Exp19_Excel_Ch01_CapAssessment_Training

 

Exp19_Excel_Ch01_CapAssessment_Training

 

Project Description:

You manage a company that provides corporate training workshops. Your two types of clients are business people and college professors. You want to complete a spreadsheet that calculates gross revenue for upcoming training workshops. Finally, you will improve the appearance of the worksheet by applying font, alignment, and number formats.

Cybersecurity

Encryption is an important aspect of computer security. For this discussion, you are to research Advanced Encryption Standard (AES) and the Data Encryption Standard (DES) algorithm.

  1. Answer the questions in full paragraphs. Enter the information on the discussion forum (Do not attach any documents). 
  2. Cite your sources

Develop your research on the following items (items 1-7 equals 70% of the grade and item 8 equals 30% of the grade):

  1. Define and explain Advanced Encryption Standard
  2. Define and explain Data Encryption Standard
  3. Define and explain Symmetric cryptography
  4. Define and explain Asymmetric cryptography
  5. Define and explain Symantec
  6. Answer the questions in full paragraphs
  7. Cite your sources

Cloud

  

Instructions

Follow the instructions below to complete this assignment:

  1. Research a cloud service model.
  2. In a Word document, identify the following and write a brief summary of what you learned in your research.  
    • What the service model is and what advantages it provides
    • What kinds of scenarios the service model is commonly used for
    • The management responsibility associated with the service model—what the provider manages vs. what you manage
    • A brief description of at least three different service providers for the cloud service model selected
  3. Save your file, and submit it using the instructions below.

 IMPORTANT: This is not a formal paper. Please be concise. Your entire assignment should only be between 1/2 to 1 page.

Instructions

Follow the instructions below to complete this assignment:

  1. Write a 1-page paper describing the advantages and disadvantages of a virtualized environment in the cloud.
  2. Remember to use proper APA formatting, including citations and references for all resources used.
  3. Save your file, and submit it using the instructions below.

Instructions

Follow the instructions below to complete this assignment:

  1. Write a 1-page paper summarizing a well-known cloud provider. Your paper should also: 
    • Describe at least 5 services offered.
    • Include the features and functionality provided.
    • Describe how the pricing for each service is determined.
  2. Remember to use proper APA formatting, including citations and references for all resources used.
  3. Save your file, and submit it using the instructions below.

Project Charter

Check residency project charter file for Question.

Other documents are templates and support document-

Landscape tools

Portrait tools

How to Prepare budget justification

Discussion

  1. What are some distinctions between COPPA and CIPA? Similarities?
  2. Describe an organization that might be subject to both laws, and explain why you believe they both may apply.
  3. Why do you believe that these two laws define “child” differently? Is it rational to do so?
  4. Lastly, feel free to add further analyses or commentary that reflects your understanding of the two related but distinct laws.

Exp19_PowerPoint_Ch01_HOEAssessment_Dinosaurs

Exp19_PowerPoint_Ch01_HOEAssessment_Dinosaurs

  

Project Description:

You are a student teacher in a second-grade classroom. Your cooperating teacher has asked you to create an introductory presentation for the students on dinosaurs.

     

Start PowerPoint. Download and   open the file named Exp19_PPT_Ch01_HOEAssessment_Dinosaurs.pptx.   Grader has automatically added your last name to the beginning of the   filename. Save the file to the location you are saving your files.

 

Apply the Facet theme and change   the variant to the last one (green with black background).

 

Change the theme font to Arial   Black – Arial.

 

On Slide 1, in the title   placeholder type Dinosaurs. In the subtitle placeholder type Ms. Wagner’s   Second Grade.

 

You have slides that you created   in the past on dinosaurs that you want to use in this presentation. The Reuse   Slides feature is an easy way to import these slides.
 

  Use the Reuse Slides option to insert all of the slides from Dinosaurs.pptx.

 

When you imported the slides,   you realized that you do not need a duplicate of the title slide so you   delete Slide 2.
 

  Delete Slide 2. Move Slide 5 (Pterosaur) so that it becomes Slide 7.

 

On Slide 1 change the layout to   Picture with Caption. Increase the font size of the title text to 28 pt and the subtitle text to 18 pt. 

 

Insert the Dino1.jpg image into the picture placeholder. Apply the Reflected   Rounded Rectangle picture style.

 

On Slide 2, type Dinosaur   means “Terrible Lizard” (including the quotes) as the fifth bullet point.

 

Type the following in the Notes   pane for Slide 1: Today we are going to start our study of dinosaurs. (including the period).

 

Converting a bulleted list to a   SmartArt graphic is a good way to add interest to the presentation.
 

  On Slide 2 convert the bulleted list in the content placeholder to a Vertical   Curved List SmartArt graphic.

 

On Slide 8, insert the Dino2.jpg image. Change the height of   the image to 3.9″ and the width to 3.9″.

 

Apply the Beveled Oval, Black   picture style to the image. Position the image horizontally at 3.9” and vertically at 0.3”.

