computer word

  1. Change user name and initials.
    1. Open the Word Preferences dialog box .
    2. In the User Information area, type your first and last name in the Name text box and your first and last initials in lowercase letters in the Initials text box.
    3. Check the Always use these values regardless of sign in to Office box and close the Word Options dialog box.
  2. Change Display for Review view, review and delete a comment, and turn on Track Changes.
    1. Change the Display for Review view to All Markup and review tracked changes in the document.
    2. Read the comment on the first page and then delete the comment.
    3. Accept All Changes in the document and stop tracking changes.
  3. Change the left and right margins to 1″. NOTE: Mac users if you receive a message saying the margins are out of the printable area, click the Ignore button.
  4. Apply styles to the title and headings.
    1. Apply the Title style to the title on the first page.
    2. Apply the Heading 1 style to all the bold headings.
    3. Apply the Heading 2 style to all the underlined headings.
    4. Apply the Heading 3 style to all the italicized headings.
  5. Insert and customize footnotes.
    1. Insert a footnote after the “Skiing Procedures” heading on the first page.
    2. Type Skiing procedures vary depending on the clients’ needs. as the footnote text.
    3. Insert a footnote after the “Guiding Techniques” heading on the second page.
    4. Type A minimum of two guides is required for all clients. as the footnote text.
    5. Change the footnote Number format to A, B, C and change Numbering to Continuous.
  6. Insert a custom table of contents.
    1. Place your insertion point at the beginning of the document and insert a page break.
    2. Type Table of Contents on the first line on the new first page and press Enter.
    3. Apply the Title style to “Table of Contents” on the new first page.
    4. Place the insertion point on the blank line below the “Table of Contents” heading and before the page break.
    5. Insert a Custom Table of Contents, use Fancy format, show 2 levels of headings, show page numbers, right align page numbers, and do not include a tab leader. HINT: Click the Table of Contents button and then select Custom Table of Contents… to insert the Custom Table of Contents.
  7. Insert header and footer.
    1. Edit the header on the first page (table of contents) and insert a right-aligned Page Number at the top of page.
    2. If necessary, remove the blank line below the page numbers.
    3. Go to the footer on the same page and insert the Title document property field on the left. Use the right arrow key to deselect the document property field.
    4. Press Tab two times and insert the Company field on the right.
    5. Bold the text in the footer and close the footer.
  8. Insert page breaks to keep headings with the text below.
    1. Insert a page break before the “Beginning Wedge Christie Turns” heading (page 4).
    2. Insert a page break before the “Introduction to Equipment” heading (page 5).
  9. Insert and modify a cover page.
    1. Insert the Facet cover page.
    2. Delete the Subtitle field.
    3. Place the insertion point on the blank line between the Title and Abstract fields and insert the Company document property field.
    4. Delete all other fields on the cover page.
    5. Select the Company document property field, change the font size to 20 pt, apply bold formatting, and change the text color to the fourth color in the first row of the Theme Colors (Blue-Gray, Text 2).
  10. Update the entire table of contents

SNAP stands for

  

1. SNAP stands for______________ .

2. The ability of FDDI and other high-availability fiber networks to wrap connections on either side of a break is due to the dual _______________ rings.

3. Which of the following is a cell-based protocol?

4. Given a small local area network of 10 systems, what is the best device, where best is best performance without additional unneeded functionality, to connect all 10 systems to each other. Assume that all of the systems need to transfer large files frequently between each other, but that there is no need for external access/communication outside of the LAN.

5. Given an analog signal with the highest frequencies at slightly below 5KHz, what would be the best sampling frequency, where best means the lowest sampling frequency that will still accurately allow the original signal to be regenerated.

6. The three key public network components are____________________, 

Section 2 Please answer all question in detail and in your own words.

What is a collision on an Ethernet network? What happens in the case of a collision?

Describe 5 network topologies (briefly) and give an advantage and a disadvantage for each.

Describe what a VLAN is. How is this useful for a geographically dispersed company? What advantage to the end user does this provide?

Mid-term (E-commerse)

2-3 pages

*NO Plagiarism*

1. Explain the advantages and disadvantages of e-commerce versus regular commerce.  Elaborate on your answers.

2. Research and compare the trend of e-commerce versus regular commerce in US since 2010.  You need to show this trend graphically using Excel or other tools.

