Internal-External Disk Drives

1-How many internal and external disk drives can be connected to a laptop/desktop computer? 
2-Let’s discuss how you would choose a disk drive for your computer?

Exp19_PowerPoint_AppCapstone_IntroAssessment_Color

#Exp19_PowerPoint_AppCapstone_IntroAssessment_Color

  

Exp19_PowerPoint_AppCapstone_IntroAssessment_Color

Project Description:

As a student in the marketing program, you have been asked to create a presentation on the power of color and its impact on marketing. You have begun a presentation and now need to add the content to the presentation.

     

Start   PowerPoint. Download and open the file named Exp19_PPT_AppCapstone_IntroAssessment_Color.pptx. Grader has automatically added   your last name to the beginning of the filename. 

 

Change the theme fonts to   TrebuchetMS.

 

Click Slide 5 and use the Reuse   Slides option to insert all slides from Color.pptx.
  Keep the source formatting of the original slides (inserted slides). Note,   Mac users, insert all slides from the file using the default formatting.

 

On Slide 13 in the left content   placeholder, insert the Orange1.jpg   image. In the middle content placeholder, insert the Orange2.jpg image. In the right content placeholder, insert the Orange3.jpg image.
 

  Apply the Drop Shadow Rectangle picture style to the three images. 

 

On Slide 3 insert the ColorWheel.mp4 video file. Make the   following changes to the
  video:
  • Apply the Monitor, Gray video style.
  • Set the video to start Automatically.
  • Compress the video

 

On Slide 16 insert the image Balloon.jpg as a background image on   the slide. Change the transparency to 10%.

 

On Slide 4 convert the bulleted   list to a Vertical Box List SmartArt graphic. Make the following changes to   the SmartArt graphic:
 

• Change the colors to Colorful Range   – Accent Colors 4 to 5.
  • Change the SmartArt style to Intense Effect.
  • Change the text font size in all four shapes to 28 pt. 

 

On Slide 16 apply the Gradient   Fill: Purple, Accent color 5, Reflection WordArt style to the text Questions?
 

  Make the following changes to the WordArt:
 

  Increase the font size to 96 pt.
  • Change the Text Fill to Gold, Accent 3.
  • Apply the Wave Up text effect in the Transform gallery (Mac users: Apply   the Wave 2 text
 effect in the Transform gallery).
  • Change the Shape Height to 2.8″.
  • Set the Horizontal position of the shape to 0.8″ and the Vertical   position to 1.7″.

 

On Slide 15 insert an Oval shape   on the slide.
 

  Make the following changes to the Oval shape:
  • Change the Shape Height to 1.5″ and the Shape Width to 1.5″.
  • Type Blue   in the shape   and apply the Moderate Effect – Dark   Blue, Accent 6 shape style.
  • Change the font color of the text to Black, Background 1, increase the font   size to
 20 pt and apply Bold.
  • Set the Horizontal position of the shape to 3.15″ and the Vertical position to 4.5″.

 

Make a copy of the formatted   oval shape and paste on the slide. Set the Horizontal position of the new   shape to 7.15″ and the Vertical position to 4.5″. Highlight the text in the   shape, and type Red, apply the Moderate Effect – Red, Accent 1 shape style.

 

Copy the formatted oval shape   again and paste on the slide. Set the Horizontal position of the new shape to   11.15″ and the Vertical position to 4.5″. Highlight the text in the   shape, and type Yellow, apply the Moderate Effect – Gold, Accent 3 shape style.

 

On Slide 5 insert a table with 2   columns and 6 rows.
  Make the following changes to the table structure:
  • Apply the No Style, Table Grid table style.
  • Change the width of the first column to 2.4″.
  • Change the width of the second column to 6.3“. 

 

Type the following information   into the table:
  Row 1: Col 1: Red; Col 2: Excitement, Youthful, Bold
  Row 2: Col 1: Blue; Col 2: Trust, Dependable, Strength
  Row 3: Col 1: Yellow; Col 2: Optimism, Clarity, Warmth
  Row 4: Col 1: Black; Col 2: Power, Mystery, Intensity
  Row 5: Col 1: Green; Col 2: Peaceful, Wealth, Growth
  Row 6: Col 1: Orange; Col 2: Friendly, Cheerful, Confidence

 

Set the height of the table to 3.9″. Center Vertically the text in   the first and second columns of the   table.

 

In the table, apply the   following shading:
  •Red, Accent 1 to the cell with the text Red   
  •Dark Blue, Accent 6 to the cell with the text Blue
  •Gold, Accent 3 to the cell with the text Yellow
  •Dark Green, Accent 4 to the cell with the text Green
  •Orange, Accent 2 to the cell with the text Orange

 

On Slide 14 insert a Clustered   Column chart. Replace the spreadsheet information with the following   information: Leaving cell A1 blank, type Percentage in cell B1. Populate cells   A2:B5 with the following:
 

Red 29%
Blue  33%
Black/Grayscale 28%
Yellow 13%
 

  Change the source data to use the range A1:B5.

 

Make the following changes to   the chart:
 

  • Apply the Style 4 chart style
  (Note, ensure that the selected style contains the silvery background color,   gridlines, and inside end data labels.)
  • Remove the chart title, gridlines, and legend.
  • Increase the font size of the data labels to 32 pt.
  • Change the Shape Fill of the Blue data point to Dark Blue, Accent 6
  • Change the Shape Fill of the Black/Grayscale data point to Black,   Background 1
  • Change the Shape Fill of the Yellow data point to Gold, Accent 3

 

On Slide 15 select the blue   circle shape, press SHIFT, and then select the rectangle shape with the blue   outline. Group the shapes. Repeat for the two remaining shapes on the slide   to group each of the circle shapes with their associated rectangle shapes.

