adobo Spark

 First slide/clip:

  • Add a motivational title
    For example: My Success & Motivational Video; My Journey to Success, etc.
  • Add your name

3. Add slides/clips:

  • slides/clips: Answer the following question (please don’t include the question)
    What does success mean to you? (you developed your definition in Lesson 1)
    Insert a few pictures of your choice about success.

  • slides/clips: Why are you going to college? Insert a few pictures.
  • slides/clips: Your academic goal (SMART GOAL) from lesson 3.  Insert a few pictures.
  • slides/clips: Your next term goals – What is next after this term? (your short-term goals)
    • 3 specific success strategies to succeed next term 
  • slides/clips: Add a slide/clip about how you will use the information from your MAP to succeed
  • slides/clips: Where do you see yourself in five years?
    • Envision your graduation day
    • Add pictures/audio/videos picturing and expressing your feelings on that day
  • slides/clips: Your 3 most powerful motivational strategies (one strategy per slide/clip). Insert a few pictures.
    • What will you do to stay motivated?
    • Feel free to include inspiration from Dr. Padrón’s motivational story
  • slides/clips: Your 3 most powerful Time Management success strategies (one strategy per slide/clip). Insert a few pictures.
  • slides/clips: Your 3 most powerful health and stress reduction strategies (one strategy per slide/clip). Insert a few pictures.
    Note: You will be able to include this information when you complete week 8 lesson.
     
  • slides/clips: Your 3 most powerful money management strategies (one strategy per slide/clip). Insert a few pictures.
    Note: You will be able to include this information when you complete week 8 lesson.

  • Insert background music.

example

Practical Assessment Assignment

 

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and been put into practice within their own career.

Assignment:

Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT provide an overview of the assignments given in the course. Rather, reflect and write about how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

forensics

 After reading the required articles this week, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Packet Tracer & Discussion 1 [43]

InstructionsWrite 1 thread of at least 250 words. You must support your  assertions with at least 1 citation in current APA format. Acceptable  sources include Cisco material, the Bible, and scholarly journals. You  must also reply to the 2 threads below. Each reply must be at  least 100 words. Topic: Hierarchal TopologyQuestion/Prompt: At your workplace or school,  research to determine 1–5 network devices in your hierarchal model.  Create a simple network topology using Packet Tracer software. Place 1–5  devices at the appropriate levels of the Cisco three-layer hierarchical  model design. The model must include:

  1. A labeled hierarchical model ( Access layer, distribution layer, and core layer);
  2. Labeled Type, vendor, and model of the devices (ie. Cisco 2911 series router) ; and
  3. 1 Simulated cloud, 1 PC per subnet to represent a subnet of devices.

If you are unable to do research at your workplace or school, or you  do not have one to research, then create your own hierarchical model.  Share your .pka in the Discussion Board Forum. Do you agree with the way  the network is designed? If so, explain why. If not, state 1 way to  improve the design and why you would make improvements. Replies(100 words each)Thread 1 Reply  Signal flow        From my understanding we are only a fraction of the pie. We do not  have full access of the network we fall under. The hierarchy can be  related to how the infantry is broken down to fire teams of 4. Yet in an  a platoon theres about 100 people which means theres about 20 fire  teams, creating 20 fire team leaders reporting to the Platoon Sgt who  then reports to the Platoon Commander and then he passes it to the  Company Commander etc. The purpose of having multiple bosses helps to  not overload the main boss with meaningless questions or information not  protaining to them. The way our network is design is to  mitigate unnecessary mistakes made on the network, only affecting us at  our level not disrupting the entire network enterprise.  It also brings a  sense of organization, structure, and management. If anyone has the  proper (AAA) Authorization, Authentication, and Access to be in our  domain to can be part of all broadcasting that may be informative to  them. Also file sharing and the access to the share drive on lower  networks can help not overload the pipeline to the higher echelon of the  network. If you don’t have any business with management or the boss  then just avoid it, communicate between those at your level and later  with the proper authorities your message Will make it to Mr.CEO. The  Hierarchical Model we use in the military could improve if there was a  way to communicate with everyone that shares your Military Occupational  Specialty, is the only improvement I would try to implement Thread 2 Reply  Importance of Redundancy        Since  I was not able to examine a network at school or work, I went to a  small business owned by a family member to see what kind of setup they  had. It turned out that only three employees worked there, so they only  had a very simple point-to-point architecture that consisted of a modem,  a router, and a switch (attached packet- “Office Hierarchy”). Because  of the limited budget and needs, I believe this basic setup fulfilled  their needs adequately. However, one of the downsides of this setup is  that each device is a single point of failure. A key factor of network  stability is implementing redundancy (Yeh & Fiondella, 2017). There  is no device redundancy on this network. As such, I decided I would make  a second diagram that implemented redundancy (“Three Tier Hierarchy”),  even though realistically it would not be possible to implement in the  business I examined. Another benefit that this setup provides is  additional scalability if the company were to hire more employees. In  its current state, this company only has one small switch, meaning the  amount of traffic that can flow through is extremely limited, and it  would be unwise to try to add a lot more users to this network. The  high-capacity switches used in the “Three Tier” diagram would allow more  users to easily connect in. Another way to identify that the smaller  network is not scalable is not only to see if its hardware exceeds its  userbase, but also to ask: If I were to expand my company, would I need  to raze my entire network design and start over? In this case, the  answer is yes—a significant size increase would mean that a fully  different scalable topology, such as a virtual bus, would need to be  created. The business could not function with its current topology. In  conclusion, because the business has not grown in size for fifty years  and is not planning to, I see no need for them to change anything;  however, I would advise them to place a high priority on keeping their  security up-to-date because of the vulnerability of the point-to-point  network.

