C# Programming (Using Inheritance)

1. Start a ( Console App (.NET Framework) ) project in Visual Studio 2019.

2. Please name it “Using Inheritance”.

3. I attached the main assignment instructions.

Please write the code Without plagiarism. Thank you!

Infrastructure, Networks, and Network Operations

Instructions

Design a network that would provide each office with three Ethernet jacks but would isolate the different teams from each other. Make sure to identify where you would house switches, and how things would be physically and logically laid out.

Create a Word document containing descriptions of your solution.

Aligned Objectives

  • Identify physical and logical network components
  • Identify and describe the services and tools used in network operations
  • Describe the processes involved in running a datacenter

Servers Remote Management

While working on the homework assignment, the differences between servers and desktops will become more obvious. What tools and technology would you use to remotely manage servers? These may be the same as those used with desktops or completely different. Discuss with the other students how you would manage one remote server, 10 remote servers, and 1,000 remote servers. Make sure to think about out-of-band management along with management through remote protocols such as remote desktop and ssh.

Aligned Objectives

  • Understand the core elements of an IT infrastructure, servers, network devices, and wired and wireless network links
  • Understand through practical examples, how protocols are used to enable communication between computing devices
  • Understand the differences between workstation and server hardware
  • Manage servers both remotely and locally

Response Parameters

  • Each initial post should be 250 to 350 words. Respond to at least one peer’s post by providing potential solutions to their concern

PHYSICAL CYBER SECURITY

LO1: Develop a systematic understanding and critical awareness of the security threats affecting Cyber Physical Systems and the mechanisms to prevent, detect and mitigate attacks.

• LO2: Identify and evaluate appropriate solutions for building secure Cyber Physical Systems; apply advanced techniques and tools to deal with cross-cutting security concerns in different domains.

• LO3: Demonstrate advanced skills in research, problem solving and communication; be a self-directed, independent learner showing initiative and personal responsibility.

Re-do

 Q1. Research paper: 5 pages ——- Separate Document
You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.  Include at least 3 scholarly references in addition to the course textbook.  At least Five of the references cited need to be  peer-reviewed scholarly journal articles from the library.  Your paper should meet the following requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Q2: Practical Connection – 550 words ——- Separate Document Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:

  • Provide a 2 full pages double spaced minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Q3.  Research paper: 5 pages This week, you have to read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness for virtualization.
  • Explain Microsoft (or another product) licensing for virtualized environments.
  • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
  • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations. 
 Your paper should meet the following requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

PowerPoint_3A_Trails

PowerPoint_3A_Trails

     

Open the file Student_PowerPoint_3A_Trails.pptx downloaded   with this project. Then, in your textbook, turn to Project 3A and complete   all of the steps in Activities 3.01 – 3.17.

 

Complete Activity 3.01 Changing   Theme Colors

 

Complete Activity 3.02 Changing   Theme Fonts

 

Complete Activity 3.03 Applying   a Background Style

 

Complete Activity 3.04 Hiding   Background Graphics

 

Complete Activity 3.05 Applying   a Background Fill Color to a Slide

 

Complete Activity 3.06 Applying   a Background Texture

 

Complete Activity 3.07 Applying   a Picture to the Slide Background and Adjusting Transparency

 

Complete Activity 3.08 Resetting   a Slide Background

 

Complete Activity 3.09 Applying   Animation Entrance Effects and Effect Options

 

Complete Activity 3.10   Reordering Animation

 

Complete Activity 3.11 Setting   Animation Start Options

 

Complete Activity 3.12 Setting   Animation Duration and Delay Timing Options

 

Complete Activity 3.13 Using   Animation Painter and Removing Animation

 

Complete Activity 3.14 Inserting   a Video and Using Media Controls

 

Complete Activity 3.15 Sizing   and Aligning a Video

 

Complete Activity 3.16 Changing   the Style and Shape of a Video

 

Complete Activity 3.17 Trimming   and Compressing a Video and Setting Playback Options

 

Save and close the file, and   then submit for grading.

Exp19_Excel_Ch06_HOEAssessment_Scholarship_Dinner

 Exp19_Excel_Ch06_HOEAssessment_Scholarship_Dinner 

 Exp19 Excel Ch06 HOEAssessment Scholarship Dinner

Excel Chapter 6 Hands-On Exercise Assessment – Scholarship Dinner

  

Project Description:

You have recently been elected social coordinator for your University’s student government association. As part of your duties, you are required to plan an annual scholarship dinner. The dinner is a fundraiser in which the proceeds are used to fund scholarships. You will perform What-If Analysis to calculate the budget information required for the event to be successful.

     

Start Excel. Download   and open the file named Exp19_Excel_Ch06_HOEAssessment_ScholarshipDinner.xlsx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Create range names   based on the left columns in the ranges A4:B9, A20:B20, and A30:B30. 

 

Edit the named range of_Guests_Using_Valet to Guests_Using_Valet.

 

Enter a formula in   cell B27 using Named Ranges to calculate projected cost of catering. The cost   of catering is the cost per meal * the total number of tickets sold.

 

Enter a formula in   cell B28 using Named Ranges to calculate total cost for room setup.

 

Enter a formula in   cell B29 using Named Ranges to calculate the total valet expenses. The total   valet expenses can be calculated by multiplying tickets sold * total guests   using valet * valet cost per car.

 

Use a function to   total all expenses in cell B30.

 

Enter a formula in   cell C32 to calculate the remaining balance (Total_Income – Total_Expenses).

 

Enter a series of   substitution values in the range E5:E20. The values should start at 50 and   increase in increments of 5 stopping at 125.

