- Read Chapters 14–17 in your textbook.
- Using the discussion link below, respond to the following prompts and questions:
- What types of threats can impact operations of the infrastructure? What steps can be taken to protect systems in the infrastructure (server or desktop systems and beyond)?
- How can threats from Internet-based activities, such as the use of e-mail and web browsing, be mitigated? What is the responsibility of the user community in mitigating such threats?
- Your initial post should be at least 300 words and supported with at least three references.
Flocking Paper
Craig Reynold’s work on flocking was a seminal development in animation and distributed behavior modeling. A link to the original paper from 1987 can be found at:
https://www.red3d.com/cwr/papers/1987/boids.html
In this assignment, that will take the place of our first test, you will:
1. Read the paper and summarize the approach.
2. Describe what boids are. How are they modeled?
3. What forces are considered on the boids at each time step?
4. Provide pseudocode that would allow you to simulate such a system.
5. Provide links to 5 example videos that model flocking in 2D and 3D. Include screen shots of the flocking video and a link to the example.
You should submit a report (as a Word document) that is as detailed as possible. This is a topic that you are expected to delve into. Submit your detailed report by the due date posted on Blackboard. No late assignments will be accepted.
Exp19_Excel_AppCapstone_CompAssessment_Manufacturing
You have recently become the CFO for Beta Manufacturing, a small cap company that produces auto parts. As you step into your new position, you have decided to compile a report that details all aspects of the business, including: employee tax withholding, facility management, sales data, and product inventory. To complete the task, you will duplicate existing formatting, utilize various conditional logic functions, complete an amortization table with financial functions, visualize data with PivotTables, and lastly import data from another source.
Start Excel. Download and open the file named Exp19_Excel_AppCapstone_ComprehensiveAssessment- Manufacturing.xlsx. Grader has automatically added your last name to the beginning of the filename.
Group all the worksheets in the workbook and fill the range A1:F1 from the Insurance worksheet across all worksheets including the formatting. Ungroup the worksheets after the fill is complete and ensure the Insurance worksheet is active.
Click cell I5, and enter a function that determines the number of full-time employees, (FT).
Enter a database function in cell I6 that determines the average salary of all full-time employees with at least one dependent. Format the results in Accounting Number Format.
Enter a lookup function in cell E5 that returns the tax deduction amount for the number of dependents listed in the cell C5. Use the table in range H13:I17 to complete the function. The maximum deduction is $500.00; therefore, employees with more than four dependents will receive no additional deductions.
Use Auto Fill to copy the function down, completing column E. Be sure to use the appropriate cell referencing. Format the data in column E with the Accounting Number Format.
Enter a logical function in cell F5 that calculates employee FICA withholding. If the employee is full-time and has at least one dependent, then he or she pays 7% of the annual salary minus any deductions. All other employees pay 5% of the annual salary minus any deductions. Copy the function down through column F. Format the data in column F with Accounting Number Format.
Apply conditional formatting to the range C5:C34 that highlights any dependents that are greater than 3 with Light Red Fill and Dark Red Text.
Click cell H10, and enter an AVERAGEIFS function to determine the average salary of full-time employees with at least one dependent. Format the results in Accounting Number Format.
Use Advanced Filtering to restrict the data to only display full-time employees with at least one dependent. Place the results in cell A37. Use the criteria in the range H24:M25 to complete the function.
Ensure that the Facilities worksheet is active. Use Goal Seek to reduce the monthly payment in cell B6 to the optimal value of $6000. Complete this task by changing the Loan amount in cell E6.
Create the following three scenarios using Scenario Manager. The scenarios should change the cells B7, B8, and E6.
Good
B7 = .0325
B8 = 5
E6 = 275000
Most Likely
B7 = .057
B8 = 5
E6 = 312227.32
Bad
B7 = .0700
B8 = 3
E6 = 350000
Create a Scenario Summary Report based on the value in cell B6. Format the new report appropriately.
Ensure that the Facilities worksheet is active. Enter a reference to the beginning loan balance in cell B12 and enter a reference to the payment amount in cell C12.
Enter a function in cell D12, based on the payment and loan details, that calculates the amount of interest paid on the first payment. Be sure to use the appropriate absolute, relative, or mixed cell references.
Enter a function in cell E12, based on the payment and loan details, that calculates the amount of principal paid on the first payment. Be sure to use the appropriate absolute, relative, or mixed cell references.
Enter a formula in cell F12 to calculate the remaining balance after the current payment. The remaining balance is calculated by subtracting the principal payment from the balance in column B.
Enter a function in cell G12, based on the payment and loan details, that calculates the amount of cumulative interest paid on the first payment. Be sure to use the appropriate absolute, relative, or mixed cell references.
Enter a function in cell H12, based on the payment and loan details, that calculates the amount of cumulative principal paid on the first payment. Be sure to use the appropriate absolute, relative, or mixed cell references.
Enter a reference to the remaining balance of payment 1 in cell B13. Use the fill handle to copy the functions created in the prior steps down to complete the amortization table.
