Hearsay rule assignment

Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.

Write a short paper, 200-300 words, using WORD and submit here.

Information Stores

 Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search? 

Exp22_Excel_Ch11_HOE_Halloween

Exp22_Excel_Ch11_HOE_Halloween

Exp22 Excel Ch11 HOE Halloween

Excel Chapter 11 Hands-On Exercise – Halloween Center 

  

Project Description:

Halloween Center is a supercenter corporation that opens stores around the country in September and October. The stores sell high-quality costumes and accessories. In addition, each location has a haunted house that generates revenue through admissions fees. You are the regional manager over Utah, Colorado, New Mexico, and Arizona, where stores are located in 10 major cities. You created a workbook with three worksheets. The first two worksheets contain lists of store and state managers. Your first task will be to manipulate the text to make the lists easier to read. The third worksheet contains a list of gross sales by store at the end of each week. You will use advanced filtering and database functions to analyze the sales. The fourth worksheet contains a similar dataset. You will use array functions to create a unique list of locations, a list of record numbers, sorted and filtered data, and a sequence of the top values. Finally, the last worksheet contains a consolidated list of the weekly sales in an easy-to-read format. You will use lookup functions to search for and find data within the dataset

     

Start Excel. Download and open   the file named Exp22_Excel_Ch11_HOE_Halloween.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

 

The first column contains first   and last names of the store managers. To facilitate future sorting by last   name, you want to display last names and then first names in the second   column.
 

  In cell B2 in the Store Managers worksheet, type Lundgren, Gusten. Use Flash Fill to complete the   pattern down column B.

 

The worksheet contains the complete   addresses in the third column. You will separate the street addresses,   cities, states, and postal codes into individual columns.
 

  Select the range C2:C11 and convert the text to columns. Use the comma check   box as the delimiter and deselect other delimiters. Change width of column C   to 25 and the width of column D to 13.

 

Now you want to separate the   state abbreviations and zip codes.
 

  Select the range E2:E11 and convert the text to columns. Deselect the comma   delimiter and select the space delimiter. Do not import the first column. In   cell F1, apply Align Right horizontal alignment.

 

 

The State Managers worksheet   contains a list of managers. You will combine the names using the TEXTJOIN   function.
 

  Display the State Managers worksheet. In cell D2, insert the TEXTJOIN   function to combine the names in the range A2:C2 using a space as a delimiter   and ignore empty cells. Copy the function to the range D3:D5. 

 

To improve the readability of   the names, you will convert the text to upper- and lowercase.
 

  In cell E2, insert the PROPER function for the text contained in cell D2.   Copy the function to the range E3:E5.

 

You want to extract the area   code from the phone number.
 

  In cell H2, insert the LEFT function to extract the first three characters   from the phone number in cell G2. Copy the function to the range H3:H5.

 

You will use the Database   worksheet for the next several steps. You will set up criteria and output   ranges, enter the criteria, and then apply the filter.
 

  Display the Database worksheet. Copy the range A2:E2 and Use the Keep Source   Column Widths paste option to paste the headings in cell G2. Paste another   copy of the headings starting in cell G9. In cell I3, type UT, In cell J3, type 11/2/2024. In cell C2, display the   Advanced Filter dialog box. Apply the settings to copy the records to another   location, using the dataset in range A2:E52. Select the range G2:K3 as the the   criteria range and select the range G9:K9 as the copy-to range. 

 

You want to calculate total   sales for the Utah stores for the week ending 11/2/2024.
 

  In cell N2, insert the DSUM function for the range A2:E52. Type Gross Sales for the field and use the range   G2:K3 as the criteria.

 

Next, you want to calculate the   average sales for the Utah stores for the week ending 11/2/2024.
 

  In cell N3, insert the DAVERAGE function using the same arguments that you   used for the DSUM function in Step 9.

 

The next function will identify   the highest gross sales for the Utah stores for the week ending 11/2/2024.
 

  In cell N4, insert the DMAX function using the same arguments that you used   for the DSUM function in Step 9.

 

Next, you will identify the   lowest gross sales for the Utah stores for the week ending 11/2/2024.
 

In cell N5, insert the DMIN function   using the same arguments that you used for the DSUM function in Step 9.

