Microsoft word homework
What representation
· What representation (e.g., data structure) will you use, and what invariants will it satisfy? (This question is especially important to solve the problem precisely.)
· What functions will you offer, and what are the contracts of that those functions must meet?
· What functions or members will be exposed publicly? What will not be exposed?
· What examples do you have of what the functions are supposed to do?
· What test cases have you devised?
Term Paper Outline
Instructions
Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The term paper details are listed below. ALL TOPICS MUST BE APPROVED. A FAILURE TO HAVE THE TOPIC APPROVED WILL RESULT IN A ZERO GRADE FOR THE TERM PAPER OUTLINE AND THE TERM PAPER. You can send a message with the topic for approval.
This project provides you with the opportunity to increase and demonstrate your understanding of cyberlaw theory and practice. You will need to choose a law(s) that you are interested in researching. The paper must be 4-6 pages in length detailing the below questions. Before completing the below steps, please make sure that the topic is approved.
1. Thesis: What law are you researching (You are to choose a specific law. Please do not choose a topic)? What position do you want to take in regard to your chosen law? You will need to decide if you agree or disagree with the current way the law is written. You can choose to like certain aspects of the law and not others.
2. Background: What is the existing point you want to challenge or support, and how did the law get to be that way (This is where you would need to find cases, background information, etc.)?
3. Inadequacies: What are the deficiencies in the present way of doing things, or what are the weaknesses in the argument you are attacking?
4. Adequacies: Discuss the positive aspects of the law?
5. Proposed Changes: How will we have a better situation, mode of understanding or clarity with what you are advocating? In short, how can the law be improved (or not diminished)? (This is where you have the chance to change the law with your own ideas of how it should be written).
6). Conclusion: Why should and how can your proposal be adopted?
A detailed implementation plan is NOT expected, but you should provide enough specifics for practical follow-up. In making recommendations, you are expected to draw on theories, concepts and reading.
When writing the term paper you must have a minimum of 3-5 outside sources cited and referenced in the paper.
When writing the term paper you must have a minimum of 3-5 outside sources cited and referenced in the paper following APA guidelines.
HR Management & Blockchain
1. Define blockchain. 2. Discuss how enterprise blockchain enriches the definition of blockchain. You are required to cite assigned readings in your paper. You may also cite external sources if you wish. Use the following headings to organize your paper: Introduction, Question 1, Question 2, Conclusion, References. Word count 500 words.
Exp19_PowerPoint_Ch03_HOEAssessment_Energy_Saving_Tips
Exp19_PowerPoint_Ch03_HOEAssessment_Energy_Saving_Tips
Exp19 PowerPoint Ch03 HOEAssessment Energy Saving Tips
PowerPoint Chapter 3 Hands-On Exercise – Energy Saving Tips
Project Description:
As an employee of Madison Electric, you give several pr esentations a year on home energy waste and how to save money. You want to update your presentation with new charts, a table and SmartArt graphics.
Start PowerPoint. Download and open the file named Exp19_PPT_Ch03_HOEAssessment_Energy.pptx. Grader has automatically added your last name to the beginning of the filename.
On Slide 2, insert a Target List SmartArt graphic. Type the following in the Text pane as first level bullet points. Remove any unneeded bullet points in the Text pane.
Saves you money
Increases the comfort level indoors
Reduces our impact on climate change
Reduces pollution
On Slide 4, click the first picture on the left, press and hold CTRL, and then select each of the remaining pictures moving from left to right. Click Picture Layout and insert a Bending Picture Caption List SmartArt graphic.
In the SmartArt Text pane type the text as follows (ensure that the text is next to the appropriate image)
• Seal and insulate your home (first image)
• Buy energy saving appliances (second image)
• Install a programmable thermostat (third image)
• Replace incandescent lights (fourth image)
Mac users, delete the four images on the slide, and then insert a Bending Picture Caption List SmartArt graphic. Add a shape to the end to ensure there are four shapes included in the SmartArt graphic. Add the following downloaded images, in the order shown: SmartArtPicture1.png, SmartArtPicture2.png, SmartArtPicture3.png, and SmartArtPicture4.png. Add the text as instructed.
