1. Start a ( Console App (.NET Framework) ) project in Visual Studio 2019.
2. Please name it “Using Inheritance”.
3. I attached the main assignment instructions.
Please write the code Without plagiarism. Thank you!
1. Start a ( Console App (.NET Framework) ) project in Visual Studio 2019.
2. Please name it “Using Inheritance”.
3. I attached the main assignment instructions.
Please write the code Without plagiarism. Thank you!
Design a network that would provide each office with three Ethernet jacks but would isolate the different teams from each other. Make sure to identify where you would house switches, and how things would be physically and logically laid out.
Create a Word document containing descriptions of your solution.
While working on the homework assignment, the differences between servers and desktops will become more obvious. What tools and technology would you use to remotely manage servers? These may be the same as those used with desktops or completely different. Discuss with the other students how you would manage one remote server, 10 remote servers, and 1,000 remote servers. Make sure to think about out-of-band management along with management through remote protocols such as remote desktop and ssh.
LO1: Develop a systematic understanding and critical awareness of the security threats affecting Cyber Physical Systems and the mechanisms to prevent, detect and mitigate attacks.
• LO2: Identify and evaluate appropriate solutions for building secure Cyber Physical Systems; apply advanced techniques and tools to deal with cross-cutting security concerns in different domains.
• LO3: Demonstrate advanced skills in research, problem solving and communication; be a self-directed, independent learner showing initiative and personal responsibility.
Q1. Research paper: 5 pages ——- Separate Document
You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:
Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. Include at least 3 scholarly references in addition to the course textbook. At least Five of the references cited need to be peer-reviewed scholarly journal articles from the library. Your paper should meet the following requirements:
Q2: Practical Connection – 550 words ——- Separate Document Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:
Q3. Research paper: 5 pages This week, you have to read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:
Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.
Your paper should meet the following requirements:
PowerPoint_3A_Trails
Open the file Student_PowerPoint_3A_Trails.pptx downloaded with this project. Then, in your textbook, turn to Project 3A and complete all of the steps in Activities 3.01 – 3.17.
Complete Activity 3.01 Changing Theme Colors
Complete Activity 3.02 Changing Theme Fonts
Complete Activity 3.03 Applying a Background Style
Complete Activity 3.04 Hiding Background Graphics
Complete Activity 3.05 Applying a Background Fill Color to a Slide
Complete Activity 3.06 Applying a Background Texture
Complete Activity 3.07 Applying a Picture to the Slide Background and Adjusting Transparency
Complete Activity 3.08 Resetting a Slide Background
Complete Activity 3.09 Applying Animation Entrance Effects and Effect Options
Complete Activity 3.10 Reordering Animation
Complete Activity 3.11 Setting Animation Start Options
Complete Activity 3.12 Setting Animation Duration and Delay Timing Options
Complete Activity 3.13 Using Animation Painter and Removing Animation
Complete Activity 3.14 Inserting a Video and Using Media Controls
Complete Activity 3.15 Sizing and Aligning a Video
Complete Activity 3.16 Changing the Style and Shape of a Video
Complete Activity 3.17 Trimming and Compressing a Video and Setting Playback Options
Save and close the file, and then submit for grading.
Exp19_Excel_Ch06_HOEAssessment_Scholarship_Dinner
Exp19 Excel Ch06 HOEAssessment Scholarship Dinner
Excel Chapter 6 Hands-On Exercise Assessment – Scholarship Dinner
You have recently been elected social coordinator for your University’s student government association. As part of your duties, you are required to plan an annual scholarship dinner. The dinner is a fundraiser in which the proceeds are used to fund scholarships. You will perform What-If Analysis to calculate the budget information required for the event to be successful.
Start Excel. Download and open the file named Exp19_Excel_Ch06_HOEAssessment_ScholarshipDinner.xlsx. Grader has automatically added your last name to the beginning of the filename.
Create range names based on the left columns in the ranges A4:B9, A20:B20, and A30:B30.
Edit the named range of_Guests_Using_Valet to Guests_Using_Valet.
Enter a formula in cell B27 using Named Ranges to calculate projected cost of catering. The cost of catering is the cost per meal * the total number of tickets sold.
Enter a formula in cell B28 using Named Ranges to calculate total cost for room setup.
Enter a formula in cell B29 using Named Ranges to calculate the total valet expenses. The total valet expenses can be calculated by multiplying tickets sold * total guests using valet * valet cost per car.
Use a function to total all expenses in cell B30.
Enter a formula in cell C32 to calculate the remaining balance (Total_Income – Total_Expenses).
Enter a series of substitution values in the range E5:E20. The values should start at 50 and increase in increments of 5 stopping at 125.
Enter references to Total_income, Total_Expenses, and Balance in the correct locations (F4, G4, and H4) for a one-variable data table. Use range names where indicated.
Complete the one-variable data table in the range E4:H20 using cell B5 as the column input cell, and then format the results with Comma Style.
Type Price in cell E4 and apply custom number formats to make the formula references appear as descriptive column headings. In F4, Total Income; in G4, Total Expenses, in H2, Balance.
