Exp19_Word_Ch03_ML2_Fresh

 Exp19_Word_Ch03_ML2_Fresh

  

Project Description:

You are preparing a one-page flyer promoting a meal planning service and app. The flyer includes information, some of which is shown in a table, describing the new service. You will merge the flyer with a data source to produce personalized copies of the flyer.

     

Start Word. Download and open   the file named Exp19_Word_Ch03_ML2_Fresh.docx.   Grader has automatically added your last name to the beginning of the   filename.

 

Ensure that nonprinting   characters are displayed. At the second blank paragraph that follows the   document logo, insert a 2×1 table. Type Meal Planning Series in the first cell of the table.   Type   Volume 24 in   the next cell and right-align it. Format all text in the table as italics,   with a font size of 10 pt.

 

Adjust the width of both columns   in the table to 2″. Center the   table horizontally on the page. Shade the table with Green, Accent 6, Lighter   60%.

 

Select text at the end of the   page, beginning with Citrus Salmon   Whole Grain Rice Bowl and ending in 490   (whether you select the paragraph mark that follows 490 is irrelevant). Convert the selected text to a table,   accepting all default dialog box selections.

 

Adjust the width of the second   column to 1”. Insert a row above the first row and type Meal   Selection in   the first cell. Type Calories in the second. Apply Align Center alignment to both   entries in row 1.

 

Insert a column at the right of   the second column. Type Remaining Calorie Count in row 1 of the new column. Text   will wrap in the cell.

 

Click in the third column on the   second row (below Remaining Calorie   Count). Include a formula to subtract Calories from 1200. You do not need to select a   Number format. Repeat the formula down the column, adjusting the cell   reference for each row.

 

Insert a column to the left of   the first column and adjust column width of the new column to 1”. Merge all   cells in the new column. Type FRESH! in the merged cell. Click Text Direction in the Alignment group   on the Table Tools Layout tab twice to rotate the text attractively. Click   Align Center. Change the font size of text in the first column to 26.

 

Modify all formulas in the last   column to adjust for the newly inserted column. You should change the letter   in each formula from b to c. Note that the formula will   change, but the results remain the same. Change the calorie count for Barbecue Chicken Pizza to 550. Update the formula field in   the next cell to reflect the new amount for calories remaining.

 

Apply a table style of Grid   Table 5 Dark – Accent 6 (row 5, column 7 under Grid Tables). Select text in   row 1 (but not the merged cell) and choose Align Center alignment. Apply   Align Center alignment to all numbers in the last two columns.

 

Center the table on the page horizontally. Select the first column.   Select the first double line style shown (click the Line Style dropdown   arrow, not Border Styles) and a line weight of ½ pt. Select a pen color of   Green Accent 6. Apply the border selection to all borders of the selected   column.

 

Place the insertion point at the   end of the document (after Download the   Fresh! app from your friends at). Press SPACEBAR. Click the Mailings tab   and begin a mail merge, choosing to create letters and selecting recipients   from an existing list. You will use the Access database, Fresh App Contacts.accdb. Note, Mac users will use the text file,   Fresh App Contacts.txt. Edit the   recipient list and sort by Grocery Name in ascending order.

 

Insert a merge field of Grocery_Name. Preview the results and   finish the merge of all records. Select and copy all text in the new   document. Display the original document, move to the end of the document   (after Download the Fresh! app from   your friends at Associated Grocers), and insert a page break. Paste the   copied text, resulting in a 6-page document.

 

Save and close Exp19_Word_Ch03_ML2_Fresh.docx. Close   all other open documents without saving. Submit Exp_Word_Ch03_ML2_Fresh.docx as directed.

Digital forensics

 There is a cyber attack against Company X and you are the only digital forensics analyst for the company.  You think the attack is coming from an insider. You have a good idea that employee Kevin is not happy at the company and launched a cyber attack. Kevin is in IT department. He uses Linux computer and has an iPhone.  The attack is against HR database. Database is an SQL database. All social security numbers are being deleted. You find that the attacker uses phishing email to capture a database password. Phishing e-mail has following body lines: “Your password is expired, please click the link to reset your password”.  You will get his computer and iPhone to analyze. Please describe steps you will take from taking his computer and iPhone and doing digital forensics analysis. Describe tools you will use, methodology you will follow. 

Audit Report

Please write a brief report listing the controls tested and the result of the test. You may express your opinion or thoughts on the findings. The goal is familiarize everyone with an Audit Report related to FISMA. I am looking for 500 to 600 words, using APA Style formatting. 100% original work and not plagiarized.  

Instructions:

For this week, I would like to have you read and analyze an Office of Inspector General (OIG) report. I picked the 2012 FISMA Audit report of the Department of Education. Please review the report attached.

Deep Learning and Cognitive Computing assignment

 Chapter 6– discussion question #1-5 & exercise 4

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).

Discussion questions:

1. What is deep learning? What can deep learning do that the traditional machine-learning method cannot? 

2. List and briefly explain different learning paradigms/ methods in AI. 

3. What is representation learning, and how does it relate to machine learning and deep learning? 

4. List and briefly describe the most commonly used ANN  activation functions. 

5. What is MLP, and how does it work? Explain the function  of summation and activation weights in MLP-type ANN 

Exercise 4:

 Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize  your findings in a professionally organized report 

Create a class named Person that holds the following fields: two String objects for the person’s first and last name and a LocalDate object for the person’s birthdate. Create a class named Couple that contains two Person objects. Create a class

Create a class named Person that holds the following fields: two String objects for the person’s first and last name and a LocalDate object for the person’s birthdate. Create a class named Couple that contains two Person objects. Create a class named Wedding for a wedding planner that includes the date of the wedding, the names of the Couple being married, and a String for the location. Provide constructors for each class that accept parameters for each field, and provide get methods for each field. Then write a program that creates two Wedding objects and in turn passes each to a method that displays all the details. Save the files as 

Person.java, Couple.java, Wedding.java, and TestWedding.java.

