4/3 Discussion

  1. Read Chapters 14–17 in your textbook.
  2. Using the discussion link below, respond to the following prompts and questions:
    1. What types of threats can impact operations of the infrastructure? What steps can be taken to protect systems in the infrastructure (server or desktop systems and beyond)?
    2. How can threats from Internet-based activities, such as the use of e-mail and web browsing, be mitigated? What is the responsibility of the user community in mitigating such threats?
  3. Your initial post should be at least 300 words and supported with at least three references.

Flocking Paper

 

Craig Reynold’s work on flocking was a seminal development in animation and distributed behavior modeling. A link to the original paper from 1987 can be found at:

https://www.red3d.com/cwr/papers/1987/boids.html

In this assignment, that will take the place of our first test, you will:

1. Read the paper and summarize the approach.

2. Describe what boids are. How are they modeled?

3. What forces are considered on the boids at each time step?

4. Provide pseudocode that would allow you to simulate such a system.

5. Provide links to 5 example videos that model flocking in 2D and 3D. Include screen shots of the flocking video and a link to the example.

You should submit a report (as a Word document) that is as detailed as possible. This is a topic that you are expected to delve into. Submit your detailed report by the due date posted on Blackboard. No late assignments will be accepted.

Exp19_Excel_AppCapstone_CompAssessment_Manufacturing

 

You have recently become the CFO for Beta Manufacturing, a small cap company that produces auto parts. As you step into your new position, you have decided to compile a report that details all aspects of the business, including: employee tax withholding, facility management, sales data, and product inventory. To complete the task, you will duplicate existing formatting, utilize various conditional logic functions, complete an amortization table with financial functions, visualize data with PivotTables, and lastly import data from another source.

Start   Excel. Download and open the file named Exp19_Excel_AppCapstone_ComprehensiveAssessment- Manufacturing.xlsx. Grader has automatically added your last name   to the beginning of the filename. 

Group all the worksheets in the   workbook and fill the range A1:F1 from the Insurance worksheet across all   worksheets including the formatting. Ungroup the worksheets after the fill is   complete and ensure the Insurance worksheet is active.

Click cell I5, and enter a   function that determines the number of full-time employees, (FT).

Enter a database function in   cell I6 that determines the average salary of all full-time employees with at   least one dependent. Format the results in Accounting Number Format.

Enter a lookup function in cell   E5 that returns the tax deduction amount for the number of dependents listed   in the cell C5. Use   the table in range H13:I17 to complete the function. The maximum deduction is   $500.00; therefore, employees with more than four dependents will receive no   additional deductions.

Use Auto Fill to copy the   function down, completing column E. Be sure to use the appropriate cell   referencing. Format the data in column E with the Accounting Number Format.

Enter a logical function in cell   F5 that calculates employee FICA withholding. If the employee is full-time   and has at least one dependent, then he or she pays 7% of the annual salary   minus any deductions. All other employees pay 5% of the annual salary minus   any deductions. Copy the function down through column F. Format the data in   column F with Accounting Number Format.

Apply conditional formatting to   the range C5:C34   that highlights any dependents that are greater than 3 with Light Red Fill and Dark Red Text.

Click cell H10, and enter an   AVERAGEIFS function to determine the average salary of full-time employees   with at least one dependent. Format the results in Accounting Number Format.

Use Advanced Filtering to   restrict the data to only display full-time employees with at least one   dependent. Place the results in cell A37. Use the criteria in the range   H24:M25 to complete the function.

Ensure that the Facilities   worksheet is active. Use Goal Seek to reduce the monthly payment in cell B6   to the optimal value of $6000. Complete this task by changing the Loan amount in cell E6.

Create the following three   scenarios using Scenario Manager. The scenarios should change the cells B7, B8,   and E6.
 

