PowerPoint_2G_Orientation

PowerPoint_2G_Orientation #PowerPoint_2G_Orientation

Project Description:

In the following project, you will format a presentation that is shown to Sensation Park Entertainment Group employees on their first day of a three-day orientation.

     

Open   the file Student_PowerPoint_2G_Orientation.pptx downloaded with this project.

 

 

On Slide 1, format the subtitle—New Employee Orientation—as WordArt   using the last style in the first row.

 

Select the picture and then Crop   the image from the left side so that the center-left crop handle aligns with   the left half of the horizontal ruler at 5 inches.

 

 

Change the picture Height to 3.5   and then apply a Glow: 8 point; Turquoise, Accent color 1 picture effect to   the image. Use the Align Selected Objects command to apply Align Middle to   the title and the picture.

 

On Slide 2, remove the bullet   symbol from the paragraph, and then change the Shape Fill to, under Theme   Colors, in the third column, the second color, and the Shape Outline to under   Theme Colors, in the second column, the first color.

 

On Slide 3, convert the bulleted   list to the Hierarchy type SmartArt graphic—Hierarchy List. Change the color   to Colorful Range – Accent Colors 3 to 4, and then apply the 3-D Inset style.

 

On Slide 4, change the two   bulleted lists to Numbering.

 

On Slide 5, change the bullet   symbols to Filled Square Bullets, change the Color to under Theme Colors, in   the third column, the fourth color, and then change the Size to 100.

 

On Slide 5, in the placeholder   on the right, insert an online picture by searching for fire alarm and then insert a picture of a   fire alarm with a background.
  Note—alternatively, insert the image p02G_Alarm.jpg   downloaded with the data files for this project.

 

If the option is available,   remove the background from the picture, and then apply the Glow: 18 point,   Bright Green, Accent color 3 picture effect.

 

On Slide 5, insert a Text Box   below the content placeholder on the left side of the slide. In the text box,   type All   employees will be tested on park safety procedures! Using the Align to Slide option   Align Center the text box and apply Align Bottom.

 

On Slide 6, from the Shapes   gallery, under Basic Shapes, insert a Diamond of any size anywhere on the   slide. Resize the diamond so that its Shape Height is 6 and its Shape Width   is 8. 

 

Using the Align to Slide option,   apply Align Center, and Align Middle to the diamond shape. Apply the Moderate   Effect – Bright Green, Accent 3 shape style.

 

In the diamond, type Sensation   Park Entertainment Group Welcomes You! Change the Font Size to 28, and then apply the   Round Convex Bevel effect to the diamond shape. Note—this effect may be   called Art Deco on some systems.

 

Insert a Header & Footer on   the Notes and Handouts. Include the Date and time updated automatically, the   Page number, and a Footer with the text 2G_Orientation 

 

Display the document properties.   As the Tags type orientation.

 

Save and close the file, and   then submit for grading.

8 puzzle JAVA

2- Complete the puzzle method by using heuristic search f(n) = g(n)+ h(n).

For h(n) use sum of distances out of place (hamilton distance).
Make sure to write your name in main method.
3- Create an input file as follow:
3
1 3 2 5 0 4 8 7 6               1 3 2 5 7 4 8  6  0
1 5 2 0 8 6 3 7 4               1 2 3 4 5 0 8  7  6 
1 3 2 5 0 4 8 7 6               0 1 3 2 5 7 4  6  8
4- For each input print:
Initial state, Goal Sate, the no. of moves as well as moves from initial state to goal
state. for example:
Initial state: 1 3 2 5 0 4 8 7 6,
Goal State:  1 3 2 5 7 4 8  6  0,  
10 moves: L, R, D, ……..
*private void puzzle(int cs[], int gs[]){ //complete this method, on attached file.

ITSD422U3DB

 

Assignment Details: Design Phase

One of the most time-consuming activities and difficult tasks in systems development is the design phase. Depending on the system, there are many design decisions that must be made. Poor decisions during design can cause catastrophic failure of the project. As a member of your software development group, you have been asked to select the system architecture required for the self-service benefits application that is currently under development by the software group in the next room.

Based on your knowledge, experience, and ideas, discuss the following:

  • Describe how you would proceed through the process of selecting an appropriate architecture. Address the following questions:
    • What steps are involved in the architecture selection?
    • Describe 1 architecture and what type of software system it would be used for.
    • What advantages does this architecture have over others?

Assignment 300 words

 After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). 

Graduate Internship Preparation assignment 6 feb 7

Assignment Content

  1. Review the following video “Tips for job seekers: How to negotiate your salary pt. 1” and “Tips for job seekers: Advice on personal branding pt. 2”, and answer the critical thinking question that follows:

Summarize the key points from the video in terms of what you have learned regarding what skills and knowledge you would focus on when building your personal branding information for a potential job interview. Why focus on those skills? In your summary, reflect on, and explain, how you will apply what you have learned in a career context. 

Your summary should be a minimum of one page of content in length. Properly cite any references utilized in APA format.

Assignment help

Assignment
Question 1 : You  are the web master for the Republican Party National Committee. Prepare  a risk assessment analysis for your website. Some questions to  consider: 

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?
    Write between 200-300 words and provide references.

Question 2 :  Do a bit of research on penetration testing techniques. Investigate and document the following 

  • Five network penetration testing techniques
  • Advantages and disadvantages of each
  • One notable social engineering test
  • Possible negative implications of penetration tesing

Please write between 200 and 300 words   
 

Question 3 : Do some research on Threat Response software. Find one particular software package to investigate. 

  • What does the software do?
  • What are it’s major features?
  • What kind of training is required?
  • How much does the software cost?

Do not do the same software as everyone else.  Write 200-300 of your own words

NIST

The National Institute of Standards and Technology (NIST) publishes Special Publications (SP) to help government agencies and private companies develop and support security programs. The SP 800 subseries deals specifically with computer security. SPs are considered guidelines for nongovernment entities whereas both NIST Federal Information Processing Standards (FIPS) documents and the SPs are required standards for government agencies. 

Prepare a 1- to 2-page table in Microsoft® Word or a Microsoft® Excel® table in which you outline how a CISO would use the NIST publications to develop security policies.

Include the following column headings: 

  • SP number 
  • SP name  
  • SP purpose

Include the following row headings: 

  • SP 800-30 
  • SP 800-34 
  • SP 800-37 
  • SP 800-39 
  • SP 800-53 
Part 2 

You were recently hired as CISO for a healthcare company that qualifies as a “Covered Entity” under HIPAA, which means it must comply with the standards of the HIPAA Security Rule. 

Using the table you created in Part 1, write a 2- to 3-page informal comparison outlining the overarching components and outcomes of your NIST-based structure as compared to a structure operating in the global marketplace. Logically explain how NIST compliance influences information security governance and is part of formulating the organization’s desired outcomes. 

Cite all sources using APA guidelines. 

Submit your assignment, including the 1- to 2-page table and the 2- to 3-page comparison.

Operating system

Multi-core technology can often, but not necessarily always, make applications run faster.

  • Research some actual computing environments that are expected to benefit from multi-core chips and briefly explain why.