MS Word Documentary and Advanced Microcomputer

MS Word Documentary and Advanced Microcomputer Applications

W1 Microsoft Word Assignment: Documentary

MS Word Documentary and Advanced Microcomputer
MS Word Documentary and Advanced Microcomputer

Do Project 1E Documentary that begins on page 205 of your textbook. Submit the document by clicking the Attachments button to attach the file. Do not paste the document in the Message area.

You will need to download and use the following data files in your project:

Picture of Antarctica

Documentary Overview

In addition to the assignment file, answer the following question with your submission. This can be answered directly in your

Submission comment area, or as a separate Word attachment file:

In this Week’s reading and prep work, you learned about SmartArt graphics and how to add them to your documents. Take a look at some of the different options for SmartArt graphics found in Microsoft Word, and indicate which one you feel you are most likely to use, and what sort of document type you might use it in. Explain why you feel this is a good fit. Please look to answer this in at least 3 complete sentences in order to address it adequately.

Computer Security using IEEE Format and Citation Style

Computer Security using IEEE Format and Citation Style Turn in a 3-page manuscript (your paper) with a focus on Computer Security.

Computer Security using IEEE Format and Citation Style
Computer Security using IEEE Format and Citation Style

The article, journal, or newspaper article should be no older than a year. It is going to be IEEE format IEEE citation style is used primarily for electronics, engineering, telecommunications, computer science, and information technology reports.

Computer Security using IEEE Format and Citation Style

The three main parts of a reference are as follows:

  • Author’s name listed as the first initial of the first name, then full last.
  • Title of article, patent, conference paper, etc., in quotation marks.
  • Title of journal or book in italics.

This system allows the reader to identify the information source at a glance. All punctuation, dates, and page numbers depend on the type of reference cited, so follow the examples with care. Please note this style guide is wide-ranging, but not all sources are identified. Further research may be required.

Computer Security using IEEE Format and Citation Style Citation Within The Text

The first step of the reference citation process is within the report itself. Each citation must be noted within the text through the use of simple sequential numbers. A number enclosed in square brackets, placed in the text of the report, indicates the specific reference. Citations are numbered in the order in which they appear. Once a source has been cited, the same number is used in all subsequent references in the report. No distinction is made between electronic and print sources, except in the citation reference details.

Each reference number should be enclosed in square brackets on the same line as the text, before any punctuation, with space before the bracket.

You need to read the articles, journals, or newspaper articles in order to submit them as references in your paper.

Disaster Recovery in PC Security Incident Response

Disaster Recovery in PC Security Incident Response Team Search “scholar.google.com” or your textbook. Discuss ways organizations have built a CSIRT.

Disaster Recovery in PC Security Incident Response
Disaster Recovery in PC Security Incident Response

What are the components of building an effective and successful CSIRT team?

Disaster Recovery in PC Security Incident Response Reply1:

PC Security Incident Response Team (CSIRT) is a vital mainstay of worldwide digital. Less CSIRT is known as terminating units, disease control propensities or mechanized crisis medicinal professionals – call specialists, terminating or evaluating the conditions and supporting lamentable sufferers. A little and irregular system as of now has numerous CSIRTs, which are routinely checked in institutional frameworks, formally managed by national or local organizers. They began the general subject of “basic measures and associations that manage Internet 2” At this time, CSIRT is encountering a turn. They are bitten by bit finishing and meeting as a piece of the more extensive talk of the digital arrangement, just as checking as per different conditions and political objectives. Consequently, arrangement creators are critical around there to all the more likely to comprehend CSIRT’s history, advancement, types, and culture. Robert Tupon Morris discharged Morris Worm on the Internet trying to “demonstrate the present security endeavors in PC systems”. [3] Although the harm is hazardous, the worm wrecks PCs and frameworks in the United States. Morris and others captured the essential reaction of the PC security occurrence by sending the baffling directions as “an approach to murder a worm and keep him from slaughtering” at whatever point he comprehended the danger of a worm. [4] Unfortunately, Morris and PC were struck by the worm, his response did not return, and the worm was making incredible harm dollars. The model encourages crafted by various things that give pants help they do.

