Discussion help

 Please read the Journal Article in this Content Folder called “IT Doctoral Students with Completing Their Dissertations”. Create an initial post that shares your thoughts about what the major challenges are with pursuing a Ph.D. 

Note – uploaded the document.

week 4 discussion

 Operation Security 

Three case studies and examples are presented about actual exploited risks.  Choose one of the case studies and describe the risk that was exploited.  Also,  tell how you think that exploit could be avoided using proper technology and security policies.  

Your main post needs to be at least 300 words.

-No plagiarism

-References   

Paper

 List possible training requirements for an SaaS solution integration, a PaaS application migration, and an IaaS application migration.

List and describe budget considerations one should evaluate before moving an application to the cloud.

questions

1. List and briefly describe the nine-step process in con-ducting a neural network project. (850 Words)

operations security 6

 

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Images

Excel 2019 In Practice – Ch 7 Independent Project 7-6

 

The Hamilton Civic Center is developing a template for member exercise and off-site seminars. You create the template, set validation, enter formulas, and insert a combo box control. You then create a new workbook from the template.

[Student Learning Outcomes 7.1, 7.2, 7.3, 7.4, 7.6]

File Needed: HamiltonCC-07.xlsx (Available from the Start File link.)

Completed Project File Names: [your name]-HamiltonCC-07.xlsx

Skills Covered in This Project

  • Set data validation to use a list.
  • Set validation to restrict dates.
  • Create an error alert message.
  • Insert a combo box control.
  • Check accessibility and add alt text.
  • Protect a worksheet.
  1. Open the HamiltonCC-07 workbook and click the Enable Editing button. The file will be renamed automatically to include your name.
  2. Select cell D2 on the Data sheet and review the formula. The formula divides calories by time and rounds the results to three decimal places.ImagesFigure 7-69 Custom format for values
  3. Select cells D2:D10 and open the Format Cells dialog box.
  4. Select the Custom category on the Number tab and build a format to display three decimal places (Figure 7-69).
  5. Select cell D2 and click the Format Painter button [Home tab, Clipboard group]. Click the Calorie Tracking tab and paint the format to cells E3:E33.ImagesFigure 7-70 VLOOKUP formula
  6. Select cell E3 on the Calorie Tracking sheet. Start a VLOOKUP function to lookup the label in cell C3. For the array, use an absolute reference to cells A2:D10 on the Data sheet. The Col_index_num is 4 for the calories per minute column. Leave the Range_lookup argument empty; the array (A2:D10) is sorted in ascending order. The result of the VLOOKUP formula is calories per minute for the exercise (Figure 7-70).
  7. Edit the formula in cell E3 to multiply the results by the number of minutes in cell D3.
  8. Copy the formula in cell E3 to cells E4:E33. The #N/A error message displays in rows where no data displays.
  9. Select cells C3:C33 and set data validation to use the list of activity names on the Data sheet. Do not use an input message or an error alert.
  10. Select the Calorie Tracking sheet and delete the data in cells A3:D23.ImagesFigure 7-71 Data validation for dates
  11. Select cells B3:B33 and set data validation to use a Date that is less than or equal to TODAY (Figure 7-71). Include a Stop error alert with a title of Check Date and a message of Date must be today or in the past. including the period.
  12. Select cells A3:D33 and remove the Locked cell property. Select cell A3 to position the insertion point.
  13. Display the Developer tab on the Ribbon and click the Data worksheet tab.ImagesFigure 7-72 Combo box settings
  14. Draw a combo box control to cover cell F8 and open its Format Control dialog box. Select cells G8:G11 for the Input range and type f8 in the Cell link box (Figure 7-72).
  15. Deselect the control and then select Second from the control. The linked cell is under the control and hidden from view.
  16. Click the Hospital Seminars tab and select cell D4. This cell has Center Across Selection alignment applied.
  17. Select cell D4 and use CONCAT and INDEX to display the result from the combo box, concatenating the Index results to the word “Quarter.”
    1. Start a CONCAT function [Text group].
    2. Use the INDEX function with the first arguments list as the Text1 argument.ImagesFigure 7-73 INDEX is nested within CONCAT
    3. Choose cells G8:G11 on the Data sheet for the Array argument and cell F8 for the Row_num argument. You can select the combo box control or type f8 after the sheet name (Figure 7-73). When the array is one column, a Column_num argument is not necessary.
    4. Click between the two ending parentheses in the Formula bar to return to the CONCAT arguments and type a comma (,) to move to the Text2 argument. (If you accidentally click OK, click the Insert Function button to re-open the Function Arguments dialog box.)ImagesFigure 7-74 Space character is included with Text2 argument
    5. Click the Text2 box, press Spacebar, type Quarter, and click OK. (Figure 7-74).
    6. Format cell D4 as bold italic 16 pt.
  18. Select the Data sheet, select Third from the combo box control, and return to the Hospital Seminars sheet to see the results.
  19. Select cell D4 and cells D6:G10 on the Hospital Seminars sheet and remove the Locked property.
  20. Delete the contents of cells D6:G10 and select cell D6.
  21. Check accessibility and add the alternative text Hamilton Civic Center Logo to both pictures in the workbook.
  22. Select cell D6 on the Hospital Seminars sheet and cell A3 on the Calorie Tracking sheet.
  23. Protect the Hospital Seminars sheet and the Calorie Tracking sheet, both without passwords.
  24. Save and close the workbook (Figure 7-75).
  25. Upload and save your project file.
  26. Submit project for grading.

