Help with this project
CBSC 630 Book Review 2
After reading, chapters 3 and 4, write a 3-4 page review (not including the Title page or Reference page) of the chapters.
Text:
Alfred Basta, Nadine Basta, Mary Brown (2014) Computer Security and Penetration Testing, 2nd Edition 1st Cengage
Information Technology
Think of and describe a “unique” e-business that you might want to start on the Internet that NO ONE HAS EVER TRIED. Do not create a game. Also, please use good taste! It must be legal in ALL 50 states.
WARNING: It should be a business that is not currently on the web. If I do find an online business that is identical or SIMILAR to your business idea, you will NOT receive any credit for it.
PowerPoint_3G_Remodels
PowerPoint_3G_Remodels
#PowerPoint3GRemodels
Project Description:
In the following project, you will format a presentation that describes backyard remodels.
Open the file named Student_PowerPoint_3G_Remodels.pptx. downloaded with this project.
Change the Colors for the presentation to Paper.
On Slide 1, format the background with the Stationery texture, and then change the Transparency to 30%.
Select Slides 2 through 4, and then apply a Solid fill to the background of the selected slides-in the fifth column, the third color.
On Slide 2, hide the background graphics.
On Slide 2, insert a Table with 2 columns and 4 rows. Apply table style Medium Style 3-Accent 1, and then type the information below in the inserted table.
Row 1, Col 1: Improvement Type; Col 2: Components
Row 2, Col 1: Outdoor Kitchen; Col2: Barbecue, sink, bar, covered patio
Row 3, Col 1: Swimming Pool; Col 2: Jacuzzi, pool, waterfall
Row 4, Col 1: Fire Pit; Col 2: Fire pit, seating area, gas lines
Change the Font Size of all of the table text to 28. Resize the table height to 5.8″, and then distribute the table rows. Align the table text so that it is centered horizontally and vertically within the cells.
In the table, change the Font Size of the first row of text to 32. Apply a Round style Cell Bevel to the first row. Note, depending on your version of PowerPoint, this may be called Circle.
On Slide 3, animate the picture using the Wipe entrance animation starting After Previous. Change the Duration to 01.00. Apply the Split entrance animation to the bulleted list placeholder, and then change the Effect Options to Vertical Out.
On Slide 4, insert a Clustered Column chart. In the worksheet, beginning in cell B1, type the following data.
In row 1, beginning in cell B1: Owner Installed, Contractor, Owner as Contractor
In row 2, beginning in cell A2: Patio, 8000, 12000, 9500
In row 3, beginning in cell A3: Bar, 3500, 5200, 4600
In row 4, beginning in cell A4: Infrastructure, 5000, 9750, 8100
In row 5, beginning in cell A5: Appliances, 3000, 4200, 3850
Apply Chart Style 8 to the chart, and then remove the Chart Title element. Apply the Wipe entrance animation to the chart and change the Effect Options to By Series.
On Slide 5, format the background using solid fill color Dark Green, Background 2 and hide the background graphics. (depending upon your version of Office, the color may be named Dark Green, Text 2). From your downloaded project files, insert the video p03G_Video1.mp4.
Change the Video Height to 5 and use the Align Center and Align Middle options to position the video. Apply the Simple Frame, Black video style.
On the Playback tab, change the Video Options to Start the video Automatically. Trim the video so that the End Time is 00:07 and then compress the media to Low Quality. (Mac users, the Compress Media feature is not available on a Mac).
On Slide 6, hide the background graphics, and then format the slide background by inserting a picture from your downloaded grader files-p03G_Backyard.jpg. Set the Transparency to 0%
Insert a Header & Footer on the Notes and Handouts. Include the Date and time updated automatically, the Page number, and a Footer with the text 3G_Remodels
Display the document properties. As the Tags, type backyard remodels
Network Services
All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.
Routing protocols use metrics to decide on the best path on the network. Name two different metrics and explain how routing protocols use these metrics to decide on the best path.
ISO 27001
The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.For your week 6 research paper, please address the following in a properly formatted research paper:
- Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
- Are there other frameworks mentioned has been discussed in the article that might be more effective?
- Has any other research you uncover suggest there are better frameworks to use for addressing risks?
