Exp19_Access_Ch02_ML1 – Game Collection 1.2

  

Project Description:

You have cataloged your vintage video games in an Access database. In this project, you add two tables to a database you have started? One to identify the game system that runs your game and the other to identify the category or genre of the game. Then you will join each table in a relationship so that you can query the database.

     

Start Access. Open the downloaded   Access file named Exp19_Access_Ch02_ML1_Games. Grader has automatically added   your last name to the beginning of the filename. Save the file to the   location where you are storing your files.

 

Open   the Games table and review the fields containing the game information. Close   the table.
 

  Create a new table in Design view. Add the field name SystemID and select AutoNumber as the Data Type. Add the caption System ID. Set the SystemID field as the primary   key for the table.

 

Add   a second field named SystemName   with the Short Text Data Type.   Change the SystemName field size property to 15.   Add the caption System Name.   Save the table as System.

 

Switch   to Datasheet view and enter the following system names, letting Access assign   the System ID:
 

XBOX 360
PS3
Wii
NES
PC Game
Nintendo 3DS
 

  Double-click the border to the   right of the System Name column to set the column width to Best Fit. Save and   close the table.

 

Create   a new table in Design view. Add the field name CategoryID   and select AutoNumber as the Data   Type. Add the caption Category ID.   Set the CategoryID field as the   Primary Key for the table.

 

Add   a second field named CategoryDescription   and accept Short Text as the Data   Type. Change the field size property to 25.   Add the caption Category Description.   Save the table as Category.

 

Switch   to Datasheet view, and enter the following Category Description, letting   Access assign the Category ID:
 

Action
Adventure
Arcade
Racing
Rhythm
Role-playing
Simulation
Sports
 

  Close the table.

 

Establish   relationships in the database by adding the Category, Games and System tables to the Relationships   window. Close the Show Table dialog box. Create a one-to-many relationship   between the SystemID field in the System table and the SystemID field in the   Games table, enforcing Referential Integrity. Select the option to cascade   update the related fields.

 

Create   a one-to-many relationship between the CategoryID field in the Category table   and the CategoryID field in the Games table, enforcing Referential Integrity.   Select the option to cascade update the related fields. Save and close the   Relationships window.

 

Create   a simple query using the Query Wizard. From the Games table, add the GameName and Rating fields (in that order). Save the query using the title Ratings. Switch to Design view. Sort the   Rating field in ascending order.

 

Click   the gray column selector at the   top of the Rating field, then click and drag the column to move it to the first position of the query design grid.   Add a Total row, click in the Totalrow   of the GameName column, click the arrow,   and then select Count. The records   will be grouped by rating, and the number of games will be counted for each   group. Run, save, and close the query.

 

Create   a new query in Design view. Add the Category,   Games, and System tables to the query design window. Add the following   fields to the query (in this order).
 

GameName

CategoryDescription
  Rating
  SystemName
  DateAcquired

 

Sort   the query in ascending order by GameName and run the query. Save the query as   Game List and close the query.

 

Copy   the Game List query in the   Navigation pane and paste it with the name PS3 Games.   Modify the query in Design view by using PS3   as the criteria for SystemName. Remove the sort by GameName and sort in   ascending order by CategoryDescription. Save and run the query. Close the query.

 

Create   a new query in Design view. Add the Category,   Games, and System tables to   the query design window. Add fields (in this order) to display the name of   the game, its rating, the category description of the game, and the system   name. You only want to display Wii games with a rating of Everyone or Teen.   Because the system name is the same for the games you plan to pack and share,   hide this value from the results. Save the query as Thanksgiving Games and run the query. Close the query.

Parallel Computing Homework

  

1. For each of the following code segments, use OpenMP pragmas to make the loop parallel, or

explain why the code segment is not suitable for parallel execution.

a. for (i = 0; i < (int) sqrt(x); i++) {

a[i] = i + 12;

if (i < 10) b[i] = a[i];

}

b. flag = 0;

for (i = 0; (i < n) & (!flag); i++) {

a[i] = 2.8 * i;

if (a[i] < b[i]) flag = 1;

}

c. for (i = 0; i < n; i++) {

a[i] = fun(i);

}

d. for (i = 0; i < n; i++) {

a[i] = fun(i);

if (a[i] < b[i]) b[i] = a[i];

