Activity to do

 

View a step-by-step video tutorial on Windows troubleshooting. Visit the following website, which hosts a variety of videos on Windows troubleshooting topics:

Link to choose TOPIC:

www.top-windows-tutorials.com/windows-troubleshooting (Links to an external site.)

SELECT A TOPIC from the list that interests you. View the video for that topic, and if possible, try out the troubleshooting tool illustrated in the video.

Finally, write a 2 paragraph (4 sentences each paragraph) report you can share with your colleagues that answers questions such as the following:

  • What is the purpose of the tool illustrated in the video? What problem(s) does it solve?
  • How does a support specialist access the tool? Describe the steps.
  • Describe how the tool indicates that either a possible problem exists or that none exists.

Use file extension:  .doc   OR    .docx

H7

   Download and read the document and answer all questions in the document. Please see attached document H7 & APA Criteria doc.     

module 4

 

Module 04 Content

  1. MedicalWise is implementing a text messaging function for your medical record. Registration will require you to enter MedicalWise website. Websites that allow users to enter or view PII data must be protected with cryptography. A determination of TLS encryption keys has been made for the website management. However, the leadership of MedicalWise only understands this technology as SSL.

    Assignment Details
    For this week’s course project assignment, address the following elements:

    • A history and evolution of TLS certificates. Include at least one cited source.
    • Description of SSL certificates versus TLS certificates. Include at least one cited source.
    • Cryptographers’ Recommendation on TLS Certificate
    • Be sure to address minimum system and browser requirements for this version of certificate, including PC, Mac, iOS, and Android.
    • Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

Research on safe robot operation using force tracking impedance control

I have some comments for things I would like to be changed in/added to my presentation:

1)  Add real picture of a robot in slide 1 & 2

2)  Slide 5 should have the title (Problem Statement), and Slide 6&7 are just continuation

3)  Specify that the used method will be Optimization

4)  Missing Point should be included that is the Input Data 

5)  In Slide 8 , the last point is good but the others needs review 

6)  In Slide 10 change the title to (Literature Review), This Part should be longer with more info

7)  In Slide 11, I need some questions to make the methodology clear

8)  In Slide 12, some results(Graphs) should be added from other authors and analyse them

9)  If there was any extra references used then it should be added to the ppt

Lastly I provided examples along with (( My Presentation(Luna) ))

ITCO391

 You and your team are now working on some icons for the organization’s program user interface (UI). Based on your first mock-up of the UI, complete the following:

  • Discuss 2 original icons with 3 states each.
  • Explain how the icons would be used, and give the purpose of each state.
  • Investigate emerging alternative I/O devices and discuss their impacts on design.
  • Provide substantive comments that critique the postings of at least 2 classmates.
Week8-q2.png

476

  1. Describe DBLC (Database Life Cycle) and its phases.
  2. Describe concurrency in a DBMS and how it is managed.

For the following tables write the required SQL statements:

3. Write an SQL statement to create the PET table.

4. Write an SQL statement to show the breed and type of all pets.

5. Write an SQL statement to display the breed, type, and DOB of all pets having the type Dog.

6. Write an SQL statement to show the pet owner first name, last name, and pet name. Hint: you need to link PET_OWNER and PET tables.

Week8-q2.png

 project:

A factory has several departments. A department may have many employees but must have at least seven. Every employee works for one and only one department. Every department has a manager — only one manager per department. A manager is an employee of the company, but not all employees are managers. A department may have many machines, and every machine is assigned to a specific department. Products are produced on machines. A product can be an assembly of several different components or a single piece. Every product goes through one or more machines for appropriate production operations. Likewise, several products may go through a particular machine for a production operation. The employee has a first name, last name, and middle name, gender, address, and salary. An employee number uniquely identifies an employee. Departments have departments name, type, and location. The department’s name and number are both unique identifier of a department. Every machine will have a unique machine number, name, type, and vendor’s name.

