PowerPoint_Introductory_Capstone1_Winter_Products

PowerPoint_Introductory_Capstone1_Winter_Products

  PowerPoint Introductory Capstone1 Winter Products

  Project Description:

In this project, you will apply skills you practiced from the Objectives in PowerPoint Chapters 1 through 3. You will develop a presentation that Irene Shviktar, Vice President of Marketing, will show at a corporate marketing retreat that summarizes the company’s plans to expand the winter sports product line.

     

Open   the PowerPoint file PowerPoint_Capstone1_Winter_Products.pptx downloaded with this project.

 

Change the Slide Size to   Widescreen, and then change the Colors to Blue II.

 

Format the background of Slide 1   with the picture downloaded with this project—pCap1_Skiing.jpg. Select the subtitle, and then use the   Eyedropper to change the font color to the dark red color of the skier’s   jacket. Apply bold to the subtitle.

 

With Slide 1 displayed, insert   the second slide from the downloaded presentation named pCap1_Company_Overview.pptx.
  Mac users: Insert all slides and then delete the title slide (FRONT RANGE   ACTION SPORTS) and the third slide (SPECIALIZED MERCHANDISE) from the Company   Overview presentation.

 

On Slide 2, in the content placeholder, center the paragraph, increase   the font size to 32, and then apply bold and italic. Click the Bullets button   to toggle it off.

 

On Slide 2, change the line spacing of the content placeholder text to   1.5. Change the shape fill to the first color in the sixth column, and then   change the font color to White, Background 1—the first color in the first column.

 

On Slide 2, format the content placeholder with the first bevel shape   effect—Round. Format the title with the first WordArt style and increase the   font size to 80.
 

  Note, the bevel effect may be named Circle depending on the version of Office   used.

 

Display Slide 3, and then change the slide layout to Content with   Caption. In the content placeholder, from the downloaded project files,   insert pCap1_Heights.jpg. Apply the   first reflection picture effect—Tight Reflection: Touching.

 

On Slide 3, format the slide background with the last Theme color in   the sixth column.   Be sure to apply the background color only to Slide 3. Increase the font size of the caption placeholder   text to 24.

 

Display Slide 4, and then in the content placeholder, insert the   Process type SmartArt graphic Segmented Process. Change the color to Colored Fill – Accent 2, and then apply the 3-D Cartoon style. Center the slide title and   hide the background graphics.

 

In the SmartArt, in the top,   dark blue text rectangle, type Washington and California Resorts and then click in the light blue   text placeholder below and to the left. Type Mammoth Mountain in California and then click in the text   placeholder to the right. Type Mission Ridge in Washington 

 

In the middle of the SmartArt   graphic, click the dark blue shape. Type Our Market Position and then click in the light blue   text placeholder below and to the left. Type Trusted brand name and then click in the text   placeholder to the right. Type Expansion planned for Western U.S. (include the period.)

 

In the last dark blue shape,   type Poised   for Growth and   then click in the text placeholder below and to the left. Type New   warehouses in Washington and then click in the text placeholder to the right. Type Proposed   retail division in California

 

Display Slide 5, and then insert a new slide with the Two Content   layout. On the inserted slide, enter Our   Most Popular Winter Products as the slide title. Center the   title.

 

On Slide 6, in the content   placeholder on the left, type the following six list items and then change   the font size to 36 and apply the default numbering style.
Snowboards   
Boots   
Goggles   
Bindings   
Skis   
Jackets

 

On Slide 6 in the placeholder on   the right, search Online Pictures using the search phrase snowboard and then insert an appropriate   image from the results. Change the Height of the picture to 3.5 and then   apply the preset Glow: 8 point; Turquoise, Accent color 1 glow effect— in the   first column, the second effect.
 

  Select and delete any additional text boxes that may display when the image   is inserted.

 

Display Slide 7, and then in the   content placeholder, insert a Clustered Column chart. In the worksheet, enter   the following data:
Oregon Colorado British Columbia
Year   1 12.2 17.5 6.5
Year   2 14.5 19.2 8.7
Year   3 11.9 18.6 10.6
Year   4 17.6 22.4 11.3

 

Apply Chart Style 8, and then   remove the Chart Title element. Animate the chart by applying the Wipe   entrance effect.

