This website uses cookies to ensure you have the best experience. Learn more

Information Technology Essay

2817 words - 12 pages

CALABAR HIGH SCHOOL

CSEC INFORMATION TECHNOLOGY
(General Proficiency)

School Based Assessment

SPREADSHEET

-------------------------------------------------

Description of Project
It takes 90 seconds or less for a car thief to take your vehicle.  It is no longer enough to just roll-up your windows and lock your doors.  Although few stolen vehicles are recovered within 48 -72 hours, the damage has already been done. 
The Spartahouse City Council in collaboration with the Spartahouse Police Department is encouraging residents to protect their vehicles. This is due to the fact that Incidents of Grand Theft Auto in the city have spiked by over 35% over the last year.  There is ...view middle of the document...

 They also require a program based on the study to assist their business in helping with the data collection and the necessary calculations with reference to premiums and payments.
At the end of this analysis, a report is to be presented to the Mayor and other relevant parties including NMTRO and the insurance companies.
A pamphlet on Tips to Avoid Auto Theft will be made available to the public as a part of the Operation Bounce Back Project. Candidates are required to utilized Word processing, Database, Spreadsheet and Programming packages to efficiently carry out the required activities.

SPREADSHEET
TASK A
You are required to:
1. Create a workbook based on the headings below:
Statistical Analysis |
FirstName | LastName | Gender | Year Manufactured | Model | Category | Insurance Company | Type Of Coverage | Anti Theft Device Installed | Value |
Sasha | Moore | Female | 2000 | Accord | LCR-70 | BCC | TPO | FALSE | J$612,000.00 |
Jermaine | Black | Male | 2005 | Charade | LCR-71 | Nationwide | FC | TRUE | J$2,617,881.00 |
* The categories are as follows:
* LCR-70 Motor vehicle theft, cars
* LCR-71 Motor vehicle theft, SUV\van
* LCR-72 Motor vehicle theft, truck or bus
* LCR-73 Motor vehicle theft, other vehicles

* The type of coverage’s are as follows:
* Third party only (TPO) or Fully Comprehensive (FC)

2. Insert columns and add the labels “Age of Vehicle” to the right of Year Manufactured” and “Premium" to the right of "Value" columns. Modify the spreadsheet as necessary using "M" for "Male" and "YES" for "Antitheft Device Installed"

Use the spreadsheet functions and/or formulae to perform the following calculations.
a) The age of each vehicle based on the year it was manufactured. Hide the column labeled “Year Manufactured”.
b) Total ALL appropriate columns and ensure that your worksheet is efficient. Also use formatting features to allow clarity of your worksheet (example bold, decimal places $-and % signs).
c) Enter the regular premium for each vehicle in the worksheet based on the insurance company table below.

Insurance Company | Premium |
STATEFARM | 1950.00 |
BCC | 2700.00 |
IWCI | 1675.00 |
NATIONWIDE | 3500.00 |

FirstName | LastName | Gender | YearManufactured | Model | Category | Insurance Company | Type Of Coverage | Anti Theft Device Installed | Value |
Tyrese | Witter | Male | 2000 | Eclipse | LCR-71 | State Farm | TPO | FALSE | J$1,210,000.00 |

3. Insert before the record number 8 the following data

4. Sort the data in the worksheet by Type of Coverage (Primary field) and Insurance Company (secondary field).

Present the data using bordered line style and centre and bold all column headings. Titles should be displayed evenly across the data provided.

Save as Task A
Print this worksheet. Include printouts showing ALL formulae.
.
TASK B
1. The insurance companies calculate the compensation packages for stolen vehicles based...

Other Papers Like Information Technology

Business Information Technology Essay

273 words - 2 pages The purpose of this report is to understand the effect and impact that business process, competing and/or complimentary technologies and information systems have on an organization. This report has considered two business process models (As-Is & To-Be model) in Conundrum Consultants and discuss about the role of business process modeling for an organization and IT’s importance to an organization After taking the comparison of two models, we

Information Security And Technology Essay

422 words - 2 pages exposed. 3. What are the three components of the CIA triangle? What are they used for? The three components of the CIA triangle are confidentiality, integrity, and availability. Confidentiality is used to protect information from disclosure or exposure to unauthorized individuals or systems. Integrity is when information is a whole, complete, and uncorrupted. Availability is used to enable authorized users to access information without

Information Technology Acts

438 words - 2 pages There have been many of times where I have just been relaxing at home enjoying my day off of work when I hear the phone ring, answer it and get bombarded with sales pitches from telemarketers trying to sell me their products. I did not ask this company about their products much less did I want a random person calling me and trying to sell me things I do not want. This problem has plagued millions of people around the world since the 1980’s when

