OPERATING SYSTEM

 

  • Explain the purpose of an operating system for a personal computer.
  • Give a brief description of the hardware components of a computer that the OS interfaces with. Motherboard, CPU, RAM, hard drive, sound controller, power supply, input and output devices, etc.

the cs

 

Please solve three (3) programming problems related to the content presented in Chapter 12 in your text. You can find the programming problems in the attached file (Module 5 Programming Problems Worksheet.docx (Links to an external site.)).

  • Download the worksheet and save it as Mod5-Worksheet-Programming-Last-First.docx. For example, Mod5-Worksheet-Programming-Smith-John.docx.
  • Consider the problem, design an algorithm (or algorithms) that would solve the problem, and then implement the algorithm in Java.
  • Create a new folder and name it as Mod5-Java-Programming-Last-First, for example, Mod5-Java-Programming-Smith-John.
  • Write the source code for each problem and save them as .java files in the folder you created. There are three programming problems for this module so you should have three .java files. Name your java files as Mod5Problem#.java, for example, Mod5Problem1.java.
  • Copy data file(s) used for your program and/or output file into the folder.
  • Please insert the algorithm written in pseudocode as a comment in the beginning of your program.
  • Take screenshots of your running program – you can take screenshots using PrintScreen or any tool that you are familiar with, making sure that the console window in which you run the program appears on the screen.
  • Copy the screenshots in the worksheet. If your program has different outcomes, take screenshots of each variation.

Submission

  • Compress the folder that saves all of your java files as .zip file. Please note don’t save the worksheet in the same folder as they need to be submitted separately.
  • Submit the following two files as attachments by clicking the Submit Assignment button above.
    • Mod5-Java-Programming-Last-First.zip (including .java files, data files, and .txt files).
    • Mod5-Worksheet-Programming-Last-First.docx.

Grading

This assignment is worth 20 points. You can find the grading rubric for each program in the worksheet attached above.

  • CycleThrowTryCatch (6 pts.).
  • CycleFileOutput (7 pts.).
  • CycleFileInput (7 pts.).

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Images

Excel 2019 In Practice – Ch 7 Independent Project 7-6

 

The Hamilton Civic Center is developing a template for member exercise and off-site seminars. You create the template, set validation, enter formulas, and insert a combo box control. You then create a new workbook from the template.

[Student Learning Outcomes 7.1, 7.2, 7.3, 7.4, 7.6]

File Needed: HamiltonCC-07.xlsx (Available from the Start File link.)