 

Select the text Questions? and apply the Fill: Green,   Accent color 1; Shadow WordArt style. Change the text effect to Tight   Reflection:Touching.

 

It is important to always check   your presentation for possible spelling errors.
 

  Check the presentation for spelling errors. Make corrections as needed on the   slides. NOTE: Do not change the title on Slide 3; while both spellings of Ankylosaurs (and Ankylosaurus) are correct, the preferred spelling in this case is   Ankylosaurs.

 

Create a Notes and Handouts   footer with the following: Dinosaur Facts. Apply to all.

 

 

Save and close Exp19_PPT_Ch01_HOEAssessment_Dinosaurs.pptx.   Submit the file as directed.

COMP 3051 Algorithm Design and Analysis

  

Assignment 2

Instructions

According to our suggested 16 week “Course Schedule,” you should complete and submit Assignment 2 by the Sunday at the end of Week 6. This assignment is worth 10% of your final grade. To receive full marks, answer each of the following questions in a clear and comprehensive manner. You can find the assignment marking criteria at the end of this document.

Questions

1.  Show that if f(n) is O(h(n)) and g(n) is O(i(n)), then f(n) + g(n) is O(h(n) + i(n)).

[2 marks]

2. Show that 3(n + 1)7 + 2n log n is O(n7). Hint: Try applying the rules of Theorem 1.7. You will have to use the insert equations to answer this question. [2 marks]

3. Give an O(n)-time algorithm for computing the depth of each node of a tree T, where n is the number of nodes of T. Assume the existence of methods setDepth (v,d) and getDepth(v) that run in O(1) time.  [2 marks]

4. What does the following algorithm do? Analyze its worst-case running time and express it using “Big-Oh” notation. [2 marks] 

Algorithm Foo (a,n):

Input: two integers, a and n

Output: ?

k ß 0

b ß 1

while k < n do

k ßk + 1

b  ß b *a

return b

  

5. a. Describe (in pseudo-code) a findAll Elements (k) method of an AVL tree T. It should run in O(logn + s) time where n is the size of T and s is the number of elements returned (i.e., the number of nodes in T whose key is k).

b. Analyze the running time of your algorithm.

[2 marks]

  

Marking Criteria for Assignments

 

You will be awarded full marks if your   answer adequately answers the question addressed.

Total marks = 10

You will be awarded partial marks if your   answer demonstrates:

· Application of the major and   alternative approaches, methods, or algorithms to solve the problem.

· Evidence of appropriate   logic.

· Evidence of correct   computational skills and data structures.

· Inclusion of appropriate   comments or explanations.

For details about how to submit this assignment, refer to the “Assignment Submission Instructions” under the Assignments Overview tab of your course.

Computer Science: Technology and law enforcement

NO PLAGIARISM PLEASE!

Due April 17, 2021 10:00 PM CST

Write a 3-page single-spaced analytical essay to discuss how computer technology assists law enforcement. Structure: introduction, body, conclusion (sum up, what to expect in the future), and references (at least 3 reliable sources).

Address these topics by definition, pros, cons(mostly on privacy and safety of people): Big Data Policing to predict crime, wearable facial recognition devices, and public surveillance cameras.

Formatting:

– 3 pages, single-spaced

– 12 pt font

– MLA citation

– no cover page needed

NO PLAGIARISM PLEASE!

Very Urgent

 

Students will assess actual security breaches and think critically about the cause, impact, continuity, and prevention of these malicious attacks.

In Target’s 2013 holiday data breach and cyber-attack, data belonging to millions of customers was disclosed. The hackers in the Target attack used legitimate credentials to initially enter the system. In 500 words or more, address social engineering and the most likely way the attackers used valid credentials to achieve their hack, and how the rather significant planning failed to protect the company. What elements of a detailed strategic operational plan were missed by Target?

This assignment requires the use of at least two additional scholarly research sources published within the last 5 years. Include at least one in-text citation from each cited source.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

Operation Stop Hack

 

Operation Stop Hack

Introduction

Suppose you have recently responded to your first computer forensic incident. The case in question involves a potential underground hacking ring, which the police, working in conjunction with the Federal Bureau of Investigation (FBI) have been investigating for several years. It has since been determined that an IP address confirms that location, and the identity of one of the suspects. Warrants have been issued for search and seizure of all electronic devices found on the premises.View the setup found in the suspect’s home. Then document your findings and secure all relevant evidence.

Instructions

Write a 2–3 page paper in which you:

  1. Investigate the legal statutes involved in this type of case and outline specific legal consideration to take when collecting evidence.
  2. Pre-plan how to approach the crime scene, documenting the steps and procedures to process the digital evidence.
  3. Analyze the crime scene diagram and document and tag each device that will be collected for evidence, specifying the importance of each device.
  4. Use the Strayer Library to conduct your research. Use no less than three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed and double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides. Citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. 

https://blackboard.strayer.edu/bbcswebdav/institution/SEC/SEC340/200400/Images/suspect_desk.png