989-05-01 0.7484
1989-06-01 0.7553
1989-07-01 0.7524
1989-08-01 0.7656
1989-09-01 0.7764
1989-10-01 0.7831
1989-11-01 0.7815
1989-12-01 0.7927
1990-01-01 0.7708
1990-02-01 0.7594
1990-03-01 0.7542
1990-04-01 0.7509
1990-05-01 0.7691
1990-06-01 0.789
1990-07-01 0.7901
1990-08-01 0.8162
1990-09-01 0.8265
1990-10-01 0.7847
1990-11-01 0.7745
1990-12-01 0.7733
1991-01-01 0.7849
1991-02-01 0.7851
1991-03-01 0.7752
1991-04-01 0.7817
1991-05-01 0.7609
1991-06-01 0.7681
1991-07-01 0.7775
1991-08-01 0.7848
1991-09-01 0.7995
1991-10-01 0.7837
1991-11-01 0.7848
1991-12-01 0.7598
1992-01-01 0.7498
1992-02-01 0.7546
1992-03-01 0.7684
1992-04-01 0.7593
1992-05-01 0.7589
1992-06-01 0.7488
1992-07-01 0.7442
1992-08-01 0.7134
1992-09-01 0.714
1992-10-01 0.6954
1992-11-01 0.6823
1992-12-01 0.688
1993-01-01 0.6786
1993-02-01 0.6957
1993-03-01 0.7058
1993-04-01 0.7116
1993-05-01 0.6769
1993-06-01 0.6722
1993-07-01 0.6834
1993-08-01 0.6708
1993-09-01 0.6453
1993-10-01 0.6661
1993-11-01 0.6586
1993-12-01 0.6711
1994-01-01 0.7112
1994-02-01 0.7178
1994-03-01 0.7008
1994-04-01 0.7124
1994-05-01 0.7361
1994-06-01 0.7291
1994-07-01 0.7393
1994-08-01 0.7425
1994-09-01 0.7393
1994-10-01 0.7422
1994-11-01 0.7674
1994-12-01 0.7768
1995-01-01 0.7583
1995-02-01 0.7395
1995-03-01 0.728
1995-04-01 0.7299
1995-05-01 0.7138
1995-06-01 0.7086
1995-07-01 0.7389
1995-08-01 0.7524
1995-09-01 0.755
1995-10-01 0.7566
1995-11-01 0.7469
1995-12-01 0.745
1996-01-01 0.7447
1996-02-01 0.7635
1996-03-01 0.7793
1996-04-01 0.7854
1996-05-01 0.7983
1996-06-01 0.789
1996-07-01 0.7731
1996-08-01 0.7909
1996-09-01 0.7924
1996-10-01 0.7919
1996-11-01 0.8107
1996-12-01 0.7965
1997-01-01 0.762
1997-02-01 0.7758
1997-03-01 0.7865
1997-04-01 0.7811
1997-05-01 0.7613
1997-06-01 0.7455
1997-07-01 0.7452
1997-08-01 0.7344
1997-09-01 0.7198
1997-10-01 0.7036
1997-11-01 0.6803
1997-12-01 0.6527
1998-01-01 0.6693
1998-02-01 0.6745
1998-03-01 0.6634
1998-04-01 0.6499
1998-05-01 0.6236
1998-06-01 0.6135
1998-07-01 0.6113
1998-08-01 0.5691
1998-09-01 0.5945
1998-10-01 0.6263
1998-11-01 0.6323
1998-12-01 0.6139
1999-01-01 0.6286
1999-02-01 0.6225
1999-03-01 0.6293
1999-04-01 0.6598
1999-05-01 0.6491
1999-06-01 0.6596
1999-07-01 0.652
1999-08-01 0.6379
1999-09-01 0.6536
1999-10-01 0.6446
1999-11-01 0.6376
1999-12-01 0.6538
2000-01-01 0.6382
2000-02-01 0.6143
2000-03-01 0.6055
2000-04-01 0.5909
2000-05-01 0.5735
2000-06-01 0.5986
2000-07-01 0.5822
2000-08-01 0.5748
2000-09-01 0.5433
2000-10-01 0.5148
2000-11-01 0.5227
2000-12-01 0.554
2001-01-01 0.5466
2001-02-01 0.525
2001-03-01 0.489
2001-04-01 0.5088
2001-05-01 0.51
2001-06-01 0.5075
2001-07-01 0.5041
2001-08-01 0.5342
2001-09-01 0.4923
2001-10-01 0.5053
2001-11-01 0.52
2001-12-01 0.5106
2002-01-01 0.5078
2002-02-01 0.5164
2002-03-01 0.5316
2002-04-01 0.5397
2002-05-01 0.5674
2002-06-01 0.5648
2002-07-01 0.5478
2002-08-01 0.5532
