Power Point Presentation

Create a Power Point Presentation

 PIONEERS (  Tim Berners-Lee )  tell me about this person. What did this person do to become a pioneer? Did he/she invent something? What did they invent? What is the person doing now? What has this person accomplished? Be thorough with the subject. 

 PowerPoint Criteria For the PowerPoint you must:

 1- Research your subject 

2- Find photographs 

 3-  Your Presentation should not be your entire research assignment. o USE THE 7X7 RULE  7 lines per slide (maximum) 7 words per line (maximum) o This does not mean that all of your slides need to have 7 lines with 7 words .

Use key words and/or phrases to make your point o DO NOT crowd the slides with too much text or too many pictures 

 Use the NOTES Pages underneath each slide to include some information you are going to talk about if/when presenting in front of an audience. 

 The purpose of the presentation is to give details, information or teach about a subject. o You are NOT to read the slides 

 Be sure that ALL of your slides contain both text and pictures 

There should not be any slides with pictures only  

FORMAT the pictures/images that you’ve used 

 Be sure to include a slide transition 

Use the same transition throughout the presentation 

 DO NOT make the slides change automatically 

 Insert a Footer with Your Name and your Student ID number on all slides except the title slide 

 Be sure ti include a Works Cited slide with your video link at the END of the presentation. 

Use one of your images AS a background on one slide 

 Use shapes to enhance your presentation 

  DO NOT make the slides change automatically o The Presentation

 MUST have a minimum of 15 slides.  Slide 1: Title  Slides 2 – 14: Presentation  Slide 15: Work Cited, Links, Video Link and resources 

Methodology used on your topic

 Try to find a quantitative, a qualitative and a  mixed-method dissertation that may be closely related to   The role of intrusion/spyware analysis in risk management in the current world topic. Describe the method used, the sample, the population chosen, was there a survey involved, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the dissertation tried to examine. 

Advanced Operating Systems Project

 There are 4 parts for the project. The question may be long to read but it’s not a heavy work because there are many examples and explanations for the each parts.*Part 1.  The first part of this project requires that you implement a class that will be used to simulate a disk drive. The disk drive will have numberofblocks many blocks where each block has blocksize many bytes. The interface for the class Sdisk should include :

Class Sdisk
{
public :

Sdisk(string diskname, int numberofblocks, int blocksize);

int getblock(int blocknumber, string& buffer);
int putblock(int blocknumber, string buffer);
int getnumberofblocks(); // accessor function
int getblocksize(); // accessor function

private :

string diskname;        // file name of software-disk

int numberofblocks;     // number of blocks on disk
int blocksize;          // block size in bytes
};

An explanation of the member functions follows :

  • Sdisk(diskname, numberofblocks, blocksize) This constructor incorporates the creation of the disk with the “formatting” of the device. It accepts the integer values numberofblocks, blocksize, a string diskname and creates a Sdisk (software-disk). The Sdisk is a file of characters which we will manipulate as a raw hard disk drive. The function will check if the file diskname exists. If the file exists, it is opened and treated as a Sdisk with numberofblocks many blocks of size blocksize. If the file does not exist, the function will create a file called diskname which contains numberofblocks*blocksize many characters. This file is logically divided up into numberofblocks many blocks where each block has blocksize many characters. The text file will have the following structure :  

                                                            -figure 0 (what I attached below)              

  • getblock(blocknumber,buffer) retrieves block blocknumber from the disk and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • putblock(blocknumber,buffer) writes the string buffer to block blocknumber. It returns an error code of 1 if successful and 0 otherwise.

IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the Sdisk. NOTE that you must also write drivers to test and demonstrate your program.*Part 2.  The second part of this project requires that you implement a simple file system. In particular, you are going to write the software which which will handle dynamic file management. This part of the project will require you to implement the class Filesys along with member functions. In the description below, FAT refers to the File Allocation Table and ROOT refers to the Root Directory. The interface for the class should include :

Class Filesys: public Sdisk
{
Public :
Filesys(string diskname, int numberofblocks, int blocksize);
int fsclose();
int fssynch();
int newfile(string file);
int rmfile(string file);
int getfirstblock(string file);
int addblock(string file, string block);
int delblock(string file, int blocknumber);
int readblock(string file, int blocknumber, string& buffer);
int writeblock(string file, int blocknumber, string buffer);
int nextblock(string file, int blocknumber);


Private :


int rootsize;           // maximum number of entries in ROOT

int fatsize;            // number of blocks occupied by FAT
vector filename;   // filenames in ROOT
vector firstblock; // firstblocks in ROOT
vector fat;             // FAT
};

An explanation of the member functions follows :

  • Filesys() This constructor reads from the sdisk and either opens the existing file system on the disk or creates one for an empty disk. Recall the sdisk is a file of characters which we will manipulate as a raw hard disk drive. This file is logically divided up into number_of_blocks many blocks where each block has block_size many characters. Information is first read from block 1 to determine if an existing file system is on the disk. If a filesystem exists, it is opened and made available. Otherwise, the file system is created.The module creates a file system on the sdisk by creating an intial FAT and ROOT. A file system on the disk will have the following segments:                                                           -figure 1 (what I attached below)           
  • consists of two primary data objects. The directory is a file that consists of information about files and sub-directories. The root directory contains a list of file (and directory) names along with a block number of the first block in the file (or directory). (Of course, other information about the file such as creation date, ownership, permissions, etc. may also be maintained.) ROOT (root directory) for the above example may look something like                                                   -figure 2 (what I attached below)  The FAT is an array of block numbers indexed one entry for every block. Every file in the file system is made up of blocks, and the component blocks are maintained as linked lists within the FAT. FAT[0], the entry for the first block of the FAT, is used as a pointer to the first free (unused) block in the file system. Consider the following FAT for a file system with 16 blocks.  

