Project 2: Windows Upgrade Proof of Concept

 

If you didn’t last week:

  • Download VMware Player, Virtual Box, or use Hyper-V to build a Windows 10 virtual machine. These free applications can be placed on your personal computer:
  • Download the Windows Upgrade Proof of Concept Template and follow the instructions in the document.

In this project, you will practice installing and configuring Windows 10 on a virtual machine and document the process with screenshots and written explanations. You will need to take screenshots from the virtual machine (VM) from this project for the Project 3 presentation, so do not delete the VM.

Follow the Windows Installation Instructions to create the proof of concept. Once you have completed these tasks, write a report that documents the steps you followed in installing Windows 10, detailing which version you installed as well as the steps you completed after the installation.

Blockchain

Complete  a review of the attached article by writing a 2-3 page overview of the  article. This will be a detailed summary of the journal article,  including concepts discussed and Applications in Health Care. Additionally, find one other  source (2nd – Health_Care.pdf) that substantiates the findings in the article you are reviewing.   Once you find the article, you will read it and write a review of it.  This is considered a research article review. Your paper should meet these requirements:  

  • Be approximately 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support  your answers with the readings from the course and at least two  scholarly journal articles to support your positions, claims, and  observations, in addition to your textbook. 

Do groups enhance or impair performance?

 Do groups enhance or impair performance?

Introduction:

Does the thought of a “group project” send shivers down your spine?  If so, you aren’t alone.  Many students prefer working alone to working in a group.  But before you dismiss the benefits of working together, let’s explore what the research says about whether groups enhance, or impair, performance.

This assignment fulfills/Supports:

  • Module Outcome: 1
  • Course Outcome: 1, 2
  • General Education Competencies: 1, 3, 5

The Assignment:

For this Discussion Board, complete the following steps:

Step 1:

  1. Using the FTCC Library (either in-person or online), explore scholarly research on the following concepts:
    1. The social facilitation effect
    2. Social loafing
    3. Deindividuation
    4. Group polarization
    5. Groupthink

Step 2:

In your initial post, thoroughly discuss the following:

  1. Based on your research, choose at least two of the concepts listed above and discuss how they could IMPAIR performance on a group task (identify a group task/activity and apply your discussion to that task).  Here’s an example: Social loafing is a common occurrence in academic group work.  When students are assigned a group project, there may be one or more social loafers in the group who do not complete their “fair share” of the work.  This happens because people who are part of a group feel slightly less responsible for the outcome and therefore don’t work as hard as they https://perfectwriterblog.com/education-homework-help/do-groups-enhance-or-impair-performance/ would if they were completing a project alone.  When this happens, other group members pick up the slack left by the social loafers.  Ultimately, this can impair group performance because…(explain how social loafing impairs group performance using the information from your research and your textbook). Remember- group work doesn’t always occur in an academic setting.  We work together in groups at our jobs, in our homes, and in social settings.
  2. Next, discuss at least two ways that working in a group can ENHANCE performance on the same task you identified above.
  3. Your discussion must be based on information from the scholarly sources you found through the FTCC Library.  However, you may add anecdotal information from your own life to justify your position.

Citing Sources:   You must use APA style to reference your source(s) at the end of your submission.  For this assignment, you must include reference information for your textbook and any articles or publications you use.  Information on how to format reference information (including a reference generator) in APA style can be found on the Purdue Online Writing Lab website at https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/general_format.html (opens in a new window).

Acceptable Length: 300-500 word initial post; 2-3 sentence responses to at least two classmates.

Formatting Requirements:

  • Use 12-point Times New Roman or Arial font
  • Use double line spacing in the document
  • 1-inch margins all around

Grading criteria: For full points you must fully comply with each component of the Discussion Board Rubric.

Specifications: Post your initial response to the questions early in the assignment period so that others have time to respond to you. *NOTE*: You must submit your initial post before you will be able to view the posts of other students.  This prevents students from simply re-wording the posts of classmates.

To Submit: When you are ready to make your initial post, click on the “Module 2 Discussion Board” link above.  You will not see any other posts.  Click on “Create Thread” to type and post your initial post.  Once your initial post is submitted, you will be able to read and reply to your classmates’ posts.

discussion unit 3 #1

 

Topic 1: Due Care and Diligence

Discuss the role of due care and due diligence in regulatory compliance. What are some examples of companies you have heard about that might not have been exercising these in the news? Please use outside research to back up what you say. Be sure to cite your sources.

See attached for examples and also respond to two examples in the provided document.

