6/4 PPT

  1. Using your responses to the 6.3 Discussion, prepare a short PowerPoint presentation as an executive summary of your observations that could be presented to your management team.
  2. Prepare your PowerPoint based on the following outline:
    1. Provide an introduction to your presentation.
    2. Prepare at least one slide that shows the (a) mission or vision of the organization, and (b) information technology response to meeting that mission or vision.
    3. Provide a slide that demonstrates a strength in the current IT strategy.
    4. Provide a slide that discusses one weakness you see in the current IT strategy.
    5. Prepare at least one slide that provides your recommendations or suggestions for improvement.
    6. Provide a conclusion to your presentation that summarizes your points.
  3. Your presentation should be a minimum of six slides (10). Keep your points to no more than four bullets per slide. You may use any acceptable background for your presentation. You may wish to stay with the templates provided by the presentation software you are using (use previously used template, 5/4 Presentation).
  4. Be sure to use good presentation skills, and check your grammar.
my home network diagram .png

Discussion Reply!!! About 50 words

  

  • Review your classmate’s contributions for pros and cons of one  of the example network setups and determine if they have any gaps in  their understanding.
  • Provide feedback for a classmate’s home network diagram. Do you have any suggestions to improve it?

Diagram 2 is the closest to my home network instead of the cable box.  I just have a router because I don’t watch cable tv. I mainly watch  Netflix and other movie apps. I normally don’t watch tv but when I do, I  have those apps to choose from and I could live stream that way as  well.  I don’t think I need to add anything else it works out just fine.

for my naming scheme, I usually use a nickname and or my last name  and I might throw some numbers in there depending on how I feel. I chose  my naming scheme because it was just something that I felt comfortable  putting which is a nickname and I know that it’s me.

The pros are that it has a simple setup. Having the possibility to  configure a router not required of higher quality than a gateway port  for your phone is provided. The cons are that the quantity of ethernet  ports reduces the number of gadgets that can be linked together with low  wi-fi coverage. I do agree with the pros because I have a password  included, as far as the cons it works out but it also buffers because of  the limited wifi range. 

Everything that I use is connected to my wifi including my two TVs  but for some reason, the TVs wouldn’t connect in packet tracer so I put  them up anyway just to show the class how my home setup is. 

my home network diagram .png

Write a 4 page paper in APA format with summary.

1Q. Provide a basic foundation of the concepts of cellular telephony, how it works, and the various generations and evolutions of cellular telephony. 

2Q. Research and address the differences between the current 4G and 5G cellular technologies and the challenges still faced in deploying the newest technologies. 

3Q. With 6G and other possible technologies on the immediate horizon, what are some of the challenges faced in the industry?

4Q. Research a current security risk impacting mobile devices or computers connected over WiFi networks. Address where the risks exist and recommendations for protecting devices.

CMSC512

explain what Embedded Systems are? Discuss and explain at least 5 applications of embedded systems.

Please list your references

Email Forensics

 Question:1

Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. Do your own work. 

References:

Question 2:

Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it. 

desktop mitigation (Computer troubleshooting course) (cybersecurity) (computer)

I must be sure this is done very professionally without filler words but instead working technical knowledge. Also, the quote for all upgrades and accessories will be in the configurator as per the examples shown in the request. Please review all instructions thoroughly to ensure you know everything needed.

 

How Will My Work Be Evaluated?

For this assignment, you are asked by your manager to research the replacement of 50 aging desktop machines with new laptops. Review the business needs of your manager carefully so that you fully appreciate the requirements you must address in selecting the new laptops.

For example, what is significant about the need for “multiple external monitors”? Ask yourself what it takes to connect a laptop to external monitors. What ports are included on your recommended laptop? What kind of cables are required? Can those ports/cables be used with the external monitors? Does the laptop have sufficient graphics capabilities to drive external displays, and if so, how many and at what resolution? Follow this same process for all business needs.

By documenting your choices and the overall recommendation in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is a critical workplace skill.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

1.1.3: Present ideas in a clear, logical order appropriate to the task.

1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.

1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.

2.1.2: Describe the context surrounding the issue or problem.

2.3.3: Explain inferences and deductions that follow logically from the evidence provided.

10.1.3: Define the specifications of required technologies.

13.1.1: Create documentation appropriate to the stakeholder.

13.2.1: Evaluate vendor recommendations in the context of organization requirements.

This project is a three- to four-page business-oriented proposal that should contain the following:

  • at least one high-quality graphic
  • one or more tables to present information
  • at least one online configurator
  • your purchase recommendations, specifications, and justification for your choice
  • one to two IEEE references

If you didn’t download it last week, download the Desktop Migration Proposal Resources now and follow the instructions in the document.

