computer architecture jan 17

History of Computer Architecture:
Write a one page summary report that highlights the history of computer architecture and the main events. Use the APA style that includes a cover page and a reference page. Use the APA template document in this folder to help you write your report.

entry about a tool used in computer forensics.

  1. name of tool;
  2. what function does it do (for computer forensics);
  3. commercial / open source?
  4. a safe site to download from;
  5. was it verified/ validated?
  6. brief description about “what is it used for exactly?”
  7. what operating system does it work on? 
  8. any dependencies on other software? what are they?

Exp19_PowerPoint_Ch03_CapAssessment_IT_Careers

 Exp19_PowerPoint_Ch03_CapAssessment_IT_Careers 

 Exp19 PowerPoint Ch03 CapAssessment IT Careers 

 PowerPoint Chapter 3 IT Career 

  

Project Description:

As the department chair of Information Technology at the college, you often give presentations on IT Careers to potential students. You have been asked to to update the presentation with recent data on the programs you offer at the college that will prepare students for a career in IT.

     

Start PowerPoint.   Download and open the file named Exp19_PPT_Ch03_CapAssessment_IT   Careers.pptx. Grader has automatically added your last name to the   beginning of the filename. 

 

Insert a Title and   Content layout slide after Slide 1. Type Jobs in IT in the Title   Placeholder.
 

  Insert a Trapezoid List SmartArt graphic in the content placeholder. Type the   following in the Text pane as first level bullet points. Remove any unneeded   bullet points in the Text pane.
 

Software applications developer
Information security analyst
Computer systems analyst
Database administrator
Computer network architect
Management analyst

 

Apply the Moderate   Effect SmartArt style. Change the color to Colorful – Accent Colors.

 

On Slide 4, insert a   two column, seven row table in the content placeholder.
 

  Type the following information into the table:
  Row 1: Col 1: Profession; Col 2: Salary Per Year
  Row 2: Col 1 Software applications developer; Col 2: $103,560
  Row 3: Col 1: Information security analyst; Col 2: $95,510   
 Row 4: Col 1: Computer   systems analyst; Col 2: $88,270
  Row 5: Col 1: Database administrator; Col 2: $87,020
  Row 6: Col 1: Computer network architect; Col 2: $104,650   
  Row 7: Col 1: Management analyst; Col 2: $82,450   

 

Apply the Light Style   2 – Accent 4 table style.

 

Add a new column to   the left of column 1. Merge the cells in the new column. Set the cell width   of the merged cell to 0.79“. Type   2016   in the new column and rotate all text 270°. Center the text in the cell.   Increase the font size of the text to 28 pt. Change the cell shading to   White, Text 1.

 

Set the text in the   table to Center Vertically. Set the table height to 4.2” and the width   to 10.7“.

 

Change the layout of   Slide 3 to Title Only.

 

Start Excel. Download   and open the file named ITData.xlsx   and save it as ITData_LastFirst.xlsx.   Copy the chart from the Job Growth Percentage worksheet and embed the chart   using Paste Special on Slide 3.

 

Size the chart to a   height of 4.5“. Position the chart horizontally at 1” and vertically   at 1.85“.

 

On Slide 5, create a   Clustered Column chart with the following data:
 

  In cell A1, type Profession and in cell B1 type #   of Jobs.Then   populate A2:B7 with the following values:
 

Software applications developer 1,256,200
Information security analyst 100,000
Computer system analyst 600,500
Database administrator 119,500
Computer network architect  162,700
Management analyst 806,400
 

  Change the source data to use the range A1:B7.

 

Make the following   changes to the clustered column chart:
  • Apply Chart Style 8
  • Apply the Layout 4 Quick Layout
  • Remove the legend and y-axis
 

  Note, Mac users apply Chart Style 9.

 

Save and close Exp19_PPT_Ch03_CapAssessment_ITCareers.pptx.   Exit PowerPoint. Submit the file as directed.

Discussion

Answer the following questions about IT Project Management. 

