RESEARCH REPORT

 

Topic: Write a scholarly research report on a narrowed focus related to Computer Networking based on one of the following main topics:

Step 1: Select one of these topics:

1) Computer Networking and Machine Learning

Step 2: Review the CU Research Guide and APA documentation (Attached the document)

       a.    Follow the guidelines of the CU Research guide for the structure of the paper

       b.    Following the specifications of APA for format

Note: You will write a paper of at least 8-10 pages in length. The Title page, Abstract, Table of Contents, and Reference pages should not be counted in the number of pages required.

The paper must follow APA guidelines.  

Step 3: Go to Module 6 to submit your final paper

HW

 

Job Enrichment: Knowledge and skill development within the scope of the employee’s normal job

Mentoring: A formal or informal program in partnership with a senior employee for long-term career growth

Coaching: A formal or informal program with a direct supervisor or external coach for performance improvement or resolution of work issues

Job Transitions: Job Design: Promotion.

Security Threat Awareness Infographic and Presentation

Imagine you are the information systems security officer at your company and are tasked with creating a cybersecurity threat awareness training. You must create an infographic or job aid for the company’s intranet and a brief presentation for the company’s stakeholders, including executives, managers, and staff.

Refer to the LinkedIn course “PowerPoint: Creating an Infographic” by Heather Ackmann, located in this week’s Learning Activities folder, for guidance on creating infographics.

Create a 1-page infographic or job aid of the cyber domain using the OSI model.

Identify 5 to 7 threats to the cyber domain, including at least 1 threat for each of the layers in your infographic.

Create a 4- to 6-slide presentation in which you:

  • Discuss the challenges of securing each layer of the cyber domain in the company’s cyber threat awareness training.
  • Select 3 threats from your infographic or job aid.
  • Identify 2 challenges from the threats you identified.

Note: You do not need to identify how to mitigate the threat; this presentation is focused on raising awareness of cybersecurity threats and the challenges these threats present.

Format any references according to APA guidelines.

MATCH statements are the row_num and col_num arguments.

excel independent project 6-5

 

Independent Project 6-5

Windows   Mac

Classic Gardens and Landscapes counts responses to specialty promotions to determine effectiveness. You use SUMIFS and an IFS formula to complete the summary. You also calculate insurance statistics and display full names in one cell.

[Student Learning Outcomes 6.1, 6.2, 6.3, 6.6, 6.7]

File Needed: ClassicGardens-06.xlsx (Available from the Start File link.)

Completed Project File Name: [your name]-ClassicGardens-06.xlsx

Skills Covered in This Project

  • Nest MATCH and INDEX functions.
  • Create DSUM formulas.
  • Build an IFS function.
  • Build SUMIFS formulas.
  • Use TEXTJOIN to join labels.
  1. Open the ClassicGardens-06 start file. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Create a nested INDEX and MATCH function to display the number of responses from a city.
    1. Click the Mailings sheet tab and select and name cells A3:D28 as Responses.
    2. Click the Mailing Stats sheet tab.
    3. Click cell B21 and type Carthage.
    4. Click cell C21, start an INDEX function, and select the first argument list option.
    5. Choose or type the Responses range name for the Array argument.
    6. Click the Row_num box and nest a MATCH function. Select cell B21 for the Lookup_value and cells A3:A28 on the Mailings sheet for the Lookup_array. Click the Match_type argument box and type 0.
    7. Click INDEX in the Formula bar. Click the Column_num box and nest a second MATCH function to look up cell D3 on the Mailings sheet in the lookup array A3:D3.
    8. Click the Match_type box and type 0 (Figure 6-106) and click OK. The result displays as 343.00.MATCH statements are the row_num and col_num arguments.Figure 6-106 Nested MATCH and INDEX functions
    9. Format the results to show zero decimal places.
    10. Type Smyrna in cell B21.
  3. Use DSUM to summarize mailing data.
    1. Select the Mailings sheet and note that number mailed is located in the third column and response data is in the fourth column.
    2. Click the Criteria sheet tab. Select cell B2 and type lan* to select data for the Landscape Design department.
    3. Type law* in cell B5 for the Lawn & Maintenance department.
    4. Type pat* in cell B8 for the Patio & Furniture department.
    5. Click the Mailing Stats sheet tab and select cell B7.
    6. Use DSUM with the range name Responses as the Database argument. Type 3 for the Field argument (# Mailed column), and enter an absolute reference to cells B1:B2 on the Criteria sheet as the Criteria argument.
    7. Copy the formula to cell C7 and edit the Field argument to use the fourth column (# Responses).
    8. Use DSUM in cells B8:C9 to calculate results for the two remaining departments.
  4. Use SUM in cells B10:C10.
  5. Format all values as Comma Style with no decimal places.
  6. Create an IFS function to display a response rating. Note: If your version of Excel does not include the IFS function, build the following nested IF function =IF(C7/B7>=20%,$C$15,IF(C7/B7>=15%,$C$16,IF(C7/B7>=11%,$C$17,$C$18))) to display the rating.
    1. Click cell D7. The response rate and ratings are shown in rows 14:18.
    2. Start an IFS function and select C7 for the Logical_test1 argument. Type / for division and select cell B7. Type >=20% to complete the test.
    3. Click the Value_if_true1 box, select C15, and press F4 (FN+F4) (Figure 6-107).Each logical_test argument has a corresponding value_if_true argument.Figure 6-107 First Logical_test and Value_if_true arguments
    4. Click the Logical_test2 box, select C7, type /, select cell B7, and type >=15%.
    5. Click the Value_if_true2 box, click cell C16, and press F4 (FN+F4).
    6. Complete the third and fourth logical tests and Value_if_true arguments (Figure 6-108).Several arguments are scrolled out of viewFigure 6-108 Completed IFS function arguments
    7. Copy the formula in cell D7 to cells D8:D10.
  7. Use SUMIFS to total insurance claims and dependents by city and department.
    1. Click the Employee Insurance sheet tab and select cell E25.
    2. Use SUMIFS with an absolute reference to cells F4:F23 as the Sum_range argument.
    3. The Criteria_range1 argument is an absolute reference to cells E4:E23. The Criteria1 argument is bre* to select the city of Brentwood.
    4. The Criteria_range2 argument is an absolute reference to cells D4:D23, the department column, with criteria of lan* to select the Landscape Design department.
    5. Click OK. The result for cell E25 is 10.
    6. Build SUMIFS formulas for cells E26:E28 based on the criteria displayed in cells C26:C28.
    7. Format borders to remove inconsistencies, if any, and adjust column widths to display data.
  8. Use TEXTJOIN to display names. Note: If your version of Excel does not include the TEXTJOIN function, use CONCAT or CONCATENATE to build the function.
    1. Click the Full Names sheet tab and select cell E4.
    2. Start a TEXTJOIN function and press Spacebar for the Delimiter argument.
    3. Click the Text1 box and select cell C4.
    4. Complete the Text2 and Text3 arguments to show middle and last names and click OK (Figure 6-109).The quotation marks display when you move to the next entry box in the list.Figure 6-109 Delimiter is a space
    5. Copy the formula to display full names in column E.
  9. Save and close the ClassicGardens-06 Excel workbook (Figure 6-110).Completed worksheets for Excel 6-5