 

Display Slide 8, and then hide   the background graphics on the slide. Format the background with the   downloaded picture file—pCap1_Lake.jpg.

 

On Slide 8, align the text   placeholder to the top and center of the slide. Change the Font Color to   White, Background 1—the first color in the first column, and the Font to   Calibri (Body). Apply Bold.

 

In the slide thumbnails, select Slides 5 and 9. Apply a Solid Fill   background color using the second color in the sixth column, under Theme   colors.

 

Display Slide 9. Insert the downloaded picture file pCap1_ Mountain.jpg. Change the   picture Height to 2.25 and then apply the second glow effect in the first column.

 

On Slide 9, use the Crop to   Shape option to change the picture shape to the tenth Basic Shape in the   third row—Cloud. Align the picture to the center and middle of the slide.

 

On Slide 9, insert a Frame shape   anywhere on the slide. Change the Height to 2.5 and the Width to 4.5, and   then type Moving to the Top of the Winter Sports Action in the shape. Align the shape to   the bottom of the slide. Select the title, picture, and frame, and then align   the objects to the center of the slide. Apply the second style in the third   column shape style to the Frame shape.

 

To all of the slides in the   presentation, apply the Page Curl transition with the Single Left Effect   Option. 

 

Display Slide 6, and then apply   the Split entrance effect to the numbered list.

 

Display Slide 3. In the Notes   pane, type The key elements necessary to achieve our goals are the   expansion of the winter sports product line and an aggressive marketing   campaign. (include   the period).

 

Insert a Header & Footer for   the Notes and Handouts. Include the Date and time updated automatically, the   Page number, and a Footer with the text Capstone1_Winter_Products.

Cybersecurity

(a) How many policy documents does the ISO 27000 standard provide? Briefly describe the content areas covered by each of them.

(b) Compare the ISO 27000 series of documents with the NIST documents discussed in Chapter 8. Which areas, if any, are missing from the NIST documents? Identify the strengths and weaknesses of the NIST program compared to the ISO standard.

What is SANS SCORE and why is it useful? Review the security policy documents provided by SANS SCORE and discuss contents of the relevant documents available under each of the following categories: (a) Server Security (b) Application Security (c) Network Security (d) Incident Handling.

 What is the fundamental difference between a security management model and a security architecture model? Explain with an illustrative example.

(a) What are the key principles on which access control is founded?

(b) What two access control methods that use a state machine model to enforce security? Compare and contrast the two methods by explaining their similarities and differences.

What is separation of duties? Discuss the various ways through which this method can be used to improve an organization’s InfoSec practices.

Assignment

  

  1. What are some examples of confidential information? (provide at least 5 examples). 

2. What does a buffer overflow do?  

3. Why is it important for information security professionals to know the laws that affect them? 

4. What are some other security models besides the CIA triad? 

5. What are the four components of security documentation? 

6. What are responsibilities of a security architect? 

7. What is authentication? What is authorization? Together, what are authentication and authorization used for? 

8. What are the three commands for administering database object permissions? 

9. What best practice network architecture should be used for databases that provide data via a web server to the Internet? 

10. Why is encryption generally not used in the core layer? 

***Please answer in order***

Write pseudocode

Write pseudocode for the 5 (five) problems for full credit. There are two ways to complete this quiz. One is to simply download the instructions file (docx) below and do your pseudocode code editing right into the instruction document. Then upload the edited Word file.The other is to type a separate document with your pseudocode and submit the newly created document. Make sure your pseudocode includes the problem descriptions. You get to pick your own poison. You DO NOT need to create C++ source code files for this assignment. Remember pseudocode is intended to be a description/roadmap for your program. Keep it simple but include enough information to define your plan. It is not supposed to look like code. Use the template sections. Purpose: Don’t just repeat the problem description. Think in terms of HOW you are going to do the job. Input: What values (if any) do you need from the user. You can also include known/defined values such as PI. Processing: Describe what processing/calculations need to be done Output: Results to be output. Text and/or calculated values.