Good   
  B7 = .0325
  B8 = 5
  E6 = 275000
 

Most   Likely
  B7 = .057
  B8 = 5
  E6 = 312227.32
 

Bad
  B7 = .0700
  B8 = 3
  E6 = 350000
 

  Create a Scenario Summary Report based on the value in cell B6. Format the   new report appropriately.

Ensure that the Facilities   worksheet is active. Enter a reference to the beginning loan balance in cell   B12 and enter a   reference to the payment amount in cell C12

Enter a function in cell D12,   based on the payment and loan details, that calculates the amount of interest   paid on the first payment. Be sure to use the appropriate absolute, relative,   or mixed cell references.

Enter a function in cell E12,   based on the payment and loan details, that calculates the amount of   principal paid on the first payment. Be sure to use the appropriate absolute,   relative, or mixed cell references.

Enter a formula in cell F12 to   calculate the remaining balance after the current payment. The remaining   balance is calculated by subtracting the principal payment from the balance   in column B.

Enter a function in cell G12, based on the payment   and loan details, that calculates the amount of cumulative interest paid on   the first payment. Be sure to use the appropriate absolute, relative, or   mixed cell references.

Enter a function in cell H12,   based on the payment and loan details, that calculates the amount of   cumulative principal paid on the first payment. Be sure to use the   appropriate absolute, relative, or mixed cell references.

Enter a reference to the   remaining balance of payment 1 in cell B13. Use the fill handle to copy the functions created in   the prior steps down to complete the amortization table. 

Ensure the Sales worksheet is   active. Enter a function in cell B8 to create a custom transaction number.   The transaction number should be comprised of the item number listed in cell   C8 combined with the quantity in cell D8 and the first initial of the payment type in cell E8. Use   Auto Fill to copy the function down, completing the data in column B.

Enter a nested function in cell G8 that displays the word Flag if the Payment Type is Credit and the Amount is greater than   or equal to $4000. Otherwise, the function will display a blank cell. Use Auto   Fill to copy the function down, completing the data in column G. 

Create a data validation list in   cell D5 that displays Quantity, Payment Type, and Amount (in that order).

Type the Trans# 30038C in cell B5, and select Quantity from the validation list in   cell D5.

Enter a nested lookup function   in cell F5 that evaluates the Trans # in cell B5 as well as the Category in   cell D5, and returns the results based on the data in the range A8:F32.

Create a PivotTable based on the   range A7:G32. Place the PivotTable in cell I17 on the current worksheet.   Place Payment Type in the Rows box and Amount in the Values box. Format the   Amount with Accounting Number Format.

Insert a PivotChart using the   Pie chart type based on the data. Place the upper-left corner of the chart   inside cell I22. Format the Legend of the chart to appear at the bottom of   the chart area. Format the Data Labels to appear on the Outside end of the   chart.

Insert a Slicer based on Date.   Place the upper-left corner of the Slicer inside cell L8.

Use PowerQuery to connect to the   Access database Exp19_Excel_AppCapstone_Comprehensive_Inventory.accdb.   Load the Inventory table into a new worksheet named Inventory.
 

  Note, Mac users, download and import the delimited Inventory.txt file into a new worksheet named Inventory starting in cell A1.

Create a footer with your name   on the left, the sheet code in the center, and the file name on the right for   each worksheet.

Save the file Exp19_Excel_AppCapstone_ComprehensiveAssessment-   Manufacturing.xlsx. Exit Excel. Submit the file as directed.

Processors, RAM, and Hard Drives

 

Part 1: Microprocessor and Motherboard Compatibility

  • In your own words, discuss how one can determine if a processor is  compatible with a motherboard. Discuss the process of making this  determination. Discuss possible troubleshooting issues that may arise in  the process. Provide examples and supporting evidence where applicable.

Part 2: RAM and Motherboard Compatibility

  • How can you determine if a RAM module is compatible with a  motherboard? Discuss the process of making this determination. Discuss  possible troubleshooting issues that may arise in the process. Provide  examples and supporting evidence where applicable.