Fixing C code with Vulnerabilities

 

The current code (attached), developed by a junior developer, has several issues and is not functioning as expected. The desired functionality of the program is to allow a user to select from several choices on a menu. After the user selects the “Exit” option from the menu, the program will populate a password with ‘1’s and then display the value of the password. The program also captures a character so the screen can stay paused for review before exiting. Below are screenshots for successful program execution.

Unfortunately, not only are there security issues, the code you were provided doesn’t work as expected. For the first part of this exercise demonstrate your C developer environment is working properly. You can do this by running any of the sample C code applications. 

Modify the C code in this example to make the desired functionality work properly. Demonstrate the code works properly through screen captures and describing what changes were made to fix the functionality issues.

Carefully, review the code and perform analysis as needed. Consider the following rules and recommendations and hints for items that you might want to review. 

Note, that some rules and recommendations listed below may not be found as issues in the code. 

 STR31-C. Guarantee that storage for strings has sufficient space for character data and the null terminator. 

 MSC24-C. Do not use deprecated or obsolescent functions. 

 FIO34-C. Distinguish between characters read from a file and EOF or WEOF. 

 MSC17-C. Finish every set of statements associated with a case label with a break statement.  MSC33-C. Do not pass invalid data to the asctime() function. 

 MSC17-C. Finish every set of statements associated with a case label with a break statement. 

 DCL20-C. Explicitly specify void when a function accepts no arguments. 

 MEM30-C. Do not access freed memory. 

You can use any C compiler you have access to. 

nw wk 3

Do you foresee that the traditional computer will be replaced by mobile and smart technologies as a primary device form factor in the near future? If one looks at the world of education for example, the use of Google Chromebooks and Apple iPads are now running the majority of school infrastructures. Mobile apps replace traditional software. Can the same hold true for corporate enterprises today?

IOS Discussion Response

Respond with 150 words or more with your opinion about the post below pertaining to your views on the IOS operating system.

  

It’s  Simple! IOS has the simplest User interface among all the other  interfaces out there and there isn’t much learning required when you  switch from one device to another. All iOS devices more or less work the  same way and have the same interface. there was only one major change  to the interface when they got rid of the home button. All devices  before the iPhone x pretty much work the same way and the interface  looks the same too. After the introduction of the iPhone x things,  haven’t changed much either. Everything looks the same up to iPhone 12  pro max which is the latest model out there. For all the developers out  there. iOS devices do not vary much in size, unlike android devices. so  it’s easier to make iOS compatible apps compared to the huge range of  Android devices that come in different sizes and screen types.

Gaming on iOS devices is far superior to gaming on Android devices.  Although the new android devices offer 90fps while iOS devices are still  limited to 60fps, an iOS device hardly ever drops fps. the touch  response and zero lag along with the awesome gyro sensors make the ios  Devices superior to other options. Multitasking on iOS devices is far  easier compared to other options in the market. The camera on iOS  devices is really good and the AI and AR implementation do wonder. some  apps use cameras that can assist you in measuring and calculating.

Module 3: Data Normalization

Assignment: Import Data and Build Relationships Instructions

In this assignment you will work with both MS Access and Excel. Much of the work you do this module you have done already in module 2. The only new task in this assignment is to ‘import’ data from Excel into Access. Reference the MS Access textbook for instructions on importing data. Note that the Module 3 data file referenced below is located as an attachment in the assignment submission folder that follows this page.

Here is what you need to do:

  • Download Module 3 Data file. (Module 3 Data.xls – a link is provided in the assignment submission folder that follows this page)
  • Open the Excel file that you just downloaded and take note of the three tabs: Customers, Products, and Sales.
  • Open MS Access and create a new database named Module 3.
  • Create three tables named Customers, Products, and Sales.
  • Open each table in Design View and add fields to accommodate data in each of the columns. Use the column titles as field name. Determine proper data type for each field.
  • Be sure to assign Primary Key to each table.
  • After creating the three tables, import data from each tab in the Excel file to the appropriate table in Access.
  • Create a Relationship between the three tables.
  • Submit your database to the appropriate assignment submission folder.

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you