Please use the same attached file to answer all questions in appropriate section, minimum answer is 150 words per question, use in-text citations and list the references used if its not your own words. Please, list the reference under each answer of each

 

Please use the same attached file to answer all questions in appropriate section, minimum answer is 150 words per question, use in-text citations and list the references used if its not your own words.

Please, list the reference under each answer of each question separately keep them in order they are and don’t change the formatting!

8 Questions Total

Just add the answer and reference under each appropriate question on this same file

Safety Using Headpnones

Creation of a research paper

Exercise Content

  1. WD2 – Exercise # 1

     Follow along with the tutorial on how to properly format a research paper. Follow the steps, this is important.
    Chapter Exercise “Safety Using Headphones and Earbuds”

    Safety Using Headpnones

    NOTE: Enter in the Header your personal information not the information of the exercise
    (my Name: Nayancy Rodriguez)

    Save as 2-WD2-EX-A-YourName
    The document  “2-Steps to create the Research Paper – Exercise 1″ is a guide to create the Research Paper in exercise 1.

    Be sure to save your assignment in a .docx format, especially if you are using an Apple or MAC computer.

    Note: You need to submit the File:
    Chapter Exercise “Safety Using Headphones and Earbuds”     as 2-WD2-EX-A-YourName

    The document “1- MLA Documentation Style” shows all the features of the MLA Style Research Paper.

    1-MLA Documentation Style.pdfThe document “2-Steps to create the Research Paper Exercise 1.pdf” shows the steps to do a Research Paper in exercise 1

    2-Steps to create the Research Paper Exercise 1.pdf

    IMPORTANT!
    Remember that all the Word documents that you create should be in a file with the Creation Date of this week, or after if you submit late, but not a previous date. Files Assignments with the previous date will not be accepted

Discussion 4 response 2

Read classmates post and respond with 50 words:

There are three guidelines for radiology which are professional, technical and global. Technical guideline is for the use of facilities, equipment and non medical staff and supplies. An example will be code 77014-TC which indicates every non medical like the equipment and facilities. Professional guidelines is for the doctor’s professionals services only. An example is code 77014-26 which lets you know its only for professional services. Global guidelines when there is no division of costs associated with medical services because it was provided by a single operator. An example will be 99203 for a consultation with a doctor. 
Reference:

Carol J. Buck, Saunders (2022). Step-by-Step Medical Coding, 2022 Edition, by Carol J. Buck, Saunders

Discussion

 Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion.(250 words)
 

 

Exp19_PowerPoint_AppCapstone_Intro_STEM

  

Exp19_PowerPoint_AppCapstone_Intro_STEM

  

Exp19 PowerPoint AppCapstone Intro STEM

 
PowerPoint Introductory Capstone – STEM 

  

Project Description:

As a member of the local school district’s STEM (Science, Technology, Engineering, and Math) committee, you have been asked to create a presentation on STEM education to be used to build interest in expanding the STEM curriculum with the local school district and to seek funding from local business owners and taxpayers. You began a presentation and now need to add the content to the presentation.

     

Start PowerPoint. Download and open the file named Exp19_PPT_AppCapstone_Stem.pptx. Grader has automatically added your last   name to the beginning of the filename. Download and extract the zip file   named Exp19_PPT_AppCapstone_Stem_Assets.zip.   

 

Change the theme   colors to Aspect.

 

 

Change the theme   fonts to Gill Sans MT.

 

On Slide 8, insert   the Microscope.jpg in the left   placeholder. Apply the Metal Oval
  picture style. Change the Picture Border fill to Dark Gray, Background 2,   Lighter 10%.

 

On Slide 10 in the   left content placeholder, insert the ElementarySchool.jpg   image. In the right content placeholder, insert the ElementarySchool2.jpg image.
 

  Apply the Simple Frame, White picture style to both images. Change the   Picture Border fill for both images to Dark Gray, Background 2, Lighter 10%.

 

On Slide 11 insert   the MiddleSchool.jpg image. Make   the following changes to
  the inserted image:
  • Crop the left side of the image so that most of the white area is removed.
  • Change the Shape Height of the image to 5.2“.
  • Apply the Simple Frame, White picture style.
  • Change the Picture Border to Dark Gray, Background 2, Lighter 10%.
  • Set the Horizontal position of the image to 3.6” and the   Vertical position to 1.9“.

