Microsoft Windows Server® 2012/R2

 

Case Project 4-1: Using System-Monitoring Tools
 You recently became the server administrator for a company. As soon as you walked in the door, users were telling you the network is running slowly quite often, but they couldn’t tell you when it happened or how much it slowed down. What tests and measurements could you use to try to determine what’s going on?

 

Case Project 5-1: Deploying Remote Access
 You’re consulting for a company that uses Windows Server 2012 R2 servers in a domain environment. All computers are running Windows 8.1. You have been told to come up with a remote access solution for the company’s mobile workforce. Employees will be using company-issued laptops that they can use when they’re on the premises, too. The solution should provide access to the company network when employees have an Internet connection without them having to specifically initiate a connection. The solution should be secure and allow IT staff to perform maintenance tasks via Remote Desktop sessions on the laptops when they’re connected locally or remotely. What remote access solution do you recommend, and why? Are there any configuration options you should consider for this solution?
List the Case title, questions and answers.

 

Writing Requirements

  • 2-3 pages in length  (excluding cover page, abstract, and reference list)
  • APA 6th edition, Use the APA template located in the Student Resource Center to complete the assignment.
  • Please use the Case Study Guide as a reference point for writing your case study.

4/3 Peer Review

1. read and respond in at least 150 words to your two peers individually. Include citations to at least one credible information source in your replies.

Computer Systems Architecture Assignment WK 6

The article you chosen in your discussion should summarize the article in such a way that it can justify any arguments you may present in your assignment and should be different from the abstract.

This article summary should not be the only article researched for your assignment. You may (and should) have several other articles researched in order to fully answer your assignment. 

Chosen Article: A Survey of Machine Learning for Computer Architecture and Systems

Reference: 

Wu, N., & Xie, Y. (2022). A survey of machine learning for computer architecture and systems. ACM Computing Surveys (CSUR), 55(3), 1-39. https://dl.acm.org/doi/abs/10.1145/3494523 

Note: In addition to your researched peer-reviewed article, You must include an example of the article researched as it is applied by industry (company, business entity, and so forth).

400 words with intext citations and 4 references.

In this project, you have to write a C++ program to keep track of banking transactions. with algorithm!

    

  1. As with all projects in this course, your program’s output will display your name, your EUID, your e-mail address, the department name, and course number. This means that your program will print this information to the terminal (see the sample output).
     
  2. Declare and initialize the following constants and variables.
     

    • A global floating-point constant of type double to store the minimum balance for the
      business account initialized to 10000.00.
       
    • A global floating-point constant to of type double to store the minimum balance for the
      personal account initialized to 1000.00.
       
    • A global integer constant of type integer to store the length of account number and
      initialize it to 6.
       
    • A global integer constant of type integer to store the maximum number of transactions
      and initialize it to 20.
       
  3. Declare an enumeration constant with values Business and Personal and assign integer values 0
    and 1 to the data items, respectively. They represent the type of bank account.
     
  4. Declare another enumeration constant with values Process, Display and Quit, and assign suitable integer values 1, 2 and 3 to the data items, respectively. They represent menu choice presented
    to the user.
     

 

  1. Write a
    • •


     
  2. Write a
    • •
     

function named getName which gets the name on the bank account. Inside the function: Using a suitable message, prompt the user for the name on the account. The name can have multiple words.
Only alphabets (A-Z or a-z) and whitespaces are permitted in the account name. 

o If the user enters any other characters in the name, you need to generate an error message and ask for the name again. 

o Yourprogrammustkeeponaskingtheusertoenterthenameuntiltheuserentersit correctly.(SEE SAMPLE OUTPUT 1) 

The user may type the name in either uppercase or lowercase, but you need to convert every initial to uppercase. (SEE SAMPLE OUTPUTS)
This function will be called by the main function. 

function named getAccountNumber which get the account number. Inside the function: Using a suitable message, prompt the user for the number of the account.
The account number must be a 6-digit number. 

  

  • If the user enters an account number with more than 6 digits generate an error message and ask the user to enter the number again.
     
  • Only numbers 0-9 are permitted in the account number. If the user enters an account number with non-numeric characters, generate an error message, and ask the user to enter the number again.
     
  • Your program must keep on asking the user to enter the number until the user enters it correctly. (SEE SAMPLE OUTPUTS 1 and 2)
     
  • This function will be called by the main function.
     

7. Write a function named encrypt_num. This function must receive the account number using a string variable and encrypt the account number. Inside this function: 

  • Declare an array of integers with size equal to the length of the account number.
     