}

e. for (i = 0; i < n; i++) {

a[i] = fun(i);

if (a[i] < b[i]) break;

}

f. product = 0;

for (i = 0; i < n; i++) {

product += a[i] * b[i];

}

g. for (i = j; i < 3 * j; i++) {

a[i] = a[i] + a[i-j];

}

h. for (i = j; i < n; i++) {

a[i] = c * a[i-j];

}

2. Suppose a parallel program completes execution on 32 processors in 348 seconds, and it has

been found that this program spends 21 seconds in initialization and cleanup on one processor, and for

the remaining time all 32 processors are active. What is the scaled speedup of this parallel program?

3. Suppose a parallel program executing on 20 processors spends 98% of its time inside parallel

code. What is the scaled speedup of this parallel program?

4. The table below shows the speedups observed for six different parallel programs A, B, C, D,

E, F as the number of processors is increased from 1 through 8.

  

Processors

Speedup

 

A

B

C

D

E

F

 

1

1.00

1.00

1.00

1.00

1.00

1.00

 

2

1.60

1.92

1.92

1.96

1.74

1.94

 

3

2.00

2.73

2.78

2.88

2.30

2.82

 

4

2.29

3.39

3.57

3.67

2.74

3.65

 

5

2.50

3.91

4.31

4.46

3.09

4.42

 

6

2.67

4.29

5.00

5.22

3.38

5.15

 

7

2.80

4.55

5.65

5.93

3.62

5.84

 

8

2.91

4.71

6.25

6.25

3.81

6.50

Using the Karp-Flatt metric as the basis, choose the statement that best describes the expected speedup

for each program with 16 processors.

I. The speedup achieved on 16 processors will probably be at least 40% higher than the speedup

achieved on eight processors.

II. The speedup achieved on 16 processors will probably be less than 40% higher than the speedup

achieved on eight processors, due to the increase in overhead as processors are added.

III. The speedup achieved on 16 processors will probably be less than 40% higher than the speedup

achieved on eight processors, due to the large serial component of the computation.

5. Let n ≥ f(p) denote the isoefficiency relation of a parallel system and let M(n) denote the

amount of memory required to store a problem of size n. Use the scalability function to rank the

parallel systems shown below from the most scalable to the least scalable:

a. f(p) = Cp, M(n) = n2.

b. f(p) = C√p, M(n) = n2.

c. f(p) = C√plog p, M(n) = n2.

d. f(p) = Cplog p, M(n) = n2.

e. f(p) = Cp, M(n) = n.

f. f(p) = Cp√p, M(n) = n.

g. f(p) = Cp2√p, M(n) = n.

6. Suppose a problem of size 100,000 can be solved in 15 hours on a computer today. Assuming

that the execution time is solely determined by the CPU speed, determine how large a problem can be

solved in 15 hours time by a computer that is 100 times as fast as today’s computer, if the algorithm

used to solve the problem has a time complexity given by (for a problem size of n):

a. Θ(n2)

b. Θ(nlog2n)

c. Θ(n3)

Software -6 Assg

 Please read chapter 15 and review reputable articles/journals and describe what is Software Reuse? Briefly explain the benefits and problems with reuse.  

Cryptography

Modern cryptography uses public algorithms with secret material (keys). These public algorithms are arrived at through large scale “competitions” in which people compete to produce the most secure but efficient algorithm while also inspecting each other’s algorithms (see the NIST AES selection process). In this model of a publicly known encryption algorithm, the most protected element will be the key. Do you think it would enhance security to also have a secret algorithm agreed upon with your communication partners? Defend your answer.

Parameters 

  • Posts should be 250 to 300 words in length
  • Must include at least one source outside of your textbook, and it should be included in the reference list at the end of the post
  • All sources should be used in the content of the post using APA format

IT207 week2

Please discuss/answer the following questions:

  • Discuss the need for dividing an operating system into at least two modes, user and kernel. What are the advantages and disadvantages associated with this division of labor?
  • What properties of a program enable it to be divided into pages? How is it possible for a program to execute with only a subset of these pages residing in the main memory at any given time?

Submit a one to two-page paper in APA format by Sunday 11:59 PM. 

