COMPUTER SCIENCE

1. For each instruction, give the 80×86 opcode and total number of bytes of object code, including prefix bytes. Assume you are in 64-bit mode and that word0p, dbl0p, and quad0p reference a word, doubleword and quadword in data, respectively.

  • Add    ax, word0p
  • Sub dbl0p, ebx
  • Sub rax, 10
  • Add quad0p, 1000
  • Inc r10b
  • Dec word0p
  • Neg rdx
  • Inc QWORD PTR [rdx]

2. Please provide code converting a Fahrenheit to a Celsius using the registers edx and eax?

3. Please write the commands (declarations) to setup a 2-byte and 4-byte GPS location.

4. Is the following code valid? Why or why not:

  • mov eax, [ebx-ecx] ;
  • mov [eax+esi+edi], ebx ;
  • cmp eax, edx ;
  • xor ecx, ecx ;
  • inc eax ;

5. What does the following code do?

  • Push ebp                  ;
  • Mov ebp, esp           ;
  • Push ebx                  ;

6. Please provide code for the following scenario:

  • Create a while loop that that checks for 4 iteractions
  • Create jumps and labels for each case
  • Provide an exitcode along with possible return codes.

paper

write the eassay 550 words about how marketing management is helpful to get a job.

Research paper

Find a peer-reviewed scholarly journal article discussing government planning and/or entrepreneurial innovation. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

Be approximately five to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your 

Exp19_Excel_Ch04_ML1_Pet_Supplies

  

Exp19_Excel_Ch04_ML1_Pet_Supplies

Exp19 Excel Ch04 ML1 Pet Supplies

Excel Chapter 4 Mid-Level 1 – Pet Supplies 

  

Project Description:

You are the inventory manager for Crafton’s Pet Supplies. You are currently preforming analysis to determine inventory levels, as well as the total value of inventory on hand. Your last steps will be to check the report for duplicate entries and format for printing.

     

Start Excel. Download and open the file named EXP19_Excel_Ch04_ML1_HW_PetSupplies.xlsx. Grader has automatically added   your last name to the beginning of the filename. 

 

Freeze the top row so   that the column labels do not scroll off screen. 

 

Convert the data to a   table and name the table Inventory2021.

 

Apply Table Style   Medium 3 to the table.
 

  Note, depending on the version of Office used, the table style name may be   Orange, Table Style Medium 3.

 

Sort the table by   Warehouse (A to Z), then by Unit Price (smallest to largest). Create a custom   sort order for Department so that it appears in this sequence: Food &   Health, Collars & Leashes, Toys, Clothes, Training, and Grooming.
  Note, Mac users to create a custom order list, on the Excel menu, click   Preferences, and then under Formulas and Lists, click Custom Lists.
  Click Add.

 

Remove duplicate   records from the table. Excel should find and remove one duplicate record.

 

Create an unqualified   structured reference in column G to determine the value of the inventory on   hand and apply Accounting Number Format. To calculate the inventory on hand,   multiply the Unit Price and the Amount on Hand.

 

Apply a Total Row to   the Inventory2021 table, set the Inventory Value to Sum, and the Amount on   Hand to Average. Format the results to display with two decimal points.

 

Create a new   conditional formatting rule that displays any Inventory Value in column G for   the Food & Health department with a value of $30,000 or more as Red fill   color (second column, last row). There will be two qualifying entries.
  Note, Mac users select the range G2:G78. Then in the New Formatting Rule   dialog box, select the style Classic.

 

Ensure the warehouse   information is not broken up between pages when printed. Add a page break to   make sure that each warehouse prints on its own consecutive page.

 

Set the worksheet to   Landscape orientation, and repeat row 1 labels on all pages.

 

Insert a footer with   your name on the left side, the sheet name code in the center, and the file   name code on the right side of the sheet. Display the Inventory sheet in Page   Break Preview.

 

Save and close EXP19_Excel_CH04_ML1_HW_PetSupplies.xlsx.   Exit Excel. Submit the file as directed.

Security Operations Concepts

provide a 50–100-word explanation on why you chose your answer. Please cite your sources for your answers from your course materials or other credible resources.

You must provide SOC 2 and SOC 3 reports on the security, availability, confidentiality, processing integrity, and privacy of operational controls. As part of these reports, you must provide information regarding the disclosure of data to third parties. To which tenet of SOC 2 and SOC 3 does this information apply?

A. Privacy
B. Security
C. Confidentiality

Which statement best describes a two-man control?

A. Two operators work together to complete a given task.
B. Two operators review and approve each other’s work.
C. An operator handles more than one position within an organization.

Which of the following is the MOST important consideration when implementing an intrusion detection system?

A. Patching
B. Tuning
C. Encryption

assignment

What are the characteristics of anomaly detection? 

  1. What are the detection problems and methods?
  2. What are the statistical approaches when there is an anomaly found?
  3. Compare and contrast proximity and clustering based approaches.

Home science and computer design

How would you conduct the study any differently?

Given the nature in the advance of technology, how do you foresee technology changing the way studies such as these are conducted in the future?

Please refer to the case study and answer the above questions in detail.