Game Development

In this assignment, you will develop a simple 3D first-person shooter game. You will learn how to implement first-person player control, ranged weapon/projectile, collectable objects, game AI/NPC navigation, UI, sound effects, and visual effects.

Information governance discussion

With your industry in mind, identify and discuss these concerns and  address how this can be effectively handled. Support with references and  do your usual critical review of at least 2 other students’ posts.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post

PowerPoint_3G_Remodels

 

PowerPoint_3G_Remodels

#PowerPoint 3G Remodels

Project Description:

In the following project, you will format a presentation that describes backyard remodels.

Open   the file named Student_PowerPoint_3G_Remodels.pptx. downloaded with this project.

Change the Colors for the   presentation to Paper.

On Slide 1, format the   background with the Stationery texture, and then change the Transparency to   30%.

Select Slides 2 through 4, and   then apply a Solid fill to the  background of the selected slides-in the fifth   column, the third  color.

On Slide 2, hide the background   graphics.

On Slide 2, insert a Table with   2 columns and 4 rows. Apply table  style Medium Style 3-Accent 1, and then   type the information below in  the inserted table.
 

  Row 1, Col 1: Improvement Type; Col 2: Components
   Row 2, Col 1: Outdoor Kitchen; Col2: Barbecue, sink, bar, covered patio
   Row 3, Col 1: Swimming Pool; Col 2: Jacuzzi, pool, waterfall
   Row 4, Col 1: Fire Pit; Col 2: Fire pit, seating area, gas lines

Change the Font Size of all of   the table text to 28. Resize the  table height to 5.8″, and then   distribute the table rows. Align   the  table text so that it is centered horizontally and vertically within the    cells.

In the table, change the Font   Size of the first row of text to 32.  Apply a Round style Cell Bevel to the   first row. Note, depending on  your version of PowerPoint, this may be called   Circle.

On Slide 3, animate the picture   using the Wipe entrance animation  starting After Previous. Change the   Duration to 01.00. Apply the Split  entrance animation to the bulleted list   placeholder, and then change  the Effect Options to Vertical Out.

On Slide 4, insert a Clustered   Column chart. In the worksheet, beginning in cell B1, type the following   data.
 

  In row 1, beginning in cell B1: Owner Installed, Contractor, Owner as Contractor
   In row 2, beginning in cell A2: Patio, 8000, 12000, 9500
   In row 3, beginning in cell A3: Bar, 3500, 5200, 4600
   In row 4, beginning in cell A4: Infrastructure, 5000, 9750, 8100
   In row 5, beginning in cell A5: Appliances, 3000, 4200, 3850

Apply Chart Style 8 to the   chart, and then remove the Chart Title  element. Apply the Wipe entrance   animation to the chart and change the  Effect Options to By Series.

On Slide 5, format the   background using solid fill color Dark  Green, Background 2 and hide the   background graphics. (depending upon  your version of Office, the color may be   named Dark Green, Text 2).  From your downloaded project files, insert the   video p03G_Video1.mp4.

Change the Video Height to 5 and use the Align Center and   Align Middle options to position the video. Apply the Simple Frame, Black   video style.

On the Playback tab, change the   Video Options to Start the video  Automatically. Trim the video so that the   End Time is 00:07 and then  compress the media to Low Quality. (Mac users, the   Compress Media  feature is not available on a Mac).

On Slide 6, hide the background   graphics, and then format the slide  background by inserting a picture from   your downloaded grader files-p03G_Backyard.jpg.   Set the Transparency to 0%

Insert a Header & Footer on   the Notes and Handouts. Include the  Date and time updated automatically, the   Page number, and a Footer  with the text 3G_Remodels
   Display the document properties. As the Tags, type backyard   remodels 

Cloud Computing Risks Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

When we talk about traditional architecture, the framework involves purchasing, installing, and maintaining the IT devices on site (Lynch, 2019). Maintaining traditional architecture is easy because of the freedom to decide security requirements needed for the system, to include network controls and cyber threat or attack response. The bottom line is the traditional approach allows the business to have more control over its devices; however, there are downsides to it:

1. Expensive – the cost to install and maintain is high. More data means more machines.

2. More Man-power – traditional IT systems require more in-house personal to maintain the hardware.

On the other hand, the cloud enables businesses to access their infrastructure via a third-party. Additionally, the third party manages the cloud computing needs. The infrastructure-as-a-Service approach allows businesses to move their data to off-site machines. Large cloud companies such as AWS (Amazon), Google, and Microsoft provide cloud services for businesses and they are able to manage comprehensive data security programs via the cloud. It saves businesses A LOT of money not having to pay for hardware for upgrades and hire additional employees to maintain and manage devices.

Now, let’s talk about cloud security and how Amazon’s AWS protect their customer’s data. Threat detection, key management, and encryption is used to ensure that data hosted on the AWS is protected from unauthorized access. Additionally, AWS is continuously being monitored from threats and shady account behaviors. Moreover, AWS provides its customers an internal Identity and Access Management (IAM) internal tool for system administrators to better restrict access of information within their organization. 

-Dexter

RESPONSE 2:

The cloud is a model of computing where servers, networks, storage, development tools, and applications are enabled through the internet. This can help to save money because companies wouldn’t have to make major investments to buy the equipment to host it all themselves. Not only are they saving on the equipment, but companies can also save on having to deal with the space that they would need to store all of their network equipment. The more storage a company needs the more space they need to host that information. Cloud storage also makes it easier to access your information or applications on different devices. You can go from your phone to your laptop to your tablet almost seamlessly. Cloud computing is becoming increasingly more popular with companies.

The flip side of that coin is that you are now putting all your information in someone else’s hands. When doing this you are also relying on their security measures they have in place and their employees to help make sure those security measures are up-to-date and no leaks happen. Anyone looking into cloud computing should definitely do their research into the companies that they would be storing their information with. Check into the security measures that they use, check if they have been attacked by a cyber criminal and the outcome of the attack, check to see what other companies use the service, and how long they have been using the service.

-Rose

Algorithm Discussion

Respond to the discussion about algorithms and their roles below using 150 words or more.

 

An algorithm is the set of instructions a computer uses to complete a  task or solve a problem. These instructions are developed to be a  precise list of instructions that are a step-by-step guide to accomplish  a task or series of tasks.

We are surrounded by algorithms everywhere we go. They manipulate,  process data, and perform calculations. Algorithms used in programming  require an input either from a user or related task. The programmer’s  goal is to design instructions a computer uses to complete a series of  steps based on certain circumstances and follows the steps like a flow  chart. After each step is completed in the specified order, an output is  generated. If the programmer is successful in developing the algorithm,  the automated function is completed without a hiccup. If the process is  not completed correctly, an error or faulty output will be generated.

Search and sorting algorithms are essential processes used in  computers. The main search may be used to look for an integer, string,  or other info in an array or database.  

Sorting algorithms sort the items in a given list per the  instructions the developer decides to use. They work by comparing two  elements and rearrange them or keep them in order as necessary.  Insertion sort compares the second element to the first and makes the  necessary changes. 

Exp22_Excel_Ch04_Cumulative – Insurance Claims 1.1

 Exp22_Excel_Ch04_Cumulative – Insurance Claims 1.1

  

Project Description:

You have been hired as a business analyst at SKV Insurance claims department. As part of your responsibilities, you have been asked to enhance the Excel workbook used to analyze the department’s performance. The workbook contains records of all claims resolved over the past year. You will convert the data to a table, format the table, sort and filter the table, insert calculations to evaluate key performance indicators, and then prepare the worksheet for printing. 

     

Start Excel. Download and open   the file named EXP22_Excel_Ch04_Cumulative_Insurance.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Freeze the panes so the first   row containing column headings (Row 6) and first two columns (Columns A:B) on   the InsuranceClaims worksheet will remain static when scrolling.

 

Convert the data to a table,   name the table InsuranceClaims, and then apply the Light Green, Table Style Light   21.

 

Remove duplicate records.

 

Add a new column to the table   named Duration.