3. Explain the purpose of MIS and give at least threeapplications where MIS can be used to benefit the business.

4. Identify and discuss ethical issues related to e-commerce.  Please elaborate and give some examples.

5. Amazon has been able to set an example of a near ideal online business. Other businesses including Walmart,which is still the largest retailer in the World, have been concerned about Amazon’s rapid growth in the market share.  In your opinion, will other businesses including Home Depot, Walmart, Best Buy, and others do to be able to survive and stay competitive with Amazon.

b.com help

 

M6 Assignment

The M6 Assignment will have two parts.

Part One requires you to create guidelines for communicating effectively using social media. You will research what different organizations have created and also review what your own organization has created to ensure that employees follow the professional guidelines for communicating through social media on behalf of the organization. Your guidelines will be written in a report-style to your company’s CEO. If you are not currently employed, you can create a mock company in which to use for this assignment. Your report will be a minimum of two pages. Please include a cover page and a reference page with your report submission. You should use a minimum of four sources with APA formatting.

Part Two requires you to consider your own digital footprint and how your actions online will impact your professional career. You will create a PowerPoint presentation that includes the following elements:

  1. Discussion of which social media platforms you use and for what purposes.
  2. Discussion of how social media impacts one’s ability to be hired by a company.
  3. Discussion of what type of digital footprint you will create for yourself.

The PPT presentation should be a minimum of 10 content slides (not including the cover slide or the reference slide). Include either speaker notes in the “”notes”” section in the slides or record audio on each slide. A minimum of two sources are required. Use APA formatting for all sources.

When you are ready to submit your slides and script, you must save your slides in a format with the slides on the top of a page, with the accompanying notes (your script) beneath each slide, as seen below.

Research Paper

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

  • Computer and email acceptable use policy
  • Internet acceptable use policy
  • Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.  

Include at least 3 scholarly references in addition to the course textbook.  The UC Library is a good place to find these references. At least two of the references cited need to be peer-reviewed scholarly journal articles from the library.

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Tracking a Route

 Tracing a Route 

Overview: 

In this assignment, you will use a command line interface to execute a network command that can help to diagnose system or network problems. You will then discuss the basics of internal and external network IP addressing. Instructions: Think of a website you visit frequently. Go to your computer’s command line interface and use the route tracing command for your platform to trace the route from your computer to that website. 

• For Mac users, use the Terminal utility. For Windows users, use cmd, or Command Prompt. 

• Take a screenshot of your route results. 

• Investigate the IP address for the first three hops in your route. Who “owns” them? 

• Discuss these first three hops, and why they are the first three for your computer/network. Requirements: • Submit a Word document in APA format.

 • Two – three pages in length. Be sure to read the criteria below by which your work will be evaluated before you write and again after you write. 

Discussions and Research paper

Discussion 1:

  Discuss  the challenges that incident handlers face in identifying incidents  when resources have been moved to a cloud environment.   Follow  up your discussion with a recent article discussing a company who has  begun utilizing a cloud environment and what challenges they may  face.  Make sure to cite the article.   ***Standard for all discussion posts:   Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:    

  • Ask an interesting, thoughtful question pertaining to the topic 
  • Answer a question (in detail) posted by another student or the instructor 
  • Provide extensive additional information on the topic 
  • Explain, define, or analyze the topic in detail 
  • Share an applicable personal experience 
  • Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA 7) 
  • Make an argument concerning the topic 

At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post.  

Discussion 2:

 You can get a basic understanding if  individuals are being held accountable for adherence to security  policies by examining policy violations, incidents, and security  awareness. These basic measurements are as follows: 

  • Number of security violations by employees reported
  • Number of incidents that could have been avoided
  • Completion and competency rate for security awareness

Answer the following question(s): 

  1. Are there other ways to measure  accountability for adherence to security policies? If yes, provide an  example. If not, explain your answer.

Fully address the questions in this  discussion; provide valid rationale for your choices, where applicable;  and respond to at least two other students’ views. 

Research Paper:

  When  law enforcement becomes involved, the need may arise to freeze systems  as part of the evidence. There is also the likelihood that the incident  will become known publicly. Do you think these issues play a significant  part in the decision to involve law enforcement? Why or why not? Can  you name some situations in which you believe that large organizations  have decided not to involve law enforcement?    ***Standard for all Research Assignments   Your paper should meet the following requirements:   

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support  your answers with the readings from the course and at least two  scholarly journal articles to support your positions, claims, and  observations, in addition to your textbook. The UC Library is a great  place to find resources.
  • Be  clearly and well-written, concise, and logical, using excellent grammar  and style techniques. You are being graded in part on the quality of  your writing.

