Computer Science homework help

Computer Science homework help

10

 

WEEK 5 Assignments

 

Part I – p 48 Introduction

 

Personal

1. Shopping for Software. You are shopping for software that will assist you with your home’s interior design. The package for the program you would like to purchase states that it was designed for the most recent version of Windows, but an older version is installed on your computer. How can you determine whether the program will run on your computer?

Well, to make that program run, it sounds like all you need to do is uninstall the older version that is on your computer already and then install the newer version. As for how to determine which programs will run on your computer, you just need to see what operating system it was designed for and how much RAM it needs to run (and check to make sure your system has that much or more)

 

 

 

2. Bad Directions. You are driving to your friend’s house and are using your smartphone for directions. While approaching your destination, you realize that your smartphone app instructed you to turn the wrong way on your friend’s street. How could this have happened?

How could this happened?

– internet

(routing the wrong way on the

highway or down a closed road).

 

– wrong applications

Solutions?

Why smartphone app instructed me to turn the wrong way?

– because we as a user we need to efficently choose the right application for the right directions.

bad directions??

– we need a basic understanding

how GPS works

– before we install the apps

we should to see the rating or

feedback

 

3. Bank Account Postings. While reviewing your checking account balance online, you notice that debit card purchases have not posted to your account for the past several days. Because you use online banking to balance your account, you become concerned about your unknown account balance. What steps will you take to correct this situation?

You would finally create a check register. Contact online service to check a misuse of my account and update the docs

4. Trial Expired. You have been using an app on your mobile device for a30-day trial period. Now that the 30 days have expired, the app is requesting that you to pay to continue accessing your data. What are your next steps? What steps could you have taken to preserve your data before the trial period expired?

 

 

5. Problematic Camera. After charging your digital camera battery overnight, you insert the battery and turn on the camera only to find that it is reporting a low battery. Seconds later, the camera shuts off automatically. What might be wrong?

 

Professional

6. Discarding Old Computer Equipment. Your company has given you a new laptop to replace your current, outdated desktop. Because of the negative environmental impact of discarding the old computer in the trash, your supervisor asked you to suggest options for its disposal. How will you respond?

 

 

7. Dead Battery. While traveling for business, you realize that you forgot to bring the battery charger for your laptop. Knowing that you need to use the laptop to give a presentation tomorrow, what steps will you take tonight to make sure you have enough battery power?

 

8. Cannot Share Photos. You are attempting to send photos of a house for sale in an email message to your real estate partner. Each time you attempt to send the email message, you receive an automatic response stating that the files are too large. What are your next steps?

 

 

9. Incorrect Sign-In Credentials. Upon returning to the office from a well-deserved two-week vacation, you turn on your computer. When you enter your user name and password, an error message appears stating that your password is incorrect. What are your next steps?

 

10. Synchronization Error. You added appointments to the calendar on your computer, but these appointments are not synchronizing with your smartphone. Your calendar has synchronized with your smartphone in the past, but it has stopped working without explanation. What are your next steps?

 

 

 

Part II – p 100 Connection and Communication Online

 

Personal

1. Cyberbullying. Message While reviewing the email messages in your email account, you notice one that you interpret as cyberbullying. You do not recognize the sender of the email message, but still take it seriously. What are your next steps?

 

2. Unsolicited Friend Requests. You recently signed up for an account on the Facebook online social network. When you log in periodically, you find that people you do not know are requesting to be your friend. How should you respond?

 

 

3. Unexpected Search Engine. A class project requires that you conduct research on the web. After typing the web address for Google’s home page and pressing the enter key, your browser redirects you to a different search engine. What could be wrong?

 

4. Images Do Not Appear. When you navigate to a webpage, you notice that no images are appearing. You successfully have viewed webpages with images in the past and are not sure why images suddenly are not appearing. What steps will you take to show the images?