On Slide 2, apply the Inset 3D Style to the SmartArt graphic and change the color to Colorful – Accent Colors.
On Slide 4, apply the Inset 3D Style to the SmartArt graphic and change the color to Colorful – Accent Colors.
On Slide 6, insert a four column, five row table in the content placeholder.
Type the following information into the table:
Row 1: Col 1: Setting; Col 2: Time; Col 3: Setpoint Temperature (Heat); Col 4: Setpoint Temperature (Cool)
Row 2: Col 1: Wake; Col 2: 6:00 a.m.; Col 3: <70° F; Col 4: >78° F
Row 3: Col 1: Day; Col 2: 8:00 a.m.; Col 3: Setback at least 8° F; Col 4: Setup at least 7° F
Row 4: Col 1: Evening; Col 2: 6:00 p.m.; Col 3: <70° F; Col 4: >78° F
Row 5: Col 1: Sleep; Col 2: 10:00 p.m.; Col 3: Setback at least 8° F; Col 4: Setup at least 4° F
Note, to add the degrees symbol (°), click the Symbol arrow in the Symbols group on the Insert tab. In the Symbol dialog box, search for the symbol or type 00B0 in the Character code box. Mac users, add the degree symbol from the LETTERLIKE SYMBOLS category.
Apply the Medium Style 2 – Accent 2 table style.
Add a new column to the left of column 1 in the table. Merge the cells in the new column. Type Recommended Settings in the new column and rotate all text 270°. Set the cell width of the merged cells to 0.9″. Center the text in the cell. Change the cell shading to Dark Red, Accent 1.
Set all of the text in the table to Center Vertically. Change the width of columns 2 and 3 to 2.2″ and the width of columns 4 and 5 to 3.3″. Set the table height to 3.4″.
On Slide 5, create a Clustered Column chart with the following data:
In cell A1, type Location and in cell B1 type % of Heat Loss.
Then populate A2:B5 with the following values:
Roof/Attic 25%
Walls 35%
Windows/Doors 25%
Floor 15%
Change the source data to use the range A1:B5.
Make the following changes to the clustered column chart:
• Apply Chart Style 10
• Type Heat Loss as the chart title
• Remove the legend and y-axis
Change the layout of Slide 3 to Title Only.
Start Excel. Download and open the file named HomeEnergyData.xlsx and save it as HomeEnergyData_LastFirst.xlsx. Copy the chart from the Energy Use worksheet and embed the chart using Paste Special on Slide 3. Mac users, paste the chart as a Microsoft Excel Chart Object.
Change the chart height to 5.2″. Position the chart horizontally at 3.35” and vertically at 2.2″.
Insert the HomeEnergy.png image on Slide 3. Position the image horizontally at 5.9″ and vertically at 3.85“.
Save and close Exp19_PPT_Ch03_HOEAssessment_Energy.pptx. Exit PowerPoint. Submit the file as directed.
Cloud Computing
As an IT analyst for Dominion Online a company providing voting solutions to a global client base, you are working to convince the organization to move its infrastructure to a public cloud. With the growth the company is experiencing, and the internal data centers maxed out, you want to get the executives on board with moving to a public cloud rather than trying to expand the current infrastructure.Use the information below from Dominion IT Budget and infrastructure summary to answer the following questions1: Compare the cost of on-premises and cloud options for over five years using AWS OR AZURE free calculator to determine savings and how you arrive at them.2. Use graphical representation of your results to compare the cost of on-premises and cloud options.3. Analyze the economic implications and show savings and how you arrive at them. Each year, the executive leadership team of Dominion Online establishes an IT budget for the organization, which is based on revenue projections. Consider that Dominion Online’s current year revenue is about $100.8 million, and the IT budget is 10 percent of that revenue ($10.8 million). The company’s executive leadership has given IT management a directive that the IT budget must shrink over time as a percentage of revenue, and within five years it must comprise no more than 5 percent of revenue.IT management has given you a directive to make recommendations that will enable a 1 percent reduction in the IT budget as a percentage of revenue annually as illustrated in the table below.