Ensure the Sales worksheet is active. Enter a function in cell B8 to create a custom transaction number. The transaction number should be comprised of the item number listed in cell C8 combined with the quantity in cell D8 and the first initial of the payment type in cell E8. Use Auto Fill to copy the function down, completing the data in column B.
Enter a nested function in cell G8 that displays the word Flag if the Payment Type is Credit and the Amount is greater than or equal to $4000. Otherwise, the function will display a blank cell. Use Auto Fill to copy the function down, completing the data in column G.
Create a data validation list in cell D5 that displays Quantity, Payment Type, and Amount (in that order).
Type the Trans# 30038C in cell B5, and select Quantity from the validation list in cell D5.
Enter a nested lookup function in cell F5 that evaluates the Trans # in cell B5 as well as the Category in cell D5, and returns the results based on the data in the range A8:F32.
Create a PivotTable based on the range A7:G32. Place the PivotTable in cell I17 on the current worksheet. Place Payment Type in the Rows box and Amount in the Values box. Format the Amount with Accounting Number Format.
Insert a PivotChart using the Pie chart type based on the data. Place the upper-left corner of the chart inside cell I22. Format the Legend of the chart to appear at the bottom of the chart area. Format the Data Labels to appear on the Outside end of the chart.
Insert a Slicer based on Date. Place the upper-left corner of the Slicer inside cell L8.
Use PowerQuery to connect to the Access database Exp19_Excel_AppCapstone_Comprehensive_Inventory.accdb. Load the Inventory table into a new worksheet named Inventory.
Note, Mac users, download and import the delimited Inventory.txt file into a new worksheet named Inventory starting in cell A1.
Create a footer with your name on the left, the sheet code in the center, and the file name on the right for each worksheet.
Save the file Exp19_Excel_AppCapstone_ComprehensiveAssessment- Manufacturing.xlsx. Exit Excel. Submit the file as directed.
Processors, RAM, and Hard Drives
Part 1: Microprocessor and Motherboard Compatibility
- In your own words, discuss how one can determine if a processor is compatible with a motherboard. Discuss the process of making this determination. Discuss possible troubleshooting issues that may arise in the process. Provide examples and supporting evidence where applicable.
Part 2: RAM and Motherboard Compatibility
- How can you determine if a RAM module is compatible with a motherboard? Discuss the process of making this determination. Discuss possible troubleshooting issues that may arise in the process. Provide examples and supporting evidence where applicable.
Part 3: Hard Drives in the Market
- With the increase in solid-state drives in the market, traditional hard drives may soon be obsolete. Explain your reasoning. Using the Internet and other credible outside sources, research solid-state drives in the market. From your findings and your prior knowledge, compare and contrast the differences between solid-state drives and hard drives. What are the advantages of using solid-state drives instead of hard drives? Discuss the disadvantages. Do you agree that hard drives may become obsolete in the near future? Discuss why or why not. You must include 2 outside sources in your response and be sure to cite your sources in APA format.
2 Case Studies 1 Book Report and 2 LAB works.
Case Study 7.1
For this project, write a 3 to 4 page paper (not including title and reference page), conduct additional research and come up with a location that you would like to physically infiltrate. List the areas you would need access to and the methods you would use to get access given the list of different security controls that could be in place. Also, provide examples of ways you would avoid detection if confronted by someone at the location you are trying to infiltrate.
Writing Requirements
- 3-4 pages in length (excluding cover page, abstract, and reference list)
Case Study 7.2
For this project, write a 3 to 4 page paper (not including title and reference page), conduct additional research and come up with a use for Base64 that involves the sending of encrypted letters. List some of the reasons you would need to use Base 64 and the methods you would use to send Base 64 messages Also, provide examples of ways you would avoid detection if confronted by someone who gained access to your Base 64 encrypted letters..
Writing Requirements
- 3-4 pages in length (excluding cover page, abstract, and reference list)
Book Report for Chapters 7, 8, 9, and 10
Each week you will write and submit a book report. The book report will include a review of chapters 7, 9, and 10 of the book.
Writing Requirements
- 3 pages in length
- APA format, Use the APA template located in the Student Resource Center to complete the assignment.
Lab # 7-1 Base 64 Encoding and Decoding
This lab will familiarize the student with the use of Base 64 Encoding. The student will create a text file using one of the file editors (Nano, Vi, or Emacs), then the student will encode the file using base 64. The student will then save the encoded file to a test file. Once the file is encoded the student will then decode the using the base 64 decode command.
Then the student will write a report on the process of base 64 encoding and decoding
Lab # 7-2 Base 64 Encoding and Decoding (Scripting)
This lab will allow the student to create a script that will run the base 64 coder command “n” number of times and then allow for decoding “n” number of times upon request.
Then the student will write a report on the process of base 64 encoding and decoding using a script
Assignment # 0792la3
Cleaning Data Homework
Security Semir
As an information security professional, you will often be called deal with security threats that impact the organization on an ongoing basis, and to provide guidance to multiple organizational units on ways to recognize, cope with, and avoid these threats. In this assignment, you will research in detail an attack type or threat assigned by your instructor. As a project group you will develop a mini-training course on your assigned topic and deliver that training to the class.
