Exp19_PowerPoint_AppCapstone_IntroAssessment_Color

#Exp19_PowerPoint_AppCapstone_IntroAssessment_Color

#Exp19 PowerPoint AppCapstone IntroAssessment Color

Project Description:

As a student in the marketing program, you have been asked to create a  presentation on the power of color and its impact on marketing. You  have begun a presentation and now need to add the content to the  presentation.

Start   PowerPoint. Download and open the file named Exp19_PPT_AppCapstone_IntroAssessment_Color.pptx. Grader has automatically added   your last name to the beginning of the filename. 

Change the theme fonts to   TrebuchetMS.

Click Slide 5 and use the Reuse   Slides option to insert all slides from Color.pptx.
   Keep the source formatting of the original slides (inserted slides).  Note,   Mac users, insert all slides from the file using the default  formatting.

On Slide 13 in the left content   placeholder, insert the Orange1.jpg   image. In the middle content placeholder, insert the Orange2.jpg image. In the right content placeholder, insert the Orange3.jpg image.
 

  Apply the Drop Shadow Rectangle picture style to the three images. 

On Slide 3 insert the ColorWheel.mp4 video file. Make the   following changes to the
   video:
   • Apply the Monitor, Gray video style.
   • Set the video to start Automatically.
   • Compress the video

On Slide 16 insert the image Balloon.jpg as a background image on   the slide. Change the transparency to 10%.

On Slide 4 convert the bulleted   list to a Vertical Box List  SmartArt graphic. Make the following changes to   the SmartArt graphic:
 

• Change the colors to Colorful Range   – Accent Colors 4 to 5.
   • Change the SmartArt style to Intense Effect.
   • Change the text font size in all four shapes to 28 pt. 

On Slide 16 apply the Gradient   Fill: Purple, Accent color 5, Reflection WordArt style to the text Questions?
 

  Make the following changes to the WordArt:
 

  Increase the font size to 96 pt.
   • Change the Text Fill to Gold, Accent 3.
   • Apply the Wave Up text effect in the Transform gallery (Mac users: Apply   the Wave 2 text
  effect in the Transform gallery).
   • Change the Shape Height to 2.8″.
   • Set the Horizontal position of the shape to 0.8″ and the Vertical   position to 1.7″.

On Slide 15 insert an Oval shape   on the slide.
 

  Make the following changes to the Oval shape:
   • Change the Shape Height to 1.5″ and the Shape Width to 1.5″.
   • Type Blue   in the shape   and apply the Moderate Effect – Dark   Blue, Accent 6 shape style.
   • Change the font color of the text to Black, Background 1, increase the font   size to
20 pt and apply Bold.
   • Set the Horizontal position of the shape to 3.15″ and the Vertical position to 4.5″.

Make a copy of the formatted   oval shape and paste on the slide. Set the Horizontal position of the new   shape to 7.15″ and the Vertical position to 4.5″. Highlight the text in the   shape, and type Red, apply the Moderate Effect – Red, Accent 1 shape style.

Copy the formatted oval shape   again and paste on the slide. Set the Horizontal position of the new shape to   11.15″ and the Vertical position to 4.5″. Highlight the text in the   shape, and type Yellow, apply the Moderate Effect – Gold, Accent 3 shape style.

On Slide 5 insert a table with 2   columns and 6 rows.
   Make the following changes to the table structure:
   • Apply the No Style, Table Grid table style.
   • Change the width of the first column to 2.4″.
   • Change the width of the second column to 6.3“. 

Type the following information   into the table:
   Row 1: Col 1: Red; Col 2: Excitement, Youthful, Bold
   Row 2: Col 1: Blue; Col 2: Trust, Dependable, Strength
   Row 3: Col 1: Yellow; Col 2: Optimism, Clarity, Warmth
   Row 4: Col 1: Black; Col 2: Power, Mystery, Intensity
   Row 5: Col 1: Green; Col 2: Peaceful, Wealth, Growth
   Row 6: Col 1: Orange; Col 2: Friendly, Cheerful, Confidence

Set the height of the table to 3.9″. Center Vertically the text in   the first and second columns of the   table.

In the table, apply the   following shading:
   •Red, Accent 1 to the cell with the text Red   
   •Dark Blue, Accent 6 to the cell with the text Blue
   •Gold, Accent 3 to the cell with the text Yellow
   •Dark Green, Accent 4 to the cell with the text Green
   •Orange, Accent 2 to the cell with the text Orange

On Slide 14 insert a Clustered   Column chart. Replace the  spreadsheet information with the following   information: Leaving cell  A1 blank, type Percentage in cell B1. Populate cells   A2:B5 with the following:
 

Red 29%
Blue 33%
Black/Grayscale 28%
Yellow 13%
 

  Change the source data to use the range A1:B5.

