Write a function to compute the sum

 Write a function to compute the sum of the first k terms of the series expansion for the sine function (-1)” (2n +1)! 2n +1 sin(x) = TL 0 The first three terms (k = 3) of the expansion are: 1 1 73 + sin(x) = 2 ਕ 5 Function specification: Your function should be called series sine(x, k) where x is the argument of the sine function and a total of k number of terms from the expansion should be summed. You are not allowed to import a factorial function (or anything else) from any of Python’s libraries – you don’t need it and it’ll slow down your function significantly! For example: Test Result import numpy as np 1.571 # Uses your series_sine to calculate sin(pi/2) with 1 to 3 iterations. 0.925 ans_literation = series_sine (np.pi/2, 1) 1.005 print(f'{ans_literation:.3f}’) ans_2iterations – series_sine (np.pi/2, 2) print(f'{ans_2iterations:.3f}’) ans_3iterations = series_sine (np.pi/2, 3) print(f'{ans_3iterations:.3f}’) Correct! ans = series_sine (1.6, 11) if abs (ans – 0.9996) < le-4: print("Correct!") else: print("Wrong answer.") print(f"Your answer was: {ans}")
 

TCO

  

1. (TCO A) Organization XYZ has just been granted access tothe LAN of the ABC organization to access Web-based applications over theInternet. Organization ABC has established what type of access? (Points : 5) 

Extranet   Internet   Remote Protocol Exchange   Intranet  

Question 2. 2. (TCO B) The ________________ is a WAN network thatincludes hundreds of thousands to millions of machines and users worldwide. (Points : 5) 

Intranet   Metropolitan Area Network (MAN)    Internet   Ethernet  

Question 3. 3. (TCO B) Which of the following is considered a componentof a network? (Points : 5) 

Server   Client   Circuit    All of the above  

Question 4. 4. (TCO C) Which is true about a network hub? (Points : 5) 

 When a frame is sent from one   computer to another, the hub retransmits it to all computers attached.   it keeps a table of addresses and   ports.   Each circuit connected to it is   not shared.   Internally, the logical topology   is a set of point-to-point circuits.  

Question 5. 5. (TCO C) Hubs and switches also act as __________ to helpprevent attenuation. (Points : 

 repeaters   firewalls   junction points   layer 2 devices  

Question 6. 6. (TCO D) A ___________ connect(s) two similarnetworks having the same network protocol and chooses the best routebetween two networks when there are multiple paths. (Points : 5) 

 router   modem   router and modem   None of the above  

Question 7. 7. (TCO D) In the case of Internet operation, a networkaccess point is ______.(Points : 5) 

 the point that links regional ISPs   used by National ISPs to exchange   data   used to exchange data between   local servers and local ISPs   used as a redundant path between   local ISPs  

Question 8. 8. (TCO E) Your organization has been the victim of arecent DoS on one of your public websites. Your CIO wants this problem tohave minimal impact on your organization in the future. What is the besttechnology to deploy to quickly detect and take action on a DoS attack onceit starts? (Points : 5) 

Firewall   Intrusion   detection system   Traffic filters and traffic limiting   Honeypot  

Question 9. 9. (TCO E) Your organization has decided to host a webserver that will be accessible by the public. Organizational leadership isconcerned about the web server being compromised and thus allowing theremaining network to be compromised. You want to come up with a solution tohost and secure the Web server internally but still protect yournetwork. What should you do?(Points : 5) 

Use a firewall    Put the web server on the DMZ   Put the web server in front of the   firewall.   Chassis based switch  

Question 10. 10. (TCO F) The building block design approach is sometimescalled ______. (Points : 5) 

wide and shallow    narrow and deep   wide and deep   narrow and shallow  

Question 11. 11. (TCO F) Your company is new and finally has acquired anoperating facility. You are in change of designing the network.Organizational leadership has explained to you that they want a networkthat is simplistic, standardized, and that can be implemented in less thanone year. What design option would best suit the needs of the organization? (Points : 5) 

