This one-credit course provides an introduction to spreadsheets using Microsoft Excel. The course will focus on basic spreadsheet skills like performing calculations, formatting cells, using functions, creating charts, filtering and sorting data, and conditional formatting. Students will complete assignments, projects, and assessments in SimNet to demonstrate proficiency in spreadsheet applications. A passing grade requires a score of at least 70% on each assessment and an average score of at least 70% on all assignments and projects.
David Brown
Director of CyberTalent
SANS Institute
Jim Michaud
Director of HR Business Development
SANS Institute
The SANS Institute, in partnership with selected veteran-friendly employers, has established VetSuccess in Cybersecurity to match skilled U.S. military veterans with today’s most compelling cybersecurity-related jobs.
David Brown
Director of CyberTalent
SANS Institute
Jim Michaud
Director of HR Business Development
SANS Institute
The SANS Institute, in partnership with selected veteran-friendly employers, has established VetSuccess in Cybersecurity to match skilled U.S. military veterans with today’s most compelling cybersecurity-related jobs.
Concerning Their Concerns: Using CBAM to Map Support for a TransitionAmber D. Marcu, Ph.D.
Virginia Tech is transitioning to Sakai. Effectively addressing Faculty, Staff, & Student concerns play a significant role in successfully adopting innovation. Our application of the Concerns-Based Approach Model includes assessing resources, then mapping optimal lines of communication and support structures to successfully implement Sakai.
Training is concerned with helping people to acquire the knowledge, skills and attitudes necessary to do the work for which they are employed. It must create changed behaviour. Training today has become an integral part of any organization’s operations.
Training means changing what an employee knows, how he works, and his attitudes towards his work or his interactions with his co-workers or his supervisors.
This method of training helps the trainer to reach many people at the same time and is widely used to impart knowledge based training programmes.
A presentation given to members of the School of Modern Languages at Durham University, exploring different ways of providing student feedback using an online learning environment such as Blackboard.
Concerning Their Concerns: Using CBAM to Map Support for a TransitionAmber D. Marcu, Ph.D.
Virginia Tech is transitioning to Sakai. Effectively addressing Faculty, Staff, & Student concerns play a significant role in successfully adopting innovation. Our application of the Concerns-Based Approach Model includes assessing resources, then mapping optimal lines of communication and support structures to successfully implement Sakai.
Training is concerned with helping people to acquire the knowledge, skills and attitudes necessary to do the work for which they are employed. It must create changed behaviour. Training today has become an integral part of any organization’s operations.
Training means changing what an employee knows, how he works, and his attitudes towards his work or his interactions with his co-workers or his supervisors.
This method of training helps the trainer to reach many people at the same time and is widely used to impart knowledge based training programmes.
A presentation given to members of the School of Modern Languages at Durham University, exploring different ways of providing student feedback using an online learning environment such as Blackboard.
Expande tus conocimientos de PSYCH-K para ser el mejor Facilitador que puedes ser. Ademas descubre excelentes consejos de Marketing para tu practica como Facilitador de este magico proceso
P a g e 1 INF 308 Programming for Informatics Prof.docxkarlhennesey
P a g e | 1 INF 308: Programming for Informatics
Professor Nim Dvir
INF 308: Programming for Informatics (3 Credits)
Semester: Fall 2019
Day/Time/Location: Fully online (BlackBoard)
Pre-requisites/Co-requisites: CINF 100 and CINF108 or I CSI/I ECE 201
Instructor: Nim Dvir
Read more about me on my university web page -- albany.edu/~nd115232/
Contact: [email protected]
Important -- When emailing, please add [INF496] at the beginning of the subject line
Office Location and Hours: Thursday, 3 pm - 5 pm, or by appointment
Last update date: August 8, 2019
Course Description, Purpose and Goals
This course focuses on computer programming in the Informatics environment. During the course, students will
learn the fundamentals of programming, including an introduction to algorithms, object-oriented design, and data
structures. Additional topics include basic interface design, security, networking, use of databases, and mobile and
other non-traditional computing platforms.
Upon completion of the course, students should be able to accomplish the following outcomes:
• Create, modify, and explain complex computer programs
• Analyze real-world problems and then design and implement computational solutions for them
• Use and apply appropriate data structures in a computer program
• Construct and implement complex computational algorithms
• Explain and identify a suitable programming paradigm to build the structure and elements of a computer
program
• Design and implement computer programs that interact with networks and databases
The Course Environment
This course is offered in a fully online learning format. The instructor will be available on Thursdays, 3 pm - 5 pm,
and by appointment. Students will complete classwork and assignments independently using the Blackboard
Learning System (BLS). If they are not familiar with Blackboard, they may please visit the Blackboard help pages
for students: http://ondemand.blackboard.com/students.htm and https://help.blackboard.com/en-
us/Learn/9.1_SP_12_and_SP_13/Student
Required Readings
The course is based on free/open-source materials, which mean that students are not required to purchase anything.
