Exp22_PowerPoint_Ch02_Cumulative_Science_Club

Exp22_PowerPoint_Ch02_Cumulative_Science_Club

Exp22 PowerPoint Ch02 Cumulative Science Club

PowerPoint Chapter 2 Cumulative – The Science Club 

  

Project Description:

The Science Club at your school wants you to create a slide show that can be used at promotional events put on by the club. In this activity, you will create a presentation that meets slide show design principles, create and modify shapes and text boxes, apply and control animation, and add video and audio.

     

Start PowerPoint. Download and   open the file named Exp22_PPT_Ch02_Cumulative_Oceans.pptx.   Grader has automatically added your last name to the beginning of the   filename.

 

Change the theme fonts to Gill   Sans MT.
 

  Mac users: From the Format menu, select Replace Fonts.

 

On Slide 1, change the font   color of the title text to Aqua, Accent 2 and the font size to 60. Select the   subtitle text box border and set the Horizontal position to 0.8″ and the   Vertical position to 5.9″. Change the font size to 32 and apply Italic.

 

Change the font color of the   title text to Aqua, Accent 2 on Slides 3 and 6.

 

On Slide 3, shorten the text to   read Even whales are not Safe in   the subtitle placeholder. Increase the font size to 28.

 

On Slide 7, shorten the text in   the title placeholder to read Be   Informed and increase the font size to 54. Shorten the subtitle   placeholder text to read Learn about issues and actions YOU can take! and increase the font size to   28. Change the font color of the text YOU   to Orange in the Standard colors section and apply Bold.

 

On Slide 4, insert a Rectangle   shape to the right of the fish icons. Set the Shape Height to 4″ and the   Shape Width to 3.4″. Set the Horizontal position to 9.4″ and the   Vertical position to 2″.

 

Apply the shape style Intense   Effect – Black, Dark 1 to the rectangle. Type 9 out of 10 large predatory fish such as   tuna, marlin, and swordfish are nearly GONE in the text box. Increase the   font size to 28. Select the number 9   in the text box, increase the font size to 60, and change the font color to   Orange in the Standard Colors section. Using the Format Painter, apply this   format to the number 10 and GONE in the text box.

 

Select the fish icon in the top   row next to the inserted rectangle and change the graphic fill to White,   Background 1.

 

On Slide 5, select the title   placeholder with the quote, and apply the shape fill Gradient Linear Down in   the Dark section. Open the Shape Format pane and change the Transparency to   70%.

 

On Slide 8, select the   illustration of the two fish and convert to shapes. Change the fill color for   the green portions of the illustrations to Dark Purple, Accent 3. Change the   graphic fill to Orange from the Standard Colors section for the dark gray   portion of the fish on the right (head and fin). Delete the large light gray   circle so that only the two fish and a few bubbles remain. Select each of the   bubbles in the illustration between the two fish and change the fill color to   Indigo, Accent 1.

 

Insert a text box to the right   of the illustration. Type Join the Science Club in the text box. Increase the height of the   text box to 1.1″. Increase the font size of the text to 54. Set the   Horizontal position to 5.2″ and the Vertical position to 5.1″.

 

On Slide 2, apply the Stretch   animation in the Entrance category to the title placeholder with the text The Big “3”. Set the animation to   start After Previous with a Duration of 0.75 and a Delay of 1.25.

 

Apply the Float In animation to   the bullet list under the heading Climate Change. Set the animation to start   After Previous with a Delay of 0.75. Change the effect options to Float Down. Use the Animation   Painter to apply the same animation to the bullet lists under the heading   Overfishing and Pollution in that order.
 

  Mac users: To set the delay, open the Animation pane, select the animation,   and select Timing.

 

Open the Animation Pane and move   the title placeholder (The Big “3”) animation down so that it   becomes the last animation in the Animation Pane. Change the Delay to 1.50.

 

On Slide 4, apply the Float In   animation to the text box with the text   9 out of 10 predatory fish such as tuna, marlin, and swordfish are nearly   GONE. Set the animation to start After Previous with a Duration of 1.00 and Delay of 0.50.

 

Select one of the orange filled   fish icons, press CTRL, and select the remaining orange filled fish icons.   Apply the Disappear animation to the selected icons. Set the animation to   start After Previous, the Duration to 0.75 and Delay to 0.50. Mac users do not need to change the Duration.

 

Apply the Ripple transition to   all slides.

 

On Slide 6, insert the video Oceans.mp4 using the Insert Video icon   in the content placeholder.

 

Change the video shape to   Flowchart: Document in the Flowchart category. Set a poster frame at 00:00.75   seconds.

 

Change the Video Height to   6.2″. Set the Horizontal position to 0.8 and the Vertical position to 0.2. Change the video color to   Aqua, Accent color 2 Dark. Set the video to play Automatically.

