Exp22_Word_Ch03_CumulativeAssessment_Academics

 Exp22_Word_Ch03_CumulativeAssessment_Academics

  

Project Description:

As an executive assistant working in the Admissions Office at Carnes State University, you are involved with a research project that is exploring the relationship between student GPA and involvement in academic clubs and scholarly activities. Academic and extracurricular data from a random sample of students in the College of Business has been summarized in a Word table that will be included in a brief memo to others on campus. You edit and format the report, preparing it for final submission.

     

Start Word. Download and open   the file named Exp22_Word_Ch03_CumulativeAssessment_Academics.docx.   Grader has automatically added your last name to the beginning of the   filename.

 

Click or move the insertion   point before the blank paragraph mark at the top of page 2. Using Century   Schoolbook font at 20-point size, type Carnes State University and press ENTER. Change the   font size to 16. Type Comparison of Student GPA and Involvement in College   Associations.   (Do not type the period.) Press ENTER. Check the document for spelling and   grammatical errors. All names in the table are correct.

 

Apply Align Center alignment to   the first row in the table. Click or move the insertion point after the last   entry in the last row, ending in 115.   Press TAB. Type the following data, tabbing between all entries except the   last. Leave cells blank that are marked with dashes. Do not type a dash in   the cell. Do not press TAB after the last item.
 

L0051899 Adams, Mary Accounting 3.67 101
L0055558 Shockney, Maria Yes Yes CIS 4.00 97 

 

Right-click any name identified   as misspelled and from the shortcut menu, select Ignore All. Sort the table   by Major in ascending order and then by Name in ascending order, so that the   result is names sorted within each major, all in ascending order.

 

Indicate that Michael J. Simpson and Andrew Sams are both active in Delta   Mu Delta by typing Yes in the Delta Mu Delta column for each of those students.

 

Insert a row above the first row   in the table and merge all cells in the newly inserted row. Change the font   size to 16. Type Comparison of GPA and Student Involvement. (Do not type the period.)

 

Shade the first row in Gold,   Accent 4 (row 1, column 8). Select all text in the third row through the end   of the table, beginning with L0051899   and ending with 98. The table may   span two pages. Bold the selection.

 

Select the entire table. Select   a Pen Color of Gold, Accent 4 and a line weight of 1 ½ pt. Ensure that a   single line border is shown. Apply the selection to All Borders.

 

Insert a row below the last row   in the table. Type AVERAGE in the first cell on the new row. Press TAB six times to reach   the CSU Cum GPA column. Include a   formula that averages all values in the column above. 

 

View the document in Multiple   Pages, noting that the table is split between two pages. Return the view to   100%. Select the first two rows. Click or navigate to the Table Layout tab   and select the option to repeat header rows.

 

Insert a row between Frederick Davidson and David Stumpe. Click in or move the   insertion point to the first cell of the new row and type the following   record, tabbing between cells. Do not type a dash in a cell. Leave the cell   blank.
 

L00500932 Johns, Lacey  Yes Yes Computer Science 3.89 130

 

Update the average in the last   row to reflect the addition of the new record. Insert a caption for the   table, ensuring that the label is Table   and that the caption shows below the table. Type Table 1: GPA and   Student Involvement.   (Do not type the period.)

 

Press ENTER twice. Insert text   from the file Sponsors.docx.

 

 

Select the newly inserted text,   from Sponsor through K177. It does not matter whether you   select the paragraph mark following K177,   but do not select the blank paragraph on the next line. Whether you select   the ending paragraph mark on the last line of the text is irrelevant. Convert   the selection to a table, confirming that the new table will include four   columns and four rows.

 

Right-click anywhere in the   selected table and from the shortcut menu, select Table Properties. Click or   navigate to the Column tab. Ensure that the Preferred Width check box is   selected and change the width to 2. Click or press OK. Apply a table design of Grid Table 4 –   Accent 4 (row 4, column 5 under Grid Tables). Change the font color of the   first row of the table to Black, Text 1.

 

Center the table horizontally on   the page. Insert a caption below the table that reads Table 2: Faculty Sponsors. (Do not type the period.)   Increase the indent of the caption by 0.5 inches.

 

Begin a mail merge for Letters   using Faculty.xlsx as the data   source. You will use the Sheet1$ worksheet. Note, Mac users select the text   file Faculty.csv as a recipient   list, responding affirmatively if asked to confirm any file conversion   activities.