During the course we will use two open-source textbooks:
• Programming for Problem Solving / Lenore G. Horowitz
o https://courses.lumenlearning.com/suny-albany-programmingforproblemsolving-v2/
• Python for Everybody - Exploring Data In Python 3 / Charles R. Severance
o https://www.py4e.com/book.php
http://www.albany.edu/~nd115232/
http://www.albany.edu/~nd115232/
mailto:[email protected]%20?subject=[INF308]
mailto:[email protected]%20?subject=[INF308]
http://ondemand.blackboard.com/students.htm
http://ondemand.blackboard.com/students.htm
https://help.blackboard.com/en-us/Learn/9.1_SP_12_and_SP_13/Student
https://help.blackboard.com/en-us/Learn/9.1_SP_12_and_SP_13/Student
https://help.blackboard.com/en-us/Learn/9.1_SP_12_and_SP_1 ...
Achieved a degree in another discipline and now searching for a way to intensively develop your computing skills? Are you an IT graduate who is seeking to increase your knowledge in specialist areas?
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Cwi syllabus cisa115-fall-2013-lund
1. Revision Date 8/24/2013 Page 1 of 7 Lex Mulder– CWI - CISA 101
INSTRUCTOR:Jen Lund
PHONE:208-794-9407 (call or text)
EMAIL: jenlund@cwidaho.cc
OFFICE: Online via email
OFFICE HOURS:By appt
INTRODUCTION TO SPREADSHEETS
CISA 115 – 1 CREDITS
Fall 2013
Course Description
This course is designed to help students develop the skills to meet the Computer Literacy
requirements for graduation from College of Western Idaho (CWI). This course will provide an
overview of hardware components, operating systems, e-mail, Internet, networks, and
application software.No pre-requisite classes or computer skills are required, but, for students
that are not familiar with computer operating systems and applications, taking the CISA 001
course would be advised.
Course ScheduleFall2013
4 week session 8/26/2013–9/23/2013
Location: Online
Section 001W Online
Section 002 W Online
!A schedule for the course will be posted on Blackboard.!
2. Revision Date 8/24/2013 Page 2 of 7 Lex Mulder– CWI - CISA 101
CWI recognizes and advocates the critical need for computer literacy. Basic computer literacy at
CWI is defined as a demonstrated ability to use technology to access, manipulate, evaluate, use,
and present information.
Any students graduating with an associate degree (AA, AS, and AAS) must demonstrate
computer competency before they graduate, and it is strongly suggested that such proficiency
be demonstrated within the first 15 credit hours of coursework.
Students must demonstrate competency in four areas: operating system file management, word
processing, spreadsheet, and presentation software using the Microsoft Office Suite. Students
may meet this requirement in a number of ways:
1. Pass the Computer Skills Assessment (CSA) with a score of 70 percent or better in all four
areas. The CSA is administered within the Assessment Centers at the Ada County Center and the
Micron Center for Professional Technical Education. The first attempt is covered by student fees.
For more detailed information regarding the Computer Skills Assessment, including retake policies and possible
applicable fees, please contact One Stop Student Services at 208.562.3000 or www.cwidaho.cc/contact.
2. If one or more parts of the Assessments are not passed with a 70 percent or better, students
may choose to complete an equivalent class. An example of this is if a student passes the word
processing and presentation section but not the spreadsheet section, the student may then
enroll in the Introduction to Spreadsheet class. With a grade of C or better in that class, the
student has then demonstrated competency in all four areas since assessment of Windows file
management is embedded in each class. Equivalent classes are:
a. CISA 141 Introduction to Word Processing (1 credit)
b. CISA 115 Introduction to Excel (1 credit)
c. CISA 135 Introduction to Presentation Software (1 credit)
d. CISA 130 Introduction to Windows (1 credit)
Students will be exempt from this testing requirement if they have completed any course listed
below with a grade of C or better. Students earning a D grade will receive credit for the class but
will need to either repeat the class or complete the CSA exam to meet the graduation
requirement.
COURSE REQUIREMENT MET
CISA 101 Word Processing, Spreadsheet, Presentation, Windows
BUSA 215 Word Processing, Spreadsheet, Presentation, Windows
EDUC 215 Word Processing, Spreadsheet, Presentation, Windows
Students will be required to demonstrate competency in all computer-skills areas prior to
applying for graduation from CWI.