Make the following changes to   the chart:
 

  • Apply the Style 4 chart style
   (Note, ensure that the selected style contains the silvery background color,   gridlines, and inside end data labels.)
   • Remove the chart title, gridlines, and legend.
   • Increase the font size of the data labels to 32 pt.
   • Change the Shape Fill of the Blue data point to Dark Blue, Accent 6
   • Change the Shape Fill of the Black/Grayscale data point to Black,   Background 1
   • Change the Shape Fill of the Yellow data point to Gold, Accent 3

On Slide 15 select the blue   circle shape, press SHIFT, and then  select the rectangle shape with the blue   outline. Group the shapes.  Repeat for the two remaining shapes on the slide   to group each of the  circle shapes with their associated rectangle shapes.

On Slide 14 apply the Fly In   animation (Entrance category) to the  chart. Set the Effect Options to   Sequence By Element in Series. Set  the animation to start After Previous. Set   the Delay to 00.75.

Add page numbers to all slides   with the exception of the first slide. 

Apply the Push transition to all   slides.

On Slide 1 type Welcome to   the power of color presentation. (including the
   period) as a speaker note.

Check the presentation for   spelling errors, and correct any errors.

Save and close Exp19_PPT_AppCapstone_IntroAssessment_Color.pptx.   Submit the file as directed.

week-4

 

Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).

Lab 4 – Lazy Deletion in BSTs

  