 

On Slide 12 insert   the HSVideo.mp4 video file. Make   the following changes to the
  video:
  • Apply the Simple Frame, White video style.
  • Change the Video Border to Dark Gray, Background 2, Lighter 10%.
  • Set the video to start Automatically.

 

On Slide 4 insert the   image WorldMap.jpg as a background   image on the slide. Change the transparency to 40%.

 

On Slide 2 insert a   Picture Caption List SmartArt graphic.
 

  Add the following to the SmartArt graphic:
  • Type Science in the first bullet point in the Text pane and then insert Science.jpg as the image
  • Type Technology in the second bullet point and   add then insert the Technology.jpg   image.
  • Type Engineering in the third bullet point and add the image Engineering.jpg.
  • Type Math as the fourth bullet point and add the image Math.jpg.
 

  Apply the Intense Effect SmartArt Style to the SmartArt graphic.

 

On Slide 6 convert   the bulleted list to a Lined List SmartArt graphic and change the
  colors to Colorful–Accent Colors.

 

On Slide 3 apply the   Gradient Fill: Dark Purple, Accent color 5, Reflection WordArt style to the   text Why Stem?
 

  Make the following changes to the WordArt:
  • Increase the font size to 96 pt.
  • Change the Text Fill to Orange, Accent 1.
  • Apply the Wave Up text effect in the Transform gallery (Mac users: Apply   the Wave 2 text effect in the Transform gallery).
  • Change the Shape Height to 2.8“.

 

On Slide 4, insert an   Oval shape on the slide.
 

  Make the following changes to the Oval shape:
  • Change the Shape Height to 3.9” and the Shape Width to   3.9“.
  • Type 40th in Mathematics in the shape, change the font   color to Black, Background 1, and increase the font size to 36   pt.
  • Change the Shape Fill to White, Text 1 and the Shape Outline to No Outline.
  • Change the Transparency to 36%.
  • Set the Horizontal position of the shape to 2” and the Vertical position   to 2.5“.

 

Make a copy of the   formatted oval shape and paste on the slide. Set the Horizontal position of
  the new shape to 7” and the Vertical position   to 2.5“. Highlight the text in the shape, and type
25th in Science.

 

On Slide 9 insert a   table with 2 columns and 6 rows. In the table, merge the following:
  Column 1 – Merge the cells in rows 1 and 2
  Column 1 – Merge the cells in rows 3 and 4
  Column 1 – Merge the cells in rows 5 and 6 

 

Make the following   changes to the table structure:
  • Apply the No Style, Table Grid table style.
  • Change the width of the first column to 2.8“.
  • Change the width of the second column to to 8.2“.

 

Type the following   information into the table:
  Row 1: Col 1: Elementary School; Col 2: Focuses   on introductory STEM courses and awareness of STEM occupations
  Row 2: Col 2: Provides structured inquiry-based and real-world   problem-based learning, connecting all four of the STEM subjects
  Row 3: Col 1: Middle School; Col 2: Courses   become more rigorous and challenging
  Row 4: Col 2: Student exploration of STEM-related careers begins at   this level
  Row 5: Col 1: High School; Col 2: Focuses   on the application of the subjects in a challenging and rigorous manner
  Row 6: Col 2: Courses and pathways are now available in STEM fields   and occupations

 

 

Set the height of the   table to 4.8“. Apply Center and Center Vertically   alignments to the first column of the table. Apply Center Vertically to the   second column of the table. 

 

In the table, apply the   following shading:
  •Red, Accent 2 to the cell with the text Elementary   School
  •Orange, Accent 1 to the cell with the text Middle School
  •Dark Blue, Accent 3 to the cell with the text High School

 

On Slide 5 insert a   Clustered Column chart. Replace the spreadsheet information with
  the following information: Leaving cell A1 blank, type Percentage in cell B1. Populate   cells A2:B7 with the following:
 

All Occupations 14%
Mathematics 16%
Computer Systems Analysts 22%
Systems Software Developers 32%
Medical Scientists 36%
Biomedical Engineers 62%
  Change the source data to use the range A1:B7.

 

Make the following   changes to the chart:
  • Remove the chart title, gridlines, legend, and vertical axis.
  • Increase the font size of the x-axis (horizontal) to 16 pt.
  • Add Outside End data labels and change the font size to 18 pt.

 

Click Slide 13 and   use the Reuse Slides option to insert Slides 2–5 from Careers.pptx. Keep the source formatting of the original slides   (inserted slides).

