You are going to buy a personal computer. What operating system features are important to you? What operating system would you select, why? and talk about the system?
Essay , two topics 10 pages excluding references
Please find the help doc for the info.
Week 6 discussion
The proliferation of the Internet of Things (interconnected devices, primarily using wifi as the means of communication) means that most individuals will be using a wifi network or be exposed to wifi networks on a daily basis. Reflect on the following:
1. What risks and safeguards are associated with wireless communication?
2. Are you comfortable (or would you use) a wireless “hot spot” to do computer work?
3. What safeguards might you use in accessing an unprotected (public) wireless communications?
4. Are you more at risk using a wireless connection via laptop or a connection via a smart phone?
For the curious, take a look at What is “war driving” or “war flying.” How prevalent are these two terms today?
diss6
Need APA format without plagiarism
interivew
WRITTEN INTERVIEW QUESTIONS
DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.
1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.
2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?
3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?
4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?
5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?
WEEK 5: INDEPENDENT PROJECT: EXCEL 2019 IN PRACTICE – CH 6 INDEPENDENT PROJECT 6-6
Clemenson Imaging LLC monitors increased revenue from the use of CT scan equipment. You analyze the number of patients and procedures by technician and location.
[Student Learning Outcomes 6.3, 6.4, 6.5, 6.6, 6.7]
File Needed: ClemensonImaging-06.xlsx (Available from the Start file link.)
Completed Project File Name: [your name]-ClemensonImaging-06.xlsx
Skills Covered in This Project
- Calculate the net present value of a purchase.
- Use TRANSPOSE to rearrange labels into a column.
- Concatenate cells to display full names.
- Use SUMIFS to summarize data.
- Calculate procedure times.
- Format times with fractions.
- Open the ClemensonImaging-06 workbook and click the Enable Editing button. The file will be renamed automatically to include your name.
- Determine the net present value of a new equipment purchase.
- Click the Financials sheet tab and select cell H5.
- Use NPV with a Rate argument of 4.25%.
- Select cells D7:D13 for the Value1 argument and click OK. This is the same as entering each value argument separately.
- Edit the formula to add both costs (cells D4 and D5) at the end of the formula. The net present value is $268,921.79.
- Use TRANSPOSE and CONCAT to display technician names.
- Click the Technicians sheet tab. The names are in rows.
- Select cells A4:A10, seven rows in one column.
- Select TRANSPOSE from the Lookup & Reference category and select cells A1:G1 for the Array argument.
- Press Ctrl+Shift+Enter to complete the array formula.
- Repeat the TRANSPOSE task for the first names in cells B4:B10.
- Select cell D4 and create a CONCAT formula to display the name in first name, last name order (Figure 6-111).Figure 6-111 CONCAT formula to display names
- Copy the formula in cell D4 to cells D5:D10.
- Click the Summary sheet tab, select cell A5, and create a 3D reference to cell D4 on the Technicians sheet.
- Copy the formula and preserve the borders.Figure 6-112 SUMIFS with absolute and relative references
Figure 6-113 Change time format to display fractions
- Use SUMIFS to total number of patients by procedure and technician.
- Click the Summary sheet tab and select cell C5.
- Use the SUMIFS function with an absolute reference to cells $D$5:$D$41 on the Procedures sheet as the Sum_range argument.
- The Criteria_range1 argument is an absolute reference to the image type column on the Procedures sheet, cells $E$5:$E$41.
- The Criteria1 argument is a relative reference to cell B5 on the Summary sheet.
- The Criteria_range2 argument is an absolute reference to the technician names column on the Procedures sheet.
- Select cell A5 for the Criteria2 argument (Figure 6-112).
- Copy the formula in cell C5 to cells C6:C11 and preserve the borders.
- Use SUMIFS to total number of patients by category and location in cells C14:C15.
- Look for and correct format inconsistencies.
- Calculate procedure times.
- Click the Times sheet tab and select cell F6.
- Build a formula to subtract the start time from the end time and multiply those results by 24. The result is shown in hours.
- Copy the formula to row 41.
- Select cells F6:F41 and open the Format Cells dialog box. On the Number tab, choose Fraction with a Type of Up to two digits (Figure 6-113).
- Save and close the workbook (Figure 6-114).
- Upload and save your project file.
- Submit project for grading.
Blockchain Discussion
How do you feel blockchain will change the global economy or will it? Explain your answer.
Writing assignment 4
WRITING ASSIGNMENT 4 INSTRUCTIONS
SECURITY ISSUES IN P2P NETWORKS
In this assignment, you will answer the following review questions from the reading materials of the module/week.
1. Question #1 in Section 2.9 in Chapter 2.
“What are the key components of a typical P2P application? Describe their functions.”
2. Question #4 in Section 3.9 in Chapter 3.
“What are the essential features of a typical hybrid network architecture design?”
3. Question #2 in Section 7.11 in Chapter 7.
“What is Sybil attack? Why is it a serious problem?”
4. Question #4 in Section 7.11 in Chapter 7.
“Why is it possible to launch a DDoS attack using a P2P network?”
You are expected to provide a detailed answer that shows a clear understanding to each question’s subject matter. Biblical worldview should be integrated in an appropriate manner and supported by Scripture. In addition to the module’s “Reading & Study” materials, a minimum of 3 references is required for this assignment and be sure to include complete reference information. Your submission must contain at least 1,000 words and should follow the current APA formatting style. Please refer to the current edition of the APA publication manual for guideline details.
Submit this assignment by 11:59 p.m. (ET) on Sunday of Module/Week 5.
IDM W 5 D
I want you to post the particular data analytics tool that you used for the midterm project. Provide the benefits and limitations of the tool.
Blockchain
In chapter 7, the author briefly discusses how to deploy a smart contract. You’re using Ganache in your labs, but you’ll learn in future chapters about public test blockchains and production (live) blockchains. Once you deploy a smart contract, that smart contract code is stored on the blockchain forever (remember immutability?) Understanding that you cannot simply overwrite previously deployed smart contracts, contrast approaches to deploying traditional applications and blockchain apps. Does blockchain make deployments easier or harder? Are there any potential risks when deploying blockchain apps that either don’t exist in traditional environments or aren’t as prominent? What should a development organization do differently to mitigate these risks?