Assignment

 

Review in 500 words or more the video above called Cloud Security Myths.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.   Stand alone quotes will not count toward the 3 required quotes.

Server Virtualization Feasibility Analysis

Please follow the template that is given and should be in that format and also read the instructions in pdf and template before starting the project. Please follow and use the same excel template that is given by the professor.

Write a program to convert currency

 

Write a program to convert currency from UK pounds or sterling to US dollar. Read the quantity of money in pounds and pence, and output the resulting foreign currency in dollars and cents. (One pound is 100 penny). Use a const to represent the conversion rate, which is $2.018 to £1 currently. Be sure to print suitable headings and or labels for the values to be output

Research Paper

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

Be approximately 2-3 pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

GO16_AC_CH03_GRADER_3F_AS – Contractor Services

  

GO16_AC_CH03_GRADER_3F_AS – Contractor Services

  

GO16_AC_CH03_GRADER_3F_AS – Contractor Services

Project Description:

In this project, you will use a database to track facility and contractor services for an open house for prospective college students. You will create reports, modify a report in Layout view and Design view, group data in a report, and keep grouped data together for a printed report.

     

Start Access. Open the downloaded   file named go_a03_grader_a2_Contractor_Services.accdb and then enable the content.   View the relationship between the Contractors table and the Facility Services   table. One contractor can provide many facility services. Close the   Relationships window.

 

Use   the Report tool to create a report based on the Setup and Tear Down Job Costs   Query object.

 

With   the report displayed in Layout view, apply the Facet theme to only the   report. Delete the Job ID and Contractor ID fields from the report. Change   the width of the Contractor Last Name and Contractor First Name text box   controls to 2   inches. Change the width of the Category text box controls to 1.25 inches.

 

With   the report displayed in Layout view, sort the records in ascending order by   the Date field. Change the width of the Job Cost text box controls to 0.75 inch.

 

At   the bottom of the report and in Layout view, change the height of the   calculated control that displays $1440   to 0.25 inch. For the page number control, set   the Left property to 2.75   inches.

 

With   the report displayed in Layout view, select the title of the report and   change the font size to 16. In the title, change the word Query to Report.   In the body of the report, select the Date field name and set the Left   property to 0.25   inch (the Date text box controls move to the right, and all of the other fields   also move to the right). Save the report as Setup and Tear   Down Job Costs Report, close the Property Sheet, and then   close the report.

 

Use   the Report Wizard to create a report based on the Facility Services table.   Add the following fields (in this order) to the report: Category, Service   Description, and Job Cost. Group the records by the Category field.

 

Sort   the records in ascending order by the Service Description field. Summarize   the report by summing the Job Cost field.

 

Be   sure the layout is Stepped and the orientation is Portrait. Name the report Job Cost by Category Report, and then finish the wizard.

 

Display   the Job Cost by Category Report in Layout view. Apply the Wisp theme to this   report only. Select the title of the report, change the font size to 16, and   then apply bold. Apply bold to the three label controls that display the   field names.

 

With   the Job Cost by Category Report displayed in Layout view, delete the control   that begins with Summary for ‘Category’. Change the width of the Service   Description text box controls to 2.75   inches and the height to 0.375   inch. Save the report.

 

With   the Job Cost by Category Report displayed in Layout view, select the Job Cost   label control, the Job Cost text box controls that display a truncated #   symbol, and the calculated controls for the total Job Cost that display a   truncated # symbol, and the calculated control for the Grand Total that   displays a truncated # symbol. Change the width of the selected controls to 1 inch, and set the Left property to 6 inches. Save the report.

 

With   the Job Cost by Category Report displayed in Layout view, change the text in   the label control that displays Sum to Total Job Cost by   Category.   For the same control, set the Left Property to 3.5   inches and the width to 2.1.   At the bottom of the report, change the width of the Grand Total label   control to 1   inch. Close the Property Sheet, and save the report.

 

Display   the Job Cost by Category Report in Design view. Select the following two   controls: the Total Job Cost by Category label control (in the Category   Footer section) and the Grand Total label control (in the Report Footer   section). Align the right edges of the two selected controls. Save the   report.

 

Display   the Job Cost by Category Report in Print Preview as two pages, and notice how   the groupings break across the pages. Display the report in Layout view, and   then open the Group, Sort, and Total pane. Set the grouping option so that   each group of category records is kept together on one page when the report   is printed, and then close the Group, Sort, and Total pane. Display the   report in Print Preview, and notice that the groupings are not split between   pages. Save the report, and then close the report.

 

If   necessary, close all database objects and open the Navigation Pane. Close   Access and submit the database as directed.

Research Project

  

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§ Description of information required for items of evidence

§ Documentation required in addition to item details (personnel, description of circumstances, and so on)

§ Description of measures required to preserve initial evidence integrity

§ Description of measures required to preserve ongoing evidence integrity

§ Controls necessary to maintain evidence integrity in storage

§ Documentation required to demonstrate evidence integrity

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Ethics Project

this is Ethic Project that needs to be done By Today.

I will provide everything you need to understand it, it’s small Project

Ethical Issue's of the Recent Technology(FACEBOOK)

  term paper can be up to 5 pages (excluding title page, references), single-spaced, single-column, and 11pt Times Roman font. Each page has a 1-inch margin on all sides. The first line of each paragraph must indent by 0.25in

NOTE:failure to follow this format will result in a penalty up to 20% 

Computer Science

 

How is probability theory used in computer science?  Find at least one example and explain it.

Focus on clear thoughtful words. Remember that you need to do your own work.  Reply to one of your classmate’s discussions.