Lab 4 – Lazy Deletion in BSTs
Parts A is required. Part B is optional and is worth two points extra credit (but must be submitted in addition to, and along with, Part A). Part C is optional but has no extra point value. Make sure you have read and understood
● both ​ modules A​ and ​ B​ this week, and
● module 2R – Lab Homework Requirements before submitting this assignment. Hand in only one program, please.
Part A (required) – Lazy Deletion With Ints
This will be your first foray into an actual ADT implementation. It is not a toy program, but the real deal. You’ll take the binary search tree implemented in the modules (and supplied in your downloaded header file libraries) and modify it to use lazy deletion rather than the explicit “hard deletion.”
You will find it helpful to fetch and install the files in the following zip archives now:
● https://fgamedia.org/faculty/anand/resources/CS_2C_Client_Support.zip
● https://fgamedia.org/faculty/anand/resources/CS_2C_Files.zip
If you have carefully studied and experimented with the binary search tree template class, this assignment should be “just right”. It is not as difficult as doing an ADT from scratch, which might require more than a week. Nonetheless, in the few methods that you must retool, you’ll find just enough of a challenge to feel like you are really cracking the problem. The changes and debugging you will be doing are typical of ADT design.
Preparation
Copy the file ​ FHsearch_tree.h ​ and name the copy ​ FHlazySearchTree.h​ . Work on the latter file for this assignment. In the new file, change the name of the classes FHsearch_tree​ and ​ FHs_treeNode​ to ​ FHlazySearchTree ​ and FHlazySearchTreeNode​ , respectively. ​ Hint: Do a global search/replace of the old names with the new ones in this file​ . Also, if you use ​ #ifndef/#define ​ at the top of the file (to avoid nested compilation) they should be changed to some name ​ distinct​ from FHSEARCHTREE_H​ .
This file should now compile without any errors and be compatible with your cs_1c library and project as a whole (other than the name of the new tree class). So far, you have basically duplicated the logic of a BST into a second class that behaves exactly like the first, but has a new name. This is your starting point.
New Class Design
1. Add a ​ bool deleted​ member to ​ FHlazySearchTreeNode​ . Adjust this class to accommodate this member.
2. Add a new ​ int mSizeHard​ member to the ​FHlazySearchTree ​ class which tracks the number of “hard” nodes in it, i.e., both ​ deleted​ and ​ undeleted​.
Meanwhile, ​ mSize​ is still there and will only reflect the number of ​ undeleted nodes. Normally, the client will not need to know about ​ mSizeHard​ , but we want it for debugging purposes. Give it an accessor, ​ sizeHard()​ , so the client can test the class by displaying both the soft size (the number the client normally wants) and the hard size.
3. Revise ​ remove()​ (recursive version) to implement ​ lazy deletion​ .
4. Adjust​ insert()​ ​ and any other methods​ that might need revision to work with this new deletion technique. This often means inspecting the ​ deleted member when you are traversing for the data and take appropriate action based on the value of ​ deleted​ . (The only exceptions to this is the
height​ -related members and methods which are only there for the derived class ​ AVL tree​ . You can ignore any ​height​ -related code you find in the ​ .h​ file.)
5. Add a public/private pair, void ​ collectGarbage()​ (the private method is the
recursive counterpart of the public one). This allows the client to truly remove
all deleted (stale) nodes. Don’t do this by creating a new tree and inserting
data into it, but by traversing the tree and doing a ​ hard remove​ on each
deleted node. This will require that you have a private ​ removeHard()​ utility
that works very much like our old ​ remove()​ method.
6. Test your code thoroughly.
I will help you with the testing by providing a sample ​ main()​ and successful run, but this
is not a thorough test of the class:
// Assignment #4 Instructor Solution
In addition to testing your client a little better than the above ​ main()​ does, add a couple of tests for​ findMin()​ and ​ findMax()​ at various stages (e.g., hard-empty tree, a tree that has non-deleted stuff in it, and a tree that is completely empty but has all soft-deleted nodes) to make sure your exception handling is working in​ findMin()​ and findMax()​ .
Option B – Lazy Deletion with EBooks (2 EC Points)
Apply the same new ​ ADT​ to ​ EBookEntry​ objects by reading them in and doing various
removes and inserts. Do garbage collection at various points.
Option C: Benchmarking
If you have time and interest, after completing the above program, try to formulate an experiment to see if the ​ lazy deletion​ helps or hinders various operations (insertions,
deletions, finds, etc.)
   Submission Instructions Again
It’s worth reiterating because many students find it hard to follow instructions the first time. If you’re not one of them, feel free to skip the below. Note the following very simple important instructions. I will
only accept and grade submissions that follow these guidelines except when they are specifically
overridden in instructions.
1. Your submission should be a plain text file. See above. Save your file as a plain text file.
2. It is insufficient to simply have plain text format. The file name SHOULD have a ​ .txt​ or .java​ extension. In the past, many students who submitted files with NO extension ended up
with no points earned for those assignments. I want to help you NOT be one of them. So that’s
why this guideline is explicitly stated here.
3. If you have multiple files you might otherwise need to submit, put them all in a single file, called
Assignment_N.txt and separate the various sections in this file using a commented line of
dashes. E.g. Your ​ Assignment_8.txt​ file could be:
4. IMPORTANT: Don’t include any provided files (e.g. iTunes*.*) in your submission (I already
have them 🙂
5. Submit your work ​ on time​ by uploading the above file into Canvas, well before the deadline.
6. The following guidelines are technically not mandatory, but following them would earn you the
full points you are eligible for. Why not earn easy-to-get points?
● Make sure you follow all the formatting guidelines. Serious points could be lost for badly
formatted or difficult-to-read code.
● Don’t over-engineer your code. Implement exactly what’s asked, no more and no less.
To demonstrate your additional knowledge, use the forums. Assignments are not the place to do it. No bells and whistles or decorative code/output.
● If you’re doing this course for a grade (i.e. your GPA is important) only attempt the BASIC OPTION unless you are absolutely certain you have the basics nailed.
Intermediate and Advanced options are generally graded far more strictly. You should, however, attempt the advanced options and post/discuss that code in the forums AFTER the lab has been graded.
● Make sure your output is not “touched up” by hand. Incorrect output is better than “doctored output.

 

Discussion……2

  

Review both videos below and respond to the following:

1. What is the relationship between vulnerabilities, threats, risks and controls.

2. What is vulnerability scanning and what are some tools used for vulnerability scanning?

no less than 300words and in your own words.

videos links

Computer Base Module 2 – Reflection

Based on your Module topics, what did you find new and interesting?  And what appeared to be a review?  Also, identify at least one discussion post you found interesting, helpful, or beneficial (and why). 

 

Topics covered in this Module

  • Data visualization
  • Table design principles
  • Chart types
  • PivotCharts
  • Advanced data visualization
  • Data dashboards
  • Events and probabilities
  • Conditional probability
  • Random variables
  • Discrete probability distributions
  • Continuous probability distributions

Learning objectives

By the end of this module, students should be able to:

  • Explain design techniques for data visualization
  • Create pivot tables, scatter charts, bar charts, bubble charts, pivotcharts in Excel
  • Identify applications for data dashboards
  • Describe events and probabilities
  • Explain conditional probability, Bayes’ Theorem, Multiplication Law
  • Discuss random variables and probability distribution
  • Calculate in Excel
    • expected value
    • variance
    • standard deviation
    • binomial probabilities
    • poisson probabilities
    • mean
    • exponential probabilities

Human Computer Interaction Discussion 2

which of the interaction types do you feel most influence interface design challenges?

After reading Chapter 3, which of the interaction types do you feel most influence interface design challenges? You are required to write a statement that is LIMITED to 150 words. This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format.