Please find the attachemnt
Please use the same attached file to answer all questions in appropriate section, minimum answer is 150 words per question, use in-text citations and list the references used if its not your own words. Please, list the reference under each answer of each
Please use the same attached file to answer all questions in appropriate section, minimum answer is 150 words per question, use in-text citations and list the references used if its not your own words.
Please, list the reference under each answer of each question separately keep them in order they are and don’t change the formatting!
8 Questions Total
Just add the answer and reference under each appropriate question on this same file
Creation of a research paper
Exercise Content
- WD2 – Exercise # 1
Follow along with the tutorial on how to properly format a research paper. Follow the steps, this is important.
Chapter Exercise “Safety Using Headphones and Earbuds”NOTE: Enter in the Header your personal information not the information of the exercise
(my Name: Nayancy Rodriguez)Save as 2-WD2-EX-A-YourName
The document “2-Steps to create the Research Paper – Exercise 1″ is a guide to create the Research Paper in exercise 1.Be sure to save your assignment in a .docx format, especially if you are using an Apple or MAC computer.
Note: You need to submit the File:
Chapter Exercise “Safety Using Headphones and Earbuds” as 2-WD2-EX-A-YourNameThe document “1- MLA Documentation Style” shows all the features of the MLA Style Research Paper.
1-MLA Documentation Style.pdfThe document “2-Steps to create the Research Paper Exercise 1.pdf” shows the steps to do a Research Paper in exercise 1
2-Steps to create the Research Paper Exercise 1.pdf
IMPORTANT!
Remember that all the Word documents that you create should be in a file with the Creation Date of this week, or after if you submit late, but not a previous date. Files Assignments with the previous date will not be accepted
Computer Science Discussion – 2 Assignments – Reflection
Discussion – Cloud Computing – 300 Words
Assignment – Cloud Computing – 4 pages
Reflection – Cloud computing – 2 pages
Assignment – Intro to Data mining – 3 pages
Discussion 4 response 2
Read classmates post and respond with 50 words:
There are three guidelines for radiology which are professional, technical and global. Technical guideline is for the use of facilities, equipment and non medical staff and supplies. An example will be code 77014-TC which indicates every non medical like the equipment and facilities. Professional guidelines is for the doctor’s professionals services only. An example is code 77014-26 which lets you know its only for professional services. Global guidelines when there is no division of costs associated with medical services because it was provided by a single operator. An example will be 99203 for a consultation with a doctor.
Reference:
Carol J. Buck, Saunders (2022). Step-by-Step Medical Coding, 2022 Edition, by Carol J. Buck, Saunders
Discussion
Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion.(250 words)
Exp19_PowerPoint_AppCapstone_Intro_STEM
Exp19_PowerPoint_AppCapstone_Intro_STEM
Exp19 PowerPoint AppCapstone Intro STEM
PowerPoint Introductory Capstone – STEM
Project Description:
As a member of the local school district’s STEM (Science, Technology, Engineering, and Math) committee, you have been asked to create a presentation on STEM education to be used to build interest in expanding the STEM curriculum with the local school district and to seek funding from local business owners and taxpayers. You began a presentation and now need to add the content to the presentation.
Start PowerPoint. Download and open the file named Exp19_PPT_AppCapstone_Stem.pptx. Grader has automatically added your last name to the beginning of the filename. Download and extract the zip file named Exp19_PPT_AppCapstone_Stem_Assets.zip.
Change the theme colors to Aspect.
Change the theme fonts to Gill Sans MT.
On Slide 8, insert the Microscope.jpg in the left placeholder. Apply the Metal Oval
picture style. Change the Picture Border fill to Dark Gray, Background 2, Lighter 10%.
On Slide 10 in the left content placeholder, insert the ElementarySchool.jpg image. In the right content placeholder, insert the ElementarySchool2.jpg image.
Apply the Simple Frame, White picture style to both images. Change the Picture Border fill for both images to Dark Gray, Background 2, Lighter 10%.
On Slide 11 insert the MiddleSchool.jpg image. Make the following changes to
the inserted image:
• Crop the left side of the image so that most of the white area is removed.
• Change the Shape Height of the image to 5.2“.
• Apply the Simple Frame, White picture style.
• Change the Picture Border to Dark Gray, Background 2, Lighter 10%.