 

Click or move the insertion   point before the paragraph mark following TO:   on page 1. Insert the merge field of Title.   Press SPACEBAR. Insert the merge field of First_Name. Press SPACEBAR. Insert the   merge field of Last_Name. Click   before the paragraph mark following DATE:   and type April 14, 2023.

 

Preview results and finish the   merge, editing individual documents and merging all. The merged document   should contain nine pages.

 

Select all of the merged   document and copy the selection. Display Exp22_Word_Ch03_CumulativeAssessment_Academics.docx,   move the insertion point to the end of the document, and insert a page break.   Paste all copied text, resulting in a 13-page document.

 

Save and close Exp22_Word_Ch03_CumulativeAssessment_Academics.docx.   Close all other open documents without saving. Submit Exp22_Word_Ch03_CumulativeAssessment_Academics.docx as directed.

Discussion 250 -300 words

What protection does Section 230 of the Communications Decency Act provide? How does this act impact major tech companies such as Google and Facebook? 

Project 2: Cloud Vendor Presentation

In this project, you will develop a detailed comparative analysis of cloud vendors and their services. A comparative analysis provides an item-by-item comparison of two or more alternatives, processes, products, or systems. In this case, you will compare the pros/cons of the cloud service providers in terms of security, ease of use, service models, services/tools they provide, pricing, technical support, cloud service providers’ infrastructure, and architecture model.

You will present your findings to the owner of the company in a narrated PowerPoint presentation with 10 to 20 slides. Use the Cloud Presentation Template.

This resource can help you prepare and record your presentation: Presentation Resources.

Presentation Guidelines

Your presentation should be comprised of the following:

  • One to two slides on the company profile.
  • One to two slides on what the company is struggling with.
  • One to two slides on current infrastructure.
  • Three to six slides on the top three cloud services providers. Include their service models (i.e., SaaS, PaaS, IaaS), services/tools/solutions (i.e., compute, storage, database, developer tools, analytics tools, networking and content delivery, customer engagement), pricing, accessibility, technical support for companies, global infrastructure.
  • One to two slides on a recommended cloud service provider based on the comparative analysis and the cloud vendor’s abilities to meet the service needs of the company.
  • One slide on the conclusion.

Evidence Collection Policy

 Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§ Description of information required for items of evidence

§ Documentation required in addition to item details (personnel, description of circumstances, and so on)

§ Description of measures required to preserve initial evidence integrity

§ Description of measures required to preserve ongoing evidence integrity

§ Controls necessary to maintain evidence integrity in storage

§ Documentation required to demonstrate evidence integrity

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages

Self-Assessment Checklist

§ I created a policy that addressed all issues.

§ I followed the submission guidelines.

project3

 

Prototyping is an integral part of design thinking and user experience design in general because it allows us to test our ideas quickly and improve on them in an equally timely fashion. A prototype is a simple experimental model of a proposed solution used to test or validate ideas, design assumptions and other aspects of its conceptualization quickly and cheaply, so that the designer/s involved can make appropriate refinements or possible changes in direction.

For Project 3, you will create a high-fidelity digital prototype of the user interface. The prototype will be used in the final project to design and test.

Intro to digital forensic

Scenario

You are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:

  • Give concerted attention to clients’ needs and concerns.
  • Follow proper procedures and stay informed about legal issues.
  • Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.

Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver’s public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation—or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver’s phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver emailed the photos to one other person several months ago. He has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else. 

Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm’s expertise. The company sees this as an opportunity to build the future business, regardless of whether they are retained to help with the investigation of this case.

Tasks

To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses to the following questions:

  • What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation? 
  • Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need
  • additional information in order to determine if they should proceed with an investigation? Why or why not?
  • What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.
  • What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale. 
  • What should the client, investigators, and others do—or not do—to ensure that evidence could be used in a court of law? Using layman’s terms explains laws and legal concepts that should be taken into account during the collection, analysis, and presentation of evidence.
  • What questions and concerns do you think the client will have?
  • What questions should the team ask the client to learn more about the case and determine the next steps?