Assignment:

Please see attachment.

Problem 2- Planning

Problem

1. Identify a major public infrastructure project that is either underway, complete, or proposed in your region. This could be a bridge, road, building, or something of that nature. For the project you have identified, think of as many stakeholders and stakeholder groups as you can. Create a three-column table. In column 1, list the stakeholders. In column 2, list what each stakeholder wants to get from the project. In column 3, list the influence each stakeholder has over the project.
2. How can the stakeholders change over the course of a project? Give examples of changes in who the stakeholders are, and also in how their interests or influence over the project might change throughout the term of the project.

Text

Title: Project Management Subtitle: https://opentextbc.ca/projectmanagement/ Authors: Adrienne Watt Publisher: BCcampus Open Education Publication Date: 2019 Edition: 2nd Edition 

Exp19_PowerPoint_Ch01_ML1_Time_Management

  

Exp19_PowerPoint_Ch01_ML1_Time_Management

Exp19 PowerPoint Ch01 ML1 Time Management

PowerPoint Chapter 1 Mid – Level 1 Time Management 

  

Project Description:

You belong to a student organization on campus that has asked you to put together a presentation on time management. You created a presentation with some basic content for a school project you will use as starting point. You want to modify the presentation to make it more appealing and better portray the message.

     

Start PowerPoint.   Download and open the file named Exp19_PPT_Ch01_ML1_TimeManagement.pptx.   Grader has automatically added your last name to the beginning of the   filename.

 

Apply the Gallery   theme and change the variant to the second variant.

 

Change the theme   colors to Aspect and the theme fonts to Corbel.

 

Add the title Time   Management   in the title placeholder. Type Use Your Time Wisely in the subtitle   placeholder.

 

If you want to use   slides from another presentation, the Reuse Slides features saves   considerable time, as you do not have to copy and paste slides from another   presentation.
 

  Use the Reuse Slides feature to add all slides from Time.pptx into the open presentation. Preserve the order of the   slides. Ensure the Use source formatting or Keep source formatting check box   is not selected so that the inserted slides take on the design and formatting   of the open presentation.

 

Delete Slide 2. Move   Slide 3 so that it becomes Slide 2.

 

Click Slide 5 and add   a new slide. Change the slide layout to Content with Caption on the newly   inserted slide. In the top left placeholder, type What’s Stealing Your Time? (including the ?   mark). Increase the font size of the text to 44 pt and apply Bold.
 

  Click the bottom placeholder and type Identify aspects of your   personal management that need to improve! Increase the font size of the   text to 24 pt.

 

Images can be used to   enhance a presentation and better portray your message.
 

  On the newly created slide (slide 6), insert the Steal.jpg image in the content placeholder on the right. Change   the width of the image to 6.3″

 

Apply the Bevel   Perspective Left, White picture style. Change the Picture Border to Tan,   Background 2. Set the horizontal position of the image to 4.8″ and the vertical   position to 1.5 “.

 

Change the layout of   Slide 4 to Title and Content. Insert the TimeMarches.jpg   image in the content placeholder. Crop the top and bottom of the image so   that most of the white area is removed. Change the width of the image to 7.9″

 

Apply the Moderate   Frame, White picture style. Change the Picture Border to Tan, Background 2.   Set the Horizontal position of the image to 2.7″ and the Vertical   position to 2.5″.

 

SmartArt allows you   to communicate information visually with graphics instead of just using text.
 

  On Slide 5, convert the list to a Vertical Box List SmartArt graphic.

 

On Slide 3, convert   the list to a Basic Block List SmartArt graphic.

 

Check the   presentation for spelling errors. Make corrections as needed on the slides   and notes.

 

To help you prepare   and deliver your presentation you will add speaker notes.
 

  Type the following speaker note on Slide 6: To better manage your time it   will be important to identify aspects of your personal management that may   need to improve. 

 

Save and close Exp19_PPT_Ch01_ML1_TimeManagement.pptx.   Submit the file as directed.

summary

write a short assessment of the maintainability of the software. What did the original programmers do that made it hard to change the software? What did the original programmers do that made it easy to change the software? What would you do differently if you did it again?