For APA format, include a title page. Include an abstract statement on page two. Add the body on pages 3 & 4. Put your references on page 5. Use more than one reference for your information. Use Times New Roman 12 point font, double-spaced through the entire document. Indent paragraphs in the body. The abstract is not indented. 

You can use the APA template and References tab in MS Word for easier formatting.

If you are not familiar with APA formatting, please let me know and we can set up a live tutorial via GoToMeeting.

Remember to proofread your paper before submitting. Ideally, also have someone else also proofread it.

Practical connection

  Subject:  Operational Excellence 

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. Requirements:Provide a 500 word (or 2 pages double spaced) minimum reflection.Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.Share a personal connection that identifies specific knowledge and theories from this course.Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. Be sure to not self-plagiarize as this assignment is similar in multiple courses. 

Course Objective:

 This course focuses on the skills & knowledge to guide an organization in its best use of technology to achieve its business goals and objectives. Although technical knowledge & skills are essential for technology professionals, this course focuses on the development of more general leadership skills. The ability to communicate with a broad set of stakeholders is essential & this course will offer exercises in skills such as negotiation, persuasion, agility, coaching & facilitation through case studies, role playing and simulation. Technology leaders must also understand the elements of developing & implementing an overall IT Strategy for the organization. This course will review the various levels of strategy & how strategy is implemented. 

Checkpoints

  

Checkpoints
1) Include name, e-mail, and lab# as comments in the code and also include code to output this information to the output.2) Minimum of three (3) comments (including Pre/Post) in each function. Note that if the parameter is a reference to (i.e. address of) a value, then the Pre comment must so state.3) user defined constants for property tax rate, cost of utilities, and cost of insurance. use non-global memory constant for percent of down payment.4) use exactly one function separate from main for input.5) Call a calculation function from main which handles all calculations. This function needs to call a sub-function (another function) to calculate exactly the following and no more: amount of down payment, amount of the loan, amount of monthly mortgage payment.6) Use exactly one function separate from main for output.7) Output must be formatted exactly as shown on lab write-up with decimal points lined up. Output must be copied to a separate file.8) All functions (other than main() & your signature function) must use prototype style.9) use reference variables when necessary and ONLY WHEN NECESSARY.Test data (see bankrate.com or use Excel & pmt()to check your answers)
Set 1 – $600,000, 5%, 20Set 2 – $400,000, 4.2%, 30

Minimum of three (3) comments (including Pre/Post) in each function. Note that if the parameter is a reference to (i.e. address of) a value, then the Pre comment must so state.5) Call a calculation function from main which handles all calculations. This function needs to call a sub-function (another function) to calculate exactly the following and no more: amount of down payment, amount of the loan, amount of monthly mortgage payment.9) use reference variables when necessary and ONLY WHEN NECESSARY.>>>>>>>>>>>>>>>Model for Lab 5 -> Webinar: Pizza Problem CompleteSee the words “reference to” in the Pre below:
double calcBill(int nDrinks, int nPiz, double& sub, double& tax)
{
/* Pre: nDrinks – number of drinks
nPiz – number of pizzas
sub – reference to subtotal
tax – reference to tax
Post: total of the bill
Purpose: Calculate subtotal, tax, total
*/Also, please note that many of these “musts” are because I am endeavoring to make sure that you understand the underlying concepts and are not just blindly coding.

Exp22_Word_Ch02_CumulativeAssessment – Space

Exp22_Word_Ch02_CumulativeAssessment – Space

  

Project Description:

In this project, you will use Word to prepare a document publicizing a series of space camp programs, designed for families and individuals. You will format the document as appropriate and include graphics to enhance document content.

     

Start Word. Download and open   the file named Exp22_Word_Ch02_CumulativeAssessment_Space.docx.   Grader has automatically added your last name to the beginning of the   filename. Ensure that nonprinting characters are displayed.

 

Select Underwater Astronaut Trainer in the first body paragraph and bold   it. Select Thermal Design Challenge   in the first body paragraph and bold it. Select all text from Space Academy on page 1 through Pack your bags on page 2 and change   the font to Cambria with a font size of 14. Change the alignment of selected   text to Justify.

 

Select the bulleted activities   in the Space Academy section on   page 1 and adjust the line spacing to 1.15. Ensure that paragraph spacing   before and after is 0 pt for the selected paragraphs.

