refer to the attached document
Assignment
Review in 500 words or more the video above called Cloud Security Myths.
Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources. Stand alone quotes will not count toward the 3 required quotes.
Server Virtualization Feasibility Analysis
Please follow the template that is given and should be in that format and also read the instructions in pdf and template before starting the project. Please follow and use the same excel template that is given by the professor.
Write a program to convert currency
Write a program to convert currency from UK pounds or sterling to US dollar. Read the quantity of money in pounds and pence, and output the resulting foreign currency in dollars and cents. (One pound is 100 penny). Use a const to represent the conversion rate, which is $2.018 to £1 currently. Be sure to print suitable headings and or labels for the values to be output
Research Paper
Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?
Your paper should meet the following requirements:
Be approximately 2-3 pages in length, not including the required cover page and reference page.
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
GO16_AC_CH03_GRADER_3F_AS – Contractor Services
GO16_AC_CH03_GRADER_3F_AS – Contractor Services
GO16_AC_CH03_GRADER_3F_AS – Contractor Services
Project Description:
In this project, you will use a database to track facility and contractor services for an open house for prospective college students. You will create reports, modify a report in Layout view and Design view, group data in a report, and keep grouped data together for a printed report.
Start Access. Open the downloaded file named go_a03_grader_a2_Contractor_Services.accdb and then enable the content. View the relationship between the Contractors table and the Facility Services table. One contractor can provide many facility services. Close the Relationships window.
Use the Report tool to create a report based on the Setup and Tear Down Job Costs Query object.
With the report displayed in Layout view, apply the Facet theme to only the report. Delete the Job ID and Contractor ID fields from the report. Change the width of the Contractor Last Name and Contractor First Name text box controls to 2 inches. Change the width of the Category text box controls to 1.25 inches.
With the report displayed in Layout view, sort the records in ascending order by the Date field. Change the width of the Job Cost text box controls to 0.75 inch.
At the bottom of the report and in Layout view, change the height of the calculated control that displays $1440 to 0.25 inch. For the page number control, set the Left property to 2.75 inches.
With the report displayed in Layout view, select the title of the report and change the font size to 16. In the title, change the word Query to Report. In the body of the report, select the Date field name and set the Left property to 0.25 inch (the Date text box controls move to the right, and all of the other fields also move to the right). Save the report as Setup and Tear Down Job Costs Report, close the Property Sheet, and then close the report.
Use the Report Wizard to create a report based on the Facility Services table. Add the following fields (in this order) to the report: Category, Service Description, and Job Cost. Group the records by the Category field.
Sort the records in ascending order by the Service Description field. Summarize the report by summing the Job Cost field.
Be sure the layout is Stepped and the orientation is Portrait. Name the report Job Cost by Category Report, and then finish the wizard.
Display the Job Cost by Category Report in Layout view. Apply the Wisp theme to this report only. Select the title of the report, change the font size to 16, and then apply bold. Apply bold to the three label controls that display the field names.
With the Job Cost by Category Report displayed in Layout view, delete the control that begins with Summary for ‘Category’. Change the width of the Service Description text box controls to 2.75 inches and the height to 0.375 inch. Save the report.
With the Job Cost by Category Report displayed in Layout view, select the Job Cost label control, the Job Cost text box controls that display a truncated # symbol, and the calculated controls for the total Job Cost that display a truncated # symbol, and the calculated control for the Grand Total that displays a truncated # symbol. Change the width of the selected controls to 1 inch, and set the Left property to 6 inches. Save the report.
With the Job Cost by Category Report displayed in Layout view, change the text in the label control that displays Sum to Total Job Cost by Category. For the same control, set the Left Property to 3.5 inches and the width to 2.1. At the bottom of the report, change the width of the Grand Total label control to 1 inch. Close the Property Sheet, and save the report.
Display the Job Cost by Category Report in Design view. Select the following two controls: the Total Job Cost by Category label control (in the Category Footer section) and the Grand Total label control (in the Report Footer section). Align the right edges of the two selected controls. Save the report.
Display the Job Cost by Category Report in Print Preview as two pages, and notice how the groupings break across the pages. Display the report in Layout view, and then open the Group, Sort, and Total pane. Set the grouping option so that each group of category records is kept together on one page when the report is printed, and then close the Group, Sort, and Total pane. Display the report in Print Preview, and notice that the groupings are not split between pages. Save the report, and then close the report.
If necessary, close all database objects and open the Navigation Pane. Close Access and submit the database as directed.
Research Project
Scenario
After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.
Consider the following questions for collecting and handling evidence:
1. What are the main concerns when collecting evidence?
2. What precautions are necessary to preserve evidence state?
3. How do you ensure evidence remains in its initial state?
4. What information and procedures are necessary to ensure evidence is admissible in court?
Tasks
Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.
Address the following in your policy:
§ Description of information required for items of evidence
§ Documentation required in addition to item details (personnel, description of circumstances, and so on)
§ Description of measures required to preserve initial evidence integrity
§ Description of measures required to preserve ongoing evidence integrity
§ Controls necessary to maintain evidence integrity in storage
§ Documentation required to demonstrate evidence integrity
Required Resources
§ Internet access
§ Course textbook
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 2 to 4 pages
Ethics Project
this is Ethic Project that needs to be done By Today.
I will provide everything you need to understand it, it’s small Project
Ethical Issue's of the Recent Technology(FACEBOOK)
term paper can be up to 5 pages (excluding title page, references), single-spaced, single-column, and 11pt Times Roman font. Each page has a 1-inch margin on all sides. The first line of each paragraph must indent by 0.25in
NOTE:failure to follow this format will result in a penalty up to 20%
Computer Science
How is probability theory used in computer science? Find at least one example and explain it.
Focus on clear thoughtful words. Remember that you need to do your own work. Reply to one of your classmate’s discussions.
