Turnitin™ enabled

Computer Science Week 4 assignment

 

Week 4 Assignment

Hide Assignment InformationTurnitin™Turnitin™ enabledThis assignment will be submitted to Turnitin™.Instructions

Week 4 Assignment:

In order to complete assignment #4 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #4). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of one (1) full page in length with a minimum of two (2) outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

                            (Topic Below)

Discuss the steps involved in modifying a response file.

Research Report

 Quality research report (min. 2500 words / Docx or PDF format only), as measured by a provided rubric, that will provide a comparative analysis of deep learning, reinforced learning, and natural language processing (using peer-reviewed studies). Proper APA citations are required. 

Research paper

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a very brief computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Include at least 3 scholarly references in addition to the course textbook.  

the paper should meet the following requirements:

  • Be approximately 2-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Exp19_PowerPoint_Ch01_ML2_Outdoor_Adventures

 Exp19_PowerPoint_Ch01_ML2_Outdoor_Adventures 

 Exp19 PowerPoint Ch01 ML2 Outdoor Adventures 

 PowerPoint Chapter 1 Mid-Level 2 – Outdoor Adventures 

  

Project Description:

You have been asked to put together a promotional presentation on the company you work for, Peddle and Paddle. The company has a presentation it has used in the past that you have been asked to modify.

     

Start PowerPoint. Download and   open the file named Exp19_PPT_Ch01_ML2_OutdoorAdventures.pptx.   Grader has automatically added your last name to the beginning of the   filename. Save the file to the location you are saving your files.

 

Apply the Wood Type theme.

 

Type Peddle and Paddle in the title placeholder. Type The Ultimate   Outdoor Adventure   in the subtitle placeholder.

 

Use the Reuse Slides feature to   add all slides from the downloaded Adventure.pptx   presentation. Deselect the Use Source Formatting option when importing the   slides.

 

Delete Slide 2. Move Slide 6 so   that it becomes Slide 4.

 

On Slide 5 insert the Peddle.jpg image. Change the height of   the image to 5.8″

 

On Slide 5 set the horizontal   position of the image to 3.4″ and the vertical position to 1.25″

 

Apply the Reflected   Perspective Right picture style to the image on Slide 5.

 

On Slide 6 insert the Paddle.jpg image. Change the height of   the image to 5.8″

 

On Slide 6, set the horizontal   position of the image to 3.4″ and the vertical position to 1.25″.

 

Apply the Reflected Perspective   Right picture style to the image on Slide 6.

 

On Slide 4, convert the list to   a Basic Block List SmartArt graphic. Apply the Intense Effect SmartArt style.

 

Select the text Book Your Adventure Soon! on the last   slide. Format the text as WordArt Fill:
  Black, Text color 1; Shadow.

 

On Slide 2 change the font size   of the text in the placeholder to 80 pt.

 

Add slide numbers to all slides   with the exception of the title slide.

 

Check the presentation for   spelling errors. Make corrections as needed on the slides. Hint: Ignore the   spelling error for Funyak in the notes.

 

Save and close Exp19_PPT_Ch01_ML2_OutdoorAdventures.pptx.   Submit the file as directed.

(1,200 words) Find various (current, i.e. posted within the last month) online job positions related to the field of information/technical security and describe each job position

 Find various (current, i.e. posted within the last month) online job positions related to the field of information/technical security.  Describe each position in detail, the skills required for the position, and the purpose of the skills? How do the skills/requirements for these positions differ, and why?  

 1200 Words – Exclude references!! 

 

***no Plagiarism, APA format***

!!!! No money Negotiations after accepting the Bid !!!!!!!

Exp22_Excel_Ch02_CumulativeAssessment_Inland_Jewelers

 Exp22_Excel_Ch02_CumulativeAssessment_Inland_Jewelers

  

Project Description:

You are an account manager for Inland Jewelers, a regional company that makes custom class rings for graduating seniors. Your supervisor requested a workbook to report on new accounts created on payment plans. The report should provide details on total costs to the student as well as payment information. Each ring financed has a base price that can fluctuate based on ring personalization.

     

Start Excel. Download and open   the file named Exp22_Excel_Ch02_Cumulative_InlandJewelers.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Insert a function in cell B2 to   display the current date from your system.

 

With cell B2 selected, set the   width of column B to AutoFit.

 

Insert a VLOOKUP function in   cell C5 to display the ring cost for the first student. The cost of the ring   type should be an exact match. Use appropriate relative and absolute cell   references.

 

Fill the function from cell C5   to the range C6:C11.

 

Apply Accounting number format   to the range C5:C11.

 

Insert an IF function in cell E5 to calculate the total   due. If the student has chosen to personalize the ring, there is an   additional charge of 5% located in cell B21 that must be added to the cost of   the ring; if not, the student only pays the base price. Use appropriate   relative and absolute cell references.

 

Fill the function from cell E5   to the range E6:E11.

 

Apply Accounting number format   to the range E5:E11.

 

Insert a function in cell G5 to   calculate the first student’s monthly payment, using appropriate relative and   absolute cell references. Ensure the result is a positive number.

 

Fill the function from cell G5   to the range G6:G11.

 

Apply Accounting number format   to the range G5:G11.

 

Calculate totals in cells C12,   E12, and G12.

 

Set 0.3″ left and right   margins and ensure the page prints on only one page.

 

Save and close Exp22_Excel_Ch02_Cumulative_InlandJewelers.xlsx.   Exit Excel. Submit the file as directed

Project Part 4: Final Network Design Report

 Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff. You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the Course Syllabus for submission dates.

  • Project Part 1: Network Design
  • Project Part 2: Firewall Selection and Placement
  • Project Part 3: Remote Access and VPNs
  • Project Part 4: Final Network Design Report

4

4. Considering the type of organization and the business units involved (internal & external), enumerate and describe the main challenges H&N might face when/if implementing an ERP. Evaluate the advantages/disadvantages of this implementation.

Own work no plagrism. Easy words

APA format 

Pratical connection assignment for Database system 

In this course, you will learn about the basic models and capabilities of standard database management systems (DBMS) packages. Included in the course is an overview of database principles, file-level models, data-level models, operation. The course also emphasizes implementation, maintenance and security considerations. You will study and use methods of DBMS selection and evaluation to implement the design for your proposed database project solution.

one references and APA format