Disaster Recovery in PC Security Incident Response

Despite the fact that there is no customary model that can meet all the basic needs, each organization has portions or costs which require a response outline for the situation. CSIRT powers are fortified to genuinely comprehend and follow dangers to an organization. Work on the pertinent errands that make a proficient CSIRT gathering: When a case observing gathering is executed, essential norms are adequately settled for the last pool of occasion pool. At that point, the total conviction framework in resources required to manage these cases ought to be perfect.

To conform to the necessities and prerequisites of the development to characterize the solicitation and solicitation. A specialist in recognizing the dangers related to an organization, for instance, if the assets related to cash are essential, have some genuine dangers and influence the gathering. Because of the occasion, nervousness identified with issues and methods is foreordained as encountering knowledge from fiasco occasions. Likewise, drawing in experts from various divisions, for instance, from the Department of Personnel, Budget Companies, can effectively discover occasions, not simply IT experts. These devices enable you to make and manage a productive CSIRT gathering. Find out about torque hardware, maintenance, switches, valves and progress valves for framework objects. The site off: recognizes/distinguishes duplicate markers; Any documentation of duplication of mechanized data and PC outline; Set the floor plan and set the spot. Police Headquarters – Fire Department – Outdoor/Observer Agent Campings Glaziers Create chronicles in the ravishing hoods – Increase the rundown of addresses and addresses, areas, locations, locations and addresses you are called impermanent working capacitor. PC advisor information authority – a specialist to refresh the game plans of insurance agencies. A solid CSIRT assumes a critical job in the association. CSIRT represent PC security occasion, reaction group. CSIRT is upheld for anticipating and reacting to the administrations and security of its administrations. Contingent upon the dimension of association in the association, there are different security infringement. Numerous associations are liable to security breaks, and in this way, each organization needs to make a CSIRT to guarantee the security of the organization. Information rupture is a piece of numerous organizations that can without much of a stretch be uncovered. It is difficult to sort out an occurrence, which incorporates warning, participation, investigation, and reaction.

Disaster Recovery in PC Security Incident Response Reply 2:-

The Computer System Incident Response team is the one responsible for responding to whatever incidents that occur in the organization. This team is always ready and equipped for dealing with incidents and coming up with solutions. These problems or incidents can range from Denial of Service attack to Malicious malware attacks or any unauthorized access in an organization. This team is capable of dealing with IT security services and managing incidents with their anticipated effects on an organization. Since this team is crucial in the life cycle of the Software Development Life Cycle, it’s assembly should not be taken lightly. This team has the best people with adequate skills to work under immense pressure and have the ability to take quick decisions and take responsibility for incident resolution.

Every organization has its own way of creating a team for a very specific task or phase in the life cycle. Some companies might have an approach of creating a team with internal employees and assigning them to incidents according to their skillset. This way, the employees have a much clearer vision of the product and authorization while dealing with incidents. On the other hand, some organization might opt for an option of outsourcing a team specially for handling reported incidents. They might be on round the clock support for reported incidents. There might be a third option where a company might entirely work towards incident management and resolution. They can be assigned with incidents according to their skill set and ability to deal with specific kinds of incidents. In this case, employees would have to go through rigorous training and education on quick decision making, working under pressure and taking a judgment call on an incident.

Disaster Recovery in PC Security Incident Response

The formation of a CSIRT would have a basic pattern as follows:

  1. A team leader: The team leader would be responsible for delegating work and organizing employees according to their skills and knowledge base. He would also have to manage and analyze the incident reports. These reports can be further used in coming up with solutions for better problem-solving techniques.

 

  1. Lead on Incident: This person would be the one who has to coordinate all the responses to IT security incidents. Depending on the severity of the incident, there may be more than one lead for dealing with the incident. All information about the incident or it’s a resolution should pass through this lead before going to other teams.

Note:-

Hi

It’s a Discussion and two replies for the above question

I need everything in separate documents as 1st document should be discussion, the 2nd document should be reply 1 and the 3rd document should reply 2.make sure no Turnitin and no plagiarism please don’t copy it from any source write in your own words.