Exp19_Access_Ch09_HOEAssessment – Food Inspections 1.0

Exp19_Access_Ch09_HOEAssessment – Food Inspections 1.0

  

Project Description:

Your job at the Chicago Health Inspection Agency has been fun and challenging. You have been making daily updates to the Agency’s database with the help of your boss, Anne Serdifone. The database tables may already be normalized; however, you need to examine the tables to verify this. Based on your understanding of the rules of normalization, you decide to recommend some design changes to the database.

     

Start Access. Open the   downloaded Access file named Exp19_Access_Ch09_HOEAssessment_Food_Inspections.accdb.   Grader has automatically added your last name to the beginning of the   filename.

 

Anne has asked you to review the   table structure to see if any changes should be made. You decide to apply the   rules of normalization to the Inspections table.
 

  Open the Inspections table in   Datasheet view. Look for repeating groups in the Inspections table. The   Violation field has multiple values separated by bars. This qualifies as a   repeating group. This information has been added to a new table and will be   removed from this table. For simplicity’s sake, the information for   inspection violations has been preloaded to a table called Violations, so   removing the Violation field from the Inspections table is required to   conform to 1NF.
 

  Switch to Design view. Click the row selector   for the Violation field and click Delete   on the Home tab in the Records group. Click Yes when asked for confirmation, and switch to Datasheet view.   Click Yes when prompted to save.

 

After you remove the Violation   field, you will examine the Inspections table and convert to second normal   form. Examine the Inspections table and notice there are multiple Inspections   with Dominick Cortez as the Business Owner.
 

  Switch to Design view for the Inspections table. Business Owner is determined   by Business ID and are attributes of the business, not a specific inspection.   Fields will need to be removed to satisfy 2NF. In a real-world scenario, you   would need to create a separate table for this information, but the   Businesses table is provided so you do not have to perform data entry.
 

  Examine the Inspections table. Click the row   selector for the Business Owner field and click Delete in the Records group of the Home tab, clicking Yes in response to the warning.
  You deleted this field because it is not functionally dependent on the entire   primary key. Save the Inspections table. Switch to Datasheet view.

 

The final step to improve the   Agency’s Inspections table is to convert to third normal form: The value of a   non-key field cannot be functionally dependent on the value of another   non-key field.
 

  Look for any non-key field values in the Inspections table that are   functionally dependent on another non-key field value. Facility Type ID   (non-key) is functionally dependent on Business ID (non-key). If you know the   Business ID, you can determine the Facility Type ID, which will help you   determine the Facility Type. A table named Facility Types already exists.
 

  Switch to Design view in the Inspections table. Delete the Facility Type ID field, clicking Yes in response to all warnings you   receive. You delete the Facility Type ID field because it is functionally   dependent on the Business ID field and therefore is not allowed in the   Inspections table. Normally, this would then require you to set up a new   table, but as you already have a Facility Types table, you can simply delete   the Facility Type ID field. Note that this may not always be the case.
 

  Switch to Datasheet view, saving the table. The table now meets 3NF criteria.   Close the Inspections table.

 

You will now create   relationships for the tables in the database. Due to the changes you made to   the design, you will add relationships to ensure the database functions   correctly.
 

  Click the Database Tools tab and   click Relationships in the   Relationships group to show the Relationships window. Click Show Table. Click each table and click Add. Once you have added all five tables, click Close to close the Show Table dialog   box.

 

Drag the Inspection Type ID field from the Inspection Types table to the   Inspection Type ID field in the Inspections table. The Inspection Types and   Inspections tables are related by the common Inspection Type ID field. Select   the Enforce Referential Integrity   and Cascade Update Related Fields   options. Click Create to create   this relationship.

 

Repeat the steps to connect the   Businesses and Inspections tables via the Business ID field.

 

Repeat the steps to connect the   Businesses and Facility Types tables via the Facility Type ID field.
 

  You may also notice the Inspections and Violations tables are not yet linked.   You are leaving these tables unlinked intentionally as you want to discuss   the contents with your supervisor.
 

  Save the relationships and close the Relationships window.

 

Select the Inspections table, and create a basic report using the Report   tool. Save the report as Inspections Report. Close the report.

 

Select the Violations table and create a report using the Report tool. Save   the report as Violations Report. Close the report.

 

Click the Create tab and click Navigation   in the Forms group. Select the Horizontal   Tabs option. A new Horizontal Tabs navigation form displays. Drag the Inspections Report from the   Navigation Pane to [Add New].

 

 

Add Business Report, Facility   Types Report, Inspections Types   Report, and Violations Report,   in that order to the navigation form.

 

Switch to Form View and click each tab to test the form. Save the   navigation form with the default name and close the form.

 

To simplify the look and   functionality of the database, you will hide the Navigation Pane and set the   Navigation Form to open automatically when the database is opened.
 

