File

Intro. to Computer

 

  • Presentation
    PresentationAttached Files:

    1. Before, during and after assignment thoughts.
    2.  If you use outside resources, cite your sources with the presentation
    3. While completing this presentation by following the instructions attached, you should use several of the PowerPoint features you learned while completing the PowerPoint Tutorials assignment including:
      1. Themes
      2. Transitions
      3. Pictures
      4. Animation
      5. Audio – Audio should enhance the purpose of your presentation. Do not just add random music or read your slides.
      6. Video
      7. This Student Presentation assignment is worth 100 points.You are required to follow Guy Kawasaki’s 10 20 30 rule. This rule is you should have no more than 10 slides, you should not talk for more than 20 minutes and you should not use a font size that is less than 30 points. Look Guy up and see what his background is. Check out his web page. He explains the rule nicely in this short video:http://www.youtube.com/watch?v=-M13SObffog Submit your presentation here by the due date listed on your course Detailed Schedule.
  • AssignmentStudent Presentations using MS PowerPointYou have 2 documents to attach.  A video presentation and one is the PowerPoint presentation that is not a video. 

To write java program of prime numbers

you will generate a NON THREADED, SEQUENTIAL program.  This sequential program will take some input (you can grab this input from the user, or from a command line argument) that it will store in an integer.  (Therefore, there needs to be checks in place to make sure that the number being given can be stored adequately in an integer.  You do not need to use BigInteger or long for this, regular integersis fine.  This is more about design than about function).

Now that you have this number, you want to compute all the prime numbers that exist between 2 and that number (inclusive).

If a number is not prime, you will store that number and a List of its factors in a Map

If a number is prime you will store it in a List.  So, at the conclusion, we have a Map of non primes that contain factors of numbers and a list of primes.

You will time the runtime of your application so that we know how long it will take to build these two structures.  To time your application, simply generate a starting time as soon as you retrieve the number you want to use as the base of your iteration and then stop the timer when you are finished generating your structures.  Report back what the difference is. You can use System.currentTimeMillis(); to do this.

INT 1010 assignment 7

  Please complete the steps below and upload your Excel workbook assignment under Chapter 7 Assignment Submit Here.

  1. Open a blank Excel workbook
  2. Create the following headers in row 1
    1. Class Date
    2. Topic of the week
    3. Assignment
    4. Due Date
    5. Possible Points
    6. Points Earned
    7. Grade
  3. Format Class Date column with MM/DD/YY format
  4. Format Due Date column with MM/DD/YY format
  5. Format Possible Points column as a Number with 0 Decimal Places
  6. Format Points Earned column as a Number with 0 Decimal Places
  7. Format Grade as a Percentage with two decimals
  8. The calculation for the grade column is Points Earned divided by Possible Points.  Complete for each topic. (use formulas)
  9. Enter a Row for assignment per the detailed schedule
  10. Enter all the Points Earned in the Points Earned Column (use formulas)
  11. Calculate the Grade for each Points Earned in the Grade Column (use formulas)
  12.  Add the sum of the column labeld Possible Points (use formulas)
  13. Add the sum of the column labeld Points Earned (use formulas)
  14. The Grade Column is the calculation for the sum of all Points Earned divided by the sum Possible Points (use formulas)
  15. Save the file as Excel_Database_StudentFirstandLastName and submit.

30/s2

  • Why is there a need for data access control?
  • What are the benefits and risks for using Smart Cards and PKI?
  • How do Smart Cards/PKI protect the data’s confidentiality, integrity, authentication, and non-repudiation?

Unit 8.1 DB: OS Hardening

 1 page 

You provide a lecture to the working group regarding the importance of security education, awareness, and training due to the oft-quoted security maxim that users/humans are the weakest link in the security chain. While making users aware of security risks and training them how to protect company assets will reduce risk, it is important to put technical controls in place to protect the operating systems and applications that employees use every day.

Discuss the importance of “hardening” the PCS client workstations and servers. Make recommendations for operating system hardening options and describe how these are related to the concept of “system-specific policies” discussed earlier in the course. One of the working group members blurts out that antivirus protection is a waste of computing resources and patching applications takes too much time. Be sure to address these two concepts in your initial thread. Include at least one research reference and associated in-text citation using APA standards. In your replies to your peers further discuss the importance of software security.

GRCA EXCEL new topic

1).What have researchers learned about the relationship between higher education and employment? 

2). Rising costs of information technology

Found 3 or 4 RESEARCH ARTICLES using the method taught in the video in this week’s folder

For this assignment, follow the directions CAREFULLY: 

Step 1: Download the EXCEL document below 

HOW, WHAT, who, when, where, why

Step 2: Fill in ONLY the BLUE portions
(If you have answers for how and what, your article IS a research article; if not, please go back to find one)
Submit the complete form here.

Part 2 

Please use the same EXCEL sheet that you used to input HOW and WHAT in the blue sections,

ADD the who, where, when, and why in the salmon sections

Submit the sheet with both the blue and salmon sections filled in.

Please create an APA-7-compliant References page with all 3 or 4 references you found. 

(the title page and references page must be one document, with numbered pages 1 and 2)

PLEASE use the resources in your manual pages 19-20 and page 28also attached hereAND the template below. Remember, there are VERY specific rules about capitalization and italics. You have a “ways to get help” document in your content folder. 

Corporate IT Security Audit Compliance

 

  • Read the Article: Whitley, J. (2007). PCAOB Proposes Audit Standards. Internal Auditor, 64(1), 15. (this article is located in the EBSCO Host of the University of the Potomac Library) 
  • Write a summary analysis and discuss the formation of the standards. In your opinion are we creating too many standards or are they needed?   

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)
  • APA 6th edition, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

Local Operating System Exploitation

 

After completing Part A of the Lab, complete this graded written assignment for the lab:

Submit a word document containing an analysis and a summary of the completed lab (part A). The word document should contain the following elements:

  • Summary of the lab
  • Analysis of the activities performed in the lab and their importance to the course topics
  • How the lab relates to the course and current module topics
  • Related concepts from the module readings and lectures
  • At least one external reference
  • 1-3 pages in length
  • Proper APA formatting and citations
  • Minimum of 1-3 references are required

Policy, Legal, Ethics, & Cmplc week 14

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean

Discussion Forum (LO2) (LO3) (LO4) – 50 points

week 3 Discussion 50  and week 3 Assignment 100 points

What role do you see APA citations playing in your writing? How does the use of citations help avoid plagiarism? How does ethics play a role in scholarly writing?

Using one of the resources found in Week 2, paraphrase a paragraph from the resource, in one to two sentences, providing appropriate in-text citations and reference list.

Initial posts should be 300-500 words.You can finish your post asking a question that you may have about academic integrity for others to answer OR you can respond to two peers. Responses should be 100-200 words. (LO2) (LO3) (LO4)

Essential Activities: 

  1. Reading the all of the required readings will assist you in writing this discussion forum.

Week 3 Assignment (LO4) – 100 points

Research and examine strategies for maintaining academic integrity. Create an infographic with at least five strategies you will use to maintain academic integrity. Create an original graphic in Canva, templates are not allowed. Submit as a PDF. (LO3)

Cite all sources used in APA Style Format. (LO4)

Essential Activities: 

  1. Reading the all of the required readings will assist you in writing this discussion forum.