Source: CWI Catalog 2013 -2014 pg. 51
3. Revision Date 8/24/2013 Page 3 of 7 Lex Mulder– CWI - CISA 101
Course Focus
The CSA is comprised of four sections: General Computer Technology, Internet/Email, Word
processing, Spreadsheets, and Presentations using the (Microsoft) Office Suite applications.
Students will be required to demonstrate competency in all four sections prior to applying for
graduation from CWI.
This course will focus on Basic Computer Skills and Application Strategies. The software used for
the course will be the Operating System Windows 7, Internet Explorer 8, Microsoft Office 2013
(Word, Excel, and PowerPoint). The course is specifically designed to these programs. Office
Web Apps or Starter is not recommended.
COURSE OBJECTIVES AND OUTCOMES
Upon completion of this course, the student should be able to demonstrate:
1. Proficiency using Spreadsheet application software to perform basic computations and
formatting.
NOTE:More detailed Outcomes are listed in Appendix A.
Textbooks and Required Materials
ISBN 9781259188442- basic one module SimNet for Office 2013 access card WITH
printed Coulthard Computing Now Concepts text for $45 net to the bookstore
or
ISBN 9780077801328 – basic one module SimNet for Office 2013 access card- no print
option, $35 net to the bookstore
Minimum Software Requirements
MICROSOFT INTERNET EXPLORER 8.0 OR HIGHER
MICROSOFT WINDOWS 7
MICROSOFT OFFICE 2013: Many assignments are specific to Microsoft Office 2013and it
will be difficult, if not impossible, to complete these assignments in the same manner as the
text if you do not have access to Office 2013. All campus computers should contain Office
2013 so feel free to use them.
OTHER REQUIRED MATERIALS:Student will need a storage device of their choice(CISA faculty
advises that you use SkyDrive or a flash drive [also called a thumb drive or jump drive]) and a
notebook for notes.
Methods of Delivery
All assignments and tests will be completed online using SIMnet software and Blackboard.
4. Revision Date 8/24/2013 Page 4 of 7 Lex Mulder– CWI - CISA 101
COURSE EVALUATION
GRADING
Grades for this class will be based on assignments, projects and assessments. A student will only
pass the class with a C or better or if he/she passes each assessment with a score of at least
70% and has an average score of at least a 70% on assignments and projects.
This class is divided into modules. For each module, assignments and projects will be assigned
and needs to be submitted as directed in the course schedule. Although you might pass each
assessment with 100%, if you do no homework, you will receive no more than a D for the class.
The final grade will be based on the
following percentage:
90.0 – 100% = A
80.0 – 89.9% = B
70.0 – 79.9% = C
60.0 – 69.9% = D
00.0 – 59.9% = F
As a general rule Instructors do not give Incompletes. However, to be eligible for an Incomplete,
a student must have an A for the class and have most of the class work completed. Instructors
will only consider awarding an Incomplete if a student meets the above criteria and has some
extreme emergency situation. In such cases, a student requiring an incomplete must submit a
written appeal with full rationale to the instructor at least three weeks prior to the end of the
term.
ASSIGNMENTS, QUIZZES &ASSESSMENTS
Assignments are to be completed using information received from your instructor. A schedule
with the requirements (and due dates/times) for each assignment will bemade availableon
Blackboard. All assignments, projects and assessments will be submitted as directed by your
instructor. Unless required by the assignment, Instructors do not accept assignments that are
printed and mailed to them. Most assignments require uploading through SIMnet or Blackboard
unless otherwise directed by your instructor. You must buy the correct text book (listed above)
and register with SIMnet (directions will be given during the first week of the semester.)
Course Expectations
BEHAVIORAL EXPECTATIONS :
Every student has the right to a respectful learning environment. In order to provide this right
to all students, students must take individual responsibility to conduct themselves in a mature
and appropriate manner and will be held accountable for their behavior. Students who disrupt
the class, or behave inappropriately or disrespectfully, as determined by the instructor, may be
asked to leave the classroom. Instructors or Student Services has the right to create a written
behavioral contract with students; if a student violates a behavioral contract, they may be
released from the course.
ACADEMIC DISHONESTY
All work submitted by a student must represent his/her own ideas, concepts, and current
understanding. All material found during research must be correctly documented to avoid
plagiarism. Cheating or plagiarism in any form is unacceptable and violations will result in failure
5. Revision Date 8/24/2013 Page 5 of 7 Lex Mulder– CWI - CISA 101
of the course. Acts of academic dishonesty may also have more severe institutional
ramifications.
