Exp19_PowerPoint_Ch02_Cap_ScienceClub

Exp19 PowerPoint Ch02 Cap ScienceClub

Exp19_PowerPoint_Ch02_Cap_ScienceClub

Powerpoint Chapter 2 Capstone ScienceClub

Project Description:

The Science Club at your school wants you to create a slide show that can be used at promotional events put on by the club. In this activity, you will create a presentation that meets slide show design principles, create and modify shapes and text boxes, apply and control animation, and add video and audio.

Start   PowerPoint. Download and open the file named Exp19_PPT_Ch02_Cap_Oceans.pptx. Grader has automatically added   your last name to the beginning of the filename. 

Replace Student Name on Slide 1 with Carla Chen.

Contrast is one of the main   design principles used in a  presentation to direct focus and aid in   readability. You adjust the  formatting of the font used in the presentation   so there is better  contrast.
 

  Change the title font type to Tw Cen MT (Headings) and ensure the  size is 48. Change the font color to   Black, Text 1. Change the  subtitle font type to Tw Cen MT (Body) and ensure   the size is 22.  Change the font color to White, Background 1, Darker 50%.

Repetition is another design   principle. You change the font on  several slides to utilize repetition   throughout the presentation.
 

  Click Slide 4 and change the title font color to Black, Text 1. Change the   bulleted text font color to Black, Text 1.

Click Slide 5. Change the title   font type to Tw Cen MT (Headings)  and ensure the size is 32. Change the font   color to Black, Text 1.

Click Slide 6 and change the   title font color to Black, Text 1.  Change the bulleted text font color to   Black, Text 1. Do not change  the font color of the email address.

The design principle of   proximity to visually connect or organize  the placement between text and the   image on this slide. This will keep  create a relationship between the objects   on the slide.
 

  Click Slide 2 and create a text box and size it to a height of 0.5” and a   width of 4”. Type Whales are amazing creatures  Apply Tight Reflection: Touching as a text   effect. Drag the text box to the lower-right corner.

This slide is enhanced by using   the alignment design principle to add ovals and text to convey the intended   message.
 

  Click Slide 3 and use Lock Drawing Mode to add four Oval shapes.  Size them to a height of   2” and a width of 3.44” . Arrange them from  the lower left corner to the   upper right corner of the slide. Change  the fill to Blue.

Add a Line Arrow connecting each   oval to the next higher oval. Change the weight to 4 1/2 pt.

Type Primary Producer in the lowest oval. Type Primary   Consumer in the   next oval. Type Secondary Consumer in the third oval. Type Top Predator in the highest oval.

Create a text box and type THE FOOD   CHAIN. Change   the title font type to Tw Cen MT (Headings) and the size to 32. Drag the text   box to the upper-left corner.

Animation is added to the shapes   on this slide to control how they  appear on the slide and focus how the   audience receives the message of  the slide.
 

  Click Slide 3. Select the Primary   Producer oval and add the Wheel Entrance animation. Next, select the Primary Consumer oval and add the   Wheel Entrance animation. Then, select the Secondary Consumer oval and add the Wheel Entrance animation. Finally, select the Top Predator oval and add the Wheel   Entrance animation.

Click After Previous in the   Start box for the Top Predator oval.    Adjust the Delay to 00.50. Open the   Animation Pane. Click each of  the three lower ovals and then click After   Previous. Close the  Animation Pane.

Click Slide 4. Select the   bulleted text and apply the Fade Entrance  effect. Set the animation to start   After Previous with a Duration of  02.00 and a Delay of 01.75.  Click the Animation Pane to access the Fade    dialog box. Set the After Animation to Green on the Effect tab.

You apply a transition to all   the slides in the presentation to  create visual interest and re-focus the   audience attention as each new  slide displays during the presentation.
 

  Click Slide 1 and add the Fade transition. Set it to apply to all. Set the slides to advance   automatically after 00:03.00.

Video engages the audience’s   emotions and helps to reinforce the  message of your presentation. This helps   the audience remember the  message of the presentation, so you add one on this   slide.
 