Personal Computer Purchase Project

Personal Computer Purchase Project Using the criteria below each student will collect 3 advertisements from 3 different retailers, from either newspaper, magazines, circulars, or the Internet.

Personal Computer Purchase Project
Personal Computer Purchase Project

You can use any Internet site such as Dell or Compaq, where you will be allowed to customize your system, or you can do your own price shopping.

Personal Computer Purchase Project

The advertisements should be submitted along with the 3-6 page, double spaced, font size 12, regular margins, a report containing the following criteria. You will need to provide a price breakdown, and a detailed description of the software and hardware, for 3 compatible computers that could be used in your endeavor, and then, your selection of the best of those 3 systems and an explanation of why it is better. Your selection of the best computer for your project should be based only on functionality and price, not on the popularity of the computer system.

Personal Computer Purchase Project

The report should also include a table which can be done in Word or Excel, showing the comparisons of the systems (including specifications and costs). An example of a table is given below with the 3 retailers and the different components. You may add more components to your table.

The following parts should be included in this paper. Emphasis should be given to the Purpose, Software and Hardware sections. This is where you specify why you are buying a computer (it can be made up as long as you are consistent throughout), what kind of software and kind of hardware you need to fulfill your purpose. You then include the cost and summarization of which system you are purchasing in the end.

Personal Computer Purchase Project

  1. Purpose

Why am I buying this computer? What will I use it for, or what function will it serve me? Be specific and detailed.

  1. Software

What software do I need to accomplish the tasks that I have outlined in the purpose? Include both system and application software that you will have to include. Make sure that you are aware of the software specifications and requirements for your system.

III.        Hardware

What Hardware platform will run the software that has been identified in the above section. Discuss the configurations of the systems that you are selecting your system from. What do you need in terms of the processor, memory, and peripheral devices? Consider if the system is upgradable in the future.

  1. Cost

Set up a budget of about $1000 for Hardware, $300-400 for Software

  1. Personal Computer Purchase Project Conclusion

Sum up which configuration out of the 3 that you are buying and why.

Helpful Web sites

http://www.computershopper.com/

http://www.ebay.com/gds/Desktop-PC-Buying-Guide-/10000000177635637/g.html (March 17,2014)

http://www.amazon.com/gp/feature.html?ie=UTF8&docId=1000863131

http://www.consumerreports.org/cro/computers/buying-guide.htm (last updated May 2014)

Here are some additional helpful tips:

Example of a table.

Configuration           Computer retailer #1            Computer retailer #2            Computer retailer #3

Brand and type of Computer

Operating System

Monitor (Size)

RAM (GB)

Hard Drive (GB)

Processor Brand

Processor Speed (GHZ)

Software

Peripheral Devices

(printers, speakers, web cam, etc., scanner)

Antivirus software

Firewall (software or router with built-in firewall)

Price

RUBRIC FOR PC PURCHASE PROJECT

 

Personal Computer Purchase Project: 5%          Points

Your Personal Needs         20

Hardware Requirements (includes peripherals)            20

Research the cost of a new computer (3 Retailers)          20

Software Needs       20

Conclusion and table of comparison       20

TOTAL POSSIBLE POINTS:          100

Cloud Computing Essay Assignment Paper

Cloud Computing
Cloud Computing

Cloud Computing

Cloud computing is becoming mainstream with adoption by major enterprises. However, one inhibitor for Cloud adoption is the Cloud security. Some argue that the Cloud is still not secure enough for hosting confidential or critical data. Do you agree or disagree with this position? Describe the reasons behind your answer with real life examples.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

We can write this or a similar paper for you! Simply fill the order form!

Cloud Based Storage Service and Software as a Service

Cloud Based Storage Service and Software as a Service Research cloud-based storage service and Software as a Service (SaaS) backup systems.