Needs analysis   Traditional network design    Building-block network design   Lateral network design  

Question 12. 12. (TCO G) __________ policies attempt to allocate costsassociated with a WAN or a mainframe to specificusers. (Points : 5) 

 Charge-back   Web spinning   Internet access fees   Support staff billing

Question 2. 2. (TCO B) Discuss and support your opinions of why combining voice and data is a major organizational challenge. Include your thoughts on its possible impacts on the organization in terms of competitive advantage, internal organization, and so forth. (Points : 25)

Question 3. 3. (TCO C) Switched Ethernet networks dominate the landscape of computer networks today. What improvements do Switched Ethernet networks have over its predecessor Shared Ethernet networks? Be specific and answer in details. (Points : 25) 

Question 4. 4. (TCO C) What are the preferred technologies used in the three technology layers in backbone design? Describe each of the technologies in detail

Question 5. 5. (TCO D) What are the principal organizations responsible for Internet governance, and what do they do? (Points : 25) 

Question 7. 7. (TCO F) What are some major problems that can cause network designs to fail? Provide the problems in detail. (Points : 25) 

Question 6. 6. (TCO E) Viruses and worms are issues that any networking professional must face. Compare and contrast viruses and worms. Be n. (Points : 25) 

Question 8. 8. (TCO G) The total cost of ownership (TCO) is a measure of how much it costs per year to keep one computer operating. TCO includes the cost of support staff to attach it to the network, install software, administer the network (e.g., create user ids, backup user data), provide training and technical support, and upgrade hardware and software. It also includes the cost of time “wasted” by the user when problems occur or when the user is attempting to learn new software. Discuss in detail at least three approaches that can be used to reduce network costs. (Points : 25) 

Cyber

Need help with question. will give instructions once we communicate.

Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory

 

Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory

 

#Exp19_Excel_Ch12_Cap_Bulldog_Collectibles

 #Exp19_Excel_Ch12_Cap_Inventory 

Project Description:

You are the operations manager for Bulldog collectables, a small  start-up company that deals with sports memorabilia. As you prepare to  document your inventory, you decide to utilize a template to save time.  To complete this task, you will create a worksheet based on an  Office.com template; you will also use the Macro Recorder and Visual  Basic for Application to automate sorting and calculations within the  workbook.

Start   Excel. Download and open the file named EXP19_Excel_Ch12_Cap_Inventory.xlsx. Grader has automatically added   your last name to the beginning of the filename. 

Delete the Inventory Pick List   and Bin Lookup worksheets.

Delete the INVENTORY PICK LIST   and BIN LOOKUP icons located  respectively in cells E2 and F2. Then Clear all   existing Data  Validation in the range A1:K15.

Delete the values in the range   B5:J15.

Record a macro named Sort, be sure to use relative    references. Ensure the macro sorts the data in the table in ascending  order   based on SKU (column A). Stop the Macro Recorder and Save the  workbook as a   Macro-Enabled Template.

Create a form control button   that spans the cell E2:E3. Assign the Sort macro and edit the button text to Sort.

Use the VBA Editor to create a   new module.
 

  Type the following VBA code to create a custom Inventory Value  function then   save and exit the VBA Editor (be sure to leave a blank  line between each line   and before End Function):
 

Function   InventoryValue (QTY, COST)
 

InventoryValue   = QTY * COST
 

Click cell J5 and use the newly   created InventoryValue function to  calculate the value of the inventory for   each item in column I.

Use the VBA Editor to create a   new module named ProtectWorkbook. Type the following VBA statements to create the   sub procedure (leave appropriate line spacing).
 

Sub   ProtectWorkbook()
 

‘Protect   workbook using the password eXploring
Worksheets(“Inventory   List”).Protect Password:=”eXploring”

Insert a new module named UnprotectWorkbook. Type  the following VBA   statements to create the sub procedure and then save  and exit the VBA Editor   (leave appropriate line spacing).
 