• Set the Horizontal position of the image to 3.6” and the Vertical position to 1.9“.
On Slide 12 insert the HSVideo.mp4 video file. Make the following changes to the
video:
• Apply the Simple Frame, White video style.
• Change the Video Border to Dark Gray, Background 2, Lighter 10%.
• Set the video to start Automatically.
On Slide 4 insert the image WorldMap.jpg as a background image on the slide. Change the transparency to 40%.
On Slide 2 insert a Picture Caption List SmartArt graphic.
Add the following to the SmartArt graphic:
• Type Science in the first bullet point in the Text pane and then insert Science.jpg as the image
• Type Technology in the second bullet point and add then insert the Technology.jpg image.
• Type Engineering in the third bullet point and add the image Engineering.jpg.
• Type Math as the fourth bullet point and add the image Math.jpg.
Apply the Intense Effect SmartArt Style to the SmartArt graphic.
On Slide 6 convert the bulleted list to a Lined List SmartArt graphic and change the
colors to Colorful–Accent Colors.
On Slide 3 apply the Gradient Fill: Dark Purple, Accent color 5, Reflection WordArt style to the text Why Stem?
Make the following changes to the WordArt:
• Increase the font size to 96 pt.
• Change the Text Fill to Orange, Accent 1.
• Apply the Wave Up text effect in the Transform gallery (Mac users: Apply the Wave 2 text effect in the Transform gallery).
• Change the Shape Height to 2.8“.
On Slide 4, insert an Oval shape on the slide.
Make the following changes to the Oval shape:
• Change the Shape Height to 3.9” and the Shape Width to 3.9“.
• Type 40th in Mathematics in the shape, change the font color to Black, Background 1, and increase the font size to 36 pt.
• Change the Shape Fill to White, Text 1 and the Shape Outline to No Outline.
• Change the Transparency to 36%.
• Set the Horizontal position of the shape to 2” and the Vertical position to 2.5“.
Make a copy of the formatted oval shape and paste on the slide. Set the Horizontal position of
the new shape to 7” and the Vertical position to 2.5“. Highlight the text in the shape, and type
25th in Science.
On Slide 9 insert a table with 2 columns and 6 rows. In the table, merge the following:
Column 1 – Merge the cells in rows 1 and 2
Column 1 – Merge the cells in rows 3 and 4
Column 1 – Merge the cells in rows 5 and 6
Make the following changes to the table structure:
• Apply the No Style, Table Grid table style.
• Change the width of the first column to 2.8“.
• Change the width of the second column to to 8.2“.
Type the following information into the table:
Row 1: Col 1: Elementary School; Col 2: Focuses on introductory STEM courses and awareness of STEM occupations
Row 2: Col 2: Provides structured inquiry-based and real-world problem-based learning, connecting all four of the STEM subjects
Row 3: Col 1: Middle School; Col 2: Courses become more rigorous and challenging
Row 4: Col 2: Student exploration of STEM-related careers begins at this level
Row 5: Col 1: High School; Col 2: Focuses on the application of the subjects in a challenging and rigorous manner
Row 6: Col 2: Courses and pathways are now available in STEM fields and occupations
Set the height of the table to 4.8“. Apply Center and Center Vertically alignments to the first column of the table. Apply Center Vertically to the second column of the table.
In the table, apply the following shading:
•Red, Accent 2 to the cell with the text Elementary School
•Orange, Accent 1 to the cell with the text Middle School
•Dark Blue, Accent 3 to the cell with the text High School
On Slide 5 insert a Clustered Column chart. Replace the spreadsheet information with
the following information: Leaving cell A1 blank, type Percentage in cell B1. Populate cells A2:B7 with the following:
All Occupations 14%
Mathematics 16%
Computer Systems Analysts 22%
Systems Software Developers 32%
Medical Scientists 36%
Biomedical Engineers 62%
Change the source data to use the range A1:B7.
Make the following changes to the chart:
• Remove the chart title, gridlines, legend, and vertical axis.
• Increase the font size of the x-axis (horizontal) to 16 pt.
• Add Outside End data labels and change the font size to 18 pt.
Click Slide 13 and use the Reuse Slides option to insert Slides 2–5 from Careers.pptx. Keep the source formatting of the original slides (inserted slides).
Start Excel. Open the downloaded file named StemData.xlsx and save it as StemData_LastFirst.xlsx. Copy the chart from the HarrisData worksheet and embed the chart using Paste Special on Slide 13.