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Cyber Security
Prepare a literature review/abstract on wireshark.
Qualitative Research Study on DATA ANALYTICS
ASSIGNMENT INFORMATION Due Date: Saturday, January 29, 2022 12:00 AM
Points Possible: 250
- You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the area of interest as your expected dissertation topic so that you can start learning what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines and write in APA style. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.)
Use APA formatting and include the following information:
- Introduction/Background of the research topic: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
- What characteristics of this study make it a qualitative study?
- Methodology: Describe how the data were gathered and analyzed. What research questions or hypotheses were the researchers trying to explore? What statistical analysis was used?
- Study Findings and Results: What were the major findings from the study? Were there any limitations?
- Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead to further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
- References
700 words – Interactive Design
Interactive design is a combination of many business, technical, psychological, educational, artistic, and engineering disciplines. Which of the disciplines presented (see in Jenny Preece text for full scope) do you feel is most important to HCI?
Requirements:
1.Intext citation
2.Google scholar references
3.APA Citation
References:
Blog Article: Adobe Inc. (2019, October 16). What is Interaction Design & How Does it Compare to UX? Retrieved from https://xd.adobe.com/ideas/ principles/human-computer interaction/what-is-interaction design
Video: Don Norman’s The three ways that good design makes you happy @ https://youtu.be/RlQEoJaLQR A
Video: Cognition, Design, and Usability: An Primer for Technical Communicators @ https://youtu.be/p1vrgC04ab4
c program, encrypts a binary file and then save it.
Write a program, myfilehide2, that encrypts a file — ASCII or binary — and saves the encrypted file. myfilehide2 reads from stdin a string that specifies the file to be encrypted followed by an integer. For example,
% myfilehide2
a.out 7
myfilehide2 saves the encrypted content in a new file whose name has “.E2” added as a suffix. After doing so, the app deletes the original file by calling remove(). In the above example, a.out.E2. We restrict input file names to be less than 15 characters and output file names to be less than 18 characters to account for the 3 character suffix. Spaces are not allowed in a file name. The filename and number must be separated by one or more space (‘ ‘) or tab (‘t’) characters. The number must be a single digit — either 0, 1, …, 7 — and end with ‘n’ which is generated on stdin when the ENTER/RETURN key is pressed on our lab machines. All other input of different format are disallowed and should result in a suitable error message on stdout followed by app termination by calling exit(1).
use the library function getchar() to read the input byte-by-byte. When a space character or tab character is encountered, assume the filename has ended and store it as a string in a 1-D char array of size 16. Of course, that is assuming that the filename has not exceeded 15 characters. Instead of the constants 15 and 16, use the C preprocessor directive #define to specify your own macro to reduce the potential for run-time bugs. Read the single digit (0, 1, …, 7) into variable, char numpos, and convert numpos into a decimal number, unsigned int decpos, when interpreted as a decimal number. For example, the ASCII character ‘3’ stored in numpos is convered to the decimal number 3, not the decimal encoding of the ASCII character ‘3’ which is 51.
Do not use any string processing library function to perform the input parsing task. The parsing chore can be implemented with a few lines of code. Delegate the input parsing task to
void inputcheck(void);
which stores a valid filename input a global 1-D char array. Make the variable numpos also global.
After inputcheck() returns (it may not return if the input is ill-formatted), main() opens the input file to read and creates an output file with suffix “.E2” to write the encrypted bytes. If either of the two operations is unsuccessful, main() prints a suitable error message to stdout and terminates by calling exit(1). Otherwise, like in Problem 2, lab3, myfilehide2 reads the content of the input file byte by byte using fgetc(). Unlike myfilehide, myfilehide2 flips the bit value at the bit position specified by decpos and writes the resultant byte into the output file. For example, if an input byte has bits 00001111 and decpos equals 2, the encrypted byte is 00001011. Note that the rightmost bit at position 0 is considered the least significant bit. As with myfilehide, myfilehide2 has the property that running the app again on the encrypted file with the same digit as second arguments decrypts the file. Perform a similar cleanup as myfilehide so that the encrypted file with suffix “.E2” is deleted. Use Makefile to compile your app. Test and verify that it works correctly on mac terminal.