Cloud Based Storage Service and Software as a Service
Cloud Based Storage Service and Software as a Service

Complete a 2-3-page paper with an abstract and conclusion (plus cover sheet and reference page) that discusses:

  1. How does a cloud-based storage service differ from Software as a Service (SaaS)?
  2. Give a brief overview of the following types of cloud-based storage (Public, Private, Hybrid, and Mobile).
  3. What are the disadvantages and advantages of using cloud-based storage?
  4. What are the availability, performance, and security considerations?

Specific questions or items to address:

  1. How does a cloud-based storage service differ from Software as a Service (SaaS)?
  2. Give a brief overview of the following types of cloud-based storage (Public, Private, Hybrid, and Mobile).
  3. What are the disadvantages and advantages of using cloud-based storage?
  4. What are the availability, performance, and security considerations?

Html Coding as Per Following Instruction Overview

Html Coding as Per Following Instruction Overview: Write JavaScript code to check form input against pre-determined validity criteria, reporting any errors through a single alert box.

Html Coding as Per Following Instruction Overview
Html Coding as Per Following Instruction Overview

Preparation: Readings from lecture notes (Javascript functions, form validation) and (regular expressions).

FORM FEEDBACK VIA ALERT BOX ERROR MESSAGES

Load the form from the previous task and save as “11_simple_validation.htm”. Add this new page to your navigation file with the link “simple validation.”

Html Coding as Per Following Instruction Overview

Proceed as follows (see additional notes):

Update the banner and title element with “Simple Javascript Form Validation”. Add a link to this page from your navigation ssi file.

For each input box on the form, perform the following validation checks:

Personal Information

First Name (not empty)

Last Name (one or more letters, upper or lower case)

Gender (male or female) (one button checked)

Html Coding as Per Following Instruction Overview Contact Information

Street Number (one or more numbers)

Street Name (one or more letters, numbers, spaces, hyphens, commas, or periods)

City (one or more letters, upper or lower case)

State (one option selected)

Zip code (5 numbers at the beginning of string)

Telephone (3 numbers, 3 numbers, 4 numbers in 3 boxes)

Suggestion (one or more letters, upper or lower case)

See notes on Javascript Form Validation and study scripts under the section “A ‘Good’ Validator: One Alert Box listing all errors at once.” You will be building a primary function which calls additional functions to check for each type of error (see Validation Library, I & II, from week 8 notes). The scripts will work together to build a string of text listing errors.

Html Coding as Per Following Instruction Overview

The primary function will then report out this string via a javascript alert box.

Build the validator function one line at a time. For each addition of a call to a test function, build the call and the test function and test before moving on. Your goal here is to study and understand the functions and to not only make them work, but to also understand how they work.

Your finished form validator should be tested by going through all boxes. Note that testing for not empty, numbers, letters, and 5 numbers will require up to four functions, some of which will be reused. Checking for the radio buttons and select will require two additional functions. Keep these functions simple (e.g., test for 5 numbers for zip code; don’t worry about zip code extensions, etc.

Your finished page should look something like the illustration, above, producing an alert box listing all errors, as shown.

Save your scripts (if you built them on your page, this means everything between the <script>…</script> tags) in a new folder, “/scripts,” in a file, “scripts/validator.js”. Link to them from within your page,

<script src=”scripts/validator.js” type=”text/javascript” ></script>

(i.e., there will be no other scripts left on your page).

Html Coding as Per Following Instruction Overview

Overview: Write JavaScript code to check form input against pre-determined validity criteria, reporting any errors through a single alert box.

Preparation: Readings from lecture notes (Javascript functions, form validation) and (regular expressions).

FORM FEEDBACK VIA ALERT BOX ERROR MESSAGES

Load the form from the previous task and save as “11_simple_validation.htm”. Add this new page to your navigation file with the link “simple validation.”

Proceed as follows (see additional notes):

Update the banner and title element with “Simple Javascript Form Validation”. Add a link to this page from your navigation ssi file.

