samples.pdf
Write a function to compute the sum
Write a function to compute the sum of the first k terms of the series expansion for the sine function (-1)” (2n +1)! 2n +1 sin(x) = TL 0 The first three terms (k = 3) of the expansion are: 1 1 73 + sin(x) = 2 ਕ 5 Function specification: Your function should be called series sine(x, k) where x is the argument of the sine function and a total of k number of terms from the expansion should be summed. You are not allowed to import a factorial function (or anything else) from any of Python’s libraries – you don’t need it and it’ll slow down your function significantly! For example: Test Result import numpy as np 1.571 # Uses your series_sine to calculate sin(pi/2) with 1 to 3 iterations. 0.925 ans_literation = series_sine (np.pi/2, 1) 1.005 print(f'{ans_literation:.3f}’) ans_2iterations – series_sine (np.pi/2, 2) print(f'{ans_2iterations:.3f}’) ans_3iterations = series_sine (np.pi/2, 3) print(f'{ans_3iterations:.3f}’) Correct! ans = series_sine (1.6, 11) if abs (ans – 0.9996) < le-4: print("Correct!") else: print("Wrong answer.") print(f"Your answer was: {ans}")
TCO
1. (TCO A) Organization XYZ has just been granted access tothe LAN of the ABC organization to access Web-based applications over theInternet. Organization ABC has established what type of access? (Points : 5)
Extranet Internet Remote Protocol Exchange Intranet
Question 2. 2. (TCO B) The ________________ is a WAN network thatincludes hundreds of thousands to millions of machines and users worldwide. (Points : 5)
Intranet Metropolitan Area Network (MAN) Internet Ethernet
Question 3. 3. (TCO B) Which of the following is considered a componentof a network? (Points : 5)
Server Client Circuit All of the above
Question 4. 4. (TCO C) Which is true about a network hub? (Points : 5)
When a frame is sent from one computer to another, the hub retransmits it to all computers attached. it keeps a table of addresses and ports. Each circuit connected to it is not shared. Internally, the logical topology is a set of point-to-point circuits.
Question 5. 5. (TCO C) Hubs and switches also act as __________ to helpprevent attenuation. (Points :
repeaters firewalls junction points layer 2 devices
Question 6. 6. (TCO D) A ___________ connect(s) two similarnetworks having the same network protocol and chooses the best routebetween two networks when there are multiple paths. (Points : 5)
router modem router and modem None of the above
Question 7. 7. (TCO D) In the case of Internet operation, a networkaccess point is ______.(Points : 5)
the point that links regional ISPs used by National ISPs to exchange data used to exchange data between local servers and local ISPs used as a redundant path between local ISPs
Question 8. 8. (TCO E) Your organization has been the victim of arecent DoS on one of your public websites. Your CIO wants this problem tohave minimal impact on your organization in the future. What is the besttechnology to deploy to quickly detect and take action on a DoS attack onceit starts? (Points : 5)
Firewall Intrusion detection system Traffic filters and traffic limiting Honeypot
Question 9. 9. (TCO E) Your organization has decided to host a webserver that will be accessible by the public. Organizational leadership isconcerned about the web server being compromised and thus allowing theremaining network to be compromised. You want to come up with a solution tohost and secure the Web server internally but still protect yournetwork. What should you do?(Points : 5)
Use a firewall Put the web server on the DMZ Put the web server in front of the firewall. Chassis based switch
Question 10. 10. (TCO F) The building block design approach is sometimescalled ______. (Points : 5)
wide and shallow narrow and deep wide and deep narrow and shallow
Question 11. 11. (TCO F) Your company is new and finally has acquired anoperating facility. You are in change of designing the network.Organizational leadership has explained to you that they want a networkthat is simplistic, standardized, and that can be implemented in less thanone year. What design option would best suit the needs of the organization? (Points : 5)
Needs analysis Traditional network design Building-block network design Lateral network design
Question 12. 12. (TCO G) __________ policies attempt to allocate costsassociated with a WAN or a mainframe to specificusers. (Points : 5)
Charge-back Web spinning Internet access fees Support staff billing
Question 2. 2. (TCO B) Discuss and support your opinions of why combining voice and data is a major organizational challenge. Include your thoughts on its possible impacts on the organization in terms of competitive advantage, internal organization, and so forth. (Points : 25)
Question 3. 3. (TCO C) Switched Ethernet networks dominate the landscape of computer networks today. What improvements do Switched Ethernet networks have over its predecessor Shared Ethernet networks? Be specific and answer in details. (Points : 25)
Question 4. 4. (TCO C) What are the preferred technologies used in the three technology layers in backbone design? Describe each of the technologies in detail
Question 5. 5. (TCO D) What are the principal organizations responsible for Internet governance, and what do they do? (Points : 25)
Question 7. 7. (TCO F) What are some major problems that can cause network designs to fail? Provide the problems in detail. (Points : 25)
Question 6. 6. (TCO E) Viruses and worms are issues that any networking professional must face. Compare and contrast viruses and worms. Be n. (Points : 25)
Question 8. 8. (TCO G) The total cost of ownership (TCO) is a measure of how much it costs per year to keep one computer operating. TCO includes the cost of support staff to attach it to the network, install software, administer the network (e.g., create user ids, backup user data), provide training and technical support, and upgrade hardware and software. It also includes the cost of time “wasted” by the user when problems occur or when the user is attempting to learn new software. Discuss in detail at least three approaches that can be used to reduce network costs. (Points : 25)
Cyber
Need help with question. will give instructions once we communicate.
Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory
Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory
#Exp19_Excel_Ch12_Cap_Bulldog_Collectibles
#Exp19_Excel_Ch12_Cap_Inventory
Project Description:
You are the operations manager for Bulldog collectables, a small start-up company that deals with sports memorabilia. As you prepare to document your inventory, you decide to utilize a template to save time. To complete this task, you will create a worksheet based on an Office.com template; you will also use the Macro Recorder and Visual Basic for Application to automate sorting and calculations within the workbook.
Start Excel. Download and open the file named EXP19_Excel_Ch12_Cap_Inventory.xlsx. Grader has automatically added your last name to the beginning of the filename.
Delete the Inventory Pick List and Bin Lookup worksheets.
Delete the INVENTORY PICK LIST and BIN LOOKUP icons located respectively in cells E2 and F2. Then Clear all existing Data Validation in the range A1:K15.
Delete the values in the range B5:J15.
Record a macro named Sort, be sure to use relative references. Ensure the macro sorts the data in the table in ascending order based on SKU (column A). Stop the Macro Recorder and Save the workbook as a Macro-Enabled Template.
Create a form control button that spans the cell E2:E3. Assign the Sort macro and edit the button text to Sort.
Use the VBA Editor to create a new module.
Type the following VBA code to create a custom Inventory Value function then save and exit the VBA Editor (be sure to leave a blank line between each line and before End Function):
Function InventoryValue (QTY, COST)
InventoryValue = QTY * COST
Click cell J5 and use the newly created InventoryValue function to calculate the value of the inventory for each item in column I.
Use the VBA Editor to create a new module named ProtectWorkbook. Type the following VBA statements to create the sub procedure (leave appropriate line spacing).
Sub ProtectWorkbook()
‘Protect workbook using the password eXploring
Worksheets(“Inventory List”).Protect Password:=”eXploring”
Insert a new module named UnprotectWorkbook. Type the following VBA statements to create the sub procedure and then save and exit the VBA Editor (leave appropriate line spacing).
Sub UnprotectWorkbook()
‘Unprotect workbook using the password eXploring
Worksheets(“Inventory List”).Unprotect Password:=”eXploring”
Insert a Form Control Button spanning cells F2:F3 named Unprotect. Assign the UnprotectWorkbook macro to the newly created Control Button.
Insert a Form Control Button spanning the range G2:H3 named Protect. Assign the macro ProtectWorkbook.
Insert the comment Inventory based on values in column J. in cell B3 (include the period).
Insert the comment Count of items in column C. in cell C3 (include the period).
Inspect the document for private information and hidden properties. Save the file when prompted then remove Document Properties and Personal Information, and Headers and Footers.
Note: Mac users, from the Excel menu, open your preferences, click Security, and then click the check box to Remove personal information from this file on save. Delete any headers or footers in the workbook.
Check the document for accessibility issues. Use the Accessibility Checker pane to change the cell styles to Normal in order to repair the issue.
Check the document for compatibility with Excel 2010, 2013, and 2016.
Note: Mac users, skip this step.
Insert a new worksheet named Code.
Open the VBA Editor, open Module 1, and copy the code. Paste the code in the Code worksheet starting in cell A1.
In the VBA Editor, open Module 2, and copy the code. Paste the code in the Code worksheet starting in cell A22.
In the VBA Editor, open the ProtectWorkbook, and copy the code. Paste the code in the Code worksheet starting in cell A28.
In the VBA Editor, open the UnprotectWorkbook module, and copy the code. Paste the code in the Code worksheet starting in cell A35.
Close the VBA Editor and save the workbook as an xlsx file (not Macro-Enabled).
Close EXP19_Excel_Ch12_CAP_Inventory.xlsx. Exit Excel. Submit the file as directed.
Week 11 Assignment
Instructions
Please share (3 to 4 paragraphs) on what you learned when you read chapter 11 along with Overview of Mobile Forensics (.PDF file) and identify what makes this different form acquiring computers in the traditional sense.
THEN
Please share (3 to 4 paragraphs) on what you learned when you read Developing Processes for Mobile Forensics (.PDF file)
THEN
Please share (3 to 4 paragraphs) on what you learned when you read Future of Mobile Foresics (.PDF) file and identify if you thought the author may have missed anything as well as your own thoughts – what did you learn!?
Help 1
Your sponsor is requesting that you send the project proposal so he can prepare before attending a meeting with leadership next week. As part of the request, there is a requirement that two “departmental peers” review and approve the proposal prior to submittal.
You will serve as the project manager for your proposal and as a peer reviewer for the other members in your group.
The beginning of this assignment requires the project manager to upload the initial draft of the project proposal in the group’s discussion board for the peers to review and approve.
xy
Describe the culture at your organization (past or present). List the weaknesses and strengths. How does the culture of your organization influence the behavior of its members? Is the structure of your company supportive of the culture? Why do people resist change? What are your recommendations for improvements?
use chapters 14 and 15 An Introduction to Organizational Behavior – Table of Contents (lardbucket.org)
I have uploaded screenshots of test book
Powerpoint Presentation and research paper
Topic: Internet of Things
Outline for Presentation
- Define your topic and its associated ethical dilemma (ethical values or principles)
- Identify the facts: Stake holders, activity, actions, laws (or lack of)
- Briefly outline two or three options / solutions and their consequences (intended and unintended)
- Thoughtful discussion questions or prompts to engage the class to discuss the conflict or dilemma
- What did you find surprising about this issue or the class discussion???
- Last word: Your opinion and justification…any changes from discussion input.
Also write the research paper with the same content
Assignment
Discuss in five hundred words or more a situation at work where you felt you had to consider the ethics of something you were being asked to do.