 

You want to count the records to   ensure all three stores are being included in the summary.
 

  In cell N6, insert the DCOUNT function using the same arguments that you used   for the DSUM function in Step 9.

 

Finally, you want to display the   gross sales for Salt Lake City for the week ending 10/5/2024.
 

  In cell O9, insert the DGET function for the database. Type Gross Sales for the field and use the range   M8:M9 as the criteria. In cell N9, type 10/5/2024.

 

For the next several tasks, you   will use the Arrays worksheet. You want to create a list of all store   locations so that you can familiarize yourself with the local demographics   and analyze sales data.
 

  Display the Arrays worksheet. In cell H3, insert the UNIQUE function for the   array located in the range C3:D53. In cell H16, insert the UNIQUE function   using the range C3:D53 as the array and ensure the results reflect only   locations that occur exactly once.

 

Your next step is to add a   record number for each row.
 

  In cell A3, insert the ROW function using the range A3:A53 as the reference.   The result should subtract the result of another ROW function that references   A$2.

 

Now you want to identify the   number of rows in the dataset.
 

  In cell F1, insert the ROWS function using the range F3:F53 as the reference.

 

 

You want to create an array of   the dataset sorted by city within their respective states.
 

  In cell K3, insert the SORT function to sort the range B3:F53 by the second   column. Edit the function by nesting this SORT function as the array within   another SORT function. For the outer SORT function, sort by the third column.

 

You will use the results from   the SORT function to create an array that is filtered to display data for   only UT and CO.
 

  In cell Q3, type CO. In cell R3, type UT. In cell Q7, insert the FILTER function using the range K3:O53.   Include the range M3:M53 when it equals the state abbreviation in cell Q3 or   in cell R3. In cell Q3, type TX. In cell R3 type NY. Edit the FILTER function in cell Q7 by displaying the text Invalid   Criteria in the   criteria are not met. In cell Q3, type CO. In cell R3, type UT.

 

The next task is to display an   array of the top three sales values within the filtered array.
 

  In cell U2, insert the LARGE function for the range U7:U60 and nest a   SEQUENCE function as the K argument to return three values.

 

The results of the LARGE   function should be formatted.
 

  Apply Accounting Number Format with zero decimal places to the range U2:U4.

 

 

For the rest of the tasks, you   will use the Lookup worksheet. Your first task is to identify the positions   for cells containing a specific store number and a specific date.
 

  Display the Lookup worksheet. In cell D2, insert the XMATCH function to look   up the store number in cell B2, compare it to the range A7:A16. In cell D3,   insert the XMATCH function to lookup the date in cell B3, compare it to the   range C6:G6. In cell B2, type 215. In cell B3, type 10/26/2024.

 

You will nest an XMATCH function   within an INDEX function to retrieve the sales for the week based on the   position of the store number and date.
 

  In cell G2, insert the INDEX function for the range C7:G16. Nest an XMATCH   function that looks up the store number in cell B2, compares it to the range   A7:A16 to identify the position of the store number. Nest an XMATCH function   that lookups up the date in cell B3, compares it to the range C6:G6 to return   the position of the date.

 

Next, you will use the ADDRESS   function to identify the cell address for the sales returned by the INDEX   function you previously inserted.
 

  In cell G3, insert the ADDRESS function. Add the result of D3 to the result   of a ROW function for cell A6 to return the row. Add the result of D3 to the   result of the COLUMN function for cell B6 to return the column. Enter the   appropriate code in the Abs argument to display a relative cell address.

 

You are ready to assign range   names to the city data so that you can then use the range names in a   function.
 

  Select the range B7:G16 and create range names from the selection. Use the   left column to create the range names. In cell I7, paste a list of the range   names.
 

  Mac users: Use the Insert menu, select Name, and then select the submenu   options to paste a list of range names.

 

You are ready to use the range   names in an INDIRECT function to retrieve data.
 

  In cell G4, insert a SUM function with a nested INDIRECT function. Within the   nested INDIRECT function that refers to cell B4. In cell B2, type 440. In cell B10, type Las_Cruces. In cell B15, type Salt_Lake_City.

 

Your final task is to document   the formulas.
 