Delete the instructional text from the template before you submit it.

Exp19_PowerPoint_Ch02_CapAssessment_Food

 

Exp19_PowerPoint_Ch02_CapAssessment_Food

  

PowerPoint Chapter 2 Capstone Assessment – Food

#Exp19_PowerPoint_Ch02_CapAssessment_Food  

#Exp19 PowerPoint Ch02 CapAssessment Food

Project Description:

Your school’s Culinary Club is raising money for the local food bank. You volunteer to create a slide show that will be shown at a potluck fundraiser put on by the club. In this activity, you will create a presentation that meets slide show design principles, and has shapes, animation, video, and audio.

#Start PowerPoint. Download and open the file named Exp19_PPT_Ch02_CapAssessment_Food.pptx. Grader has automatically added your last name to the beginning of the filename

#Replace Student Name in the subtitle placeholder on Slide 1 with Carl Patterson Change the title font size to 54.

#Click Slide 2. Change the title font size to 48. Change the subtitle font size to 32.

#Click Slide 3. Change the title to sentence case. Change the title font size to 54. Change the bulleted text to 32

#Click Slide 4. Change the title font size to 48. Change the bulleted text to 32.

#Click Slide 5. Change the title font size to 48. Change the subtitle font to 27.

#Click Slide 4 and insert a heart shape. Size it to a height of 2.5” and a width of 2.75” . Apply Colored Fill – Red, Accent 1, Darker 25%. Apply a shape outline in Black, Text 1. Apply Preset 2 as a shape effect. Position the shape horizontally at 10.35” from the Top Left Corner. Position the shape vertically at 4.9” from the Top Left Corner.

#Click Slide 2. Select the subtitle text and add the Zoom Entrance animation. Click After Previous in the Start box. Adjust the Duration to 01.75 and the Delay to 00.50.

#Click Slide 3. Select the first text bullet and apply the Fade Entrance effect. Set the animation to start After Previous with a Duration of 02.00 and a Delay of 01.75. Click the Animation Pane, and then click the arrow for the first bullet. Select Effect Options to access the Fade dialog box. Set the After Animation to Orange (sixth from the left) on the Effect tab.

#Select the second text bullet and apply the Fade Entrance effect. Set the animation to start After Previous with a Duration of 02.00 and a Delay of 01.75. Click the arrow for the second bullet in the Animation Pane. Select Effect Options to access the Fade dialog box. Set the After Animation to Orange (sixth from the left) on the Effect tab.

#Select the third text bullet and apply the Fade Entrance effect. Set the animation to start After Previous with a Duration of 02.00 and a Delay of 01.75. Click the arrow for the last bullet in the Animation Pane. Select Effect Options to access the Fade dialog box. Set the After Animation to Orange (sixth from the left) on the Effect tab.

#Click Slide 4 and select the heart shape. On the Animations tab, in the Animations group, click More and add the Pulse Emphasis effect. Set the animation to start After Previous with a Duration of 02.00 and a Delay of 0.25. Click the arrow for the shape in the Animation Pane. Select Timing and set Repeat to Until End of Slide and click OK.

#Click Slide 1 and add the Fade transition. Set the Duration at 01.00. Set the slides to advance automatically after 00:07.00. Set it to apply to all.

#Click Slide 5. Insert the downloaded video file Veggies.mp4

#Apply the Rounded Diagonal Corner, White moderate video style.

#Set the video to start Automatically. Change the Video Options to Hide While Not Playing and to Rewind after Playing. Compress the media in the presentation using the Standard setting. Mac users, compress all pictures in the presentation using the On-screen setting.

#Save and close Exp19_PPT_Ch02_CapAssessment_Food.pptx. Exit PowerPoint. Submit the file as directed.

IT345: Impact of IT week 4 A

  

Week 4 Discussion

No unread replies.No replies.

Welcome to Week 4

This week we will explore intellectual property. Most people do not know what intellectual property is, yet it is extremely important. Intellectual property is not specific to large corporations. Rather, individuals can also generate intellectual property. We also explore challenges of new technologies and how they affect copyright laws.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 200 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see your classmates’ posts until you make your first post.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Discussion_Grading_Rubric_Final (2).docx download

Grading_Late_Discussion-1 (3).docx download

Topics:

  • What is intellectual property? Give at least 5 examples.
  • How does new technology challenge how intellectual property is protected?
  • How is intellectual property like physical property? How is it different?
  • Do you agree with the idea that someone can “own” intellectual property?
  • What do you think the impact would be on creative industries, such as music, movies and fiction novels, if copyright laws did not protect intellectual property?