  • Using a loop of your choice, populate the array with seeded randomly generated numbers
    between 10 and 20 inclusive.
     
  • In a second loop, add the randomly generated number to the characters in the account
     

 

• 

8. Write a 

• 

• • 

• • 

 

number to offset each character by the random value.
oStore the new characters in a different string. This new string is now your encrypted 

account number.
This function will be called by the main function. 

function named display_transactions. It accepts four parameters:
A 2D array of type double named transactions that stores the transactions performed on the accounts. The number of columns this 2D array is 2. The first column stores the business transactions while the second column stores the personal transactions. The maximum number of rows is limited to the maximum number of transactions declared globally, but note that the account may not have values for all 20 transactions. Also note that the number of personal and business transactions that are actually performed can be different.
An integer that represents the number of transactions to display.
An enum variable that determines whether the account is a Business account or a Personal Account.
A Boolean variable that determines if the transactions needed to sorted while displaying. The default value of this Boolean is false.
Inside this function: 

 

o Display the content of the transactions array that relates to the correct account type – Business and Personal (display the correct column, not both columns). 

o Sort if the default value has been overridden with true when this function is called.
o Your numeric data must have two numbers after the decimal point and a $ sign in front 

 

of the number (for example, $1375.85).
• This function will be called by the displayAccount function. 

9. Write a function named displayAccount.
• This function accepts three parameters. 

  

• 

10. Write a 

• 

• • 

• 

 

• 

o A 2D array of type double named transactions that stores the transactions performed on the accounts. 

o An integer that represents the number of business transactions to display.
o An integer that represents the number of personal transactions to display.
Inside this function:
o Using a suitable message, ask the user which account needs to be displayed – Business 

or Personal.
o Using a suitable message, ask the user if the display needs to be sorted.
o Based on the account type selected by a user, design a switch-case block with a default 

case, to implement the following features. 

  • ➢  You must use the enumeration constants to set up your cases.
     
  • ➢  You must use a variable of your enumeration constant type for switching control.
     
  • ➢  If the user chooses a Business account, call function display_transactions with
    suitable value of parameters.
     
  • ➢  If the user chooses a Personal account, call function display_transactions with
    suitable value of parameters.
     
  • ➢  If the user enters a wrong choice, use the default case to provide an error message
    and ask the user to make the choice again.
     
  • ➢  Your program needs to keep on asking the user for the choice until the user chooses
    a correct choice. (SEE SAMPLE OUTPUT 1) This function will be called by the main function.
    function named process_account.
    It accepts five parameters:
    o A 2D array of type double named transactions that stores the transactions performed
    on the accounts.
    oAn integer that represents the number of business transactions that has been
    processed.
    oAn integer that represents the number of personal transactions that has been
    processed.
    o A double that represents the current business account balance.
    o A double that represents the current personal account balance.
    Inside this function:
    Ask the user to choose which account the user wants to access – Business or Personal.
    o Use a suitable integer value to get the choice from the user.
    Based on the choice of the user, design a switch case block to implement the following requirements.
    o You must use the enumeration constants to set up your cases.
    o You must use a variable of your enumeration constant type for switching control.
    o If the user chooses a Business account
     
  • ➢  Prompt the user for a transaction to process. The transaction can be a positive or a negative value. Positive transactions are deposits and negative transactions are withdrawals.
     
  • ➢  If the current balance falls below the required minimum balance for a business account, there is a 10$ penalty (decrease current balance by $10 for every new
     

  

transaction) until the current balance updates to at least the minimum required 

balance. (SEE SAMPLE OUTPUT 5)
➢ If the current balance is below the minimum required balance, remind the user that 

the account is losing 10$ for every transaction using a suitable message. (SEE 

SAMPLE OUTPUT 5) 

o If the user chooses a Personal account 

  • ➢  Prompt the user for a transaction to process. The transaction can be a positive or a
    negative value. Positive transactions are deposits and negative transactions are
    withdrawals.
     
  • ➢  If any transaction drops the current balance below the minimum personal balance,
    the transaction will be denied with a suitable message to the user.
     