  Click Slide 5. Insert   the video file oceans.mp4. Compress   the media. Select and delete any additional text boxes that may display when   the video is inserted.

You use the Playback and Format   tabs to adjust the video’s properties.
 

  Set the video to start Automatically. Change the Video Options to Hide While   Not Playing and to Rewind after Playing.

Apply a Simple Frame, White   Subtle Video Style. Format the video into an Oval shape. 

Audio is added to emphasize the   message of not only this slide but that of the entire presentation.
 

  Click Slide 2. Record yourself saying “Whales are amazing   creatures” or insert Whales.m4a.    Drag the speaker icon to the lower left of the slide. Set the audio  option to   start automatically and to hide during the show.

View the presentation. Save and   close Exp19_PPT_Ch02_Cap_Oceans_solution.pptx.   Exit PowerPoint. Submit the file as directed.

Cloud Computing technologies

A) Select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  

B) Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  

The paper should include the following sections each called out with a header.

1) Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.

2) Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

3) Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?

4) Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.

Python JSON API code

I need a code that will, on a daily basis, find out if a json URL has content in it. I need to be able to duplicate that for multiple JSON URLs in the same code

Alternate Instruction for Microsoft 365 Apps icon

computer word

If group titles are not visible on your Ribbon in Word for Mac, click the Word menu and select Preferences to open the Word Preferences dialog box. Click the View button and check the Show group titles check box under Ribbon. Close the Word Preferences dialog box.

  1. Select the tabbed text in the middle of the document and convert it to a table (accept default settings). Don’t include the blank line below the tabbed text.
  2. Select the entire table and apply the following changes:
    1. Select Banded Rows in the Table Style Options group [Table Design tab] and deselect all other check boxes.
      Alternate Instruction for Microsoft 365 Apps icon Select Banded Rows in the Table Style Options group [Table Tools Design tab] and deselect all other check boxes.
    2. Apply the List Table 1 Light – Accent 2 table style (Figure 4-120).Table Styles galleryFigure 4-120 Apply a table style
    3. Change the font size on all the text in the table to 10 pt.
    4. AutoFit the table and choose AutoFit Window.
    5. Change row height to 0.25″.
    6. Center all text vertically within each cell. (Hint: Use the Cell tab in the Table Properties dialog box.)
    7. Sort the table by Name of Vaccine in Ascending order. Be sure to select Header row in the My list has area of the Sort dialog box.
  3. Make the following changes to the table:
    1. Insert a row above the first row.
    2. Merge the three cells in the new first row and type the following:
      RECOMMENDED VACCINATION SCHEDULE
    3. Bold and center the first row and change the font size to 11 pt.
    4. Bold and italicize the column headings in the second row.
    5. Select the first row and apply borders with the following settings: solid line, Black, Text 1 color (second color in the first row of Theme Colors), 1 ½ pt. width, and apply a top and bottom
    6. Select the second row and apply a border with the following settings: solid line, Black, Text 1 color, 1 ½ pt width, and apply a bottom border. Do not remove the top border applied in the previous step.
    7. Select the last row and apply a border with the following settings: solid line, Black, Text 1 color, 1 ½ pt width, and apply a bottom border.
    8. Align Center [Table Layout tab, Alignment group] the column headings.
      Alternate Instruction for Microsoft 365 Apps icon Align Center [Table Tools Layout tab, Alignment group] the column headings.
    9. Align Center the text in the third column.
  4. Insert the following information alphabetically into the table. Insert rows where needed.Modify the title of the document (“Vaccination Schedule”).
    1. Apply the Title style to the title of the document.
    2. Change the After paragraph spacing to 8 pt.
    3. Center the title horizontally.
    4. Apply small caps and bold formatting to the title.
  5. Insert and modify a picture.
    1. Place the insertion point after the title and insert the CMPLogo-04 picture downloaded from the Resources link. Use the Insert Picture dialog box.
    2. Change text wrapping to Top and Bottom.
    3. Change the height of the logo to 1″. Verify the logo remains proportional.
    4. Apply the Offset: Bottom Right shadow picture effect (Outer category).
    5. Set the Horizontal Absolute position to 0.2″ to the right of Page.
    6. Set the Vertical Absolute position to 0.2″ below Page.
  6. Insert a picture and add a caption.
    1. Place the insertion point at the end of the first body paragraph and insert the Vaccination-04 picture downloaded from the Resources link. Use the Insert Picture dialog box.
    2. Change the text wrapping to Square.
    3. Change the height of the picture to 1.3″. Verify the graphic remains proportional.
    4. Drag the picture to the right of the first and second paragraphs.
    5. Insert a caption, delete the caption placeholder text, and type Don’t neglect your vaccinations! as the caption text.
    6. Center the caption text, change the font color to Red, Accent 2 (sixth color in the first row of Theme Colors), and turn off italics if it is applied to the text.
    7. Select the caption and the picture and Align Center.
    8. Group the caption and the picture.
    9. Set the Horizontal Absolute position to 6″ to the right of Margin.
    10. Set the Vertical Absolute position to 0.8″ below Margin.
  7. Edit the alt text of the graphic objects.
    1. Edit the alt text of the CMP logo and type Courtyard Medical Plaza logo as the alt text.
    2. Edit the alt text of the graphic of a doctor, type Graphic of a doctor as the alt text, and close the Alt Text pane.