BIT-200-INTRODUCTION TO COMPUTER TECHNOLOGY

TOPIC: Benchmark – Sales Results Excel Spreadsheet and PowerPoint Presentation

The purpose of this assignment is to utilize Microsoft Excel and PowerPoint to create a business presentation.

Part 1

As a sales manager at Lopes Athletics Productions, you are required to report your sales numbers weekly and share them with the vice president of sales. Create an Excel spreadsheet that provides the following information.

  1. Total sales for each type of video.
  2. Total sales of all videos.
  3. Percentage of total sales for each type of video.
  4. A bar chart that summarizes the sales data.

The data needed for the spreadsheet is as follows. In all, you will need to create at least four columns; Video Type, Unit Price, Total Sales (for each type of video), and Percentage of Total Sales (for each type of video.

  1. Pilates sold 156 videos at $29.99 each.
  2. Step sold 392 videos at $14.99 each.
  3. Weight Training sold 147 videos at $54.99 each.
  4. Kickboxing sold 282 videos at $29.99 each.
  5. Yoga sold 165 videos at $34.99 each. 

Add a second worksheet to your workbook. 

  1. Insert a chart in a bar format linked to data on your first      worksheet.
  2. This bar chart should reflect the total sales of each type of video.
  3. Review the rubric to see how the spreadsheet will be assessed

Part 2

Create a PowerPoint presentation with a minimum of five slides based upon the Excel spreadsheet you created in Part 1 of this assignment.

Utilize the bar chart from the spreadsheet as a graphic element on at least one slide in the presentation. The presentation should summarize the following information for the vice president of sales:

  1. Total sales for each type of video.
  2. Total sales of all videos.
  3. Percentage of total sales for each type of video.

In addition to the content, the presentation will be assessed on the following criteria:

  1. Slide structure includes correct use of bullet points and the 6 x 6 rule.
  2. Slide appearance includes consistent theme, text alignment, readable font, clear photos/charts.
  3. Slide content is accurate, concise, and focused on a single topic.
  4. Use of chart enhances the presentation and illustrates slide information.
  5. Speaker notes are appropriate for explaining slide content and add details not presented on the slide.

Submit the PowerPoint presentation file. Do not submit any other file format, such as an Adobe PDF file, or you will not earn full credit.

General Requirements

Submit both the Excel spreadsheet file and the Microsoft PowerPoint presentation file. Do not submit any other file format, such as an Adobe PDF file, or you will not earn full credit.

APA style is not required, but solid academic writing is expected.

Benchmark Information

7.1:  Demonstrate computer literacy skills.

Performing a Qualitative Risk Assessment for an IT Infrastructure

1.

What is an IT risk assessment’s goal or objective? 

2.

Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure?

3.

What was your rationale in assigning a “1” risk impact/risk factor value of “Critical” to an

identified risk, threat, or vulnerability?

4.

After you had assigned the “1,” “2,” and “3” risk impact/risk factor values to the identified risks,

threats, and vulnerabilities, how did you prioritize the “1,” “2,” and “3” risk elements? What

would you say to executive management about your final recommended prioritization?

5.

Identify a risk-mitigation solution for each of the following risk factors:

a. User downloads and clicks on an unknown e-mail attachment 

b. Workstation OS has a known software vulnerability

c. Need to prevent eavesdropping on WLAN due to customer privacy data access

d. Weak ingress/egress traffic-filtering degrades performance

e. DoS/DDoS attack from the WAN/Internet

f. Remote access from home office

g. Production server corrupts database

HCI

 

Second job

this is continuation of HCI project 

 

Detailed discussion about the participants of the evaluation  – this may include any relevant characteristic (like the number of participant, what ages, gender split, education, proficiency level, etc.)  

  • children 4 -6 yo
  • male/female…even # of boys and girls
  • schooling (preschool and kindergarten) / no school
  • social & economic status
  • previous technology exposure (have they used mobile devices before?)

redundancy discussion

Please respond with a minimum of 150 words to the peer discussion post below after reading the initial discussion first. 

Initial Discussion:

 Discuss the relationship between data redundancy and normalization. What are the consequences if databases are not normalized? What problems is normalization addressing? Why is normalization crucial for effective database design and development? 

Peer Discussion:

 Hello class,

Database normalization is described as the process of arranging a relational database’s columns (attributes) and tables (relations) to decrease data redundancy and enhance data integrity. The fundamental connection between the two is to eliminate redundancy and provide data accessibility.

It entails organizing attributes in tables based on attribute dependencies and ensuring that the relationships are appropriately enforced by database integrity requirements.

The implications of not normalizing a database are a lack of data integrity and massive data redundancy, which leads to no access to the database. The issue with normalizing addressing is that additional tables must be joined. This implies that by dividing your data into additional tables, we increase the number of tables that must be joined. Another issue is that tables contain codes rather than actual data: Instead of meaningful data, the repetitive data is kept as codes. As a result, the value must always be obtained from the lookup table. The main issue is that the data model is difficult to query upon. This indicates that the data model is designed for applications rather than ad hoc queries. Normalization is critical for database design and development since it allows for the creation of smaller databases. We will be able to lower the total size of the database by removing duplicate entries. By offering ->, it improves database speed. Narrow tables: Having more fine-tuned tables allows your tables to have fewer columns and fit more records per data page. It also results in fewer indexes per table, which means faster maintenance chores like index rebuilds. This makes the database appear nice and easy to use.