HOMEWORK
A combination of lecture, demonstration, homework, lab exercises, projects and tests may be
used. Homework, lab exercises and projects may be used as preparation for testing. At CWI, it is
assumed that there are two hours of homework required for each hour of class time. Therefore,
students should plan on spending at least two hours of additional homework for each hour of
lecture. This may be done on a home computer or can be completed in any of the CWI computer
labs.
LATE WORK
All coursework (assignments, projects and assessments) will have a specific due time and date.
Deadline times and dates will be listed in the course schedule (located on Blackboard.)Late work
will NOT be accepted or graded.No exceptions.Please don’t ask for an extension as it’s not fair
to those who turn in work on time. Get to your work early and often so you don’t miss critical
deadlines. In most cases, Blackboard (or SIMnet) will not allow you to submit your work after
the deadline has passed.
6. Revision Date 8/24/2013 Page 6 of 7 Lex Mulder– CWI - CISA 101
WHAT YOU CAN EXPECT F R OM ME
You can expect my help in reaching your educational goal.
You and I have a common goal, your success. I will do everything possible to help you reach that
goal and will do nothing to hinder you.
You can expect me to provide all information necessary for an assignment.
You can expect me to be fair.
Since I am a human being, I make mistakes. For example, I may have the wrong due date on an
assignment or may lecture longer than planned and not give enough lab time. If it is my fault, I
will make whatever changes necessary to be fair to you. If I discuss the changes in class and you
are not there, it is then your responsibility to find out what changes are made.
You can expect me to be available for help
If I am not in class, you may email me questions, and I will try to get back to you within 24-48
hours.
Emergency Procedures
If you are on campus, please make yourself familiar with the evacuation procedures and follow
posted instructions for evacuation located in each room.
Appendix A
OUTCOME 4
SPREADSHEET SOFTWARE (EXCEL )
Start Excel and Name and Save a Workbook
Enter Text and Numbers
Copy, Paste, and Move Cell Contents
Use AutoComplete
Fill a Series with Auto Fill
Use Spelling Checker
Undo to Correct Typing Errors
Insert/delete a Row/column
Change column/row, Use AutoFit,
Style, size, alignment, patterns & colors
Use Format Painter
Use Merge and Center
Apply borders and shading
Clear contents and format
Compute Totals with AutoSum
Apply Number Formats
Use SUM MIN and MAX functions
Use the IF Function
Insert Custom Header and Footer
Relative and absolute references
Navigate Among Worksheets,
Rename Worksheets,
Change the Tab Color of a Worksheet
Print a Worksheet
Portrait & landscape
Print and Hide Formulas
Wrap Text in a Cell
Create and edit a Chart
Annotating, ranges (move, copy, name)
Data tables (one-way and two-way)
Conditional Formatting
Solver, goal seek & data analysis tools
Freeze columns and rows
Hiding and protecting worksheet areas
Recording macro
7. Revision Date 8/24/2013 Page 7 of 7 Lex Mulder– CWI - CISA 101
Course Schedule
EXCEL
Chp. 1
(simbook) Excel Chapter 1 -
Creating and editing
workbooks
2 pm
Monday, 9/2
*These assignments &
assessments are located on
SimNet
*Be sure to complete
assignments &
assessments in order
(project) Excel Chapter 1 -
Guided Project
(project) Excel Chapter 1 -
Independent Project
2 pm
Monday, 9/2
(exam) Excel Chapter 1
SimNet Quiz
(exam) Excel Chapter 1 Test
EXCEL
Chp. 2
(simbook) Excel Chapter 2 -
Working with formulas and
functions
2 pm
Monday, 9/9
*These assignments &
assessments are located on
SimNet
*Be sure to complete
assignments &
assessments in order
(project) Excel Chapter 2 -
Guided Project
(project) Excel Chapter 2 -
Independent Project
(exam) Excel Chapter 2
SimNet Quiz
(exam) Excel Chapter 2 Test
EXCEL
Chp. 3
(simbook) Excel Chapter 3 -
Creating and editing charts
2 pm
Monday, 9/16
*These assignments &
assessments are located on
SimNet
*Be sure to complete
assignments &
assessments in order
(project) Excel Chapter 3 -
Guided Project
(project) Excel Chapter 3 -
Independent Project
(exam) Excel Chapter 3
SimNet Quiz
(exam) Excel Chapter 3 Test
EXCEL
Chp. 4
(simbook) Excel Chapter 4 -
Importing tables, sorting and
filtering, and using
conditional formatting
2 pm
Monday, 9/23
*These assignments &
assessments are located on
SimNet
*Be sure to complete
assignments &
assessments in order
(project) Excel Chapter 4 -
Guided Project
(project) Excel Chapter 4 -
Independent Project
(exam) Excel Chapter 4
SimNet Quiz
(exam) Excel Chapter 4 Test