Final white paper project – ticketing system

 – Add images and tables that were included in previous submissions. Your current document points to figures and tables that are no longer included in your capstone project. 

  – There are still some discrepancies between the information presented in the Technology Solution and Requirements section (pages 13 – 19) and the Design section (pages 19 – 24) and the implementation section (24 – 31). For instance, the following technologies components listed in the Technology Solutions and Requirements section are not included in the design and implementation sections: Azure cloud-based service, Recoverit, Cisco Integrated Service Virtual Router (ISR), -WD My Book Duo 4TB, and SecuGen biometric scanner. 

 – Your test result doesn’t show specific examples and images (there are references to images, but the document doesn’t include these images) that support the needs that you selected such as database, network infrastructure, access control, and so on.  The test result section for each need is briefly summarized in three or four lines. You must provide specific information that demonstrate a proper test result or a failure if that is the case.  – The Assignment requires that you include the Conclusion section.  

word document edit

 

  1. Open the VaccinationSchedule-04.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.

NOTE: If group titles are not visible on your Ribbon in Word for Mac, click the Word menu and select Preferences to open the Word Preferences dialog box. Click the View button and check the Show group titles check box under Ribbon. Close the Word Preferences dialog box.

  1. Select the tabbed text in the middle of the document and convert it to a table (accept default settings). Don’t include the blank line below the tabbed text.
  2. Select the entire table and apply the following changes:
    1. Select Banded Rows in the Table Style Options group [Table Tools Design tab] and deselect all 
    2. Apply the List Table 1 Light – Accent 2 table style (Figure 4-120).
    3. Change the font size on all the text in the table to 10 pt.
    4. AutoFit the table and choose AutoFit Window.
    5. Change row height to 0.25″.
    6. Center all text vertically within each cell. (Hint: Use the Cell tab in the Table Properties dialog box.)
    7. Sort the table by Name of Vaccine in Ascending order. Be sure to select Header row in the My list has area of the Sort dialog box.
  3. Make the following changes to the table:
    1. Insert a row above the first row.
    2. Merge the three cells in the new first row and type the following:
      RECOMMENDED VACCINATION SCHEDULE
    3. Bold and center the first row and change the font size to 11 pt.
    4. Bold and italicize the column headings in the second row.
    5. Select the first row and apply borders with the following settings: solid line, Black, Text 1 color (second color in the first row of Theme Colors), 1 ½ pt. width, and apply a top and bottom
    6. Select the second row and apply a border with the following settings: solid line, Black, Text 1 color, 1 ½ pt width, and apply a bottom border. Do not remove the top border applied in the previous step.
    7. Select the last row and apply a border with the following settings: solid line, Black, Text 1 color, 1 ½ pt width, and apply a bottom border.
    8. Align Center [Table Tools Layout tab, Alignment group] the column headings.
    9. Align Center the text in the third column.
  4. Insert the following information alphabetically into the table. Insert rows where needed.

This table lists text to be typed in a table

Meningococcal conjugate (MCV)

At 11-12 years

1

Hepatitis B (HepB)

At birth, 1-2 months, and 6 months

3

  1. Modify the title of the document (“Vaccination Schedule”).
    1. Apply the Title style to the title of the document.
    2. Change the After paragraph spacing to 8 pt.
    3. Center the title horizontally.
    4. Apply small caps and bold formatting to the title.
  2. Insert and modify a picture.
    1. Place the insertion point after the title and insert the CMPLogo-04 picture downloaded from the Resources link. Use the Insert Picture dialog box.
    2. Change text wrapping to Top and Bottom.
    3. Change the height of the logo to 1″. Verify the logo remains proportional.
    4. Apply the Offset: Bottom Right shadow picture effect (Outer category).
    5. Set the Horizontal Absolute position to 0.2″ to the right of Page.
    6. Set the Vertical Absolute position to 0.2″ below Page.
  3. Insert a picture and add a caption.
    1. Place the insertion point at the end of the first body paragraph and insert the Vaccination-04 picture downloaded from the Resources link. Use the Insert Picture dialog box.
    2. Change the text wrapping to Square.
    3. Change the height of the picture to 1.3″. Verify the graphic remains proportional.
    4. Drag the picture to the right of the first and second paragraphs.
    5. Insert a caption, delete the caption placeholder text, and type Don’t neglect your vaccinations! as the caption text.
    6. Center the caption text, change the font color to Red, Accent 2 (sixth color in the first row of Theme Colors), and turn off italics if it is applied to the text.
    7. Select the caption and the picture and Align Center.
    8. Group the caption and the picture.
    9. Set the Horizontal Absolute position to 6″ to the right of Margin.
    10. Set the Vertical Absolute position to 0.8″ below Margin.
  4. Edit the alt text of the graphic objects.
    1. Edit the alt text of the CMP logo and type Courtyard Medical Plaza logo as the alt text.
    2. Edit the alt text of the graphic of a doctor, type Graphic of a doctor as the alt text, and close the Alt Text pane.
  5. Save and close the document (Figure 4-121).

Cloud_Computing_week10

Discussion Topic: Discuss key items that should be included in an SLA. Define predictive analytics and discuss how an IT manager might use such analytics. 

 

Writing Assignment

Write a paper on migrating to the cloud. The following are the items to discuss in the paper:

  • List and describe common system requirements one should consider before moving an application to the cloud.
  • Discuss why a company should consider using a consultant to oversee a cloud migration and list specific skills you would expect the consultant to have.
  • List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
  • List possible training requirements for a SaaS solution integration, a PaaS application migration, and an IaaS application migration.

Paper requirements:

  • Minimum 1200 words (excluding title page, table of contents, abstract, and references pages)
  • Minimum of four (4) references
  • Format your paper consistent with APA guidelines
  • When submitting the assignment, please ensure you are submitting as an attached MS Word document.

wk 13 fn

What future developments will we see for blockchain applications? Provide at least 2-3 examples.

assignment-7

 why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  

5s week 6 assignment BS

in 300 words, 

Do a bit of research on JSON and AJAX.

How do they relate to the Same-Origin policy?

Using WORD, write several short paragraphs on each. 

Use your own words and do not copy the work of another student.

Please include Reference, Do not copy paste strictly.

Discussion

Subject:  InfoTech Import in Strat Plan 

 

Why is it important for business strategy to drive organizational strategy and IS strategy? What might happen if the business strategy was not the driver?

 At least one scholarly source should be used in the initial discussion thread. Use proper APA citations and references in your post. 

security architecture 12.1

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be include at least two references.

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

PHD Interview (Information Technology)

WRITTEN INTERVIEW QUESTIONS

DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

discussion

 explain the different security measures that each version of SNMP uses.  What is the different between SNMPv1, v2c and v3?