2002-09-01 0.5435
2002-10-01 0.5534
2002-11-01 0.5608
2002-12-01 0.5662
2003-01-01 0.5884
2003-02-01 0.6054
2003-03-01 0.6036
2003-04-01 0.623
2003-05-01 0.6522
2003-06-01 0.6674
2003-07-01 0.6529
2003-08-01 0.64
2003-09-01 0.6801
2003-10-01 0.7046
2003-11-01 0.7206
2003-12-01 0.75
2004-01-01 0.7644
2004-02-01 0.7708
2004-03-01 0.7589
2004-04-01 0.722
2004-05-01 0.7143
2004-06-01 0.6889
2004-07-01 0.6986
2004-08-01 0.7011
2004-09-01 0.7147
2004-10-01 0.7461
2004-11-01 0.7775
2004-12-01 0.779
2005-01-01 0.7744
2005-02-01 0.7905
2005-03-01 0.7719
2005-04-01 0.7811
2005-05-01 0.7557
2005-06-01 0.7637
2005-07-01 0.7595
2005-08-01 0.7471
2005-09-01 0.7615
2005-10-01 0.7487
2005-11-01 0.7389
2005-12-01 0.7337
2006-01-01 0.751
2006-02-01 0.7382
2006-03-01 0.7159
2006-04-01 0.7542
2006-05-01 0.7636
2006-06-01 0.7433
2006-07-01 0.7658
2006-08-01 0.7627
2006-09-01 0.748
2006-10-01 0.7692
2006-11-01 0.785
2006-12-01 0.7913
2007-01-01 0.772
2007-02-01 0.788
2007-03-01 0.807
2007-04-01 0.8268
2007-05-01 0.8244
2007-06-01 0.8487
2007-07-01 0.8572
2007-08-01 0.8214
2007-09-01 0.8827
2007-10-01 0.9216
2007-11-01 0.8865
2007-12-01 0.8816
2008-01-01 0.8884
2008-02-01 0.9466
2008-03-01 0.918
2008-04-01 0.9337
2008-05-01 0.9559
2008-06-01 0.9626
2008-07-01 0.9434
2008-08-01 0.8639
2008-09-01 0.7996
2008-10-01 0.668
2008-11-01 0.6572
2008-12-01 0.6928
2009-01-01 0.6438
2009-02-01 0.6454
2009-03-01 0.6873
2009-04-01 0.7265
2009-05-01 0.7912
2009-06-01 0.8114
2009-07-01 0.8281
2009-08-01 0.8393
2009-09-01 0.8801
2009-10-01 0.9161
2009-11-01 0.9178
2009-12-01 0.8969
2010-01-01 0.8909
2010-02-01 0.8899
2010-03-01 0.9159
2010-04-01 0.93
2010-05-01 0.849
2010-06-01 0.8523
2010-07-01 0.8986
2010-08-01 0.8918
2010-09-01 0.9667
2010-10-01 0.9761
2010-11-01 0.9618
2010-12-01 1.0163
2011-01-01 0.9924
2011-02-01 1.0163
2011-03-01 1.0334
2011-04-01 1.09
2011-05-01 1.0709
2011-06-01 1.0739
2011-07-01 1.0954
2011-08-01 1.0691
2011-09-01 0.9781
2011-10-01 1.0509
2011-11-01 1.0021
2011-12-01 1.0156
2012-01-01 1.0637
2012-02-01 1.0816
2012-03-01 1.0402
2012-04-01 1.0453
2012-05-01 0.9727
2012-06-01 1.0191
2012-07-01 1.0526
2012-08-01 1.0301
2012-09-01 1.0464
2012-10-01 1.0378
2012-11-01 1.0431
2012-12-01 1.0384
2013-01-01 1.0394
2013-02-01 1.0275
2013-03-01 1.0426
2013-04-01 1.0368
2013-05-01 0.9649
2013-06-01 0.9275
2013-07-01 0.9037
2013-08-01 0.8947
2013-09-01 0.9309
2013-10-01 0.949
2013-11-01 0.9087
2013-12-01 0.8948
2014-01-01 0.8763
2014-02-01 0.8947
2014-03-01 0.9221
2014-04-01 0.9287
2014-05-01 0.9319
2014-06-01 0.942
2014-07-01 0.9324
2014-08-01 0.9349
2014-09-01 0.8752
2014-10-01 0.8805
2014-11-01 0.8491
2014-12-01 0.8202
2015-01-01 0.7781
2015-02-01 0.7792
2015-03-01 0.7634
2015-04-01 0.7981
2015-05-01 0.7663
2015-06-01 0.768
2015-07-01 0.7294
2015-08-01 0.7149
2015-09-01 0.701
2015-10-01 0.7099
2015-11-01 0.7189
2015-12-01 0.7306