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.

computer science

The annotation must follow this format, in paragraph form0 .Meaning, cover each topic a – e, in order, but in paragraph form. No bulleted lists!

undefined

a. The reason for choosing this particular article (title was interesting; author is known to you; lots of others used this article in their work; etc.)

undefined

b. The purpose of the work

undefined

c.A summary of its content – not a copy of the abstract, read the article

undefined

d. For what type of audience the work is written – most are NOT written for the “general public”

undefined

e. Identify strengths, weaknesses, or biases in the material

undefined

In addition, you are required to cite the other four (4) articles you intend to use for the remainder of the assignment.Don’t do the annotation – just the citation.Remember that all citations are to be in APA format. All must be peer reviewed articles in peer reviewed journals or conference proceedings – no editorials, no news articles.

 

1. Write complete annotation on this article

https://dl.acm.org/doi/pdf/10.1145/3372177.3373310

Follow instructions in First Citation document

2. Cite these remaining four articles no annotation required just cite.

https://dl.acm.org/doi/pdf/10.1145/3149572.3149578

https://dl.acm.org/doi/pdf/10.1145/3383845.3383889

https://dl.acm.org/doi/pdf/10.1145/3418288

https://dl.acm.org/doi/pdf/10.1145/3328433.3328460

All in APA format

Requirements: 2 to 3 pages

Examine Real-World Implementations of U.S. Compliance Laws

 Purpose

Compliance is important because it is the act of following laws, rules, and regulations that apply to an organization.  For an organization to be compliant it involves following laws and regulations by interpreting them so that policies and procedures can be defined.  By you researching some of the various real world standards and laws you will not only recognize how they are there to protect individuals but also realize the impact that they have on an organization.

Task

Given the following list of international and domestic information security standards and compliance laws, choose one standard or law and describe its real-world implementations in both private and public sectors.

Information security standards:

  • American National Standards Institute (ANSI)
  • Institute of Electrical and Electronics Engineers (IEEE)
  • International Electrotechnical Commission (IEC)
  • International Organization for Standardization (ISO)
  • International Telecommunication Union Telecommunication Sector (ITU-T)
  • Internet Architecture Board (IAB)
  • Internet Engineering Task Force (IETF)
  • National Institute of Standards and Technology (NIST)
  • Payment Card Industry’s Data Security Standards (PCI DSS)
  • World Wide Web Consortium (W3C)

Compliance laws:

  • Children’s Internet Protection Act (CIPA)
  • Family Educational Rights and Privacy Act (FERPA)
  • Federal Information Systems Management Act (FISMA)
  • Gramm-Leach-Bliley Act (GLBA)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Sarbanes-Oxley (SOX) Act

Criteria

  • Format: Microsoft Word
  • Font Arial, Size 12, double-space
  • Length: 2- 3 pages

Discussion plus Research paper

Task 1: DISCUSSION: 250 to 300 words. APA format

 In discussion 5, we looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons.  First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network? 

Task 2:

 Find a peer-reviewed scholarly journal article discussing government planning and/or entrepreneurial innovation. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library ( https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles ( https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately 3-4 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project2

  Please review the Project 2 document and write a paper based on the requirement.  

The accountant at Sonheim Manufacturing Company

  

The accountant at Sonheim Manufacturing Company wants an application that calculates an asset’s annual depreciation. The accountant will enter the asset’s cost, useful life (in years), and salvage value (which is the value of the asset at the end of its useful life). Use a list box to display the useful life, which should range from 3 through 20 years. The application should use the double-declining balance method to calculate the annual depreciation amounts; it then should display the amounts in the interface. You can use the Financial. DDB method to calculate the depreciation. The method’s syntax is Financial.DDB(cost, salvage,life,period). In the syntax, the cost salvage, and life arguments are the asset’s cost, salvage value, and useful life, respectively. The period argument is the period for which you want the depreciation amount calculated. The method returns the depreciation amount as a Double number. Figure 6-57 shows a sample depreciation schedule for an asset with a cost of $1000, a useful life of 4 years, and a salvage value of $100. Create a Visual Basic Windows application. Use the following names for the solution, project, and form file, respectively: Sonheim Solution, Sonheim Project, and MainForm.vb. Save the application in the VB2010Chap06 folder. Create the interface shown in Figure 6-57. Set the txtSchedule control’s Multiline and ReadOnly properties to true, and set its ScrollBars property to Vertical. Code the application. Save the solution and then start and test the application. Close the Code Editor window and then close the solution