When a machine goes for maintenance, the date of maintenance must be captured, since a maintenance activity is identified by the date of the maintenance for each machine. The attributes of maintenance activity are time taken and cost.
A product is identified by its component ID, component name, and description.

7- Create an ERD by first identifying the entities, then their relationships, and finally add the attributes to each entity.

8- Create a logical data model from ERD, including primary and foreign keys.

9- Implement the logical model into a DDL and build the database in SQL Server (or any other DBMS that you have installed)

10- Create some synthetic data and insert the data into the database.

Reseach and Networks

 https://www.computerweekly.com/resources/Networking-and-communication/

  • Select two articles from the RSS feed, one that details a network security or network troubleshooting concern and one that explains a new networking technology or service. Summarize each article and include a concluding paragraph that explains how you as a computer network professional would use this information.
  • Scan the articles that appeared over the last two weeks. Use those articles to create your own one-page summary of significant network innovations or security concerns over the last two weeks and the major events that have occurred.
  • Select one article that is of particular interest to you. Perform additional Internet research on that topic and then write a summary of that article. Include why you were interested in the article, what you learned from it, and how you could use it in your career as a computer network professional. 
  1. Save the file on your computer with your last name in the file name. (Example: chapter_01_essay_Jones.doc) 

Spr-WK2.1

Assignment 1:

Assignment Requirements

Read the worksheet named “Privacy and Compliance” and address the following:

Using what you have learned about the importance of privacy and compliance with the privacy regulations, identify information that is protected by the Privacy Act.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Unit 8 Assignment: Big Data Use Cases

 

Purpose

Big data is the term for a collection of data sets so large and complex that it becomes difficult to process using on-hand database management tools or traditional data processing applications. The challenges include capture, curation, storage, search, sharing, transfer, analysis, and visualization. The trend to larger data sets is due to the additional information derivable from analysis of a single large set of related data, as compared to separate smaller sets with the same total amount of data, allowing correlations to be found to delineate business trends, determine the quality of research, prevent diseases, link legal citations, combat crime, and determine real-time roadway traffic conditions.

Big data analytics is a topic fraught with both positive and negative potential. Big data is defined not just by the amount of information involved but also by its variety and complexity, as well as the speed with which it must be analyzed or delivered. The amount of data being produced is already incredibly great, and current developments suggest that this rate will only increase in the near future. Improved service should result as companies better understand their customers, but it is also possible that this data will create privacy problems. Thus, big data is important not only to students who hope to gain employment using these techniques and those who plan to use it for legitimate research, but also for everyone who will be living and working in the 21st century.

Assignment Instructions

First, navigate to the Academic Tools area of this course and select Library then Required Readings to review the Unit 8 videos covering facets associated with big data. It is very important that you watch the Unit 8 videos before completing the assignment.

Perform research on big data use cases via the Internet and Purdue University Global Library. Use the article at the following website as a starting point for your research:

Select one use case from the list below to be the topic of your paper.

  1. 360° View of the Customer
  2. Fraud Prevention
  3. Security Intelligence
  4. Data Warehouse Offload
  5. Price Optimization
  6. Operational Efficiency
  7. Recommendation Engines
  8. Social Media Analysis and Response
  9. Preventive Maintenance and Support
  10. Internet-of-Things (IoT)

Write a 3-page expository paper, not including title page or references, that addresses the following:

  • Describe the use case and how it makes use of big data.
  • Explain the V’s of big data within the context of your chosen use case.
    • Volume
    • Velocity
    • Variety
    • Veracity

Assignment Requirements

The paper must comply with the following:

  • Minimum of three full pages of researched content
  • Title page with paper title, course name, and student name.
  • Reference page with a minimum of two reputable sources
  • Paper adheres to APA requirements

For more information on APA style formatting, go to Academic Writer, formerly APA Style Central, under the Academic Tools area of this course.

Also, review the university policy on plagiarism. If you have any questions, please contact your professor.