Unit 3 Lab I need it paraphrased

I need the below 280 words paraphrased so that it shows less than 10% match on turnitin.com report.

Please provide me with the report.

The purpose of this lab is about how to properly plan the steps of configuring the pfsense

firewall, and also how to navigate and use the tools provided within the firewall. Firewalls are an

exceptionally great tool that provides better internet security then your usual tools you have. As

an example, would be like using the host based firewall on your computer but on a higher end

scale. With the proper configuration you can prevent multiple cyber attacks, such as DoS, Hacks

and several others. At the beginning at of the lab it had us in the planning phase. Part of this was

how to properly layout the information needed to make sure we configure the firewall

accordingly. The excel spreadsheet provided was very useful in this phase because it laid out the

essential information needed such as Hostname, Primary DNS, Secondary DNS, Time Zone, IP

Address, subnet mask, and even password. After that the second spreadsheet had the actual

layout of fire wall rules. This was very useful because the way it was set up matched up with

how the firewall was configured. The spreadsheet layout had its setup by Action, whether its pass

or block, or reject. Next was which interface it was, for us we only had two options either the

WAN interface or the LAN. Followed by that was Family and protocol. For this lab we used

IPv4 with TCP and ICMP. Next was the Source IP and Destination IP followed by the Ports. In

this lab we used HTTP, SMTP, FTP, DNS, and ICMP.

Knowing how to configure firewall rules can be very instrumental and very beneficial. It

is one of the most effective way to secure a network and prevent unauthorized access.

Desktop Migration Proposal

 

This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet research you conducted, submit your recommendation to the assignment folder. As you are writing your recommendation, ensure your analysis and recommendations align with your manager’s priorities and concerns.

You should carefully document any assumptions made (e.g., how you analyzed the requirement for upgrading monitors, peripherals devices, etc.).

Refer to the HFA Desktop Migration: Corporate PC Refresh Documentation for the company’s needs (requirements). Your justification should clearly indicate how you bridge the gap between the existing desktop specifications and the new machines you recommend.

Exp22_Excel_Ch02_ML1 – Katherine's Coffee Shop Weekly Payroll

Exp22_Excel_Ch02_ML1 – Katherine’s Coffee Shop Weekly Payroll

     

Start Excel. Download and open   the file named Exp22_Excel_Ch02_ML1_Payroll.xlsx.   Grader has automatically added your last name to the beginning of the   filename. 

 

Use IF functions to calculate   the regular pay and overtime pay in columns E and F based on a regular   40-hour workweek. Be sure to use the appropriate absolute or mixed cell   references. Pay overtime only for overtime hours. Note employees receive 1.5   their hourly wage for overtime hours worked. Calculate the gross pay in cell   G5 based on the regular and overtime pay. Spencer’s regular pay is $440. With   five overtime hours, Spencer’s overtime pay is $82.50.

 

Create a formula in cell H5 to   calculate the taxable pay. Multiply the number of dependents by the deduction   per dependent and subtract that from the gross pay. With two dependents,   Spencer’s taxable pay is $422.50.

 

Insert a VLOOKUP function in   cell I5 to identify and calculate the federal withholding tax. With a taxable   pay of $422.50, Spencer’s tax rate is 25% and the withholding tax is $105.63.   The VLOOKUP function returns the applicable tax rate, which you must then   multiply by the taxable pay.

 

Calculate FICA in cell J5 based   on gross pay and the FICA rate, and calculate the net pay in cell K5. Copy   all formulas down their respective columns. Be sure to preserve the existing   formatting in the document. Based on the hours Spencer worked he paid $39.97   to FICA and had a weekly net pay of $376.90

 

Use Quick Analysis tools to   calculate the total regular pay, overtime pay, gross pay, taxable pay,   withholding tax, FICA, and net pay on row 17. (On a Mac, this step must be   completed using the AutoSum feature on the ribbon.)

 

Apply Accounting Number Format   to the range C5:C16. Apply Accounting Number Format to the first row of   monetary data and to the total row. Apply the Comma style to the monetary   values for the other employees. 

 

Insert appropriate functions to   calculate the average, highest, and lowest values in the Summary Statistics   area (the range I24:K26) of the worksheet. Format the # of hours calculations   as Number format with one decimal and the remaining calculations with   Accounting Number Format.

 

Use the XLOOKUP function to look   up the employee name in cell A20 (Wagner) in the payroll data and return the   specified information in row 20. Ensure the return array includes overtime   pay, gross pay, taxable pay, federal tax, FICA and net pay. 

 

Save and close the workbook.   Submit the file as directed. 

Scripting

DUE IN 10 HOURS, APA, Programming 

The code for this assignment should be compared to chapter one below

Python Programming 3.html

Python Programming 4.html

The assignment file is the python 1.docx

literature review

Overview: Using mentor or model texts is a strategy to improve your own writing.  The New York Times describes mentor texts as, “Demystifying the writing process via examples students can learn from and emulate.” In this assignment, you will locate a mentor text in the form of a dissertation that may or may not be similar to your own topic to use as a model while you write your chapter 2.  It is most helpful to find a dissertation with a literature review similar to your own, but if that is not possible, you may look for the next best option.

Topic :   

The Smart Phone as a Dangerous Technology

 Directions:

  1. Use ProQuest Dissertations & Theses Global database on the UC Library website to locate mentor text dissertation (preferably it would be related to your topic). 
  2. You may need to use advanced search options to help narrow your search. 
  3. Scan read the entire dissertation.
  4. Carefully read the literature review section.
  5. Provide a one-paragraph summary of the entire literature review.  
  6. Write a second paragraph about what you learned through reviewing chapter 2

APA format with references needed

500 words

Business Intellegence

Questions and exercise: 

1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.

2. Discuss the financial benefits of chatbots.

3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.

Exercise: 

1. Compare the chatbots of Facebook and WeChat. Which has more functionalities?

2. Research the role of chatbots in helping patients with dementia.

Discussion-OS

Questions first part:

1.Think about how you would feel if there were no rules regarding how your credit card information was stored on merchants’ websites. Consider whether you would purchase items online. Would the Internet be as big as it is today if we had no laws or information security policies regarding data that makes up an e-commerce transaction? Provide rationale for your answer.

2. Imagine that you work for an organization that has no Internet use policy. Employees use the Internet in whatever way they want using company-owned personal computers. Could this cause a problem for the organization? Why or why not?

Questions Second part:

3. What is an advantage of organizing IT security policies by domain?

4. What is a disadvantage of organizing IT security policies by domain?

5. Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.