Write a brief summary of the attached article. In your summary, focus on the need for an AUP and its key elements.
Cybersecurity
Wk 7 – Class Discussion – Secure Network Design
Secure Network Design and Cloud OutsourcingThe increase in the use of cloud services means that network security design must be taken into account. What are the security design impllications for the differnet Cloud service models? Be sure to take into account IaaS, SaaS, PaaS and FaaS and network security issues for each model. Be sure to note both the Cloud providers role and the Client’s role in securing the network.Keep your discussion under 200 words, be sure to substanially comment on two(2) of your classmates discussions (minimum 50 words). Cite all sources,(remember no citations no validy.)
Exp19_PowerPoint_Ch01_Cap_Want_to_Waffle
Exp19_PowerPoint_Ch01_Cap_Want_to_Waffle
PowerPoint Chapter 1 Capstone – Franchise
Exp19 PowerPoint Ch01 Cap Want to Waffle
Project Description:
Want to Waffle is a successful mobile food business. The company was started by two culinary students and their families to finance the students’ college education. A year later they own three food trucks that sell breakfast waffles, waffle sandwiches, and dessert waffles. Street-food lovers line up around the block when the food trucks park in their neighborhood. The truck locations are advertised via Twitter and on Facebook, so waffle lovers can follow the trucks from place to place. The business has increased its revenue and profits, and the owners are looking to expand their operation by offering franchises. They need to prepare a presentation for an important meeting with financiers.
Start PowerPoint. Download and open the file named Exp19_PPT_Ch01_Cap_WantToWaffle.pptx. Grader has automatically added your last name to the beginning of the filename.
Change the theme variant to the last one (orange variant).
Change the theme color to Red Orange and the theme font to Candara.
Create a new slide after Slide 1 using the Panoramic Picture with Caption layout. Type Interested in Bringing Waffle Love to Your Town? in the middle placeholder. Type The opportunity can be yours! in the bottom placeholder.
Select the text Waffle Love in the middle placeholder, change the font size to 32 pt, apply Shadow, and change the font color to Gold, Accent 2.
Note, Mac users, to apply the shadow, on the Shape Format tab, click WordArt Styles, and then click Shadow.
Click Slide 2. Use the Reuse Slides option to insert all of the slides from Waffles.pptx into the open presentation. Ensure the Use source formatting or Keep source formatting check box is not selected so that the inserted slides take on the design and formatting of the open presentation.
Type the following speaker note on Slide 1: We have a great opportunity for you to join our waffle family. (Include the period).
Delete Slide 3. Move Slide 5 (92% increase in sales) so that it becomes Slide 4.
Create a Notes and Handouts footer with the following: Franchise Information. Apply to all.
Click Slide 1. Insert the WaffleTexture.jpg image file. Crop the image by dragging the middle bottom sizing handle up until it is at 0″ on the vertical ruler. (HINT: Shape Height will be 3.75″ at this point). Change the width of the cropped image to 13.33“.
Apply the Drop Shadow Rectangle Picture Style. Set the horizontal position of the image to 0″ and the vertical position to 0″.
Click Slide 2 and insert the DessertWaffle.jpg image file. Apply the Simple Frame, White Picture Style.
On Slide 8, insert the Waffle.jpg image file. Change the width of the image to 7.3″.
Apply the Simple Frame, White Picture Style. Set the horizontal position of the image to 5.4″ and the vertical position to 1.6″.
On Slide 7 convert the list to the Step Up Process SmartArt graphic.
Note, Mac users, convert the list to the Basic Process SmartArt graphic.
On Slide 3, select the text Why We’re HOT in the title placeholder and apply the Fill: Red, Accent color 1; Shadow WordArt Style to the text. Increase the font size of the WordArt to 60 pt.
Check the presentation for spelling errors. Make corrections as needed on the slides.
Save and close Exp19_PPT_Ch01_Cap_WantToWaffle.pptx. Submit the file as directed.
Computer Science- Analyzing and Data Visualization ITS530 week4
Review the attached file. Suzie has an issue. She can either move to NY or FL and needs to review some data that her agent gave her. The agent reviewed house prices and crime ratings for houses that Suzie would be interested in based on her selection criteria. She wants to live in an area with lower crime but wants to know a few things:
- Is it more expensive or less expensive to live in FL or NY?
- Is the crime rate higher in FL or NY (Note a low score in crime means lower crime)?
- Is the crime rate higher in lower or higher house price areas?
Using the R tool, show the data in the tool to answer each of the questions. Also, show the data visualization to go along with the summary.
- If you were Suzie, where would you move based on the questions above?
- After you gave Suzie the answer above (to #4), she gave you some additional information that you need to consider:
- She has $100,000 to put down for the house.
- If she moves to NY she will have a job earning $120,000 per year.
- If she moves to FL she will have a job earning $75,000 per year.
- She wants to know the following:
- On average what location will she be able to pay off her house first based on average housing prices and income she will receive?
- Where should she move and why? Please show graphics and thoroughly explain your answer here based on the new information provided above.
Note: The screenshots should be copied and pasted and must be legible. Only upload the word document. Be sure to answer all of the questions above and number the answers. Be sure to also explain the rational for each answer and also ensure that there are visuals for each question above. Use at least two peer reviewed sources to support your work.
Machine learning 4
Fundamentals of linear predictive modeling
Write a fully executed R-Markdown program and submit a pdf / word or html file performing classification task on the Binary response variable from the Santander Bank Case Study. Make sure to try various hyperparameters of the SVM algorithm to find the best available model.
