Assignment 2

 

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research based on what you have learned from chatpers 5 and 6.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 5 and 6 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Examine how new data-capture devices such as radio-frequency identification (RFID) tags help organizations accurately identify and segment their customers for activities such as targeted marketing. Many of these applications involve data mining. Scan the literature and the Web and then propose five potential new data mining applications that can use the data created with RFID technology. What issues could arise if a country’s laws required such devices to be embedded in everyone’s body for a national identification system?
  2. Survey and compare some data mining tools and vendors. Start with fairisaac.com and egain.com. Consult dmreview.com and identify some data mining products and service providers that are not mentioned in this chapter. One of my favorites to explore is RapidMiner found at https://rapidminer.com/ and an educational license option can be found at:  https://rapidminer.com/educational-program/
  3. Explore the Web sites of several neural network vendors, such as California Scientific Software (calsci.com), NeuralWare (neuralware.com), and Ward Systems Group (wardsystems.com), and review some of their products. Download at least two demos and install, run, and compare them.
  4. Important Note:  With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

Paper Review and Preparation to submit for Grading

Please make sure to proof read your post prior to submission. This professional paper should be well written and free of grammatical or typographical errors. Also remember not to plagiarize

word document edit

 

  1. Open the VaccinationSchedule-04.docx start file. If the document opens in Protected View, click the Enable Editing button so you can modify it.
  2. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.

NOTE: If group titles are not visible on your Ribbon in Word for Mac, click the Word menu and select Preferences to open the Word Preferences dialog box. Click the View button and check the Show group titles check box under Ribbon. Close the Word Preferences dialog box.

  1. Select the tabbed text in the middle of the document and convert it to a table (accept default settings). Don’t include the blank line below the tabbed text.
  2. Select the entire table and apply the following changes:
    1. Select Banded Rows in the Table Style Options group [Table Tools Design tab] and deselect all 
    2. Apply the List Table 1 Light – Accent 2 table style (Figure 4-120).
    3. Change the font size on all the text in the table to 10 pt.
    4. AutoFit the table and choose AutoFit Window.
    5. Change row height to 0.25″.
    6. Center all text vertically within each cell. (Hint: Use the Cell tab in the Table Properties dialog box.)
    7. Sort the table by Name of Vaccine in Ascending order. Be sure to select Header row in the My list has area of the Sort dialog box.
  3. Make the following changes to the table:
    1. Insert a row above the first row.
    2. Merge the three cells in the new first row and type the following:
      RECOMMENDED VACCINATION SCHEDULE
    3. Bold and center the first row and change the font size to 11 pt.
    4. Bold and italicize the column headings in the second row.
    5. Select the first row and apply borders with the following settings: solid line, Black, Text 1 color (second color in the first row of Theme Colors), 1 ½ pt. width, and apply a top and bottom
    6. Select the second row and apply a border with the following settings: solid line, Black, Text 1 color, 1 ½ pt width, and apply a bottom border. Do not remove the top border applied in the previous step.
    7. Select the last row and apply a border with the following settings: solid line, Black, Text 1 color, 1 ½ pt width, and apply a bottom border.
    8. Align Center [Table Tools Layout tab, Alignment group] the column headings.
    9. Align Center the text in the third column.
  4. Insert the following information alphabetically into the table. Insert rows where needed.

This table lists text to be typed in a table

Meningococcal conjugate (MCV)

At 11-12 years

1

Hepatitis B (HepB)