Government's Role with the internet

 Government’s Role with the internet

Term Paper Outline Example:

  • Title Page: Create a page separate from the rest of the paper, including the title of the paper, your name, institution name, the course name/section, the instructor’s name, and the date.
  • Table of Content: Optional but preferred
  • Introduction: this is the overall purpose or term paper statement. It is used to acquaint anyone reading the paper with the argument being explored.
  • Body: This section is typically divided into multiple headings and subheadings, each linked with various components of the topic.
    • Heading One: History of the argument
    • Heading Two: Extent of the problem being explored
    • Heading Three: Effects of the problem being explored
    • Heading Four: Potential solutions
  • Conclusion: Summary of all of the points made and a response to the term paper statement
  • Reference List: Must follow APA 7th Format, and that includes in-text citations.

Term Paper: You are to write an ethics term paper on a selected topic approved by your instructor. The list of ethics topics with instructions and due date is located on the Left Hand Menu (under Term Paper). You are to notify the instructor of your topic choices (via myLeo email – using correct email protocol) by Sunday, February 14, 2021. This term paper will represent 20% of your total grade.  The term paper must be no less than 2000(NOT INCLUDE TITLE PAGE, TABLE OF CONTENT, and REFERENCES) words, double spaced, APA Format, and Time New Roman 12 Font.

This course has been designated as a Global Course, which has the following QEP Student Learning Outcomes. The Term Paper will be used to evaluate these learning outcomes.

To meet this requirement, you must place this term paper in your ePortfolio in Mane Sync. A screenshot must be attached to your term paper that you submit for grading to prove that the paper was placed in your ePortfolio. Directions for using the ePortfolio can be located at the following URL: http://www.tamuc.edu/aboutUs/ier/QualityEnhancementPlan/documents/GlobalFellowe PortfolioGuide.pdf

 

  1.  Demonstrate knowledge of the interconnectedness of global dynamics (issues, processes, trends, and systems). (QEP LO1)
  2.  View yourself as engaged citizens within an interconnected and diverse world. (QEP LO3)

Discussion Reply!!! About 50 words

  

  • Review contributions to threats and  vulnerabilities on a home network and determine if they have gaps in  their understanding.
  • Provide feedback on a classmate’s home  network security measures they are not currently using. Do you have any  other suggestions or recommendations for them?

What threats do you need to be concerned about on your home network?

  • One threat would be a malware attack that gains access to my devices  and information, which in turn could expose me to data theft. Another  threat is coming across any phishing or Smishing (SMS phishing) attacks  with malicious links intended to compromise my data. I avoid on any  links from emails nowadays because of how many phishing emails I get  lately. 

