Connecting to the Physical Network Layer

Create a table to illustrate how you are connected to the physical network layer of the cyber domain.

  • Identify the devices in your home that are connected to a network, such as your phone, computers, or other networked devices.
  • Briefly explain how those devices are connected to a larger network, such as a cellular provider or ISP.
  • Research and list at least 3 threats to you and your connected networks.

Format any references according to APA guidelines.

Cryptography – Discussion

analyze the structure of advanced encryption standards and why it makes it so strong. 

You must use at least one scholarly resource. 

Every discussion posting must be properly APA formatted.

300 words

Provide at least 3 pieces of constructive feedback for the presenter. 50 words!!!

 

I found a good Informative speech and it  had some information that I found to be interesting. It’s called  Informative Speech on Sleep.  

Informative Speech on Sleep 

 Links to an external site.

  • What type of speech is this (informative or persuasive)? 

This is an informative speech about Sleep.  

  • What’s the main difference between an informative and persuasive speech? 

The main difference between an informative  and persuasive speech is that one is informing the audience and the  other is persuading the audience. An informative speech needs to inform  the audience on a topic. A Persuasive speech needs to persuade or  convince the audience.  

  • Using some of the evaluation areas listed above, provide at least 3 pieces of constructive feedback for the presenter. 

This  speech was well done with great information and visual aids. I was able  to relate to some points which made it very interesting. 

  • Knew topic well/freedom from notes 

In this area, I think she knew the topic  but not well. In future she needs to study more so she knows the topic  better and this will help her from reading her notes too much. I think a  speech is better if it sounds like the speaker isn’t following a script  word for word. Sometimes this causes breaks or slow reading.  

  • Tone/Energy/Enthusiasm for topic 

I like that she still did her speech even  though she had laryngitis. Her energy and enthusiasm seemed to me to be a  bit robotic. I think if she knew her speech better then maybe she could  relax more and then more energy would come out. Knowing the material  better is key for her next speech.  

  • Dressed appropriately for a formal presentation 

I am diffidently not someone who knows  clothes or style. I think that a zip up hoodie is not professional. When  it comes to an idea for what she should have worn, I wouldn’t know but  following a basic professional dress code is a good idea to follow. If  she wasn’t feeling good then maybe that played a part in her formal  presentation.  

Cost Estimation

Mini-Case Study: Cost Estimation at Global Green Books Publishing Global Green Books Publishing is continuing to produce customized eBooks as a key new product line for it as a successful printing and publishing company. It has developed a template to help plan job orders. The major customer for these customized eBooks is a local college, who expected these books to be delivered at a low cost, and the company has not always been doing that. The Accounting department in Global Green Books was having difficult tracking the costs for each of the books. Each eBook had a separate job order prepared that listed all the steps that needed to be completed, so that tasks could be assigned to each worker and costs estimated. With the existing job orders, estimates of time required for each task were sometimes not completed until after the work was done, causing problems as workers were supposed to move on to new tasks but were still finishing their previous tasks. Some tasks required specialized equipment or skills, sometimes from other groups within Global Green Books. Along with its template for job orders, Global Green Books wanted to start developing a project estimate for each new eBook project. This cost estimate should capture direct costs and indirect costs. The direct costs for an eBook project include labor costs for those in the company working on the project, materials costs (if any), subcontractor or outside labor, and 

Unit 7 db#2 + responses

 What are some ways that the government could collect data on non-criminal citizens? How could this information be misused? Please use outside research to back up what you say and be sure to cite your sources. 

Then respond to 2 classmates

Anthropology of Language and Communication

 

For this assignment, you need to do the following:

  • Search and submit reference details for at least four scholarly resources on your language and topic
  • Your references should be in APA format
  • Design and submit a list of tentative interview questions that you would like to ask your relatives or other persons associated with your ancestral language
  • Plan ahead and submit a tentative list of family members you want to interview, as well as a tentative interview schedule
  • For additional information, review the assignment guidelines and requirements in your syllabus

Instructions: 

Use the Worksheet attached to the assignment. In Part I, create a reference list of at least four scholarly sources that you will use in your final project; references should follow APA format (7th edition). In Part II, include your tentative list of questions, relatives you would like to interview, and a tentative interview schedule.

