Exp19_PowerPoint_Ch01_HOEAssessment_Dinosaurs

Exp19_PowerPoint_Ch01_HOEAssessment_Dinosaurs

Exp19 PowerPoint Ch01 HOEAssessment Dinosaurs

PowerPoint Chapter 1 Hands-On Exercise Assessment – Dinosaurs

  

Project Description:

You are a student teacher in a second-grade classroom. Your cooperating teacher has asked you to create an introductory presentation for the students on dinosaurs.

     

Start PowerPoint. Download and   open the file named Exp19_PPT_Ch01_HOEAssessment_Dinosaurs.pptx.   Grader has automatically added your last name to the beginning of the   filename. Save the file to the location you are saving your files.

 

Apply the Facet theme and change   the variant to the last one (green with black background). 

 

Change the theme font to Arial   Black – Arial. 

 

On Slide 1, in the title   placeholder type Dinosaurs. In the subtitle placeholder type Ms. Wagner’s   Second Grade

 

You have slides that you created   in the past on dinosaurs that you want to use in this presentation. The Reuse   Slides feature is an easy way to import these slides.
 

  Use the Reuse Slides option to insert all of the slides from Dinosaurs.pptx.

 

When you imported the slides,   you realized that you do not need a duplicate of the title slide so you   delete Slide 2.
 

  Delete Slide 2. Move Slide 5 (Pterosaur) so that it becomes Slide 7.

 

On Slide 1 change the layout to   Picture with Caption. Increase the font size of the title text to 28 pt and the subtitle text to 18 pt.  

 

Insert the Dino1.jpg image into the picture placeholder. Apply the Reflected   Rounded Rectangle picture style. 

 

On Slide 2, type Dinosaur   means “Terrible Lizard” (including the quotes) as the fifth bullet point.

 

Type the following in the Notes   pane for Slide 1: Today we are going to start our study of dinosaurs. (including the period).

 

Converting a bulleted list to a   SmartArt graphic is a good way to add interest to the presentation.
 

  On Slide 2 convert the bulleted list in the content placeholder to a Vertical   Curved List SmartArt graphic.

 

On Slide 8, insert the Dino2.jpg image. Change the height of   the image to 3.9″ and the width to 3.9″.

 

Apply the Beveled Oval, Black   picture style to the image. Position the image horizontally at 3.9” and vertically at 0.3”.

 

Select the text Questions? and apply the Fill: Green,   Accent color 1; Shadow WordArt style. Change the text effect to Tight   Reflection:Touching.

 

It is important to always check   your presentation for possible spelling errors.
 

  Check the presentation for spelling errors. Make corrections as needed on the   slides. NOTE: Do not change the title on Slide 3; while both spellings of Ankylosaurs (and Ankylosaurus) are correct, the preferred spelling in this case is   Ankylosaurs.

 

Create a Notes and Handouts   footer with the following: Dinosaur Facts. Apply to all.

 

 

Save and close Exp19_PPT_Ch01_HOEAssessment_Dinosaurs.pptx.   Submit the file as directed.

Help2

 

Frameworks were briefly introduced in Topic 1 as students mapped HIPAA and PCI to the NIST 800-53 set of security controls. NIST is only one of many available frameworks companies can use to establish and manage their IT and security programs while meeting industry standards, regulations, compliance, and laws. This assignment will continue evaluating frameworks and the applicability.

In a two to four-page paper, provide a comparison of five major frameworks. For each framework, identify the similarities and differences among each of the other frameworks in a matrix fashion.

Potential frameworks include: COSO, COBIT, ISO 27001, ITIL, NIST 800 Series, Risk Management Framework, Cybersecurity Framework, Factor Analysis of Information Risk (FAIR), Threat Agent Risk Assessment (TARA), or Operationally Critical Threat Asset and Vulnerability Evaluation (OCTAVE). Note: Prince2, PMBOK, OPM3, SixSigma, and other project management-based models are not applicable for this assignment.

Make sure to address the following:

  1. Explain each framework (purpose) and how they can be applied to a company.

  1. List the similarities and differences among them.

  1. Identify the advantages and disadvantages of each framework.

  1. Frameworks provide guidance to ensure information privacy and security. While privacy focuses on an individual’s right, security refers to an organization’s responsibility. Provide one ethical standpoint that you would choose privacy over security and discuss it from the Christian worldview.