What are the vulnerabilities of each of your devices on your home network?

  • For laptops and smartphones in the house, simple things such as not  having the OS updated or incorrectly installed software or hardware pose  as vulnerabilities. Poor quality passwords are also easier to  manipulate thank a secure password (Comptia). IoT devices like an Echo  have a network called Sidewalk that allows the devices to connect with  others in the surrounding area, which I disabled when I got the  notification for it on the app.

What techniques can you use to protect your devices on your home  network? (Make sure to discuss how you will protect your network traffic  on your wireless network.)

  • One technique that I currently use is utilizing a “guest” network  for guests to our home and our IoT devices we have in the house. We do  this to limit traffic on our main network for security. For my  work-at-home setup, we use a VPN and MFA to get on the company network,  so even on the go I can remain secure. I also ensure to password protect  all devices that I can, avoid connecting to public networks and try to  make sure all devices remain updated (Comptia).

Discuss some home network security measures you are not currently using but may consider using.

  • Given the amount of personal data on each device, I have been  contemplating encrypting some files along with finding a good password  manager to help me maintain keeping my passwords up to date and changed  regularly without me forgetting them. I am also going to start  performing more security assessments on my network to keep it secure  (Comptia).

Network Security: What Is It, Why Does It Matter and What Can You Do to Make Networks More Secure? 2020. Comptia. Accessed October 26, 2022. https://www.comptia.org/content/guides/network-security-basics-definition-threats-and-solutions

Journal Article Assignment

I need a 4to8 pages summary about the article uploaded in which there will be a link in which there will be an article, I will be attaching a screenshot about the requirements. The other pdf file is the article which u need to work on.

Discussion: Software Development Security

 

Your Task: Develop an “intake” briefing for a group  of software engineers who have been tasked with developing a standard  set of security review processes for virtual teams. The purpose of these  processes is to ensure that compliance for software security  requirements is verified resulting in software applications and  software-based products where security is “built in.” The company also  intends that these processes be used towards the organization’s  achievement of Capability Maturity Model Integration (CMMI) Level 3 —  Defined.

Background: Software development is a complex task,  especially as technology changes at the speed of light, environments  evolve, and more expectations are placed upon vendors who want to be  competitive within the software market. Many software development  organizations also depend upon virtual teams whose members are  geographically dispersed. This complexity also makes implementing and  testing security features (for software applications) much more  challenging.

Format: This week, the format for your deliverable  (posting) will be “Talking Points.” Talking points are presented in  outline format and contain the content that you would put on slides in a  slide deck. Your outline should include 5 to 7 major points (“slide  titles”) followed by 3 to 5 supporting points for each. Remember to put  enough information into the talking points that your peer reviewers can  understand what you intend to cover in each section of your briefing.  Remember to introduce the topic at the beginning, present your analysis,  and then close your briefing with an appropriate summary. Include a  list of sources (3 or more) which attendees could refer to if they wish  to fact check your work.

Organizational Risk Assessment

 

In this assignment you will be conducting a risk assessment. This will not be a technical risk assessment, but an assessment of your hypothetical organization/business. For your organization/business, take the NIST Cybersecurity Framework controls and reduce them to system configuration requirements and system test cases with pass/fail criteria. Refer to the “Framework for Improving Critical Infrastructure Cybersecurity,” located within the Course Materials. Then, include the following in a report:

  1. Describe when some controls cannot be implemented (such as on a personal laptop).
  2. Explain what is to be done in each case identified above to compensate for controls that cannot be implemented (e.g., create an identification authentication scheme).
  3. Demonstrate how compensating controls can ensure the non-compliant system can continue to operate within the secured and compliant environment.
  4. Discern the likelihood of a cybersecurity breach within the compliant environment and the impact it might have on the organization (make sure to consider emerging risks, threats, and vulnerability).

APA style is not required, but solid academic writing is expected.

Refer to “Organizational Risk Assessment Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion. 

You are not required to submit this assignment to LopesWrite.