 

On Slide 14 apply the Fly In   animation (Entrance category) to the chart. Set the Effect Options to   Sequence By Element in Series. Set the animation to start After Previous. Set   the Delay to 00.75.

 

Add page numbers to all slides   with the exception of the first slide. 

 

Apply the Push transition to all   slides.

 

On Slide 1 type Welcome to   the power of color presentation. (including the
  period) as a speaker note.

 

Check the presentation for   spelling errors, and correct any errors.

 

Save and close Exp19_PPT_AppCapstone_IntroAssessment_Color.pptx.   Submit the file as directed.

Practical Connection of Physical Security.

 hare a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.  DO NOT REUSE A PREVIOUSLY SUBMITTED ASSIGNMENT, THIS WILL RESULT IN A ZERO. 

VALUE RETURNING FUNCTION

Create a function that returns a decimal data type and print the value on the screen.

The function should calculate the net income by taking out a gross income from a user and deduct 7% taxes.

SAVE AS HOMEWORK4.cpp

i need help report project

     

Chapter 1:   Introduction. The introduction has several purposes. Clearly one is to set the   scene for the project by giving a little relevant background information –   try to grab the reader’s interest early. Another is to clearly elucidate the   aims and objectives of the project and the constraints that might affect the   way in which the project is carried out. If the project involves the solution   of a specific problem or the production of a specific system this should be   clearly specified in an informal way. Finally, the introduction should   summarise the remaining chapters of the dissertation, in effect giving the   reader an overview of what is to come.

The type of   project will dictate the content and structure of the following chapters and   you should discuss this with your supervisor. For example, for a theoretical   project it is likely that several chapters will be devoted to constructing   the theoretical foundations for the project and will consist of your own   interpretation and synthesis of existing work with suitable examples discussed   throughout. A sequence of chapters that cover theoretical framework,   conditions and assumptions and theory application and comparisons may be   appropriate. For an experimental project, the experimental goals, design,   execution and evaluation might be covered. What now follows is a typical   structure for a ‘design and build’ project.   

Please answer the following

 

What is Medicare? Explain the components and financing of each part. What are the problems for Medicare? What are your solutions? 

The  paper should be 3 pages and include the following and must be free of plagiarism 

• Introduce and define the topic (your study group knows nothing about it). 

• Discuss the details of the topic. 

• What are the pros and cons (or support vs opposition)? 

• What is your personal stand on the issue? 

• After reading the briefing paper, a member of your support group should have a general understanding of the issue. 

c program, encrypts a binary file and then save it.

 

Write a program, myfilehide2, that encrypts a file — ASCII or binary — and saves the encrypted file. myfilehide2 reads from stdin a string that specifies the file to be encrypted followed by an integer. For example,

% myfilehide2
a.out 7

myfilehide2 saves the encrypted content in a new file whose name has “.E2” added as a suffix. After doing so, the app deletes the original file by calling remove(). In the above example, a.out.E2. We restrict input file names to be less than 15 characters and output file names to be less than 18 characters to account for the 3 character suffix. Spaces are not allowed in a file name. The filename and number must be separated by one or more space (‘ ‘) or tab (‘t’) characters. The number must be a single digit — either 0, 1, …, 7 — and end with ‘n’ which is generated on stdin when the ENTER/RETURN key is pressed on our lab machines. All other input of different format are disallowed and should result in a suitable error message on stdout followed by app termination by calling exit(1).

use the library function getchar() to read the input byte-by-byte. When a space character or tab character is encountered, assume the filename has ended and store it as a string in a 1-D char array of size 16. Of course, that is assuming that the filename has not exceeded 15 characters. Instead of the constants 15 and 16, use the C preprocessor directive #define to specify your own macro to reduce the potential for run-time bugs. Read the single digit (0, 1, …, 7) into variable, char numpos, and convert numpos into a decimal number, unsigned int decpos, when interpreted as a decimal number. For example, the ASCII character ‘3’ stored in numpos is convered to the decimal number 3, not the decimal encoding of the ASCII character ‘3’ which is 51.

Do not use any string processing library function to perform the input parsing task. The parsing chore can be implemented with a few lines of code. Delegate the input parsing task to

void inputcheck(void);

which stores a valid filename input a global 1-D char array. Make the variable numpos also global. 

After inputcheck() returns (it may not return if the input is ill-formatted), main() opens the input file to read and creates an output file with suffix “.E2” to write the encrypted bytes. If either of the two operations is unsuccessful, main() prints a suitable error message to stdout and terminates by calling exit(1). Otherwise, like in Problem 2, lab3, myfilehide2 reads the content of the input file byte by byte using fgetc(). Unlike myfilehide, myfilehide2 flips the bit value at the bit position specified by decpos and writes the resultant byte into the output file. For example, if an input byte has bits 00001111 and decpos equals 2, the encrypted byte is 00001011. Note that the rightmost bit at position 0 is considered the least significant bit. As with myfilehide, myfilehide2 has the property that running the app again on the encrypted file with the same digit as second arguments decrypts the file. Perform a similar cleanup as myfilehide so that the encrypted file with suffix “.E2” is deleted. Use Makefile to compile your app. Test and verify that it works correctly.

What UID and PID have the highest

  

What UID and PID have the highest amount of physical memory a process has used and is not swapped out? Show all processes and full output.• If using a long listing and no process modifiers, what is the swap space amount for the bash command? When using top command, what command would you use to kill a process? If you were not using top command, what command would you use to kill a process?• What command would you use to manually mount the standard CD-ROM device /dev/db1 at /media/disk?• What command would you use to display the amount of available disk space on /dev/db1 in a human readable form?• Type in the command grep – – help to access the help manual. Using this information and the information from the text, how would you write a command to find the pattern 111 in a file called myfile.txt?