 

 

5. Social Media Password. Your social media password has been saved on your computer for quite some time and the browser has been signing you in automatically. After deleting your browsing history and saved information from your browser, the online social network began prompting you again for your password, which you have forgotten. What are your next steps?

 

Professional

6. Suspicious Website Visits. The director of your company’s information technology department sent you an email message stating that you have been spending an excessive amount of time viewing websites not related to your job. You periodically visit websites not related to work, but only on breaks, which the company allows. How does he know your web browsing habits? How will you respond to this claim?

 

 

7. Automatic Response. When you return from vacation, a colleague informs you that when she sent email messages to your email address, she would not always receive your automatic response stating that you were out of the office. Why might your email program not respond automatically to every email message received?

 

8. Email Message Formatting. A friend sent an email message containing a photo to your email account at work. Upon receiving the email message, the photo does not appear. You also notice that email messages never show any formatting, such as different fonts, font sizes, and font colors. What might be causing this?

 

 

9. Mobile Hot Spot Not Found. Your supervisor gave you a mobile hot spot to use while you are traveling to a conference in another state. When you attempt to connect to the hot spot with your computer, tablet, and phone, none of the devices is able to find any wireless networks. What might be the problem, and what are your next steps?

 

10. Sporadic Email Message Delivery. The email program on your computer has been displaying new messages only every hour, on the hour. Historically, new email messages would arrive and be displayed immediately upon being sent by the sender. Furthermore, your coworkers claim that they sometimes do not receive your email messages until hours after you send them. What might be the problem?

 

 

 

 

Part III – p 150 Computer and Mobile Devices

 

Personal

1. Slow Computer Performance. Your computer is running exceptionally slow. Not only does it take the operating system a long time to start, but programs also are not performing as well as they used to perform. How might you resolve this?

 

2. Faulty ATM. When using an ATM to deposit a check, the ATM misreads the amount of the check and credits your account the incorrect amount. What can you do to resolve this?

 

3. Wearable Device Not Synchronizing. Your wearable device synchronized with your smartphone this morning when you turned it on, but the two devices no longer are synchronized. What might be wrong, and what are your next steps?

 

4. Battery Draining Quickly. Although the battery on your smartphone is fully charged, it drains quickly. In some instances when the phone shows that the battery has 30 remaining, it shuts down immediately. What might be wrong?

 

5. Potential Virus Infection. While using your laptop, a message is displayed stating that your computer is infected with a virus and you should tap or click a link to download a program designed to remove the virus. How will you respond?

 

Professional

6. Excessive Phone Heat. While using your smartphone, you notice that throughout the day it gets extremely hot, making it difficult to hold up to your ear. What steps can you take to correct this problem?

 

7. Server Not Connecting. While traveling on a business trip, your phone suddenly stops synchronizing your email messages, calendar information, and contacts. Upon further investigation, you notice an error message stating that your phone is unable to connect to the server. What are your next steps?

 

8. Mobile Device Synchronization. When you plug your smartphone into your computer to synchronize the data, the computer does not recognize that the smartphone is connected. What might be the problem?

 

9. Cloud Service Provider. Your company uses a cloud service provider to back up the data on each employee’s computer. Your computer recently crashed, and you need to obtain the backup data to restore to your computer; however, you are unable to connect to the cloud service provider’s website. What are your next steps?

 

10. Connecting to a Projector. Your boss asked you to give a presentation to your company’s board of directors. When you enter the boardroom and attempt to connect your laptop to the projector, you realize that the cable to connect your laptop to the projector does not fit in any of the ports on your laptop. What are your next steps?

 

 

Part IV – p 204 Programs and Apps

 

Personal

1. Antivirus Program Not Updating. You are attempting to update your antivirus program with the latest virus definitions, but you receive an error message. What steps will you take to resolve this issue?

 

2. Operating System Does Not. Load Each time you turn on your computer, the operating system attempts to load for approximately 30 seconds and then the computer restarts. You have tried multiple times to turn your computer off and on, but it keeps restarting when the operating system is trying to load. What are your next steps?