Part 3: Hard Drives in the Market

  • With the increase in solid-state drives in the market, traditional  hard drives may soon be obsolete. Explain your reasoning. Using the  Internet and other credible outside sources, research solid-state drives  in the market. From your findings and your prior knowledge, compare and  contrast the differences between solid-state drives and hard drives.  What are the advantages of using solid-state drives instead of hard  drives? Discuss the disadvantages. Do you agree that hard drives may  become obsolete in the near future? Discuss why or why not. You must  include 2 outside sources in your response and be sure to cite your  sources in APA format.

2 Case Studies 1 Book Report and 2 LAB works.

Case Study 7.1

For this project, write a 3 to 4 page paper (not including title and reference page), conduct additional research and come up with a location that you would like to physically infiltrate.  List the areas you would need access to and the methods you would use to get access given the list of different security controls that could be in place.  Also, provide examples of ways you would avoid detection if confronted by someone at the location you are trying to infiltrate.    

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)

Case Study 7.2 

For this project, write a 3 to 4 page paper (not including title and reference page), conduct additional research and come up with a use for Base64 that involves the sending of encrypted letters. List some of the reasons you would need to use Base 64 and the methods you would use to send Base 64 messages  Also, provide examples of ways you would avoid detection if confronted by someone who gained access to your Base 64 encrypted letters..    

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)

Book Report for Chapters 7, 8, 9, and 10

Each week you will write and submit a book report. The book report will include a review of chapters 7, 9, and 10 of the book. 

Writing Requirements

  • 3 pages in length
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.

Lab # 7-1 Base 64 Encoding and Decoding

This lab will familiarize the student with the use of Base 64 Encoding. The student will create a text file using one of the file editors (Nano, Vi, or Emacs), then the student will encode the file using base 64. The student will then save the encoded file to a test file.  Once the file is encoded the student will then decode the using the base 64 decode command.

Then the student will write a report on the process of base 64 encoding and decoding  

Lab # 7-2 Base 64 Encoding and Decoding (Scripting)

This lab will allow the student to create a script that will run the base 64 coder command “n” number of times and then allow for decoding “n” number of times upon request.

Then the student will write a report on the process of base 64 encoding and decoding using a script

Security Semir

 

As an information security professional, you will often be called deal with security threats that impact the organization on an ongoing basis, and to provide guidance to multiple organizational units on ways to recognize, cope with, and avoid these threats.  In this assignment, you will research in detail an attack type or threat assigned by your instructor.  As a project group you will develop a mini-training course on your assigned topic and deliver that training to the class.

Deliverables for this assignment include (but aren’t limited to):

  • A white paper on your assigned threat/attack.  The paper will provide:
    1. A description of the threat/attack method, including the types of attacks performed (DoS, Access, etc).  There are multiple versions of many attacks, so you should go over the major forms/groupings.
    2. A description of how the attack is performed. (What elements in the network are being attacked, tools used, vulnerability being exploited)
    3. Attack signature for inclusion in an organizational Incident Response Plan (How would we recognize the attack on our systems?)
    4. Faulty practices (programming, design, training, etc.) that enable the threat/attack
    5. Industry Best Practices for avoiding or mitigating the risk of this threat or attack form
    6. References for further study (Technical and Cases)
  • 5 multiple choice and 1 essay question with grading rubric for use as part of the unit exam

Everyone must turn in a peer evaluation using the peer-evaluation form provided by the due date posted on Moodle.  Use form and link provided in this assignment cluster to turn in your evaluation.  Group peer evaluations will count 10% of the assignment.  Failure to turn in an evaluation will result in a grade of 0 for that component of the assignment. 

The white paper must: use APA format, use 12 point Courier or New-Courier font, be a minimum of 15 double spaced pages (excluding bibliography and graphics).  Papers should use at least 10 references.

 

2 Discussions 1 Weekly summary and 1 Case Study

Discussion 6.1

Read the following scenario and provide provide a viable resolution  based on FMLA.