  In cell J2, insert the FORMULATEXT function for cell D2. Copy the function to   cell J3. In cell J4, insert the FORMULATEXT function for cell G2. Copy the   function to the range J5:J6.

 

 

Save and close Exp22_Excel_Ch11_ HOE_Halloween.xlsx.   Exit Excel. Submit the file as directed.

Penetration Test Report

Hide Assignment InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

There are two deliverables due for Project 2.

  • A video showing your exploitation, credential theft, and data exfiltration.
  • A penetration test report that discusses the steps and actions in the video and how they are relevant to the client. The report also includes your recommendations for the client.

Use Microsoft Stream to create the video.

If you have not already done so last week:

Upload and submit two items for this assignment:

  • the Hacking Video Demonstration showing your exploitation
  • the Penetration Test Report document

How Will My Work Be Evaluated?

Penetrating the system (gaining access) is only the beginning for a penetration tester. You must also be able to clearly communicate your findings and recommend corrective actions in a way that a nontechnical audience can understand. Therefore, the written report describing the engagement’s technical details is a critical part of the job.

Having the best keyboard penetration skills in the business will not help if you are not able to properly document findings and convey critical issues to the client. A successful penetration proposal could lead to additional business from the client’s subsidiaries and partners.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

2.1.2: Describe the context surrounding the issue or problem.

  • In the Hacking Video Demonstration and the Penetration Test Report, address the client in the correspondence. Provide a brief introduction explaining the services performed and a summary at the end of the report. Summarize the actions of the attacker during the penetration test. Validate the attack methodology using industry approved techniques. Include at least two to three references in IEEE format.

2.1.3: Explain the significance of the issue or problem.

  • In the Hacking Video Demonstration and the Penetration Test Report, discuss the vulnerability you exploited on the system. Explain how you were able to steal credentials and take data important to the company. Discuss the implications, including loss of revenue and company reputation.

10.1.2: Gather project requirements to meet stakeholder needs.

  • In the Penetration Test Report, you need to address the fact that the client has asked you to use other accepted practices and tools to exploit its systems. You will need to use tools such as Kali, Metasploit, John the Ripper, and include screenshots with date and time stamps, IP addresses, and ports that show how you connected the attack system to the victim machine.

12.2.1: Identify systems for the risk assessment.

  • In the Penetration Test Report, you need to address the fact that during any scan report, it is critical that you list the IP address of the system you are using to connect to the client’s corporate network (for auditing purposes) as well as the IP address of the system(s) that you are exploiting. Discuss the scope of engagement and the limitations of your actions to stay within the parameters of the penetration test.

12.2.2: Perform a risk analysis.

  • In the Hacking Video Demonstration and the Penetration Test Report, explain to the client in clear terms the security issues that are present on the system. Discuss the exploit you used to compromise the Linux system and the steps to mitigate this vulnerability. Provide detailed information on the versions of the vulnerability and application software.

13.1.1: Create documentation appropriate to the stakeholder.

  • In the Penetration Test Report, explain to the client the actions that you used during the engagement. Talk about how an attacker would know how to get into the system and what methods could be used to compromise the victim machine. Finally, discuss the post exploitation techniques that allowed the attacker to get the credentials of a user account and to extract confidential data from the target system.

When you are finished, click “add a file” to upload your two deliverables, and then click the Submit button.   

Computer, Machine language

  • Suppose John tries to execute the loop below as efficiently as possible. He has 2 different machines, a MIMD machine and a SIMD machine. 

for (i=0; i<2048;i++)

for (j=0; j<2048;j++)

X_array [i][j] = Y_array [i][j] + 256;

1- For a 4-CPU MIMD machine, show the sequence of MIPS instructions that you would execute on each CPU. What is the speedup for this MIMD machine?

2- For an 8-wide SIMD machine (8 parallel SIMD functional units), compare the number of instructions executed on the SIMD machine to the MIMD machine.

Global Technology

Do you feel that countries and companies need explicit strategies for  technology development, given the tremendous amount of largely  spontaneous creativity that occurs today, often in areas where new  technologies are not expected to exert a great influence.  Why or why  not?

==================

Requirements

——————-

APA Formatting

2 references

225 words