 

View the presentation. Save and   close Exp22_PPT_Ch02_Cumulative_Oceans.pptx.   Exit PowerPoint. Submit the file as directed.

IT Electronic document and record management

For the presentation, please include the title slide, the agenda, the major contents of your report (the business profile, records management requirements and issues from the business, etc.)  and recommendation (of solutions for the problem, next steps, etc.), the reference slide. The presentation length should be about  8-10 minutes long. 

You need to submit your presentation with audio narration added over each slide; provide the link if you made a Prezi presentation or Youtube video.

Questions

 NOTE: The exercise instructions here are LONG — please read them all carefully. If you see an internal scrollbar to the right of these instructions, be sure to scroll down to read everything.

Write an arithmetic expression that calculates the average of 18 and 46.

You may already know that:

  • the average of two numbers is their sum divided by 2
  • the symbol for division is /, thus 10 divided by 5 is written as 10/5
  • division has higher arithmetic precedence than addition
  • parentheses (()’s) may be used to override precedence

Thus, one correct solution would be:

(18+46)/2Try it– enter the above solution and click the submit button!

Even with an exercise as simple as taking the average of 18 and 46 it is still possible to make mistakes. For example:

  • we might forget to use parentheses:
    18+46/2
  • or, we might use the wrong arithmetic operator:(18-46)/2

Try these and see the system feedback. Also try entering some of your own incorrect answers, and see what you get.

Again, what makes programming so interesting is that there are also MANY ways to be right. For example, we could reverse the 18 and 46 and still have a correct answer:

(46+18)/2

One of the most essential components of all learning is experimentation. Nowhere is this more true than in learning programming. Students should be encouraged to experiment with solutions even after “getting it right”.

Having submitted a typical correct solution, a student might experiment with:

(18+46)/(3-1)

ITS-834: Emerging Threats & Countermeasures. Discussion, reflection: practical connection and Research Paper

 Subject: ITS-834: Emerging Threats & Countermeasures

Reading Resources:

 Wangen, G., Snekkenes, E., & Hallstensen, C. (2018). A framework for estimating information security risk assessment method completeness.  International Journal of Information Security17(6), 681–699.  https://doi.org/10.1007/s10207-017-0382-0

Goutam and V. Tiwari, “Vulnerability Assessment and Penetration Testing to Enhance the Security of Web Application,” 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2019, pp. 601-605.  https://ieeexplore.ieee.org/document/9036175

G. Yadav, A. Allakany, V. Kumar, K. Paul and K. Okamura, “Penetration Testing Framework for IoT,” 2019 8th International Congress on Advanced Applied Informatics (IIAI-AAI), Toyama, Japan, 2019, 477-482.  https://ieeexplore.ieee.org/document/8992645

Textbook Title: (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide ISBN: 9781119475958, Authors: Mike Chapple, James Michael Stewart, Darril Gibson, Publisher: John Wiley & Sons, Publication Date: 2018-04-10  

Discussion: Pen Attack and Cyber Terrorism

 Word count: 300+ words

Chapters 15, and 16 in the course textbook 

 There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism? 

Make sure to back up your statements with scholarly support.

· Please cite properly in APA 7

· At least one scholarly source should be used. 

· Use proper citations and references in your post.

Research Paper:

Number of pages: 4+

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

· 4+ pages in length, not including the required cover page and reference page.

· Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

· Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

· Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reflection: Practical Connection Assignment

Number of pages: 2+ pages

This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career. Assignment: 
Provide a reflection of at least 2 pages of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

Requirements:

  • Provide 2+ pages minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment.
  • You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Note: plagiarism check required, APA7 format, include References, within 8hrs

This post has 3 individual assignments (discussion, research paper and reflection).

Please provide answers in separate documents. 

no title required.

You will be writing about cyber crime. 

Criteria for this assessment includes:

Breadth and Depth of Information:

Sources and evidence skillfully demonstrates use of a variety of high-quality, credible, relevant sources to develop ideas that are appropriate for the discipline

Access of Information:

Accesses information using effective, well-designed search strategies and most appropriate information sources

Evaluation of Information and its Sources:           

Thoroughly systematically and methodically analyzes own and others’ assumptions and carefully evaluates the relevance of contexts when presenting a position

Use of Information:

Communicates, organizes and synthesizes information from sources to fully achieve a specific purpose, with clarity and depth

Ethical and Legal Use of Information:

Students use correctly all of the following information use strategies (use of citations and references; choice of paraphrasing, summary, or quoting; using information in ways that are true to original context; distinguishing between common knowledge and ideas requiring attribution) and demonstrate a full understanding of the ethical and legal restrictions on the use of published, confidential, and/or proprietary information.