 

Use Format Painter to copy the   format of the bulleted items in the Space   Academy section to bulleted items in the Space Camp section and also in the Adult Space Academy   section.

 

Select the final three   paragraphs that are shown above the boxed area at the end of the document,   beginning with Sign up online and   ending with Pack your bags. Apply   numbering, selecting numbers that are followed by a period. Decrease the   indent so that the items begin at the left margin.

 

Display the ruler. Click or   select the blank paragraph above the bordered text at the end of the   document. Press ENTER. Set a left tab at 1″ and a right tab at 6″. Ensure that the right   tab includes a dash leader. Ensure that the font is 14 pt Cambria.

 

Press TAB and type SPACE   ADVENTURE. (Do   not type the period.) Press TAB and type DAVIDSON SPACE CENTER. (Do not type the period.) Drag   or move the 6” tab back to 5.5” on the ruler. Bold the tabbed line of text.

 

Select the tabbed line of text   and apply a Box border, choosing the first double-line style and ¾ pt width.

 

Select the Space Camp Programs heading at the top of the document. Insert   WordArt, choosing Fill: Gray, Accent Color 3; Sharp Bevel (row 2, column 5).   Ensure that the font size of the WordArt heading is 36.

 

Click or place the insertion at   the end of the third bulleted item at the top of page 2, Compete in camp-wide Challenge nights! Press ENTER. Remove the   bullet from the new line. Insert SmartArt, selecting Circle Arrow Process from the Process group. Type Space Academy   in the top text   placeholder. Type Space Camp in the middle text placeholder. Type Adult Space   Academy in the   lower text placeholder.

 

Adjust the SmartArt height to   2″ and width to   2”. Change colors to Colorful Range – Accent Colors 2 to 3. Position the   SmartArt object, choosing Position in Middle Right with Square Text Wrapping.

 

Click or position the insertion   point at the top of the document, beside the Space Academy heading. Insert a Star: 4 Points shape from the Stars and Banners   category. Draw the shape approximately 1″ wide and 1″ high, near   the left margin on the top line of the document. Using the Shape Format tab,   adjust the height and width to exactly 1.

 

Click or press Align in the   Arrange group on the Shape Format tab. Ensure that Align to Page is selected.   Click or select Align and align the shape in the center. Send the star to the   back so that it is located behind the WordArt heading object.

 

Change the shape fill of the   star to Gray, Accent 3, Lighter 80%. Change the Shape Outline to Black, Text   1. Apply a glow effect of Glow: 5 point, Orange, Accent color 2.

 

Group the star and WordArt items   into one object. Change text wrapping of the grouped object to Top and   Bottom.

 

Select the text Space Academy is the place for trainees to   experience first-hand the future of space travel, and train to solve   technically challenging problems the first sentence in the document. Copy   the selection. Deselect the text. Draw a text box of any size near the middle   of page 1 and paste the copied sentence in the text box. End the sentence   with a period. Adjust text box height to 2″ and width to 4″.

 

Change the font size of text in   the text box to 20 and change the font to Baskerville Old Face. Center the text.   Adjust text wrapping of the text box to Square. Drag or move the text box to   position it at the left margin above the Space   Camp heading near the bottom of page 1. Two bulleted items should wrap on   the right side of the text box. Apply a shape fill of Gray, Accent 3, Lighter   80%.

 

View the document in Multiple   Pages and check for any poorly placed headings or shapes. Insert a page break   before Activities at the bottom of   page 1. Insert a page break before It’s   as easy as 1-2-3 at the bottom of page 2.

 

Save and close Exp22_Word_Ch02_ML2_CumulativeAssessment_Space.docx.   Exit Word. Submit the file as directed.

Security Management Models

 

Describe the InfoSec management models, selection of InfoSec management models, the fundamental elements of key InfoSec management practices, emerging trends in the certification and accreditation of U.S. federal information technology (IT) systems, key components and implementation strategies of a security performance measurement programs.

Security Management Models

InfoSec models are standards that are used for reference or comparison and often serve as the stepping-off point for emulation and adoption. As the Chief Information Officer, you have been tasked to provide a report to senior management concerning the Access Control Models and how the implementation of this model secures the organizations information system from external and insider threats.

Prepare a 350- to 1,050-word paper that fully discusses the topic questions

Format your paper consistent with APA guidelines. Format your paper consistent with APA guidelines.