  Click the File tab, click Options, and in the Access Options   dialog box, click Current Database.   Scroll to the Navigation section of the dialog box and deselect Display Navigation Pane. The   Navigation Pane will now be hidden from view.
 

  In the Navigation Options, click the arrow next to Display Form: and select the newly created Navigation Form. Click OK   to close the dialog box. Click OK.
 

  The Navigation Form will now display upon opening the database. Save and   close the database. Re-open the database to test the changes. The Navigation   Form should display upon opening the database and the Navigation Pane should   not be visible.

 

Save the database. Close the   database, and then exit Access. Submit the database as directed.

Exp19_Excel_Ch12_Cap_Inventory

Exp19_Excel_Ch12_Cap_Inventory

 You are the operations manager for Bulldog collectables, a small start-up company that deals with sports memorabilia. As you prepare to document your inventory, you decide to utilize a template to save time. To complete this task, you will create a worksheet based on an Office.com template; you will also use the Macro Recorder and Visual Basic for Application to automate sorting and calculations within the workbook. #Start Excel. Download and open the file named EXP19_Excel_Ch12_Cap_Inventory.xlsx. Grader has automatically added your last name to the beginning of the filename.  Delete the Inventory Pick List and Bin Lookup worksheets. #Delete the INVENTORY PICK LIST and BIN LOOKUP icons located respectively in cells E2 and F2. Then Clear all existing Data Validation in the range A1:K15. Delete the values in the range B5:J15. #Record a macro named Sort, be sure to use relative references. Ensure the macro sorts the data in the table in ascending order based on SKU (column A). Stop the Macro Recorder and Save the workbook as a Macro-Enabled Template. Create a form control button that spans the cell E2:E3. Assign the Sort macro and edit the button text to Sort. #Use the VBA Editor to create a new module.  #Type the following VBA code to create a custom Inventory Value function then save and exit the VBA Editor (be sure to leave a blank line between each line and before End Function):   Function InventoryValue (QTY, COST)  InventoryValue = QTY * COST    #Click cell J5 and use the newly created InventoryValue function to calculate the value of the inventory for each item in column I. Use the VBA Editor to create a new module named ProtectWorkbook. Type the following VBA statements to create the sub procedure (leave appropriate line spacing). Sub ProtectWorkbook() ‘Protect workbook using the password eXploring Worksheets(“Inventory List”).Protect Password:=”eXploring” Insert a new module named UnprotectWorkbook. Type the following VBA statements to create the sub procedure and then save and exit the VBA Editor (leave appropriate line spacing). Sub UnprotectWorkbook() ‘Unprotect workbook using the password eXploring Worksheets(“Inventory List”).Unprotect Password:=”eXploring” #Insert a Form Control Button spanning cells F2:F3 named Unprotect. Assign the UnprotectWorkbook macro to the newly created Control Button. Insert a Form Control Button spanning the range G2:H3 named Protect. Assign the macro ProtectWorkbook. Insert the comment Inventory based on values in column J. in cell B3 (include the period). Insert the comment Count of items in column C. in cell C3 (include the period). Inspect the document for private information and hidden properties. Save the file when prompted then remove Document Properties and Personal Information, and Headers and Footers. Close EXP19_Excel_Ch12_CAP_Inventory.xlsx. Exit Excel. Submit the file as directed. 

Case analysis

1- Identify the main problem/opportunity of the case
2- Perform an analysis of the company (issues, internal and external analysis, proposed solutions)
3- Develop an implementation plan for the solution you select and discuss the change management activities required for the implementation
4- Consider the data of the case, what variables would you use to develop the analytics model?
5- Develop a presentation using Mento-Pyramid method to present your analysis.

HW2

Computer Science

Python

Complete the requirement for the attach

Due date: 06/20/2021

Secure Network Application Project Assignment

 

Secure Network Application Project Assignment Instructions

Using Microsoft Visio or a subsequent visual design tool, diagram a network in which you are familiar. 

Write a thorough report detailing the design.

The report must be a minimum of 5 pages excluding the title page, Visio diagram(s), and references.

It must include, at a minimum, 10 peer-reviewed sources to justify the design. 

In the design include (at a minimum):

· 4 Application servers

· 2 Virtual environments

· 4 File servers

· 2 Database servers

· 2 Storage Area Networks

· 4 Virtual Local Area Network segmentations for different roles/levels of user permissions

· 2 Virtual Private Networks

· Appropriate network switches and routers to host the client server architecture

· 2 Demilitarized Zones

· 4 Firewalls

Total 10 Pages 10 references

Lab 2

Please review the attached document and answer highlighted question.