Basic Student Records System

Basic Student Records System

Design and implement a simple student record system using Windows Forms in Visual Studio. Your program should have the following minimum requirements:

1. Your program should have a welcome screen.

2. The user should be presented with another screen where they can enter their grades.

3. The screen will have an option to calculate the average grade

4. The screen should also have an option to clear all the grades

5. The users can use it as many times as they like

6. The user can exit, and the program will then display the welcome screen.

Assignment Instructions:

• You are required to create a document with appropriate headings and sub-headings. You must include a short description of the task and how you intend to solve it.

• You must work individually on this task.

• You need to show evidence of different programming constructs you have learnt. You also need to include screenshots of your program.

response eric

 

In a world controlled by technology, the internet is something that has become a staple of any business. You have a range of options on how you choose to connect to the internet. DSL was one of the first options, carrying data through telephone lines, next came cable that uses buried ground lines serviced by cable companies. WiMax entered the industry around 2001 and uses wireless technology to carry data. Fiber is the newest technology, utilizing modulated light pulses.

In terms of security, DSL and cable are relatively equal as they are simple copper wires that can be tapped into with easily available equipment. WiMax is the least secure technology as wireless signals are easier to intercept than having to tap into a physical line. Fiber is the most secure option as it is expensive to get equipment for attempting to tap into and decode the data. The best security option is to protect your data inside your network and secure packets for transfer over the internet. You can use firewalls to ensure that your company’s data isn’t accessed without authorization in your network and encryption for when you transmit packets over your chosen connection medium.

To write java program of prime numbers

you will generate a NON THREADED, SEQUENTIAL program.  This sequential program will take some input (you can grab this input from the user, or from a command line argument) that it will store in an integer.  (Therefore, there needs to be checks in place to make sure that the number being given can be stored adequately in an integer.  You do not need to use BigInteger or long for this, regular integersis fine.  This is more about design than about function).

Now that you have this number, you want to compute all the prime numbers that exist between 2 and that number (inclusive).

If a number is not prime, you will store that number and a List of its factors in a Map

If a number is prime you will store it in a List.  So, at the conclusion, we have a Map of non primes that contain factors of numbers and a list of primes.

You will time the runtime of your application so that we know how long it will take to build these two structures.  To time your application, simply generate a starting time as soon as you retrieve the number you want to use as the base of your iteration and then stop the timer when you are finished generating your structures.  Report back what the difference is. You can use System.currentTimeMillis(); to do this.

computer security foundamental

  

IT departments in organizations are often expected to define a company’s information security policy. Although much of the security that needs to be added into an organization may reside in IT, all of the departments are involved in implementing the policies.

Post the following to the discussion board:

Assess the authority structure in an organization that uses formal information systems by answering the following questions:

Which department in an organization do you believe should be responsible for the company’s information security, and why?

What are some advantages and disadvantages of your choice?

Compare the tools an information security manager has available to properly implement the necessary security within an organization?

DQ

From the humdrum of the mid-2000s web apps, Apple radically changed the mobile world with the iPhone, offering well-designed apps of their own and curating apps that were accepted into the App Store.  That influence has been far reaching, prompting Google to push their boundaries and develop material design, a design language that has become the distinctive hallmark of Android apps.  When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar? 

  • When compared to the web world where some popular apps could get away with mediocre design, why do mobile apps face a higher design bar?
  • Compare and contrast native mobile app design versus standard desktop app design.  Discuss considerations for choosing one over the other.  Elaborate on main advantages vs disadvantages.

Question 2 : Creating an Example Web Service. Page 42 Chapter 3.
Chapter 3
For submission : Read carefully “Using the Microsoft Stack” and “Using the Linux Apache MySQL PHP (LAMP) Stack” or 2 different approaches for creating a web service. Then
(a) compare the two approaches and
(b) explain 2 advantages of each approach relative to the other.