You are required to clearly display and explain the models that were run for this task and their effect on the reduction of the Cost Function.
Points will be deducted in case you fail to explain the output.
Trojans, Malware, and Cryptology Attacks
Part 1: Hacking Windows and Linux
Respond to the following:
- How can you distinguish between different operation systems by examining a listing of host services? 200 words minimum.
- Why are most networks, even small office/home office (SOHO) networks, considered mixed networks in terms of operating systems? Give some common examples of devices in a typical home that might be running Linux or a derivative of it. 300 words minimum.
- How are UNIX/Linux and the Apple OS X related? 200 words minimum.
Part 2: Windows 2000™ and Firewall Issues
Respond to the following:
- When Windows first released Windows 2000, a default install resulted in IIS being installed and running. Why do you think Microsoft was criticized for this? 200 words minimum.
- What are some of the problems that might result from only deploying a firewall at the perimeter of an organization? Do most Linux distros come with a firewall? If so, explain it. What are some of the features of Microsoft’s “Internet Connection Firewall”? 300 words minimum.
cover letter.
write a cover letter based on the attached documents, pay attention to the instruction. If You are being ask to write Cover letter of the attached internship document. Make the cover letter and spiritual statement.
- Cover Letter describing your interest in an IJM Internship or Fellowship
- Statement of Faith (if not addressed in cover letter. Please share about what your faith means to you and how it has inspired you to take part in the work of IJM).
84%
Please help. Files in attachments.
medterm
INSTRUCTIONS INSTRUCTIONS
1. When answering each question, each answer should be complete and respond to all facets of the question. State your assumptions if needed. Your writing style will be evaluated (points will be deducted for writing errors).2. The format of your answers should be the following:
- Each answer shall be no longer than 2 pages
- Use single space
- Use an 11- or 12-point sans-serif font (Arial, Helvetica, or Calibri which is preferred)
- Use 1-inch margins
3. The deliverable must be APA compliant and include at least two credible references for each question. Place your reference list at the end of each question. No references to wikis, blogs and other unreliable sources are accepted.4. All five answers must be original and in your own words. This means that you should not include quoted material in your answers. I want to know what YOU know!
Questions (ANSWER EACH OF THESE QUESTIONS)
- When making decisions about how to acquire hardware, software, or any other components of the IT Infrastructure, consideration is given to the following four (4) characteristics of an IT infrastructure:
- Dependable
- Manageable
- Adaptable
- Affordable
Evaluate cloud computing in relation to each of these four (4) criteria. (20 points)
2.The Department of Homeland Security (DHS) consists of both Operational Components and Support components. These entities are: Cybersecurity and Infrastructure Security Agency (CISA); Federal Emergency Management Agency (FEMA); Federal Law Enforcement Training Center (FLETC); Transportation Security Administration (TSA); U.S. Citizenship and Immigration Services (USCIS); U.S. Coast Guard (USCG); U.S. Customs and Border Protection (CBP); U.S. Immigration and Customs Enforcement (ICE); U.S. Secret Service (USSS); Countering Weapons of Mass Destruction Office; Management Directorate; Office of Intelligence and Analysis; Office of Operations Coordination; Science and Technology DirectorateThe DHS strategic plan states: “The Nation faces a complex threat landscape with enemies and adversaries who are constantly evolving. Accordingly, the Department will build on the considerable progress since its formation and lead homeland security initiatives across this Nation and the globe that meet the threats of today and the future. The Department’s dedicated operators and personnel will safeguard against threats both foreign and domestic, respond to national emergencies and contingencies, and preserve the Nation’s prosperity and economic security.”Define and explain data warehousing in detail and describe how it could be used in the DHS. (20 poiints)
3. Describe how applying big data technology to social media can be useful for:(1) a chain of fitness centers,(2) a large government agency,(3) a multinational fashion retail company, and(4) a global online university.Finally, summarize the negative aspects of applying social media data in this way and identify ways to mitigate these concerns. (20 points)
4. Identify and describe four technologies developed and/or advanced by Google and explain how it impacts society positively and negatively. At least one technology must be related to networks and at least one should be related to mobile technology. Indicate which technology is related to networks and which relates to mobile technology. (20 points)
5. You have just been hired to work in a brand-new family grocery/bakery store in Adelphi, Maryland. You know the value of information systems and want to convince the owner (who knows only how to manage a grocery/bakery store) that technology can help the business. List at least four (4) business-related competitive strategies (not technologies) that will address the potential risks an organization may encounter as it strives to maintain or improve its position in the marketplace. Also, for each competitive strategy you identify, give an IT technology example that can apply to support that strategy. (20 points)
computer architecture chapter 2 jan 14
first video: https://youtu.be/m13Jrk-cUmo
second video: https://youtu.be/eE69LKO4dCQ
Introduction
Before the 1950s, “computers” were human, they were not machines. The first human computers appeared in the mid-1700s when people wanted to solve big, complex problems by approximation and repetitive solutions, such as determine when Halley’s Comet would return. Scientists realized that they could break complicated calculations apart so that a team could work on them. Human computers also adopted Industrial Revolution methods such as specialization, division of labor, and mass production. The field reached its peak during WWII. As electronic computers took over calculation-intensive work, some human computers became programming pioneers.
Answer questions on Human computers
- Why are mathematical computations important to human progress? Give examples throughout history and imagine technologies that can benefit from mathematical computations in the future.
- What was the meaning of the word “computer” in the past and how is it different from the current definition?
- How did new manufacturing strategies in the Industrial Revolution transform human computing?
- What effect did mainframe computers have on human computing?