 

Start Excel. Open the   downloaded file named StemData.xlsx   and save it as StemData_LastFirst.xlsx. Copy the chart from   the HarrisData worksheet and embed the chart using Paste Special on Slide 13.
 

  Change the Shape Height to 4.8“. Set the Horizontal   position to 1.4” and the Vertical position
  to 1.9″.

 

On Slide 1 select the   blue circle shape, press SHIFT, and then select the inserted icon. Group the   shapes. Repeat for the three remaining shapes on the first slide to group   each of the circle shapes with their associated icons.

 

 

On Slide 5 apply the Fly   In animation (Entrance category) to the chart. Set the Effect Options   Sequence to By Element in Category. Set the animation to start After   Previous. 

 

Delete Slide 7. Add   slide numbers to all slides with the exception of the first slide. Apply the   Split transition to all slides.

 

On Slide 1 type Welcome   to our presentation on STEM education. (including the
  period) as a speaker note.

 

Check the   presentation for spelling errors, and correct any errors.

 

Save and close Exp19_PPT_AppCapstone_Intro_STEM.pptx.   Submit the file as directed.

canon.com/ijsetup

 

canon.com/ijsetup is a website to download Canon printer drivers, you can also visit the canonsetup-canon.com/ijsetup website for the same. All-in-one Canon Inkjet printers are suitable for home, business, school, and others to improve productivity. Depending on your requirement, it offers a type printer including PIXMA, SELPHY, MAXIFY, etc. Some factors need to be in mind while choosing an inkjet printer for you. Later, you can easily set up your Canon printer through drivers from canon.com/ijsetup, wireless connection, USB, and a few components. The setup process for every Canon model is almost similar, however the download through http //ij.start.cannon or https //ij.start.cannon and  installation process may differ.

discusion-4

Chain letters are messages sent to a huge number of people, asking each recipient to forward them to as many other people as they can. While some of them can be amusing or sent for fun, others may carry hidden threats to your Internet security. What types of threats do these messages pose to Internet users? How can we guard ourselves from these threats?

Responding to Guest Concerns about Cyberattacks

 

This week, your internship assignment is with the company’s Guest Relations office.

You have been asked to draft a letter to guests to address concerns about the impacts of possible cyber attacks. This particular letter should reassure guests that the company is taking positive steps to protect guest privacy. The guests’ concerns extend beyond privacy of information in databases. There have been news reports detailing situations where hackers have attacked internal building monitoring and control systems to spy on guests and invade their privacy.

In order to write an effective notification letter, it is first necessary to understand the required perspective for such a letter.

From a technical perspective, this type of attack is a data security problem because the attackers are stealing data by attacking at the point of creation (data at rest) and then along the transmission paths (data in transit).  The impact of this type of attack is a loss of confidentiality.

From a people perspective, this type of attack is viewed as an attack on the privacy of guests and is categorized as a loss of privacy.

Managers need to address this problem from both perspectives. With internal technical staff, the conversation would revolve around data security. But, with guests and Guest Relations staff, the conversation needs to address concerns about the possible loss of privacy.

Secondly, we must consider the required “tone” for such a letter. The letter must be factual but, more importantly, it is necessary to show an appropriate amount of empathy and understanding for the recipient’s feelings. Empathy and emotional intelligence are important leadership skills for managers.

Having empathy and/or acting in an empathetic manner (aware of and sensitive to the emotions of guests and customers), allows a manager to respond appropriately when a cyberattack occurs.  As you write this letter, you will need to find a balance between addressing the emotional aspects of a cyberattack (need for a supportive and calming response — less information may be best) and the need to develop trust by providing information about a situation which can invoke fear and concern.

After you read this week’s readings on data security, read this definition of Emotional Intelligence and this discussion article about What Emotional Intelligence Is and Is Not. Then, read about three types of empathy https://www.huffingtonpost.com/entry/types-of-empathy_us_56f171cde4b03a640a6bcc17.

Next, read one or more of these articles about a cyber attack that affected hotel operations and created fear and concern among guests and employees.

1. Hackers use ransomware to target hotel guests’ door locks

2. Hackers are using hotel Wi-Fi to spy on guests, steal data

3. 20 hotels suffer hack costing tens of thousands their credit card information

Using what you’ve learned about data security AND emotional intelligence, draft a letter that Padgett-Beale could use to inform and calm its guests should a similar cyberattack (door locks, guest WiFi access, or credit card Point-of-Sale breach) affect one of the company’s hotel properties. Your draft letter will also be used to train employees in how they can and should respond to guest concerns