Ethics and Proprietary Information

Read the scenario and respond to the questions.

As a well-known consultant in the area of U.S. laws regarding counterfeit software and media, you have been asked to speak at a symposium of Chinese officials on the benefits of having strong anti-counterfeiting laws and copyright protections for software. Knowing that the counterfeiting of software is a common occurrence in China, you see this as an opportunity to speak directly with people who can help develop stronger anti-counterfeiting legislation in China. However, you are sensitive to the fact that China’s culture has different perceptions regarding the ethics of using copied software.

Do some research on how intellectual property is approached in China and perceived within Chinese culture, particularly as it involves the counterfeiting of software. Make sure to review at least two credible resources. Respond to the following in a persuasive minimum 2-page paper: 

  1. How would you explain the concepts of intellectual property theft to the Chinese officials from a U.S. viewpoint?
  2. What arguments would you use, besides legal ones, to explain why theft of other’s work product is wrong?
  3. How might you seek to bring about a change in the beliefs of someone who does not see the need for stronger intellectual protections for software?

Make your argument from both a cultural and moral standpoint. You should explain your viewpoint with the utmost professionalism.

Specific Requirements for Part 2: 

  • State a clear position on the scenario and provide a detailed explanation to support that position.
  • Examine both sides of the situation to identify the ethical issues involved.
  • Demonstrate superior organization, is well-ordered, logical, and unified.
  • Cite at least two references.
  • Follow all writing and submission requirements. 

Digital Forensics

  

research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief of 300 words or more describing the case and the how digital forensics were used in the investigation. 

  

Safe Assign is software that verifies the originality of  work against on-line sources and other students.

No plagarism 

www

Assignment Evaluation Rules:

Overall presentation 10%

Structure 10%

Introduction 10%

• Main body

Critical analysis/evaluation 50%

Recommendations 10%

Conclusion 10

Please read and apply the rules for referencing.

Please provide an elaborate answer on each of the following questions:

1. What is Web Server and Web client?

2. What is Domain Registration? Explain the steps to register a Domain.

3. What is Internet? What do you understand by Internet Standards?

4. What are the ways to communicate on Internet?

5. Define HTML Tag and list a few basic tags used in HTML.

6. What are the different types of HTML lists used?

7. How do we create frames? What are the disadvantages of using frames?

8. How to assign different colors in a HTML document

Polymorphic Class Diagram

Polymorphism is one of the fundamentals of software engineering. Polymorphic behavior implies, at runtime, that the same message has different behavioral effects. For this week’s Critical Thinking Assignment, create a polymorphic class diagram of a design of your choosing. Add an aggregation relationship to this diagram. Write a sample pseudocode script to explain the polymorphic class diagram (see example below).

Additionally, in a one-page paper, explain why polymorphism is a runtime characteristic of object-oriented designs. Describe the structural design necessity to ensure polymorphism at runtime.

Simple code example for polymorphism:

//This pseudocode indicates that when the driver object issues a call to moveCar, whichever object has been instantiated (FourWheel or FamilyCar) will move.

Class Driver:

     Car myCar;

     myCar := new FourWheel;

     myCar.moveCar(); 

     myCar := new FamilyCar;

     myCar.moveCar();

In 2021, the tuition for a full time student is $6,549 per semester

In 2021, the tuition for a full time student is $6,549 per semester, the tuition for a part time student is $3,325. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write a program using if-else and a loop. Ask the user if they are a full time or part time student, then display the projected semester tuition for the next 7 years. You should display the actual year (2021, 2022, through 2027) and the tuition amount per semester for that year using python