At birth, 1-2 months, and 6 months

3

  1. Modify the title of the document (“Vaccination Schedule”).
    1. Apply the Title style to the title of the document.
    2. Change the After paragraph spacing to 8 pt.
    3. Center the title horizontally.
    4. Apply small caps and bold formatting to the title.
  2. Insert and modify a picture.
    1. Place the insertion point after the title and insert the CMPLogo-04 picture downloaded from the Resources link. Use the Insert Picture dialog box.
    2. Change text wrapping to Top and Bottom.
    3. Change the height of the logo to 1″. Verify the logo remains proportional.
    4. Apply the Offset: Bottom Right shadow picture effect (Outer category).
    5. Set the Horizontal Absolute position to 0.2″ to the right of Page.
    6. Set the Vertical Absolute position to 0.2″ below Page.
  3. Insert a picture and add a caption.
    1. Place the insertion point at the end of the first body paragraph and insert the Vaccination-04 picture downloaded from the Resources link. Use the Insert Picture dialog box.
    2. Change the text wrapping to Square.
    3. Change the height of the picture to 1.3″. Verify the graphic remains proportional.
    4. Drag the picture to the right of the first and second paragraphs.
    5. Insert a caption, delete the caption placeholder text, and type Don’t neglect your vaccinations! as the caption text.
    6. Center the caption text, change the font color to Red, Accent 2 (sixth color in the first row of Theme Colors), and turn off italics if it is applied to the text.
    7. Select the caption and the picture and Align Center.
    8. Group the caption and the picture.
    9. Set the Horizontal Absolute position to 6″ to the right of Margin.
    10. Set the Vertical Absolute position to 0.8″ below Margin.
  4. Edit the alt text of the graphic objects.
    1. Edit the alt text of the CMP logo and type Courtyard Medical Plaza logo as the alt text.
    2. Edit the alt text of the graphic of a doctor, type Graphic of a doctor as the alt text, and close the Alt Text pane.
  5. Save and close the document (Figure 4-121).

Statistics course weekly lab

just follow the instuction from top to bottom write some function and plot the diagram

involve Python, linear algebra, confidence level, bootstrap linear_model

5s week 9 assignment BS

IN 300 Words,

 Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Do not copy the work. 

Include references, do not copy paste strictly.

Linux Implementation Proposal: Migration Proposal Presentation

 

Faster Computing has contacted Go2Linux and requested a brief  proposal presentation for migrating its systems from Windows to Linux.  The company is specifically interested in seeing the following  information:

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
     
  • The company is aware that many different Linux derivatives exist. Which would Go2Linux recommend, and why?
     
  • Are there graphical interfaces available for the Linux workstations  that would provide similar functionality to Windows? Some users are  concerned about working with a command-line interface.
     
  • What steps will be required to migrate the systems from Windows to Linux?
     
  • What tools are available on Linux for the servers to provide file sharing, web servers, and email servers?
     

The deliverable for this phase of the project is a three- to  five-slide PowerPoint narrated presentation. For each slide, you will  embed your own audio recording as if you were presenting the content to  the Faster Computing team. Faster Computing has not yet committed to the  project, so this should be presented as a proposal. 

The presentation should be visually appealing; inclusion of at least  one image that supports the content and adds value to the proposal is  required. You must cite at least two quality sources.

Wk 5 – Apply: Policies Review [due Mon]

Assignment Content

  1. Many information security policies cross the entire spectrum of an organization. 

    Module 04, “Network Security Policy Design and Implementation,” of EC Council CND Courseware provides an extensive list of information security policies.

    Choose 5 information security policies.

    Find an example of each policy on the Internet. Academic institutions and federal government agencies tend to publish their information security policies that are open to public view.

    Write a 2- to 3-page summary of the policies and examples you found in a Microsoft® Word document. Include the following for each of the policies:

    • Purpose of the policy
    • Owner of the policy
    • Audience of the policy
    • Co-dependencies with other policies
    • A link to the policy example
    • Cite references to support your assignment.

      Format your citations according to APA guidelines.

      Assignment checklist:

    1. The reflection must be 700 – 1050words (about 2-3 pages but I will be looking at word count) 
    2. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    3. Include at least one references that are properly cited 
    4. Any images must have a caption and referenced in the paper. 
    5. Combine the screenshots and the remainder of the assignment into one APA formatted document. If you submit the assignment in multiple parts you will lose points   
    6. Follow APA format (fonts, etc)