 

Enter references to   Total_income, Total_Expenses, and Balance in the correct locations (F4, G4,   and H4) for a one-variable data table. Use range names where indicated.

 

Complete the   one-variable data table in the range E4:H20 using cell B5 as the column input   cell, and then format the results with Comma Style.

 

Type Price   in   cell E4 and apply custom number formats to make the formula references appear   as descriptive column headings. In F4, Total Income; in G4, Total   Expenses,   in H2, Balance

 

Copy the range E5:E20   and paste it in the range J5:J20.

 

Type 400   in   cell K4. Complete the series of substitution values from 400 to 525 in   increments of 25.

 

Enter the reference   to the Balance formula in the correct location for a two-variable data table.

 

Complete the   two-variable data table in the range J4:P20. Use cell B4 as the Row input   cell and B5 as the Column input cell. Format the results with Comma Style   formatting.

 

Apply a custom number   format to make the formula reference appear as a descriptive column heading Price

 

Load the Solver   add-in if it is not already loaded. Set the objective to calculate the   highest Balance possible (C32).

 

Use Tickets Sold   (cell B4) and Ticket Price (cell B5) as changing variable cells. Do not use   range names.

 

Use the Constraints   section of the spreadsheet model to set constraints for minimum ticket price,   maximum ticket price, and ticket sales. The ticket price must be less than or   equal to the maximum ticket price (cell B14). The ticket price must also be   greater than or equal to the minimum ticket price (cell B13). The total   tickets sold must be less than or equal to the ballroom capacity and the   number of tickets sold must be an integer. 

 

Solve the problem.   Generate the Answer Report and Keep Solver Solution.

 

Save and close   Exp19_Excel_Ch06_HOEAssessment_ScholarshipDinner.xlsx. Exit Excel. Submit   the file as directed. 

CSP25 Homework 03

 CSP25 Homework 03
Part 1 : Use a Wordprocessor to type ANSWERS only. Save file as pdf then submit pdf file.

1. Write four statements only that will be part of an Assembly program that will define
four constants (use your own name) and each will store the decimal value 29 in decimal,
binary, octal and hexadecimal.
2. Write a statement that will be part of the data definition of an Assembly program that
will define a double word that will store in memory in big endian format.
3. Given the number 456789Abh, list out the byte values in little endian.
4. Write a statement that will be part of the data definition of an Assembly program that
will define an array of 120 uninitialized unsigned double words.

Part 2  
For these questions, submit screenshot of your code plus 2 outputs for part (b) and (d) of test
values given above.
Put all the same file as your work above.
5. Write an Assembly program that will add two numbers 9 and 4. Store result in EAX first
but later after the addition, move the result to a variable called sum which was defined
as a double word and intialzied to 0
6. Write an Assembly program that will add two numbers 9 and 4. Store result in AX first
but later after the addition, move the result to a variable called sum which was defined
as a word and intialzied to 0

Submit one pdf file that has all your work.
 

IMPACT OF IT -6 (B)

 

Find a recent article that relates to either employee monitoring that is conceived as too invasive or a recent incident of where employee data has been breached. Summarize the article and discuss how you believe this will impact the company, and application (if applicable). Also, was the data exploited through an application or storage location that is not necessarily needed to run a business? Is it a nice to have? Example: a social media type application.

Post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cite your resources.

Adaboost

 

1. Consider running the Perceptron algorithm on a training set S arranged in a certain order. Now suppose we run it with the same initial weights and on the same training set but in a different order, S 0 . Does Perceptron make the same number of mistakes? Does it end up with the same final weights? If so, prove it. If not, give a counterexample, i.e. an S and S 0 where order matters.

 2. We have mainly focused on squared loss, but there are other interesting losses in machine learning. Consider the following loss function which we denote by φ(z) = max(0, −z). Let S be a training set (x 1 , y1 ), . . . ,(x m, ym) where each x i ∈ R n and y i ∈ {−1, 1}. Consider running stochastic gradient descent (SGD) to find a weight vector w that minimizes 1 m Pm i=1 φ(y i · w T x i ). Explain the explicit relationship between this algorithm and the Perceptron algorithm. Recall that for SGD, the update rule when the i th example is picked at random is wnew = wold − η∇φ  y iw T x i . 

3. Here we will give an illustrative example of a weak learner for a simple concept class. Let the domain be the real line, R, and let C refer to the concept class of “3-piece classifiers”, which are functions of the following form: for θ1 < θ2 and b ∈ {−1, 1}, hθ1,θ2,b(x) is b if x ∈ [θ1, θ2] and −b otherwise. In other words, they take a certain Boolean value inside a certain interval and the opposite value everywhere else. For example, h10,20,1(x) would be +1 on [10, 20], and −1 everywhere else. Let H refer to the simpler class of “decision stumps”, i.e. functions hθ,b such that h(x) is b for all x ≤ θ and −b otherwise. 

(a) Show formally that for any distribution on R (assume finite support, for simplicity; i.e., assume the distribution is bounded within [−B, B] for some large B) and any unknown labeling function c ∈ C that is a 3-piece classifier, there exists a decision stump h ∈ H that has error at most 1/3, i.e. P[h(x) 6= c(x)] ≤ 1/3. (b) Describe a simple, efficient procedure for finding a decision stump that minimizes error with respect to a finite training set of size m. Such a procedure is called an empirical risk minimizer (ERM). 

(c) Give a short intuitive explanation for why we should expect that we can easily pick m sufficiently large that the training error is a good approximation of the true error, i.e. why we can ensure generalization. (Your answer should relate to what we have gained in going from requiring a learner for C to requiring a learner for H.) This lets us conclude that we can weakly learn C using H.