Music 120. Due today.

Instructions

Check the video and answer the questions.

#1 John Cage Sonatas and “Interludes for Prepared Piano, Sonata II” (1946-48)
This piece is written for piano, but certainly doesn’t sound like the traditional tone color of the piano.  Describe the tone colors that are generated by this “prepared piano.”  What is a prepared piano? How are some of the particular tone colors that you hear produced by this acoustic instrument?  What influenced Cage to invent “the prepared piano”?https://www.youtube.com/watch?v=oL_UdQf704A You can watch a short video on how to prepare a piano here: https://www.youtube.com/watch?v=myXAUEuECqQ

#2  Edgard Varese “Poème électronique” (Electronic Poem: 1958)
The first stage of music produced electronically in the twentieth-century was called “musique concrete.”  Composers recorded sounds onto audio tape, and then manipulated them in the studio to produce a fixed performance of the piece.  Varese’s Poem electronique is perhaps one of the most famous of these works.  read about it in your textbook before you listen.  Try to put yourself back in 1958 and think about the technology that was available at that time.  Listen carefully to try to discern some of the raw sound material.  How do you think this piece was received in 1958? https://www.youtube.com/watch?v=qTMSllIv2lw

#3  John Adams “Short Ride on a Fast Machine” (1986)
John Adams is most often referred to a “postminimalist” composer.  Listen to his “Short Ride in a Fast Machine” and discuss why this piece could be described as “minimalist.”  Does this piece aptly portray its title?  What specific types of musical techniques does he use in this piece to create the perpetual motion? https://www.youtube.com/watch?v=5LoUm_r7It8

#4  Kaija Saariaho “L’amour de loin” (Love from Afar: 2000)
Saariaho’s career has produced music that has used techniques of live electronics, mixed media (music, text, tape, electronics, dance, video). What is the impact of the mix of traditional instruments and electronic sounds?   How does this opera compare with the others we have studied in class, i.e. Mozart, Verdi, Wagner? https://www.youtube.com/watch?v=DKBm9mKWJVU

#5 Tania Leon “Inura” (2009)
Using the vocabulary you have learned so far in the course, describe the basic characteristics of this piece.  Explain how Leòn utilizes call and response during this movement. Discuss the role of the percussion during this movement. Be specific. https://www.youtube.com/watch?v=5WCsr4qeij4

Physical Security

 Topic: Perform a LEED (Leadership in Energy and Environment Design) Certification Assessment of your local living area or work location. Remember to get permission from security. If you wish you may approach the subject in terms of Best Practices. 

 Instructions: Please download the Assignment 6 LEED Certification Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. You must have at least 3 references and 1 must be from the text. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission.
Also review any additional files attached for more information. 

Week 11: Cyber Law assignment

 Week 11: California Privacy Rights Act Assignment

 On November 3, 2020, California’s Privacy Rights Act is on the ballot. As of the time this assignment is being written, we do not know whether it will pass or not. Please write a 250 word essay on what the Act contains, and if it passed the ballot or not. Please tell why it passed or did not pass.

Minimum 250 words. Add References in APA format.

Job search 3.0

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?
  3. 1000 words

7 questions

  

1) Read this Time article and view the video(https://time.com/5168202/russia-troll-internet-research-agency/) explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Use the Research Databases available from the Danforth Library(https://libguides.nec.edu/az.php), not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

2) Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

3) The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question. 

Your Research Project will be a presentation on some aspect of the surveillance state.  Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases 

Use at least five sources.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Short excerpt on the Surveillance State :

https://learn-us-east-1-prod-fleet01-xythos.s3.amazonaws.com/5b75a0e7334a9/1237028?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Zuboff.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20201104T030000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAZH6WM4PL5SJBSTP6%2F20201104%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=0db0e33d87614262defdca855ff1b3498572ba11c6697ca535dd48f0500209d3

4) Discuss in 500 words your opinion on what lessons should be learned from the 737 Max 8 crashes. 

Use at least three sources. Use the Research Databases available from the Danforth Library(https://libguides.nec.edu/az.php), not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

5) Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.( https://www.nec.edu/students-faculty-staff/library-danforth/research-help/databases-help/)

6) Do a bit of research on penetration testing techniques. Investigate and document the following

· Five network penetration testing techniques

· Advantages and disadvantages of each

· One notable social engineering test

· Possible negative implications of penetration tesing

Please write between 300 words

7) Prepare a final project on a web application security topic. The primary deliverables for the project will be a paper and and also a presentation “Topic : White Hat Hacking”, Include a short paragraph describing your project and how you intend to research it. 

· Week 11. Submit final project.

· Week 12. Submit a brief abstract describing your final project.

Week 13. Submit final project materials.

o 500-700 word, double spaced, written in APA format, showing sources and a bibliography

Wk 2 – Roles, Responsibilities, and Governance of Security

2 Part Assignment

 

Assignment Content

  1. One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.

    As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.

    Part 1
    Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security.

    Use the following column headings:

    • Title
    • Role
    • Responsibilities
    • Use the following row headings:
    • Chief Executive Officer (CEO)
    • Chief Operations Officer (COO)
    • Chief Financial Officer (CFO)
    • Chief Information Officer (CIO)
    • Chief Information Security Officer (CISO)
    • Senior Security Manager
    • Information Security Architect
    • Information Security Engineer
    • Information Security Auditor
    • Information Security Analyst
    • Security Technician/Specialist
    • Part 2
      Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:
    • Concisely describe cyber security governance, including major components like organizational oversight and security processes.
    • Recommend an information security control framework.
    • Logically explain how an information security control framework benefits a business.
    • Describe one organizational challenge of implementing information security and provide an example of how you, the CISO,would address the challenge.
    • Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.

      Format all citations according to APA guidelines.

      Submit your assignment.

Project portfolio

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

java

i already done half the work i just need you to make the output like this {

Square of 1 is 1

Square of 2 is 4

Square of 3 is 9

Square of 4 is 16

Square of 5 is 25

Square of 6 is 36

Square of 7 is 49

Square of 8 is 64

Square of 9 is 81

Square of 10 is 100

The sum of the squares is 385!

}

Cloud Drop Box

 Most users today manage their content on a variety of devices. Dropbox is a cloud-based storage facility for photos, documents, and other digital content. Dropbox provides a convenient folder, as shown in Figure 6-7 of you Jamsa (2013) textbook. In one page, discuss the benefits of having web-based access to a cloud storage area.

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least one source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:

  • A title page
  • 12-point Time New Roman font
  • Your paper should be typed and double-spaced with 1″ margins on all sides
  • The first sentence of each paragraph should be indented one tab space
  • All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
  • APA 7th edition in-text citations
  • Reference page