IT BUDGET : 10%ofrevenue 9% 8% 7% 6% 5% Revenue: $100.8million $110m $132m $156m $186 $225m
Budget ltem Allocation for current fiscal yearCapital Expenses : $4millionData Center Hardware Purchases Hardware capital expenses are depreciated over a five-year period: 0 Operating Expenses Tied to Capital Expenses: $800,000 Support and maintenance expenses for data center hardware purchases :0 General Operating Expenses (includes data center colocation fees) : $6million Includes data center colocation fees (space, power, and cooling), telecom costs, staffing, cloud hosting, software, etc. 0
Current server specifications (year 0):400 application servers (2 CPUs, 4 cores, 32GB RAM, Linux OS) 400 database servers (4 CPUs, 8 cores, 64GB RAM, Linux OS, MySQL DB)
Data Transfer in GB 0 50000 66500 66500 83125 103906Stotage in GB 0 50000, 66500 66500 83125 103906
Survey papper on image processing
The survey paper must compare and contrast at least 3 given reference papaers.
Attached are
– instructions on how to write the paper
– 3 reference papers, from which the final survey paper must be written
– An abstract, that will give the idea as completed work for the final survey paper.
Module 2 Lab – Steganography (Part B)
In this lab, you will be conducting steganography techniques by using various tools. You will be performing the following tasks:
1 Hiding a hidden message within a picture
2 Hiding multiple files within an image file
3 Hiding a text file within an audio file
Submit a word document containing an analysis and a summary of the completed lab (part A). The word document should contain the following elements:
- Summary of the lab
- Analysis of the activities performed in the lab and their importance to the course topics
- How the lab relates to the course and current module topics
- Related concepts from the module readings and lectures
- At least one external reference
- 1-3 pages in length
- Proper APA formatting and citations
- Minimum of 1-3 references are required
Operation excellence
OE-3
1. What were the first four locations hooked up to the Internet (ARPANET)?
2. What does the term packet mean?
3. Which came first, the Internet or the World Wide Web?
4. What was revolutionary about Web 2.0?
5. What was the so-called killer app for the Internet?
6. What does the term VoIP mean?
7. What is a LAN?
8. What is the difference between an intranet and an extranet?
9. What is Metcalfe’s Law?
10. What is the difference between the Internet and the World Wide Web? Create at least three statements that identify the differences between the two.
11. Briefly define each of the three members of the information security triad.
12. What does the term authentication mean?
13. What is multi-factor authentication?
14. What is role-based access control?
15. What is the purpose of encryption?
16. What are two good examples of a complex password?
17. What is pretexting?
18. What are the components of a good backup plan?
19. What is a firewall?
20. What does the term physical security mean?
21. Find the information security policy at your place of employment or study. Is it a good policy? Does it meet the standards outlined in the chapter?
22. How diligent are you in keeping your own information secure? Review the steps listed in the chapter and comment on your security status.
23. Discuss how learning changes over time impact organizational culture. What is the impact of this cultural change on the success of IT projects?
24. Review the Roles of Line Management and Social Network and Information Technology sections. Note the various roles in the organization and note the similarities and differences within each role. Also, note how innovation technology management shapes how we communicate amongst coworkers within an organization.
part 2 planning effective IT Audit
This is a two (2) part assignment – you can submit them together or separately, but you must submit both parts for full credit.
After completing the Audit Plan Worksheet with the risks that you have discovered, answer the three points for the Critique of the worksheet. What are the risks that you determined and placed in the worksheet, what are they going to affect?
What are the control in place (research the Gail Industries Case Study) explain the audit strategy to verify the controls in place are working and are adequate for the job.
Review the controls and note any risks that you can see that are not covered by the control objectives.