 

Create a formula using   unqualified structured references to calculate the days required to resolve   the incident (Date Resolved – Date Created) and apply General Number Format.

 

Add a total row to display the   Average days required to complete a claim.

 

Sort the table by insurance   agent in alphabetic order, add a second level to sort by description, and   then create a custom sort order as follows: Natural Disaster, Flood, Fire, Theft, Accident. Add a third level to sort by duration smallest to largest.

 

Filter the table to only display   closed claims as indicated in the status column.

 

Use Quick Analysis to apply Blue   Data Bars conditional formatting to the column that contains duration. (On a   Mac use Conditional Formatting.)

 

Create a conditional format that   applies Red fill and White Background 1 font color to the incidents (column   B) that required 30 or more days to resolve.

 

Select Landscape orientation and   set appropriate margins so that the data will print on one page. Set the   print scale to 70%.

 

Change page breaks so each   agent’s information prints on its own page.

 

Set row 6 to repeat on each page   that is printed.

 

Save and close EXP22_Excel_CH04_Cumulative_Insurance.xlsx.   Exit Excel.

BIT-200-INTRODUCTION TO COMPUTER TECHNOLOGY

TOPIC: Benchmark – Sales Results Excel Spreadsheet and PowerPoint Presentation

The purpose of this assignment is to utilize Microsoft Excel and PowerPoint to create a business presentation.

Part 1

As a sales manager at Lopes Athletics Productions, you are required to report your sales numbers weekly and share them with the vice president of sales. Create an Excel spreadsheet that provides the following information.

  1. Total sales for each type of video.
  2. Total sales of all videos.
  3. Percentage of total sales for each type of video.
  4. A bar chart that summarizes the sales data.

The data needed for the spreadsheet is as follows. In all, you will need to create at least four columns; Video Type, Unit Price, Total Sales (for each type of video), and Percentage of Total Sales (for each type of video.

  1. Pilates sold 156 videos at $29.99 each.
  2. Step sold 392 videos at $14.99 each.
  3. Weight Training sold 147 videos at $54.99 each.
  4. Kickboxing sold 282 videos at $29.99 each.
  5. Yoga sold 165 videos at $34.99 each. 

Add a second worksheet to your workbook. 

  1. Insert a chart in a bar format linked to data on your first      worksheet.
  2. This bar chart should reflect the total sales of each type of video.
  3. Review the rubric to see how the spreadsheet will be assessed

Part 2

Create a PowerPoint presentation with a minimum of five slides based upon the Excel spreadsheet you created in Part 1 of this assignment.

Utilize the bar chart from the spreadsheet as a graphic element on at least one slide in the presentation. The presentation should summarize the following information for the vice president of sales:

  1. Total sales for each type of video.
  2. Total sales of all videos.
  3. Percentage of total sales for each type of video.

In addition to the content, the presentation will be assessed on the following criteria:

  1. Slide structure includes correct use of bullet points and the 6 x 6 rule.
  2. Slide appearance includes consistent theme, text alignment, readable font, clear photos/charts.
  3. Slide content is accurate, concise, and focused on a single topic.
  4. Use of chart enhances the presentation and illustrates slide information.
  5. Speaker notes are appropriate for explaining slide content and add details not presented on the slide.

Submit the PowerPoint presentation file. Do not submit any other file format, such as an Adobe PDF file, or you will not earn full credit.

General Requirements

Submit both the Excel spreadsheet file and the Microsoft PowerPoint presentation file. Do not submit any other file format, such as an Adobe PDF file, or you will not earn full credit.

APA style is not required, but solid academic writing is expected.

Benchmark Information

7.1:  Demonstrate computer literacy skills.

Discussion

Compare and contrast the difference of network security within an on-premise environment and a cloud environment. Give some examples of areas that are common and areas that are different.

Artificial Intelligence

 For this assignment, you can assume you have a 2D board of 20 by  20 size, where the start state is (1,1) and goal state is  (19,19). Write a program that will show the path from start to goal using  A* search algorithm. You will show two solutions for Manhattan  and Euclidean distance.