 

3. Unwanted Programs. When you displayed a list of programs installed on your computer so that you could uninstall one, you noticed several installed programs that you do not remember installing. Why might these programs be on your computer?

 

4. News Not Updating. Each morning, you run an app on your smartphone to view the news for the current day. For the past week, however, you notice that the news displayed in the app is out of date. In fact, the app now is displaying news that is nearly one week old. Why might the app not be updating? What are your next steps?

 

5. Incompatible App. You are using your Android tablet to browse for apps in the Google Play store. You found an app you want to download, but you are unable to download it because a message states it is incompatible with your device. Why might the app be incompatible with your device?

 

Professional

6. Videoconference Freezes. While conducting a videoconference with colleagues around the country, the audio sporadically cuts out and the video freezes. You have attempted several times to terminate and then reestablish the connection, but the same problem continues to occur. What might be the problem?

 

7. License Agreement. You are planning to work from home for several days, but you are unsure of whether you are allowed to install a program you use at work on your home computer. What steps will you take to determine whether you are allowed to install the software on your home computer?

 

8. Low on Space. The computer in your office is running low on free space. You have attempted to remove as many files as possible, but the remaining programs and files are necessary to perform your daily job functions. What steps might you take to free enough space on the computer?

 

9. Unacceptable File Size. Your boss has asked you to design a new company logo using a graphics application installed on your computer. When you save the logo and send it to your boss, she responds that the file size is too large and tells you to find a way to decrease the file size. What might you do to make the image file size smaller?

 

10. Disc Burning Not Working. While attempting to back up some files on your computer on an optical disc, the disc burning software on your computer reports a problem and ejects the disc. When you check the contents of the disc, the files you are trying to back up are not there. What might be wrong?

 

 

Part V – p 254 Digital Security, Ethics and Privacy

 

1. Define the terms, digital security risk, computer crime, cybercrime, and crime ware.

2. Differentiate among hackers, crackers, script kiddies, cyber extortionists, and cyberterrorists. Identify issues with punishing cybercriminals.

 

3. List common types of malware. A(n) ___ is the destructive event or prank malware delivers.

 

4. Identify risks and safety measures when gaming.

 

5. Define these terms: botnet, zombie, and bot.

 

6. Describe the damages caused by and possible motivations behind DoS and DDoS attacks.

 

7. A(n) ___ allows users to bypass security controls when accessing a program, computer, or network.

 

8. Define the term, spoofing. How can you tell if an email is spoofed?

 

9. List ways to protect against Internet and network attacks.

 

10. Describe the purpose of an online security service.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Business Computer Application Assessment

Business Computer Application Assessment

SIMnet 2016: PowerPoint, Word, Excel Integrated Project 3

1 | P a g e Last Modified: 8/8/17

Office 2016 Integrated Applications – Project 3 Creating a Company’s Presentation In this project, you will create a presentation for the Top’t Corn popcorn company using resources from a Word document

and an Excel file. First, you will format an outline in Word so it can be imported as slides and content for the presentation.

You will format the look of the text before and after importing and use Format Painter to copy and paste formatting between

slides. Next, work with data in Excel, adding formulas and creating a table and a chart. Finally, you will copy and paste the

chart and table data from Excel into your PowerPoint presentation.

Skills needed to complete this project:

Word Skills

• Apply heading styles

• Change the color theme

PowerPoint Skills

• Import slides from a Word outline

• Change the font

• Align text

• Use Format Painter

• Change slide layout

• Add a table to a slide

• Paste data from Excel

• Change font color

• Paste a chart from Excel

• Move an object on a slide

Excel Skills

• Enter text and numbers in cells

• Create a formula using multiplication

• Use an absolute reference in a formula

• Copy a formula

• Format data as a table

• Sort data in a table

• Use the AVERAGE function in a formula

• Use the SUM function in a formula

• Apply a number format

• Modify the font size

• Autofit columns

• Create a PivotTable using a Recommended PivotTable

• Create a pie chart

• Hide the chart title

• Apply a chart style

IMPORTANT: Download the resource file needed for this project from the Resources link. Be sure to extract the file after downloading the resources zipped folder. Please visit SIMnet Instant Help for step-by- step instructions.