Required Resources

  • Course textbook
  • Internet access

Submission Requirements

  • Format: Microsoft Word (or compatible) 
  • Font: Arial, 12-point, double-space 
  • Citation Style: Follow your school’s preferred style guide
  • Length: 5–7 pages

Self-Assessment Checklist 

  • I effectively documented the causes for investigation.
  • I effectively documented key points related to the collection, analysis, and presentation of computer forensic evidence.
  • I successfully identified potential sources of evidence.
  • I summarized laws and legal concepts that apply to this case.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

Grading Rubric for the Assignment #1:

  • Delivery: Delivered the assignments on time, and correct format: 25 percent
  • Completion: Providing a thoroughly developed document including descriptions of all questions: 25 percent
  • Understanding: Demonstrating a clear understanding of the purpose and writing a central idea with the most relevant facts, details, and/or explanation: 25 percent
  • Organization: Paper is well organized based on the APA format, makes good use of transition statements, and in most instances follows a logical progression including good use of symbols, spacing in output: 25 percent

short answer

 For the past several years employers have started to give a lot of weight to applicants who not only have a degree, but who also possess one or more IT certifications. Engage in research on the Internet and discuss whether you feel having both a degree and certification(s), or just one but not both, can affect your career in technology.  Examine some online job boards such as Dice.com, Monster.com, and your local newspaper/want ads to determine the nature of IT certification needs for IT positions in the want ads.  Report your findings.  Based on your research, what are some examples of IT certifications that you might wish to pursue? 

Exp19_PowerPoint_Ch01_ML1_Time_Management

  

Exp19_PowerPoint_Ch01_ML1_Time_Management

Exp19 PowerPoint Ch01 ML1 Time Management

PowerPoint Chapter 1 Mid – Level 1 Time Management 

  

Project Description:

You belong to a student organization on campus that has asked you to put together a presentation on time management. You created a presentation with some basic content for a school project you will use as starting point. You want to modify the presentation to make it more appealing and better portray the message.

     

Start PowerPoint.   Download and open the file named Exp19_PPT_Ch01_ML1_TimeManagement.pptx.   Grader has automatically added your last name to the beginning of the   filename.

 

Apply the Gallery   theme and change the variant to the second variant.

 

Change the theme   colors to Aspect and the theme fonts to Corbel.

 

Add the title Time   Management   in the title placeholder. Type Use Your Time Wisely in the subtitle   placeholder.

 

If you want to use   slides from another presentation, the Reuse Slides features saves   considerable time, as you do not have to copy and paste slides from another   presentation.
 

  Use the Reuse Slides feature to add all slides from Time.pptx into the open presentation. Preserve the order of the   slides. Ensure the Use source formatting or Keep source formatting check box   is not selected so that the inserted slides take on the design and formatting   of the open presentation.

 

Delete Slide 2. Move   Slide 3 so that it becomes Slide 2.

 

Click Slide 5 and add   a new slide. Change the slide layout to Content with Caption on the newly   inserted slide. In the top left placeholder, type What’s Stealing Your Time? (including the ?   mark). Increase the font size of the text to 44 pt and apply Bold.
 

  Click the bottom placeholder and type Identify aspects of your   personal management that need to improve! Increase the font size of the   text to 24 pt.

 

Images can be used to   enhance a presentation and better portray your message.
 

  On the newly created slide (slide 6), insert the Steal.jpg image in the content placeholder on the right. Change   the width of the image to 6.3″

 

Apply the Bevel   Perspective Left, White picture style. Change the Picture Border to Tan,   Background 2. Set the horizontal position of the image to 4.8″ and the vertical   position to 1.5 “.

 

Change the layout of   Slide 4 to Title and Content. Insert the TimeMarches.jpg   image in the content placeholder. Crop the top and bottom of the image so   that most of the white area is removed. Change the width of the image to 7.9″

 

Apply the Moderate   Frame, White picture style. Change the Picture Border to Tan, Background 2.   Set the Horizontal position of the image to 2.7″ and the Vertical   position to 2.5″.

 

SmartArt allows you   to communicate information visually with graphics instead of just using text.
 

  On Slide 5, convert the list to a Vertical Box List SmartArt graphic.

 

On Slide 3, convert   the list to a Basic Block List SmartArt graphic.

 

Check the   presentation for spelling errors. Make corrections as needed on the slides   and notes.

 

To help you prepare   and deliver your presentation you will add speaker notes.
 

  Type the following speaker note on Slide 6: To better manage your time it   will be important to identify aspects of your personal management that may   need to improve. 

 

Save and close Exp19_PPT_Ch01_ML1_TimeManagement.pptx.   Submit the file as directed.