Sub   UnprotectWorkbook()
 

‘Unprotect   workbook using the password eXploring
Worksheets(“Inventory   List”).Unprotect Password:=”eXploring”

Insert a Form Control Button   spanning cells F2:F3 named Unprotect. Assign the UnprotectWorkbook macro to the newly   created Control Button.

Insert a Form Control Button   spanning the range G2:H3 named Protect. Assign the macro ProtectWorkbook.

Insert the comment Inventory   based on values in column J. in cell B3 (include the period).

Insert the comment Count of   items in column C.   in cell C3 (include the period).

Inspect the document for private   information and hidden properties.  Save the file when prompted then remove   Document Properties and  Personal Information, and Headers and Footers.
 

  Note: Mac users, from the Excel menu, open your preferences, click  Security,   and then click the check box to Remove personal information  from this file on   save. Delete any headers or footers in the workbook.

Check the document for   accessibility issues. Use the Accessibility  Checker pane to change the cell   styles to Normal in order to repair  the issue.

Check the document for   compatibility with Excel 2010, 2013, and 2016.
 

  Note: Mac users, skip this step.

Insert a new worksheet named Code.

Open the VBA Editor, open Module   1, and copy the code. Paste the code in the Code worksheet starting in cell   A1. 

In the VBA Editor, open Module   2, and copy the code. Paste the code in the Code worksheet starting in cell   A22. 

In the VBA Editor, open the   ProtectWorkbook, and copy the code. Paste the code in the Code worksheet   starting in cell A28. 

In the VBA Editor, open the   UnprotectWorkbook module, and copy the  code. Paste the code in the Code   worksheet starting in cell A35. 

Close the VBA Editor and save   the workbook as an xlsx file (not Macro-Enabled).

Close EXP19_Excel_Ch12_CAP_Inventory.xlsx. Exit Excel. Submit the file   as directed.

Week 11 Assignment

 

Instructions

Please share (3 to 4 paragraphs) on what you learned when you read chapter 11 along with Overview of Mobile Forensics (.PDF file) and identify what makes this different form acquiring computers in the traditional sense.

THEN

Please share (3 to 4 paragraphs) on what you learned when you read Developing Processes for Mobile Forensics (.PDF file)

THEN

Please share (3 to 4 paragraphs) on what you learned when you read Future of Mobile Foresics (.PDF) file and identify if you thought the author may have missed anything as well as your own thoughts – what did you learn!?

Help 1

 

Your sponsor is requesting that you send the project proposal so he can prepare before attending a meeting with leadership next week. As part of the request, there is a requirement that two “departmental peers” review and approve the proposal prior to submittal.

You will serve as the project manager for your proposal and as a peer reviewer for the other members in your group.

The beginning of this assignment requires the project manager to upload the initial draft of the project proposal in the group’s discussion board for the peers to review and approve. 

xy

 Describe the culture at your organization (past or present). List the weaknesses and strengths. How does the culture of your organization influence the behavior of its members? Is the structure of your company supportive of the culture? Why do people resist change? What are your recommendations for improvements?  

use chapters 14 and 15   An Introduction to Organizational Behavior – Table of Contents (lardbucket.org) 

I have uploaded screenshots of test book

Powerpoint Presentation and research paper

Topic: Internet of Things

Outline for Presentation

  • Define your topic and its associated ethical dilemma (ethical values or principles)
  • Identify the facts: Stake holders, activity, actions, laws (or lack of)
  • Briefly outline two or three options / solutions and their consequences (intended and unintended) 
  • Thoughtful discussion questions or prompts to engage the class to discuss the conflict or dilemma 
  • What did you find surprising about this issue or the class discussion???
  • Last word:  Your opinion and justification…any changes from discussion input.


Also write the research paper with the same content