  1. Describe the industry or organization best suited to each framework (i.e., hospital, banking, manufacturing, retail). Include examples.

Briefly answer the questions below to explain the differences between the five frameworks selected and Access Control Models presented:

  1. What is the difference between an Access Control Model and Security Framework?

  1. Can Access Control Models and Frameworks be combined?

  1. How does a framework impact an information system?

  1. How does an Access Control Model impact an information system?

Make each question a Topic

gnatt chart

 A work breakdown structure (WBS) is a tool used project management to a deliverable  into smaller tasks or components. Its purpose is to help visualize and identify a project’s  scope. Instructions: • Create a WBS capturing the process of buying a car. o Make sure you identify every task; from the moment you start your  research all the way to the time you drive out of the dealership. • At the beginning of the description, define the scope of the project in a single  sentence.  • Make sure tasks are reasonable on duration and predecessors are identified (if  any).  • You can easily create the WBS in a Word document or from an editable template you found online. • In addition, you will include a one-page description of the process captured in the  WBS. Requirements: • Submit a Word document in APA format. • Your submission will be 2 pages in length. The first page is the WBS graphic,  and the second page is the WBS description, double-spaced. • You will include a reference page for any references used. 

Informational Interview Assignment

  

Informational Interview: Career Mentor Questionnaire 

Your Career Mentor must be someone who has experience your field of interest and has been involved in hiring. Your mentor should have a minimum of three years of experience in the industry, and a background or knowledge of the hiring process for entry level candidates in their field. Interviews can be conducted by phone, in person, or virtually.

Access Control Discussion

Discussion 12-1 – Compare and contrast remote access methods for enterprises or personal use (e.g., subscription VPN).  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

In a program, write a method that accepts

  

In a program, write a method that accepts two arguments: an array and a number n. Assume that the array contains integers. The method should display all of the numbers in the array that are greater than the number n. Add javadoc and comments to your code. Be sure your code is formatted with proper indentation. Submit your one .java file here.

SECURE CLOUD ARCHITECTURE

Business case:  Bule Sky Airport (second improvement of the project ) 

Migrating to the Cloud: You were tasked to improve the performance of the Bule Sky Airport IT system.  

There are three databases:

  • The passenger database will record and authenticate each passenger in the airport
  • The employee database will record and authenticate each employee in the airport
  • The flight database will record each flight in the airport

After having meetings with the airport owners and managers, the following IT-related system comments will be moved to the cloud.

Database and Database management systems are on premises for all three (Passenger, Employee, and Flights). Therefore, current data related to Passengers and data related to Flights data will be on preemies.  Cloud storage will be used for long-term data storage.  Week-old Passenger data will be stored on the cloud and Week-old Flight data will also be stored on the cloud as well.  The airport IT system will not keep old Passenger and Flight data on the premises.

Data related to Employees will be kept on the premises always.

The Airport company’s specific privacy requirements

  • Security certifications ISO 27001, NIST CSF, and FedRAMP should be met by the cloud service provider(s). 
  • The Payment Card Industry Data Security Standard (PCI DSS) should be met by the cloud service provider(s). 

Answer the airport owners’ questions about cloud migration.

Question 1:  What would be the System Requirements that you look for in the cloud service provider.?

Question 2: How would you protect your data before cloud migration? You should consider the company’s specific privacy requirements

Question 3: What are the Budget factors of the current data center before cloud migration? What would be the impact of the cloud migration on the budget in long term?

Web Project 3

Half Page/ NEED IT DONE IN 5-8 HOURS

 Imagine you run a small business that handles sensitive data for its clients. Such a company might handle payroll for other companies or some other task that requires a great deal of data security. Because you transmit important information (employee data, account numbers, invoices, and the like), you decide it is a good idea to use encryption, to digitally sign e-mail messages, and to have a digital certificate. Visit the websites of certificate authorities. In your web research, determine how much it will cost your company to acquire a digital certificate and the kinds of information you must provide to the certificate authority.  

Blockchain for Business

 Building a Case for Blockchain Efficiencies

The formation of komgo, a private blockchain linking the financial interests of global trade is an interesting case in how interested parties can collaborate to streamline operations across the globe. Read the “komgo Case Study – May 2019” along with reading chapters 1-4 and analyze how this blockchain has achieved significant efficiencies for the member companies.

Note: please view attached material. in addition refer to chapters 1-4 in 

Blockchain for Business 1st Edition (ISBN 9780135581407)