For each input box on the form, perform the following validation checks:

Personal Information

First Name (not empty)

Last Name (one or more letters, upper or lower case)

Gender (male or female) (one button checked)

Contact Information

Street Number (one or more numbers)

Street Name (one or more letters, numbers, spaces, hyphens, commas, or periods)

City (one or more letters, upper or lower case)

State (one option selected)

Zip code (5 numbers at the beginning of string)

Telephone (3 numbers, 3 numbers, 4 numbers in 3 boxes)

Suggestion (one or more letters, upper or lower case)

Html Coding as Per Following Instruction Overview

See notes on Javascript Form Validation and study scripts under the section “A ‘Good’ Validator: One Alert Box listing all errors at once.” You will be building a primary function which calls additional functions to check for each type of error (see Validation Library, I & II, from week 8 notes). The scripts will work together to build a string of text listing errors.

The primary function will then report out this string via a javascript alert box.

Build the validator function one line at a time. For each addition of a call to a test function, build the call and the test function and test before moving on. Your goal here is to study and understand the functions and to not only make them work, but to also understand how they work.

Your finished form validator should be tested by going through all boxes. Note that testing for not empty, numbers, letters, and 5 numbers will require up to four functions, some of which will be reused. Checking for the radio buttons and select will require two additional functions. Keep these functions simple (e.g., test for 5 numbers for zip code; don’t worry about zip code extensions, etc.

Your finished page should look something like the illustration, above, producing an alert box listing all errors, as shown.

Save your scripts (if you built them on your page, this means everything between the <script>…</script> tags) in a new folder, “/scripts,” in a file, “scripts/validator.js”. Link to them from within your page,

<script src=”scripts/validator.js” type=”text/javascript” ></script>

(i.e., there will be no other scripts left on your page).

Software Development Life Cycle Assignment

Software Development Life Cycle
Software Development Life Cycle

Software Development Life Cycle – Personal Task Application

The abstract concepts of the SDLC to show that you really understand what each step involves.

The SDLC has five primary phases:

Systems Planning and Selection Systems Analysis Systems Design Systems Implementation and Operation Systems Maintenance

After you have formulated your task and described each step, present your information in a PowerPoint presentation with a minimum of six slides (This is in addition to the title and reference list slides).

Presentation requirements:

You should have a title slide, a table of contents slide, and a reference list slide.You should have at least one slide for each of the SDLC phases. Use the SDLC phase to title these slides: System Planning and Selection, Systems Analysis, Systems Design, Systems Implementation and Operation, and Systems Maintenance. Include speaker points in each slide.Your presentation should have at least two relevant images in it.Your summary slide(s) should answer the following question:Why is it important to integrate the SDLC process?

The Software Development Life Cycle – Personal Task Application PowerPoint Assignment

Must have a minimum of six slides (not including title and references pages) and formatted according to APA style as outlined Title of PowerPoint Student’s name Course name and number Instructor’s name Date submitted Must use at least two scholarly sources in addition to the course text.

We can write this or a similar paper for you! Simply fill the order form!

Computer networks Python Essay Paper

Computer networks Python Essay Paper • Multiple TCP clients can connect to P3server posted above. You can use p2client.py for the TCP client.

Computer networks Python Essay Paper
Computer networks Python Essay Paper

–Two TCP clients must join P3server.py posted above and set up UDP communication. (40 Points)

–A TCP client should send a message to another TCP client over UDP and P3server over TCP. (40 Points)

–If the message is “exit”, two TCP clients must disconnect their TCP connection and terminate UDP-based communication. (20 Points). Traditionally networking is associated with creating and using computer networks, with respect to hardware, protocols, including wired and wireless technology.

 

Program for Comparing a Sort of Routine Coding

Program for Comparing a Sort of Routine Coding Write a program, in the language of your choice, that compares a sort routine of your own coding (you may copy the code from other sources) and a sort routine inherent to the language.

Program for Comparing a Sort of Routine Coding
Program for Comparing a Sort of Routine Coding

Compare for 100 records, 1000 records and 100,000 records. You will need to calculate the start/end time and duration of each process. Discuss and determine which method was best. C++ is the hardest language for students to master, mostly because they have to think much. Really much. We don’t claim that C# is easy, or Java is easy, but in comparison, yep, they are easy.