Statistic Management

Que 1:  

Why is it important to study the internal resources, capabilities, and activities of organizations? What insights can be gained? – 1 page

Que 2: 

Domino’s Pizza was 50 years old in 2010. Visit the company’s business-related website (www.dominosbiz.com) and read the company profile under the “Investors” tab. Does the firm focus on the economic, accounting, or shareholder perspective in the describing its competitive advantage in the profile. Defend/explain your answer. – 1 Page 

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition.  

Week 7 Discussion

 

Discussion 1 (Chapter 9): What is the firewall evaluation criteria for your organization? Does your organization have one and in your opinion does it addresses the overall network security or does it have gaps? Either way, talk about how it can be improved.

Discussion 2 (Chapter 15): Discuss how the advent of AI/MI and how it may affect network security. What do you think network security will look like 5 years, 10 years, or 15 years from now. How will the cloud play into this scenario or will there be something bigger than the cloud that could affect network security?

Note: The first post should be made by Wednesday 11:59ET and you should post at least two more times throughout the week to your classmates. Please engage early and often.

Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Network Assignment

 

Assignment Details

Part 1

For many thousands of years, the primary method of communication was for people to physically gather together to share ideas and discuss concerns. In today’s technology driven world, huge numbers of people gather together without ever directly seeing each other. This is done through social media. Social media is known to produce great changes on how individuals and communities communicate and perceive each other.

Complete the following in a minimum 1-page response:

  1. Briefly, define social media such as Google+®, Twitter®, Pinterest®, LinkedIn®, and Facebook® and how it differs from traditional media. In addition, how has social media impacted the workplace?
  2. Given the increased prevalence of social media, how has your personal perspective of multiculturalism and diversity been impacted?
  3. Select an organization you belong to. How do you think your perspective has impacted that organization? How do you feel that others in the organization have been impacted?

Part 2

As an information technology professional, you are faced with opposing perspectives on ethical issues in your daily work. Research opposing perspectives on ethical issues faced in the Information Technology field as it pertains to networking. An example might be the difference in perspectives of utilizing biometrics for authentication.

Take into consideration the opposing perspectives of different technologies, as it relates to ethics and complete the following in a minimum 1-page essay.

  1. Identify the opposing perspective you have chosen.
  2. Explain the ethical implications that are inherent with both sides of the issue.
  3. Given the ethical implications on both sides of the issue, evaluate the ethical implications on both sides.
  4. Provide your perspective on how you might apply the issue in a work situation.

Java Lab 6

I need help to do this lab. I’ve tried a few times do clearly I am doing something wrong