                                                        -figure 3 (what I attached below)

  • In the example above, the FAT has 3 files. The free list of blocks begins at entry 0 and consists of blocks 6, 8, 13, 14, 15. Block 0 on the disk contains the root directory and is used in the FAT for the free list. Block 1 and Block 2 on the disk contains the FAT. File 1 contains blocks 3, 4 and 5; File 2 contains blocks 7 and 9; File 3 contains blocks 10, 11, and 12. Note that a “0” denotes the end-of-file or “last block”. PROBLEM : What should the value of FAT_size be in terms of blocks if a file system is to be created on the disk? Assume that we use a decimal numbering system where every digit requires one byte of information and is in the set [0..9]. Both FAT and ROOT are stored in memory AND on the disk. Any changes made to either structure in memory must also be immediately written to the disk.  
  • fssynch This module writes FAT and ROOT to the sdisk. It should be used every time FAT and ROOT are modified.
  • fsclose This module writes FAT and ROOT to the sdisk (closing the sdisk).
  • newfile(file) This function adds an entry for the string file in ROOT with an initial first block of 0 (empty). It returns error codes of 1 if successful and 0 otherwise (no room or file already exists).
  • rmfile(file) This function removes the entry file from ROOT if the file is empty (first block is 0). It returns error codes of 1 if successful and 0 otherwise (not empty or file does not exist).
  • getfirstblock(file) This function returns the block number of the first block in file. It returns the error code of 0 if the file does not exist.
  • addblock(file,buffer) This function adds a block of data stored in the string buffer to the end of file F and returns the block number. It returns error code 0 if the file does not exist, and returns -1 if there are no available blocks (file system is full!).
  • delblock(file,blocknumber) The function removes block numbered blocknumber from file and returns an error code of 1 if successful and 0 otherwise.
  • readblock(file,blocknumber,buffer) gets block numbered blocknumber from file and stores the data in the string buffer. It returns an error code of 1 if successful and 0 otherwise.
  • writeblock(file,blocknumber,buffer) writes the buffer to the block numbered blocknumber in file. It returns an appropriate error code.
  • nextblock(file,blocknumber) returns the number of the block that follows blocknumber in file. It will return 0 if blocknumber is the last block and -1 if some other error has occurred (such as file is not in the root directory, or blocknumber is not a block in file.)IMPLEMENTATION GUIDELINES : It is essential that your software satisfies the specifications. These will be the only functions (in your system) which physically access the sdisk.

*Part 3.   The third part of this project requires that you implement a simple shell that uses your file system. This part of the project will require you to implement the class Shell along with member functions. The interface for the class should include :

class Shell: public Filesys
{
Public :

Shell(string filename, int blocksize, int numberofblocks);

int dir();// lists all files
int add(string file);// add a new file using input from the keyboard
int del(string file);// deletes the file
int type(string file);//lists the contents of file
int copy(string file1, string file2);//copies file1 to file2
};

An explanation of the member functions follows :

  • Shell(string filename, int blocksize, int numberofblocks): This will create a shell object using the Filesys on the file filename.
  • int dir(): This will list all the files in the root directory.
  • int add(string file): add a new file using input from the keyboard
  • int del(string file): deletes the file
  • int type(string file): lists the contents of file
  • int copy(string file1, string file2): copies file1 to file2

IMPLEMENTATION GUIDELINES :See the figure 4  (what I attached below) for the ls function of Filesys.See the figure 5 (what I attached below) for dir function of Shell. See the figure 6 (what I attached below)  for main program of Shell.*Part 4.  In this part of the project, you are going to create a database system with a single table which uses the file system from Project II. The input file will consist of records associated with Art History. The data file you will use as input consists of records with the following format: The data (180 records) is in date.txt file (what I attached below)

  • Date : 5 bytes
  • End : 5 bytes
  • Type : 8 bytes
  • Place : 15 bytes
  • Reference : 7 bytes
  • Description : variable

In the data file, an asterisk is also used to delimit each field and the last character of each record is an asterisk. The width of any record is never greater than 120 bytes. Therefore you can block the data accordingly. This part of the project will require you to implement the following class:

Class Table : Public Filesys
{
Public :

Table(string diskname,int blocksize,int numberofblocks, string flatfile, string indexfile);

int Build_Table(string input_file);
int Search(string value);

Private :

string flatfile;
string indexfile;

int IndexSearch(string value);
};

The member functions are specified as follows :