  • ➢  Note that for personal accounts the current balance will never be less than the
    minimum balance and hence there are no provision of penalties either.
     

o If the user enters a wrong choice, use the default case to provide an error message and 

ask the user to make the choice again.
➢ Your program needs to keep on asking the user for the choice until the user chooses 

a correct choice. (SEE SAMPLE OUTPUT 1)
oDisplay the current balance in either case after each successful transaction. (SEE 

SAMPLE OUTPUTS) 

➢ Your numeric data must have two numbers after the decimal point and a $ sign in front of the number (for example, $1375.85). 

o This function needs be able to process more than one transaction.
oAfter successfully processing a transaction, ask the user if the user wants to process 

another transaction.
o If the user chooses to process another transaction, use a suitable loop to ask the user 

about the type of account and the transaction to process. (SEE SAMPLE OUTPUTS )
o If the user chooses to process additional transactions, the previous transactions should 

not be overwritten.
o Assume the user will not perform more than 20 transactions on either account. 

• This function will be called by the main function. 

11. Inside your main function: 

  • Declare a 2D array of doubles to store the transactions performed on the account.
     
  • Display a menu for the user (SEE SAMPLE OUTPUT) that provides the user three choices.
    o Process an account
    o Display the transactions on an account. o Quit the program
     
  • Declare a double variable to store the current personal account balance and initialize it with the value 1000.00.
     
  • Declare a double variable to store the current business account balance and initialize it with the value 10000.00.
     
  • Declare two integer variables to store the number of business transactions and the number of personal transaction and initialize both with 0.
     
  • Declare a string variable to store the name on the account.
     

  

o Call the getName function and pass the string variable for name to get the name. 

  • Declare a string variable to store the account number.
    o Call the getAccountNumber function and pass the string variable for account number to get the account number.
     
  • Using a suitable message, ask the user to make the menu choice using an integer variable.
     
  • Based on the value entered by the user for menu choice, design a switch-case block to
    implement the following requirements.
    o You must use the enumeration constants to set up your cases.
    o You must use a variable of your enumeration constant type for switching control. o If the user chooses to process an account
    ➢ Call the function processAccount with suitable parameters. o If the user chooses to display an account
    ➢ Display the name with suitable message. Make sure the displayed name follows all requirements of Step 5.
    ➢Display the encrypted account number with suitable message. Call the encrypt_num function with appropriate arguments to encrypt the account number.
    ➢ Call the function displayAccount with appropriate arguments. o If the user choose to quit the program.
    ➢ Exit the program with a suitable message.
    o If the user chooses anything else, execute the default case to notify the user an incorrect
    choice.
     

    • ➢  Using a suitable loop, ask the use for the choice again.
       
    • ➢  Your program must keep on looping until the user enters the correct choice. (SEE
      SAMPLE OUTPUT 2)
       
  1. Your program source code should be named “euidProject2.cpp”, without the quotes.
    where euid should be replaced by your EUID.
     
  2. Your program will be graded based largely on whether it works correctly on the CSE machines (e.g., cse01, cse02, …, cse06), so you should make sure that your program compiles and runs on a CSE machine.
     

DESIGN (ALGORITHM): 

On a piece of paper (or word processor), write down the algorithm, or sequence of steps, that you will use to solve the problem. You may think of this as a “recipe” for someone else to follow. Continue to refine your “recipe” until it is clear and deterministically solves the problem. Be sure to include the steps for prompting for input, performing calculations, and displaying output. 

You should attempt to solve the problem by hand first (using a calculator as needed) to work out what the answer should be for a few sets of inputs.
Type these steps and calculations into a document (i.e., Word, text, or PDF) that will be submitted along with your source code. Note that if you do any work by hand, images (such as pictures) may be used, but they must be clear and easily readable. This document shall contain both the algorithm and any supporting hand-calculations you used in verifying your results. 

Project 1: Windows Upgrade Plan

 

If you haven’t done so already last week:

  • Download the Windows Upgrade Plan Template and follow the instructions in the document. 
  • Delete the instructional text from the template before you submit.

Client Specifications for Tetra Shillings Accounting

When developing your plan, keep in mind the following information about the client:

  • All desktops and laptops are currently running Windows 8.1 Enterprise.
  • About half of the laptops are less than a year old and will be retained for the upgrade.
  • All other laptops will be replaced with new hardware in time for the upgrade.
  • All desktop systems will be replaced with new laptops.

Your windows upgrade plan for Tetra Shillings Accounting should be based on Microsoft solutions and best practices and include the following points:

  • The advantages of upgrading to Windows 10, including at least three Windows 10 features that will provide the most benefit.
  • Recommendations for a version of Windows 10 for the upgrade and the install method(s) to be used.
  • At least two automated deployment options.
  • Plans to minimize disruptions to business operations.
  • A strategy that will keep operating systems updated.
  • Two IEEE references.

