PowerPoint_3B_Enrollment

PowerPoint_3B_Enrollment

     

Open the file Student_PowerPoint_3B_Enrollment.pptx   downloaded with this project. Then, in your textbook, turn to Project 3B and   complete all of the steps in Activities 3.18 – 3.30.

 

Complete Activity 3.18 Creating   a Table

 

Complete Activity 3.19 Inserting   Rows and Columns in a Table

 

Complete Activity 3.20 Sizing a   Table

 

Complete Activity 3.21   Distributing Rows and Aligning Table Text

 

Complete Activity 3.22 Applying   and Modifying a Table Style

 

Complete Activity 3.23 Applying   Table Effects and Font Formatting

 

Complete Activity 3.24 Inserting   a Column Chart

 

Complete Activity 3.25 Entering   Chart Data

 

Complete Activity 3.26 Applying   a Chart Style and Modifying Chart Elements

 

Complete Activity 3.27 Creating   a Line Chart and Deleting Chart Data

 

Complete Activity 3.28   Formatting a Line Chart

 

Complete Activity 3.29 Animating   a Chart

 

Complete Activity 3.30 Animating   a Chart with the Morph Transition

 

Save and close the file, and   then submit for grading.

Research paper abstract summary on roles of the SystemAdministrators or Cyber Security

Subject: Business Network Systems Management

Topic:  The roles of the System Administrators or The roles of the Cyber Security

1. Please add Research Paper Topic for roles of SystemAdministrators/Cyber Security as a topic sentence like the title of a journal article.

2. The topic must be very specific and CAN NOT BE too broad otherwise it will be returned back.

3. Add brief 1 paragraph an abstract summary (600-800 words) of what you would like to say about that topic (i.e., ).

Subject book used: The Practice of System and Network Administration, Volume 1 3rd edition.

It217 week4 assignment

use JUSTBASIC SOFTWARE 

1. Create a Just Basic playoff tournament program using array and the following:
a. There are 8 players qualified for the playoff in the tournament. The quarter final consists of 4 games: P1 vs P8 (game 1), P2 vs P7 (game 2), P3 vs P6 (game 3), P4 vs P5 (game 4).

b. Playoff Semi-Final: game 5: the winner of game 1 plays the winner of game 4, and game 6: the winner of game 2 plays the winner of game 3.  

c. Final: Game 7: The winner of game 5 plays the winner of game 6. 

d. The champion is the winner of game 7.

Hint: If you add scores to the games the program should determine the winner and the champion.

Discuss the WSH

  

1) Discuss the WSH objects and methods that are used by VBScript to create network share and to map network shares to a local drive. 

  • What is the Windows CLI command that will share the      C:Data directory with the share name PublicData? 
  • What is the Windows CLI command that would map the      share PublicData on FileServer1 to the local drive X:? 

Read the Week 3 iLab instructions and discuss the expectations you have regarding this lab. Is it easier to manage network shares from the Windows CLI or within a VBScript? How did your actual lab experiences meet your expectations? Are there specific insights or challenges you encountered that you would like to share with the class? 

Write a main function

  

Write a main function that asks the user for four floats and then outputs the minimum, maximum, their sum and mean value.
use the functions from (a) – (d) to implement this.
(a) Take two floats as argument and returns the minimum of those.
(b) Take four floats as argument and returns the minimum. Make use of the function defined in a)
(c) Are the same as in a) and b), but returns the maximum.
(d) Take four floats as argument and returns their sum and mean.
The output has to be as follows:
Give four floats: 10.0 -2.3 13.2 20.4
Min: -2.300000
Max: 20.400000
Sum: 41.299999
Mean: 10.325000

Final Project

 Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. (APA format)

Creating Company E-mail/WIFI/Internet Use Policies

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Some useful links and resources for your research:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

https://resources.infosecinstitute.com/acceptable-use-policy-template-public-wifi-networks/#gref

https://www.techrepublic.com/article/download-our-wireless-policy-template/

Unbiased Recommendations

 

Assignment Content

  1. Constructing a rationale requires research, and research requires identifying unbiased sources of information. Clearly, you cannot rely on a company’s own marketing materials to be unbiased in its evaluation of its own products.

    Write a 150-word response about how you approached locating and vetting high-quality, unbiased sources of information when researching trends, vendors, and other easily hyped topics. How satisfied are you with your ability to identify unbiased recommendations for a specific project type? Why?

    Submit your assignment.

     

Week 2 Assignment: Parallel Programming jan 31

1. How does parallel processing work in computer architecture?

2. What does Amdahl’s law state? What is Amdahl’s law and why it is used?

3. What are the applications of parallel processing in computer architecture?

4. What are the challenges in parallel processing in computer architecture?

5. Identify reasons for and consequences of the recent switch from sequential processing to parallel processing among hardware manufacturers.