python function homework

 PART 1

 three possibilities to consider if a function is not working.

1. if preconditioned is violated

2. if postcondition is  violated

3. if wrong placement of return value

  • Describe each possibility in your own words.
  • Define “precondition” and “postcondition” as part of your description.
  • Create your own example of each possibility in Python code. List the code for each example, along with sample output from trying to run it.

PART 2 

Invent your own function that does some useful computation of your choosing. Do not copy the function from somewhere else. Use incremental development, and record each stage of the development process as you go. Finally, print output that demonstrates that the function works as you intended.

Include all of the following in your Learning Journal:

  • An explanation of each stage of development, including code and any test input and output.
  • The output of three calls to your function with different arguments.

network administration

Assume you are a network administrator. Your internal network has application servers that are accessed by inbound traffic from the Internet. You are considering several strategies. The strategy you select should provide significant control over user access. You must also ensure that all data passing into the internal network is properly evaluated before access is granted. Integrity of data is the top priority.

You are considering security through obscurity, defense in depth, and diversity of defense.

Answer the following question(s):

Which firewall security strategy would be the best solution for the scenario? Why?

Jan and Kim Levering have decided to

  

Jan and Kim Levering have decided to expand their IT consulting business. They have leased space in a nearby building. The following are the details: They will have an entire floor that has the following: a receptionist area 2 offices (one for Jan and one for Kim) a conference room an office that will accommodate 15 cubes for their consultants a computer room to house their server(s) They currently have 8 Windows XP systems set up in a workgroup They would like you to develop a 2-phased plan. The first phase involves moving from the current office to the new office. In a 3–4-page report, you need to do the following: Diagram the network and identify the topology and components: Their existing equipment is as follows: 8 XP systems 1 each in Jan and Kim’s offices 6 systems cubes (1 per cube) 1 Windows Server 2008 (standard edition) system in the computer room 1 printer in the computer room Include the following: IP addressing scheme (use static addressing) subnetting/supernetting subnet mask for phase 1 Provide an installation guide on how to set up the Windows Server 2008 system and the network, including the following: illustrations of the server installation process a minimum of 8 Windows Server 2008 screenshots, with detailed explanations descriptions of the settings for the following: server roles naming conventions disk format (NTFS or FAT) joining security centralized versus decentralized administration a discussion of TCP/IP configuration a comparison of settings between workgroup and domain an explanation of typical installation problems/difficulties related to the following: hardware software the network The second phase, to be completed later, will be to expand their network to accommodate additional equipment. The answer should be in a 3-4 page Words Document.

Respond to Lisa

Using OneDrive in MS Office, many people can collaborate on a document. This is a useful feature in this day and age of remote work. It certainly is a time and money saver as well. Advocate Health Care in Illinois has used the online collaboration in Office 365 and has saved “U.S. $53.8 million† from our information worker productivity gains alone. For example, the Forrester analysis found that we’re saving $2.2 million over three years† in time and transportation costs” (Microsoft.com, 2017). With the COVID-19 pandemic, telemedicine became a lifesaver. In an article in NEJM, “A central strategy for health care surge control is “forward triage” — the sorting of patients before they arrive in the emergency department (ED). Direct-to-consumer (or on-demand) telemedicine, a 21st-century approach to forward triage that allows patients to be efficiently screened, is both patient-centered and conducive to self-quarantine, and it protects patients, clinicians, and the community from exposure.” At the height of the pandemic, telemedicine was widely used. Being able to collaborate with others is important in healthcare today. Using Microsoft Teams is another method that has been helpful today. Although Microsoft Teams has been used in my workplace, I’ve not personally used it. Being able to work with colleagues all over the world has become possible with online collaboration.

References:

Hollander, & Carr, B. G. (2020). Virtually Perfect? Telemedicine for Covid-19. The New England Journal of Medicine382(18), 1679–1681. https://doi.org/10.1056/NEJMp2003539

https://www.microsoft.com/en-us/microsoft-365/blog/2017/03/20/improving-patient-health-through-collaboration-innovation-and-efficiency-with-office-365/

Programmed Security

 

 

Cybersecurity professionals need to know the differences in the tools used to automate network defense and cybersecurity attacks by hackers in order to properly form strategic defense parameters that can resist network threats.

In 500-700 words, explain defensive scripting and how it works.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

GO16_AC_CH03_GRADER_3F_AS – Contractor Services

GO16_AC_CH03_GRADER_3F_AS – Contractor Services

  

Project Description:

In this project, you will use a database to track facility and contractor services for an open house for prospective college students. You will create reports, modify a report in Layout view and Design view, group data in a report, and keep grouped data together for a printed report.

     

Start   Access. Open the downloaded file named go_a03_grader_a2_Contractor_Services.accdb   and then enable the content. View the relationship between the Contractors   table and the Facility Services table. One contractor can provide many   facility services. Close the Relationships window.