I need help with my computer class

  21FA CGF32 LECTURE INFO 1120 Microcomputer Applications |  

 Access 2019 Skills Approach – Ch 3 Challenge Yourself 3.3 

 

  1. Open the start file AC2019-ChallengeYourself-3-3.
  2. If the database opens in Protected View, click the Enable Content button in the Message Bar at the top of the database so you can modify it.
  3. Create a new query named: GreenhouseTechsFT
    1. Add all the fields from the Employees table.
    2. The query should list all employees whose Position begins with the word greenhouse and whose weekly hours are greater than or equal to 20. Hint: Include a wildcard character in the criterion for the Position field.
    3. Modify the query design so results are sorted alphabetically by last name.
    4. Add the MaintenanceLog table to this query and include the MaintenanceDate field after the WeeklyHours field.
    5. Run the query to review the results. There should be 16 records in the results.
    6. Save and close the query.
  4. Export the GreenhouseTechsFT query to an Excel spreadsheet.
    1. Name the Excel file: GreenhouseTechsFT
    2. Include formatting and layout.
    3. Save the export steps with the name: GreenhouseTechsFTExport
  5. Create a new query named: NewPlants.
    1. Add all the fields from the Plants table except ScientificName.
    2. The query should list all white or blue colored plants whose DatePlanted is greater than or equal to 1/1/2019.
    3. Modify the query design so results are sorted by values in the DatePlanted field with the newest plants listed first.
    4. Run the query to review the results. There should be three records in the results.
    5. Save and close the query.
  6. Export the NewPlants query to a text file.
    1. Name the text file: NewPlants
    2. Use Tab as the delimiter.
    3. Include the field names in the first row.
    4. Save the export steps with the name: NewPlantsExport
  7. Create a new query named: RedPlantSale
    1. Add the following fields from the Plants table to the query: CommonName, PrimaryColor, PurchasePrice
    2. Select only those plants with a red color, but don’t show this field in the query results.
    3. Add a calculated field that displays a sale price that is 75 percent of the purchase price. Hint: Use an expression that calculates the value of the PurchasePrice field multiplied by 0.75. Use the name SalePrice for the new field.
    4. Run the query to review the results. There should be five records in the results.
    5. Save and close the query.
  8. Use the Find Unmatched Query Wizard to create a new query that identifies the plants that have no entry in the MaintenanceLog.
    1. Include all fields from the Plants table except the PlantID.
    2. Name this query: PlantsMissingMaintenance
    3. Review the query results. There should be 15 records in the results.
    4. Close the query.
  9. Create a new parameter query named: PlantsByColor
    1. Add the following fields from the Plants table to the query: CommonName, PrimaryColor, DatePlanted, PurchasePrice
    2. Configure the PrimaryColor field so the user is prompted to enter the primary plant color with this message: Enter plant color
    3. Test the query using the color violet. There should be three records in the results.
    4. Save and close the query.
  10. Open the MaintenanceLog table. Apply a filter that shows only those plants that have been watered and pruned. Close the table. There should be one record in the results.
  11. Close the database and exit Access.
  12. Upload and save your project file.
  13. Submit project for grading.

Week 7 project

 Week 7 Project Paper

Hide Assignment InformationInstructions

Week 7 Project Paper: (Due by Sunday of Week 7 11:59 PM EST)

Submit a 10 page research paper with APA standard annotations on an approved topic (see pre-approved topics below).
Pre-approved research topics

  • Authentication/Digital signatures
  • Data collections tools (hardware & software)
  • E-business/e-commerce security
  • End user security issues.
  • Government vs. commercial organization security issues.
  • HIPAA
  • Identity Theft
  • ID&IH Management and Legal Issues
  • Instant Messaging security.
  • Intrusion detection.
  • Sarbannes Oxley
  • Security Threats & Vulnerabilities
  • Wireless technology security

You may use resources from the APUS Online Library, any library, government library, or any peer-reviewed reference (Wikipedia and other non-peer-reviewed sources are not acceptable). Requirements: 

  • The paper must by at least 10 pages double-spaced
  • 1″ margin all around
  • Black12 point fonts (Times New Roman, Arial, or Courier)
  • Correct APA format citations
  • Graphics are allowed but do not apply for the minimum page count.
  • A minimum of 10 references are needed.
  • The paper is automatically submitted to Turnitin to against plagiarism

(Please make sure it’s in APA format and proper in-text citations are used)

Assignment

 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?