  • Table(diskname,blocksize,numberofblocks,flatfile,indexfile) This constructor creates the table object. It creates the new (empty) files flatfile and indexfile in the file system on the Sdisk using diskname.
  • Build_Table(input_file) This module will read records from the input file (the raw data file described above), add the records to the flatfile and create index records consisting of the date and block number, and then add the index records to the index file. (Note that index records will have 10 bytes .. 5 bytes for the date and 5 bytes for the block number.)
  • Search(value) This module accepts a key value, and searches the index file with a call to IndexSearch for the record where the date matches the specified value. IndexSearch returns the blocknumber of the block in the flat file where the target record is located. This block should then be read and the record displayed.
  • IndexSearch(value) This module accepts a key value, and searches the index file indexfile for the record where the date matches the specified value. IndexSearch then returns the block number key of the index record where the match occurs.

See the figure 7 (what I attached below) for the main program of Shell which includes a search command. 

QUALITATIVE Journal Submit Article

 

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

password recommendations

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necessary.

Discussion 66

 

Murder Case

Preamble

An organization system administrator was labeled as the key suspect in a homicide case. The accused claimed that he was at work at the time of the murder. 

Police Intervention

The police asked his employer to help them verify his alibi. Unpredictably, the same organization, occasionally trained law enforcement personnel to investigate computer crimes and was eager to help in the investigation. 

Collaborative Strength: 

The organization worked with police to assemble an investigative team, seized the suspect computers in his office and residence, and backup tapes on a file server managed by his employer. All of these evidence were stored in a room to where only members of the team had access. 

Harsh Situation

At the initial stages, the operation appeared reasonably well documented, but the reconstruction process was a disaster. The investigators made so many omissions and mistakes that one computer expert when reading the investigator’s logs, suggested that the fundamental mistake was that the investigators locked all of the smart people out of the room. The investigators, in this case, were unaware of the situation and unwilling to admit the slip-up.

As a result of the investigators’ omissions and mistakes, the suspect’s alibi could not work together. Digital evidence to support the suspect’s alibi was identify later but not by the investigators. If the investigators had sought expert assistance to deal with a large amount of digital evidence, they might have quickly confirmed the suspect’s alibi rather than putting him through years of investigation and leaving the murderer to go free.

Lesson Learned

  • The case amplifies forensic investigators’ requirements to obtain fundamental knowledge of computers, compatible operating systems, and application software programs.
  • Forewarning forensic investigators to seek the assistance of the system administrator during the criminal investigation. 

Scenario 

  • You have been retained as a Deputy Technology officer at the University and charged with the responsibility of developing an Acceptable User Policy for the department of computer science based on this murder case.
  • Question 1
  • Use the AUP to amplify the advantages and disadvantages of investigators’ quarterly training on most currently used operating systems such as Microsoft Windows, Macintosh, UNIX, Linux, Sun System, and more. 

Scenario 2

  • The investigators, in this case, were unaware of the situation and unwilling to admit the slip-up. As a result of such omissions and mistakes, the suspect’s alibi could not work together. Digital evidence to support the suspect’s alibi was identify later but not by the investigators. If the investigators had sought expert assistance to deal with a large amount of digital evidence, they might have quickly confirmed the suspect’s alibi rather than putting him through years of investigation and leaving the murderer to go free.
  • Question 2 “Investigators allowed the Murderer to go free.”

2:1. Defend the impasse of the investigator’s unwillingness to admit the slip-up?

2:2 Use the Acceptable User Policy to amplify why the murderer was allowed to go free and penalties for violations.

USE The Following attached file, called Technology Acceptable User Plolycy

EH week10 DB

 

Hello,

i need this paper by 10/28 afternoon.

Strictly No plagiarism please use your own words.

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation  been avoided? 300-350 words.

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

2 Presentations due in 14 hours

 office 365 presentation

Instructions

Create a PowerPoint presentation that is 5 to 10 slides (with speaker notes) based on the following scenario.

Scenario: You work for an organization with about 300 employees. You are in charge of tool selection and procurement for office software. You research options and come to a decision that you will recommend Office365 rather than standard copies of Office 2013 for your organization. You must convince the organization’s leaders that this is the best option.

Include slides that discuss the advantages and disadvantage of Office365 vs the standard Office 2013 for the following topics:

  • Cost
  • Differences in functionality & usability
  • Features and updates
  • Benefits of Cloud Computing
  • Cloud storage options with Microsoft® OneDrive®

 

Topic 11 Activity: Microsoft PowerPoint Basics – 

Instructions:

Create a 3- to 5-slide Microsoft PowerPoint presentation according to the instructions below. Save the changes to the file, and upload to Moodle.

Scenario:

You have been hired as the new intern in the technology department. The organization would like to understand some of the benefits and functionalities of Microsoft® PowerPoint®, as well as how it can be used to increase productivity.

At minimum, address the following core content in your presentation:

  • (6 pts.) Provide an overview of at least 3 general functions and features within Microsoft® PowerPoint®.
  • (6 pts.) Provide a  specific example of how Microsoft® PowerPoint® can be used to enhance productivity in the organization.

Include speaker notes for all slides. Simply submitting slides is not sufficient.