Deliverables for this assignment include (but aren’t limited to):
- A white paper on your assigned threat/attack. The paper will provide:
- A description of the threat/attack method, including the types of attacks performed (DoS, Access, etc). There are multiple versions of many attacks, so you should go over the major forms/groupings.
- A description of how the attack is performed. (What elements in the network are being attacked, tools used, vulnerability being exploited)
- Attack signature for inclusion in an organizational Incident Response Plan (How would we recognize the attack on our systems?)
- Faulty practices (programming, design, training, etc.) that enable the threat/attack
- Industry Best Practices for avoiding or mitigating the risk of this threat or attack form
- References for further study (Technical and Cases)
- 5 multiple choice and 1 essay question with grading rubric for use as part of the unit exam
Everyone must turn in a peer evaluation using the peer-evaluation form provided by the due date posted on Moodle. Use form and link provided in this assignment cluster to turn in your evaluation. Group peer evaluations will count 10% of the assignment. Failure to turn in an evaluation will result in a grade of 0 for that component of the assignment.
The white paper must: use APA format, use 12 point Courier or New-Courier font, be a minimum of 15 double spaced pages (excluding bibliography and graphics). Papers should use at least 10 references.
2 Discussions 1 Weekly summary and 1 Case Study
Discussion 6.1
Read the following scenario and provide provide a viable resolution based on FMLA.
One of your nurses, Betty, displayed signs of depression, such as crying openly at work in front of staff and residents. One of her co-workers even reported to the nursing home’s administrator that Betty was becoming increasingly depressed and being overworked to the point of exhaustion. Betty became ill with diarrhea after her three consecutive shift days and called in sick for two days. On the second day, Betty informed her boss that she was also experiencing vomiting and chest pains, and was going to see her physician. The physician diagnosed Betty with clinical depression, prescribed Prozac, and advised her to take a medical leave of absence from work for two months.
Betty advised her boss that her doctor told her to stay home for two months. Betty did not disclose her clinical diagnosis, did not ask for Family and Medical Leave Act (FMLA) leave, and did not ask for leave as a reasonable accommodation under the Americans with Disabilities Act (ADA). Betty’s boss required her to produce a medical certification from her physician regarding her condition. Betty indicated that her physician was away for the holidays and would not be back for three weeks.
Two weeks later, Betty received a termination letter stating that she was being fired for failing to submit a medical certificate within 15 days of requesting leave. As a result, her leave request was being denied and her failure to come to work was being deemed a voluntary resignation.
This story was brought to your attention as the HR professional after Betty’s termination letter was sent. Now what? Remember that your resolution must be based on FMLA guidelines.
************************
In order to get a full grade,
1) please make sure that your initial post is at least 150 – 200 words in length
Discussion 6.2
An unhealthy work environment can lower productivity, contribute to low morale, and increase medical and workers’ compensation costs. Consider ways to improve the work environment.
Case Study 6.1 4 Pages
There are two (2) case studies per chapter. You are to respond to one (1) case from Chapter 11 and one (1) case study from Chapter 12.
Chapter 11 – Employee Benefit (Choose one case study)
Case Study 1 – Adobe’s Family-Friendly Benefits: An Unexpected Backlash, pg. 450 and answer the questions
Case Study 2 – Evaluate the Work-Life Climate in Your Company. pg. 451 and answer the questions
Chapter 12 – Promoting Safety and Health (Choose one case study)
Case Study 1 – Rambo Goes Violent, pg. 490 and answer the questions
Case Study 2 – Too Much Fatigue and Stress? You Decide, pg. 491 and answer the questions
Weekly Summary 6.1
Write 2 pages of weekly summary based on the chapter 11 and 12 PPT attached.
introduction to data science
In this project you will investigate the impact of a number of automobile engine factors on the vehicle’s mpg. The dataset auto-mpg.csv contains information for 398 different automobile models. Information regarding the number of cylinders, displacement, horsepower, weight, acceleration, model year, origin, and car name as well as mpg are contained in the file.
Perform some initial analysis and create visualizations using Tableau Public (reference will be available in week 9).
Create some visual plots and charts describing the data and information it is trying to give out.
Using the first 300 samples in the auto-mpg.csv, run a simple linear regression and multiple linear regression to determine the relationship between mpg and appropriate independent variable/(s). Report all the appropriate information regarding your regression.
1) Multiple R-squared
2) Adjusted R-squared
3) Complete Linear Regression equation
Maintain a log of above values for all models.
For the remaining 98 samples in the dataset, use your best linear model(s) to predict each automobile’s mpg and report how your predictions compare to the car’s actual reported mpg.
1) Residual Plot
2) Histogram.
As a part of submission, share the code and report explaining the research. You can submit your code by compiling the report on RStudio. Directions to save complete code on word / PDF file is as below.
RStudio -> File -> Knit Document / Compile Report -> Save as Word / PDF.
Intro to Information systems -2
Week 2 Assignment. Include these topics in your paper:
People sometimes refer to the Internet and the World Wide Web as the same thing. There is a relationship between the two, but they are different.
- Describe a computer network, the Internet, and the Web. How is the Web related to the Internet?
- Describe how the Internet and Web support global e-commerce and other aspects of our lives.