Completed Project File Names: [your name]-HamiltonCC-07.xlsx

Skills Covered in This Project

  • Set data validation to use a list.
  • Set validation to restrict dates.
  • Create an error alert message.
  • Insert a combo box control.
  • Check accessibility and add alt text.
  • Protect a worksheet.
  1. Open the HamiltonCC-07 workbook and click the Enable Editing button. The file will be renamed automatically to include your name.
  2. Select cell D2 on the Data sheet and review the formula. The formula divides calories by time and rounds the results to three decimal places.ImagesFigure 7-69 Custom format for values
  3. Select cells D2:D10 and open the Format Cells dialog box.
  4. Select the Custom category on the Number tab and build a format to display three decimal places (Figure 7-69).
  5. Select cell D2 and click the Format Painter button [Home tab, Clipboard group]. Click the Calorie Tracking tab and paint the format to cells E3:E33.ImagesFigure 7-70 VLOOKUP formula
  6. Select cell E3 on the Calorie Tracking sheet. Start a VLOOKUP function to lookup the label in cell C3. For the array, use an absolute reference to cells A2:D10 on the Data sheet. The Col_index_num is 4 for the calories per minute column. Leave the Range_lookup argument empty; the array (A2:D10) is sorted in ascending order. The result of the VLOOKUP formula is calories per minute for the exercise (Figure 7-70).
  7. Edit the formula in cell E3 to multiply the results by the number of minutes in cell D3.
  8. Copy the formula in cell E3 to cells E4:E33. The #N/A error message displays in rows where no data displays.
  9. Select cells C3:C33 and set data validation to use the list of activity names on the Data sheet. Do not use an input message or an error alert.
  10. Select the Calorie Tracking sheet and delete the data in cells A3:D23.ImagesFigure 7-71 Data validation for dates
  11. Select cells B3:B33 and set data validation to use a Date that is less than or equal to TODAY (Figure 7-71). Include a Stop error alert with a title of Check Date and a message of Date must be today or in the past. including the period.
  12. Select cells A3:D33 and remove the Locked cell property. Select cell A3 to position the insertion point.
  13. Display the Developer tab on the Ribbon and click the Data worksheet tab.ImagesFigure 7-72 Combo box settings
  14. Draw a combo box control to cover cell F8 and open its Format Control dialog box. Select cells G8:G11 for the Input range and type f8 in the Cell link box (Figure 7-72).
  15. Deselect the control and then select Second from the control. The linked cell is under the control and hidden from view.
  16. Click the Hospital Seminars tab and select cell D4. This cell has Center Across Selection alignment applied.
  17. Select cell D4 and use CONCAT and INDEX to display the result from the combo box, concatenating the Index results to the word “Quarter.”
    1. Start a CONCAT function [Text group].
    2. Use the INDEX function with the first arguments list as the Text1 argument.ImagesFigure 7-73 INDEX is nested within CONCAT
    3. Choose cells G8:G11 on the Data sheet for the Array argument and cell F8 for the Row_num argument. You can select the combo box control or type f8 after the sheet name (Figure 7-73). When the array is one column, a Column_num argument is not necessary.
    4. Click between the two ending parentheses in the Formula bar to return to the CONCAT arguments and type a comma (,) to move to the Text2 argument. (If you accidentally click OK, click the Insert Function button to re-open the Function Arguments dialog box.)ImagesFigure 7-74 Space character is included with Text2 argument
    5. Click the Text2 box, press Spacebar, type Quarter, and click OK. (Figure 7-74).
    6. Format cell D4 as bold italic 16 pt.
  18. Select the Data sheet, select Third from the combo box control, and return to the Hospital Seminars sheet to see the results.
  19. Select cell D4 and cells D6:G10 on the Hospital Seminars sheet and remove the Locked property.
  20. Delete the contents of cells D6:G10 and select cell D6.
  21. Check accessibility and add the alternative text Hamilton Civic Center Logo to both pictures in the workbook.
  22. Select cell D6 on the Hospital Seminars sheet and cell A3 on the Calorie Tracking sheet.
  23. Protect the Hospital Seminars sheet and the Calorie Tracking sheet, both without passwords.
  24. Save and close the workbook (Figure 7-75).
  25. Upload and save your project file.
  26. Submit project for grading.

Research Based postition Paper

 

Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause a shift in financial business practices that many experts are predicting? Explain why or why not. Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way finance is applied and practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of financial management could be most impacted by Blockchain technology? How might the financial functions change? Support your answer with research.

Course writing requirements:

  • References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions (even initial discussion posts)
  • Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write more than the minimum requirement of the word count assigned
  • As always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Articlee writind

Either draw a graph with the given specifications or explain why no such graph exists:

A tree with twelve vertices and fifteen edges

Notes: 

1. Write or type your work neatly and completely.

Digital Forensics

  Discuss in 400 words on the below topics.

  • Proactive collection of evidence in Digital Forensics
  • Post-incident collection in Digital Forensics
  • Router and switch in Digital Forensics

Cybersecurity

Research the fundamentals associated with cybersecurity, choose one and explain why this fundamental is essential. consider where cybersecurity has come and where it could be going in the future

2 page papers 

COMPUTER

 

You work as an administrative assistant for the President of Bass University which employs around 300 faculty and staff. Your immediate supervisor, the President, has just informed you that the university is going to hold an employee appreciation party where all employees and their families are invited. Consequently, the President knows that you have a creative talent in creating invitation flyers and has asked you to create such a document as an invitation for all employees and their families to attend and has asked that you include at a minimum the following requirements for this employee appreciation party invitation.

  1. For content, the message within the employee appreciation party invitation should be written to attract as many of the 300 faculty and staff as possible to the party including any family members.
  2. The invitation should include an overall theme appropriate for the occasion.
  3. The invitation should only be 1 page.
  4. The invitation should contain a full-page border.
  5. The invitation should include a text watermark displaying in the background “Employee Appreciation Party.”
  6. The invitation should include a formatted title displaying the name Bass University using Word Art.
  7. The invitation should include a two-column table including general food available during the party.
  8. The invitation should also include some type of graphic in the form of a clip art and or a picture and as a tip, using clip art to represent the general menu in the table would be very creative. 
  9. When you have the invitation flyer ready, proof the document to ensure that content does not exceed 1 page and apply any appropriate formatting to text and graphical objects to ensure all content fits to 1 page and be creative. 

Assignment Expectations

Structure and Format: Follow all 9 steps using ideally Microsoft Word.

File name: Name your saved file according to your first initial, last name, and the assignment number (for example, “RHall Assignment 1.docx”)