Copy the range E5:E20 and paste it in the range J5:J20.
Type 400 in cell K4. Complete the series of substitution values from 400 to 525 in increments of 25.
Enter the reference to the Balance formula in the correct location for a two-variable data table.
Complete the two-variable data table in the range J4:P20. Use cell B4 as the Row input cell and B5 as the Column input cell. Format the results with Comma Style formatting.
Apply a custom number format to make the formula reference appear as a descriptive column heading Price.
Load the Solver add-in if it is not already loaded. Set the objective to calculate the highest Balance possible (C32).
Use Tickets Sold (cell B4) and Ticket Price (cell B5) as changing variable cells. Do not use range names.
Use the Constraints section of the spreadsheet model to set constraints for minimum ticket price, maximum ticket price, and ticket sales. The ticket price must be less than or equal to the maximum ticket price (cell B14). The ticket price must also be greater than or equal to the minimum ticket price (cell B13). The total tickets sold must be less than or equal to the ballroom capacity and the number of tickets sold must be an integer.
Solve the problem. Generate the Answer Report and Keep Solver Solution.
Save and close Exp19_Excel_Ch06_HOEAssessment_ScholarshipDinner.xlsx. Exit Excel. Submit the file as directed.
CSP25 Homework 03
Part 1 : Use a Wordprocessor to type ANSWERS only. Save file as pdf then submit pdf file.
1. Write four statements only that will be part of an Assembly program that will define
four constants (use your own name) and each will store the decimal value 29 in decimal,
binary, octal and hexadecimal.
2. Write a statement that will be part of the data definition of an Assembly program that
will define a double word that will store in memory in big endian format.
3. Given the number 456789Abh, list out the byte values in little endian.
4. Write a statement that will be part of the data definition of an Assembly program that
will define an array of 120 uninitialized unsigned double words.
Part 2
For these questions, submit screenshot of your code plus 2 outputs for part (b) and (d) of test
values given above.
Put all the same file as your work above.
5. Write an Assembly program that will add two numbers 9 and 4. Store result in EAX first
but later after the addition, move the result to a variable called sum which was defined
as a double word and intialzied to 0
6. Write an Assembly program that will add two numbers 9 and 4. Store result in AX first
but later after the addition, move the result to a variable called sum which was defined
as a word and intialzied to 0
Submit one pdf file that has all your work.
Find a recent article that relates to either employee monitoring that is conceived as too invasive or a recent incident of where employee data has been breached. Summarize the article and discuss how you believe this will impact the company, and application (if applicable). Also, was the data exploited through an application or storage location that is not necessarily needed to run a business? Is it a nice to have? Example: a social media type application.
Post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cite your resources.
1. Consider running the Perceptron algorithm on a training set S arranged in a certain order. Now suppose we run it with the same initial weights and on the same training set but in a different order, S 0 . Does Perceptron make the same number of mistakes? Does it end up with the same final weights? If so, prove it. If not, give a counterexample, i.e. an S and S 0 where order matters.
2. We have mainly focused on squared loss, but there are other interesting losses in machine learning. Consider the following loss function which we denote by φ(z) = max(0, −z). Let S be a training set (x 1 , y1 ), . . . ,(x m, ym) where each x i ∈ R n and y i ∈ {−1, 1}. Consider running stochastic gradient descent (SGD) to find a weight vector w that minimizes 1 m Pm i=1 φ(y i · w T x i ). Explain the explicit relationship between this algorithm and the Perceptron algorithm. Recall that for SGD, the update rule when the i th example is picked at random is wnew = wold − η∇φ y iw T x i .
3. Here we will give an illustrative example of a weak learner for a simple concept class. Let the domain be the real line, R, and let C refer to the concept class of “3-piece classifiers”, which are functions of the following form: for θ1 < θ2 and b ∈ {−1, 1}, hθ1,θ2,b(x) is b if x ∈ [θ1, θ2] and −b otherwise. In other words, they take a certain Boolean value inside a certain interval and the opposite value everywhere else. For example, h10,20,1(x) would be +1 on [10, 20], and −1 everywhere else. Let H refer to the simpler class of “decision stumps”, i.e. functions hθ,b such that h(x) is b for all x ≤ θ and −b otherwise.
(a) Show formally that for any distribution on R (assume finite support, for simplicity; i.e., assume the distribution is bounded within [−B, B] for some large B) and any unknown labeling function c ∈ C that is a 3-piece classifier, there exists a decision stump h ∈ H that has error at most 1/3, i.e. P[h(x) 6= c(x)] ≤ 1/3. (b) Describe a simple, efficient procedure for finding a decision stump that minimizes error with respect to a finite training set of size m. Such a procedure is called an empirical risk minimizer (ERM).
(c) Give a short intuitive explanation for why we should expect that we can easily pick m sufficiently large that the training error is a good approximation of the true error, i.e. why we can ensure generalization. (Your answer should relate to what we have gained in going from requiring a learner for C to requiring a learner for H.) This lets us conclude that we can weakly learn C using H.