 

Use   the Report tool to create a report based on the Setup and Tear Down Job Costs   Query object.

 

With   the report displayed in Layout view, apply the Facet theme to only the   report. Delete the Job ID and Contractor ID fields from the report. Change   the width of the Contractor Last Name and Contractor First Name text box   controls to 2   inches. Change the width of the Category text box controls to 1.25 inches.

 

With   the report displayed in Layout view, sort the records in ascending order by   the Date field. Change the width of the Job Cost text box controls to 0.75 inch.

 

At   the bottom of the report and in Layout view, change the height of the   calculated control that displays $1440   to 0.25 inch. For the page number control, set   the Left property to 2.75   inches.

 

With   the report displayed in Layout view, select the title of the report and   change the font size to 16. In the title, change the word Query to Report.   In the body of the report, select the Date field name and set the Left   property to 0.25   inch (the Date text box controls move to the right, and all of the other fields   also move to the right). Save the report as Setup and Tear   Down Job Costs Report, close the Property Sheet, and then   close the report.

 

Use   the Report Wizard to create a report based on the Facility Services table.   Add the following fields (in this order) to the report: Category, Service   Description, and Job Cost. Group the records by the Category field.

 

Sort   the records in ascending order by the Service Description field. Summarize   the report by summing the Job Cost field.

 

Be   sure the layout is Stepped and the orientation is Portrait. Name the report Job Cost by Category Report, and then finish the wizard.

 

Display   the Job Cost by Category Report in Layout view. Apply the Wisp theme to this   report only. Select the title of the report, change the font size to 16, and   then apply bold. Apply bold to the three label controls that display the   field names.

 

With   the Job Cost by Category Report displayed in Layout view, delete the control   that begins with Summary for ‘Category’. Change the width of the Service   Description text box controls to 2.75   inches and the height to 0.375   inch. Save the report.

 

With   the Job Cost by Category Report displayed in Layout view, select the Job Cost   label control, the Job Cost text box controls that display a truncated #   symbol, and the calculated controls for the total Job Cost that display a   truncated # symbol, and the calculated control for the Grand Total that   displays a truncated # symbol. Change the width of the selected controls to 1 inch, and set the Left property to 6 inches. Save the report.

 

With   the Job Cost by Category Report displayed in Layout view, change the text in   the label control that displays Sum to Total Job Cost by   Category.   For the same control, set the Left Property to 3.5   inches and the width to 2.1.   At the bottom of the report, change the width of the Grand Total label   control to 1   inch. Close the Property Sheet, and save the report.

 

Display   the Job Cost by Category Report in Design view. Select the following two   controls: the Total Job Cost by Category label control (in the Category   Footer section) and the Grand Total label control (in the Report Footer   section). Align the right edges of the two selected controls. Save the   report.

 

Display   the Job Cost by Category Report in Print Preview as two pages, and notice how   the groupings break across the pages. Display the report in Layout view, and   then open the Group, Sort, and Total pane. Set the grouping option so that   each group of category records is kept together on one page when the report   is printed, and then close the Group, Sort, and Total pane. Display the   report in Print Preview, and notice that the groupings are not split between   pages. Save the report, and then close the report.

 

If   necessary, close all database objects and open the Navigation Pane. Close   Access and submit the database as directed.

Web browser forensics

 

You are going to write a 2-3 page research paper in APA format, with all supporting references and visuals on the following :

You are to take one of the web browsers from the top 10 (see website below) and provide in depth research on the web browser to include such things as history of the web browser, operating system compatibility, including computer and mobile, security features and weaknesses, location of forensic artifacts, how is data stored, where web browser artifacts are found, chart of statiscal information, articles on attacks/hacking of web browser,and any other forensic data needed for an incident response to understand how an attack on a computer or computer network began and finding the source of compromise. This list is just an example and can include more than this but at a minimum should at least include these items.

https://technumero.com/most-popular-web-browsers/
https://www.toptenreviews.com/best-internet-browser-software

AAI

An excellent overview paper on Deep Learning was published in the Nature. The 

authors, Yann LeCun, Yoshua Bengio, and Geoffrey Hinton, are pioneers and leading scientists 

in Deep Learning field.  Yann LeCun, Yoshua Bengio, and Geoffrey Hinton. “Deep learning.”, Nature 521.7553, 436-444. (2015)

You can access the paper through 

http://www.nature.com/nature/journal/v521/n7553/full/nature14539.html 

Read the paper and answer the following questions. Do not just write down (copy and paste) the contents of the paper. You should write in your own understanding.You can focus on sections of “Convolutional neural networks” and “Image understanding with 

deep convolutional networks”. 

1. What is the role of Convolutional layer?

2. Why do we need more than one filer?

3. What is the role of pooling layer?

4. How local combinations of edges, motifs, parts, objects are related in a hierarchy of 

features?

5. What are major successful application areas of CNN?

6. Why CNN is so successful?