The Impact Of Information Technology On The Accountancy Profession In Nigeria

309 words - 2 pages The Impact Of InformatiOn Technology On The Accountancy prOfessiOn In Nigeria THE IMPACT OF INFORMATION TECHNOLOGY ON THE ACCOUNTING PROFESSION IN NIGERIA By: Idongesit Efiong Utah ABSTRACT This research focuses on assessing the impact of information technology on the Nigerian Accounting profession by examining four areas: Impact on the public and private sector, the challenges and reaction to the challenges posed by information

Nba Teams Make A Slam Dunk With Information Technology

2629 words - 11 pages ANGGARAN DASAR MUHAMMADIYAH BAB I NAMA, PENDIRI, DAN TEMPAT KEDUDUKAN Pasal 1 Nama Persyarikatan ini bernama Muhammadiyah. Pasal 2 Pendiri Muhammadiyah didirikan oleh K.H. Ahmad Dahlan pada tanggal 8 Dzulhijjah 1330 Hijriyah bertepatan tanggal 18 November 1912 Miladiyah di Yogyakarta untuk jangka waktu tidak terbatas. Pasal 3 Tempat Kedudukan Muhammadiyah berkedudukan di Yogyakarta. BAB II IDENTITAS, ASAS, DAN LAMBANG Pasal 4

Stratergies And Methods Of Technology Management

329 words - 2 pages Strategies and Methods of Technology Management In: Business and Management Strategies and Methods of Technology Management Strategies and Methods of Technology Management James Teacher MGMT 447 Sunday, August 28, 2011 Abstract In this essay, information on the identification of issues and concerns of what causes poor technology management will be addressed. The strategies and methods will show how the issues and concerns for

Management Information Systems

254 words - 2 pages Long, L. and Long, N. Computers: information technology in perspective. Pearson Education: N.J. Lucey, T. Management information systems. London: Letts Educational. Scott, George, Principles of management information systems. New York: McGraw-Hill. O’Brien, James A. Managing information technology in the e-business. New Delhi: Tata McGraw-Hill. O’Bbrien, J. and Marakas, G. Management information systems. New York: McGraw-Hill. Electronic resources. • Free online journals at www.doaj.org • Subscribed e-journals & e-books via Moi University Library. Visit the library page for details

Ndnzdngdzgndj

3033 words - 13 pages |Chapter | | |12 | | | | | | |Information Technology

Apple

305 words - 2 pages I think that Apple can achieve its success in business, because it knows how to use the information technology to help them to find the effective information, and then, they used this information to create their competitive advantage. They created convenient media software—iTune first which was successful at that time, because it was easier for customers to search, download, and organize their favorite music than other substitute products

Mgt 6000 Research Problem

319 words - 2 pages Checklists in the textbook were used in the decision-making process. Projects Problem I propose to do my research paper on how Information Technology systems and Automation impacts employment. Sub Problem None Hypothesis My hypothesis is that information technology has a negative impact on the employment and unemployment rate especially in blue collar occupations. Importance of the Study The importance of the study is to

Improved Integration Of Technology

983 words - 4 pages as they develop ideas on how to improve the teaching and learning process (Bednar & Sweeder, 2005). Teachers must identify the needs of their students by assessing, planning, implementing classroom instruction through the use of technology. I selected this topic because the educational system in America is slipping and as instructors we must develop innovative ways to teach our students so that they can retain the information that is being taught

Related Essays

Management Information Technology Essay

436 words - 2 pages QUESTION: Management Information Systems are too important to be left up to Information Technology (IT) personnel only. Do you agree? Why or why not? Discuss. The impact of globalization has motivated organizations to rethink the way in which they do business. In order for organizations to survive or be successful in this present global environment they have to solve problems affecting the organization and make decisions which are to the

Information Technology Acts Paper

471 words - 2 pages Information Technology Acts Paper George Tomadakis BIS/220 January 16, 2012 Marry Robbins Information Technology Acts Paper Pornography has been legally available in the United States since the 1970’s. It was controlled from being readily available to minors just by the nature that it had to be sold in a physical state (magazine, DVD). There was an adult involved the majority of the time providing it to another adult face to face. This

Impact Of Mobile Information And Communication Technology On Cybercrime

6752 words - 28 pages International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 3 Issue 8, August - 2014 The Impact of Mobile Information and Communication Technology on Cybercrime in Nigeria Oyenike Mary Olanrewaju1, Faith Oluwatosin Adebiyi2 1,2 Department of Mathematical Sciences and Information Technology Federal University Dutsin-Ma, Katsina State, Nigeria Keywords: Cybercrime, Intelligent, Investigatory Security

Information Technology Of Supply Chain In Pt Ccai

3522 words - 15 pages penting dalam berjalannya supply chain management yang efektif. Peran teknologi informasi dalam mendukung supply chain akan dibahas pada artikel ini. PT Coca Cola Amatil Indonesia yang merupakan produsen dan distributor terbesar diIndonesia untuk produk minuman berkarbonasi menjadi contoh kasus yang akan dibahas. Keywords: Information technology, supply chain management, Coca cola Amatil Indonesia 1. Introduction Persaingan bisnis