Web Design

Write a two to three paragraphs. Each should be 2 – 3 sentences.

  • Explain the importance of properly structuring an HTML document
  • Explain the difference between an ordered list and an unordered list – Give an example of each
  • Explain the importance of structural tags, such as for formatting and HTML pages

————————————————————————————————————————————-

Please answer all of the following questions. Each answer should be one or two sentences

  1. What tag is required to make images accessible for all web users?
  2. Explain the advantages of using CSS to define background colors and images
  3. Create a CSS rule to make the background color of the body white (#FFFFFF)

————————————————————————————————————————————–

Discuss the following: At least 6 sentences

How can screen readers used for viewing web pages

What are ways that web pages can be used to assist them

————————————————————————————-

Research Paper

You have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

1. Describe the organization’s environment, and evaluate its preparedness for virtualization.

2. Explain Microsoft (or another product) licensing for virtualized environments.

3. Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

4. Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

5. Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Submit your research paper as a single document. Your paper should meet the following requirements:

Be approximately 2-4 pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Project 2: Windows Upgrade Proof of Concept

 

If you didn’t last week:

  • Download VMware Player, Virtual Box, or use Hyper-V to build a Windows 10 virtual machine. These free applications can be placed on your personal computer:
  • Download the Windows Upgrade Proof of Concept Template and follow the instructions in the document.

In this project, you will practice installing and configuring Windows 10 on a virtual machine and document the process with screenshots and written explanations. You will need to take screenshots from the virtual machine (VM) from this project for the Project 3 presentation, so do not delete the VM.

Follow the Windows Installation Instructions to create the proof of concept. Once you have completed these tasks, write a report that documents the steps you followed in installing Windows 10, detailing which version you installed as well as the steps you completed after the installation.

Cyber Security Issues Presentation

 PLEASE USE SOURCES PROVIDED AND ONLY USE EXTERNAL IF IT IS THE LAST OPTION

Research and learn about the three topics listed below. 

1.  Dataveillance  

2.  Cryptography

4.  Mobile Phone 

5.  Browser fingerprinting  

6.  Online Scams  

7. Cryptojacking

8. Cyber-Physical Attacks

9. IOT Attacks

10. Phishing

11. Ransomware

12. Worm 

13. Bluejacking

14. Blue Snarfing

15. Passwords

16. “Juice Jacking”

Create a slide presentation detailing the information on your chosen topics. Upload your presentation in the assignment box. (Refer to rubric)

Requirements:

Slide #1-Title, Your Name, INF Section, Date

Slide #2,3-Choice #1

Slide #4-5-Choice #2

Slide #6-7-Choice #3

Slide #8-Work Cited

Answer for each choice the following:

1. What it is (description)?

2. What are the security problem or issues?

3. How to reduce or eliminate the threat? How the security issue(s) could be prevented or protected?

Additional Presentation Requirements:
Images/diagrams/background/animation

Upload your presentation in the assignment box.

Additional Sources: 
https://onlinedegrees.sandiego.edu/top-cyber-securitythreats/ 
https://www.fbi.gov/investigate/cyber
https://staysafeonline.org/
Ransomware Attacks Take On New Urgency Ahead of Vote 

A Company uses the following criteria for calculate pay

  

A Company uses the following criteria for calculate pay.
 

a. First 40 hours at base pay
b. Hours between 40 and 50 are paid at time and half
c. Hours between 50 and 60 are paid at twice base rate
 

THE REGULAR PAY RATES ARE BASED ON rank.
 

Managers get paid 12.50 an hour
Full time employees get paid 7.50 an hour
Part time employees get paid 5.50 an hour
 

If I worked 55 hours first 40 at base, next 10 at 1.5 times base, and final 5 at twice base pay
 

A data file is online.
 

Using your previous examples and my Exam-2 freebie as the guidelines, write a program to do the following
 

a. Populate a series of arrays or an array of a data structure.
 

b. Use Redim Preserve
 

c. Sort data by alphabetical order and display all sorted data in a listbox
 

d. Display name, hours worked, pay rate, regular time pay, overtime pay and total gross pay
 

e. Report managers, FTE and PTE separately at a click of a radio button or with menus
 

f. Allow me to search for a person’s record and display his or her information in a separate label
 

g. Allow me to write back into a file using a save file dialog