Change the Shape Height to 4.8“. Set the Horizontal position to 1.4” and the Vertical position
to 1.9″.
On Slide 1 select the blue circle shape, press SHIFT, and then select the inserted icon. Group the shapes. Repeat for the three remaining shapes on the first slide to group each of the circle shapes with their associated icons.
On Slide 5 apply the Fly In animation (Entrance category) to the chart. Set the Effect Options Sequence to By Element in Category. Set the animation to start After Previous.
Delete Slide 7. Add slide numbers to all slides with the exception of the first slide. Apply the Split transition to all slides.
On Slide 1 type Welcome to our presentation on STEM education. (including the
period) as a speaker note.
Check the presentation for spelling errors, and correct any errors.
Save and close Exp19_PPT_AppCapstone_Intro_STEM.pptx. Submit the file as directed.
canon.com/ijsetup
canon.com/ijsetup is a website to download Canon printer drivers, you can also visit the canonsetup-canon.com/ijsetup website for the same. All-in-one Canon Inkjet printers are suitable for home, business, school, and others to improve productivity. Depending on your requirement, it offers a type printer including PIXMA, SELPHY, MAXIFY, etc. Some factors need to be in mind while choosing an inkjet printer for you. Later, you can easily set up your Canon printer through drivers from canon.com/ijsetup, wireless connection, USB, and a few components. The setup process for every Canon model is almost similar, however the download through http //ij.start.cannon or https //ij.start.cannon and installation process may differ.
discusion-4
Chain letters are messages sent to a huge number of people, asking each recipient to forward them to as many other people as they can. While some of them can be amusing or sent for fun, others may carry hidden threats to your Internet security. What types of threats do these messages pose to Internet users? How can we guard ourselves from these threats?
Responding to Guest Concerns about Cyberattacks
This week, your internship assignment is with the company’s Guest Relations office.
You have been asked to draft a letter to guests to address concerns about the impacts of possible cyber attacks. This particular letter should reassure guests that the company is taking positive steps to protect guest privacy. The guests’ concerns extend beyond privacy of information in databases. There have been news reports detailing situations where hackers have attacked internal building monitoring and control systems to spy on guests and invade their privacy.
In order to write an effective notification letter, it is first necessary to understand the required perspective for such a letter.
From a technical perspective, this type of attack is a data security problem because the attackers are stealing data by attacking at the point of creation (data at rest) and then along the transmission paths (data in transit). The impact of this type of attack is a loss of confidentiality.
From a people perspective, this type of attack is viewed as an attack on the privacy of guests and is categorized as a loss of privacy.
Managers need to address this problem from both perspectives. With internal technical staff, the conversation would revolve around data security. But, with guests and Guest Relations staff, the conversation needs to address concerns about the possible loss of privacy.
Secondly, we must consider the required “tone” for such a letter. The letter must be factual but, more importantly, it is necessary to show an appropriate amount of empathy and understanding for the recipient’s feelings. Empathy and emotional intelligence are important leadership skills for managers.
Having empathy and/or acting in an empathetic manner (aware of and sensitive to the emotions of guests and customers), allows a manager to respond appropriately when a cyberattack occurs. As you write this letter, you will need to find a balance between addressing the emotional aspects of a cyberattack (need for a supportive and calming response — less information may be best) and the need to develop trust by providing information about a situation which can invoke fear and concern.
After you read this week’s readings on data security, read this definition of Emotional Intelligence and this discussion article about What Emotional Intelligence Is and Is Not. Then, read about three types of empathy https://www.huffingtonpost.com/entry/types-of-empathy_us_56f171cde4b03a640a6bcc17.
Next, read one or more of these articles about a cyber attack that affected hotel operations and created fear and concern among guests and employees.
1. Hackers use ransomware to target hotel guests’ door locks
2. Hackers are using hotel Wi-Fi to spy on guests, steal data
3. 20 hotels suffer hack costing tens of thousands their credit card information
Using what you’ve learned about data security AND emotional intelligence, draft a letter that Padgett-Beale could use to inform and calm its guests should a similar cyberattack (door locks, guest WiFi access, or credit card Point-of-Sale breach) affect one of the company’s hotel properties. Your draft letter will also be used to train employees in how they can and should respond to guest concerns