One of your nurses, Betty, displayed signs of depression, such as crying openly at work in front of staff and residents. One of her co-workers even reported to the nursing home’s administrator that Betty was becoming increasingly depressed and being overworked to the point of exhaustion. Betty became ill with diarrhea after her three consecutive shift days and called in sick for two days. On the second day, Betty informed her boss that she was also experiencing vomiting and chest pains, and was going to see her physician. The physician diagnosed Betty with clinical depression, prescribed Prozac, and advised her to take a medical leave of absence from work for two months.

Betty advised her boss that her doctor told her to stay home for two months. Betty did not disclose her clinical diagnosis, did not ask for Family and Medical Leave Act (FMLA) leave, and did not ask for leave as a reasonable accommodation under the Americans with Disabilities Act (ADA). Betty’s boss required her to produce a medical certification from her physician regarding her condition. Betty indicated that her physician was away for the holidays and would not be back for three weeks.

Two weeks later, Betty received a termination letter stating that she was being fired for failing to submit a medical certificate within 15 days of requesting leave. As a result, her leave request was being denied and her failure to come to work was being deemed a voluntary resignation.

This story was brought to your attention as the HR professional after Betty’s termination letter was sent. Now what? Remember that your resolution must be based on FMLA guidelines.

************************

In order to get a full grade, 

1) please make sure that your initial post is at least 150 – 200 words in length

Discussion 6.2

An unhealthy work environment can lower productivity, contribute to low morale, and increase medical and workers’ compensation costs. Consider ways to improve the work environment.

Case Study 6.1 4 Pages

There are two (2) case studies per chapter. You are to respond to one (1) case from Chapter 11 and one (1) case study from Chapter 12.

Chapter 11 Employee Benefit (Choose one case study)

Case Study 1 – Adobe’s Family-Friendly Benefits: An Unexpected Backlash, pg. 450 and answer the questions

Case Study 2 – Evaluate the Work-Life Climate in Your Company. pg. 451 and answer the questions

Chapter 12 Promoting Safety and Health (Choose one case study)

Case Study 1 – Rambo Goes Violent, pg. 490 and answer the questions

Case Study 2 – Too Much Fatigue and Stress? You Decide, pg. 491 and answer the questions

Weekly Summary 6.1

Write 2 pages of weekly summary based on the chapter 11 and 12 PPT attached.

introduction to data science

  

In this project you will investigate the impact of a number of automobile engine factors on the vehicle’s mpg. The dataset auto-mpg.csv contains information for 398 different automobile models. Information regarding the number of cylinders, displacement, horsepower, weight, acceleration, model year, origin, and car name as well as mpg are contained in the file. 

Perform some initial analysis and create visualizations using Tableau Public (reference will be available in week 9).

Create some visual plots and charts describing the data and information it is trying to give out.

Using the first 300 samples in the auto-mpg.csv, run a simple linear regression and multiple linear regression to determine the relationship between mpg and appropriate independent variable/(s).  Report all the appropriate information regarding your regression.

1) Multiple R-squared

2) Adjusted R-squared

3) Complete Linear Regression equation

Maintain a log of above values for all models.

For the remaining 98 samples in the dataset, use your best linear model(s) to predict each automobile’s mpg and report how your predictions compare to the car’s actual reported mpg.  

1) Residual Plot

2) Histogram.

As a part of submission, share the code and report explaining the research. You can submit your code by compiling the report on RStudio. Directions to save complete code on word / PDF file is as below.

RStudio -> File -> Knit Document / Compile Report -> Save as Word / PDF.

Intro to Information systems -2

 

Week 2 Assignment. Include these topics in your paper:

People sometimes refer to the Internet and the World Wide Web as the same thing. There is a relationship between the two, but they are different.

  1. Describe a computer network, the Internet, and the Web. How is the Web related to the Internet?
  2. Describe how the Internet and Web support global e-commerce and other aspects of our lives.