Finding scholarly sources  

For this part of the final project, UMGC library databases, or Google Scholar to locate four scholarly or credible sources on your chosen topic.

What is a scholarly or credible source? You should rely on sources that have credibility. Appropriate sources are articles written by experts in the field, articles found in peer-reviewed journals, published documents from well-known research groups (e.g., Pew Research), and reports published by government agencies (e.g., NIH, CDC). Inappropriate sources would include popular websites (e.g., about.com, ehow.com, Wikipedia) or media outlets (e.g., Fox, MSNBC, Wall Street Journal, New York Times, Forbes, etc.). These sources do not always accurately report their findings and are sometimes prone to bias. If a website or article fails to report the credentials of the author(s) and does not include citations for the information contained in the article, chances are it is not a scholarly source and therefore should not be used. 

Submit a summary of each article using the attached worksheet. In your own words, identify the key findings of the article. Do not simply state what the article was about (e.g., “This article talks about cyberbullying”). What specific information did you learn from your source? (e.g., “Cyberbullying has become a popular means of abuse among teenagers, affecting about half of all young people.”) The purpose of the key findings section is to demonstrate that you have read and understood each of your sources. Your key findings should be 250 words in length. Do not simply copy and paste the abstract or any other part of your source! This is plagiarism and violates university policy. 

The purpose of this assignment is to 1) ensure that you are using appropriate, scholarly sources, and 2) to make sure you are on track for your final project. 

SE493 week 4

Apa format 200 words each questions and citations 

Question 1

Pease read chapter 7 textbook and library resources and reputable journals and review PP slides chapter 7 pages 53 to 57 and in your own word discuss your understanding of:

What is an Open Source Software? What is the idea behind open source software?

What are open source issues and why more product companies are using an open source approach to development?

If you are in charge of developing a new software application will you use some open source components in your software application, and why?

Question 2 

Assignment Description

Please read chapter 6, what is Layered Architecture? When used? Advantages and Disadvantages of Layered Architecture?

Hint: You can use Unix as an example of layered architecture

DBMS Assign

 Task 1 – Design (40 Marks) a) Produce an entity relationship model for the proposed database system for Universal Conference Management. This should be a fully normalised model to third normal form (3NF). You do NOT have to show the steps you took in normalising the data. b) Produce a data dictionary for the entity relationship model showing all attributes, with data types and identifying primary and foreign keys. 

Task 2 – Data entry and Data Manipulation (45 Marks) a) Create all the tables using SQL. Show your ‘create table’ scripts and the finished tables. b) Enter data on all the events shown in the assignment. c) Enter data for FIVE (5) customers and associate them with events. Note that a customer might have more than one event associated with them. d) Enter data on staff and items taken from the assignment. Give a listing of this. e) Write a query that selects all the events ordered by a particular customer. f) Write a query that selects the staff and items assigned to an event. g) Write a query that selects all the customers’ details for events that require a laptop. h) Write a query that counts all the birthdays that need equipment from Edison Sound and Light. i) Write a query that shows all the events and their customers that need a waiter. j) Update the item table so that Item 2 is no longer a laptop but a ‘tablet’. k) Update the staff table so that Tara Patel is now known as Tara Williams. 

Task 3 – Assessment (15 Marks) Give an assessment of how the work you have done has met the requirements of Universal Conference Management. 

Submission guidelines  Your submission should be in the form of a single word-processed document that includes any necessary diagrams.  The word count for the document is 1250 words (excluding text in any diagrams). You should explain any assumptions you have made.  A digital version must be submitted on a CD, USB flash drive or other similarly acceptable medium, along with a copy of the developed database 

Discussion 250 -300 words

  1. What or who do you think is the greatest threat to the security of information today? What computer security incidents have been in the news recently?
  2. What policies govern your behavior currently, in school, work, or in other organizations? Are those policies enforced/followed? Why or why not?