1. Open the start file OF2016-Integrated-Project3. If the document opens in Protected View, click the

Enable Editing button in the Message Bar at the top of the document so you can modify it.

2. The file will be renamed automatically to include your name. Change the project file name if directed to

do so by your instructor, and save it.

3. Open the Top’t Corn Outline Word document from the location where you saved the data files

for this project. (Downloaded from the Resources link.)

a. Apply the Heading 1 style to numbered items in the list.

b. Apply the Heading 2 style to the lettered items in the list.

c. Change the color theme of the document to Red Orange

d. Save the document with the name Top’t Corn Outline for Import. Close the document.

e. Return to the PowerPoint presentation you downloaded from SIMnet.

 

Step 1

Download start file

Download Resources

 

 

SIMnet 2016: PowerPoint, Word, Excel Integrated Project 3

2 | P a g e Last Modified: 8/8/17

4. Import the Top’t Corn Outline for Import Word file into OF2016-Integrated-Project3 presentation.

a. Use Slides from Outline… option to import the Top’t Corn Outline for Import file.

Note: When you are finished with this step, your presentation should contain 10 slides. If it does

not, your project will not grade properly and you may lose a significant number of points. Check

your work carefully.

b. Verify that the Heading 1 style items from the Word file appear as the titles, Heading 2 style items

appear in the body.

c. Verify that the title font on the imported slides appears to be an Red Orange color.

d. Select the title placeholder on Slide 2 (the placeholder with the word Overview). Change the font to

Calibri and left align the text.

e. With the title placeholder still selected, use Format Painter to copy the formatting and paste the

formatting each of the title placeholders on Slides 3 through 10.

5. Open the OldBayMDSales Excel file (downloaded from the Resources link) and create a table to copy

into PowerPoint.

a. Go to the OldBaySales worksheet. In cell C1, type: Total Sale

b. In cell E1, type: Price

c. In cell F1, type: $9.00

d. In cell C2, enter a formula to calculate the total sale. Multiple the quantity sold (cell B2) by the price

per box (cell F1). You are going to copy this formula to cells C3:C9, so use relative and absolute

references as appropriate.

e. Copy the formula in cell C2 to cells C3:C9.

f. Format the data in cells A1:C9 as a table using any style.

g. Sort the table data by values in the quantity column so the largest number is at the top.

h. In cell E3, type: Average Quantity

i. Enter a formula in cell F3 to calculate the average of cells B2:B9.

j. In cell E4, type: Total Sales

k. Enter a formula in cell F4 to calculate the sum of cells C2:C9.

l. Apply the Currency number format to cell F4.

m. Select cells A1:F9 and change the font size to 18.

n. Autofit all columns so the data are completely visible.

o. Copy cells A1:F9.

p. Save the Excel file, but leave it open.

Download Resources

 

 

SIMnet 2016: PowerPoint, Word, Excel Integrated Project 3

3 | P a g e Last Modified: 8/8/17

6. Return to the PowerPoint presentation and navigate to Slide 8.

a. Change the layout for Slide 8 to Title and Content.

b. Add a table to the slide with six columns and nine rows.

c. Paste the data you copied from Excel into the table, and select Use Destination Style paste option.

d. Where necessary, change the text in the header row to bold, White, Background 1 (the first color

in the first row of theme colors).

e. Save the PowerPoint presentation, but do not exit PowerPoint yet.

7. Return to the OldBayMDSales Excel file and create a chart from the data in the TruffleSales worksheet.

a. Create a PivotTable from the data in the TruffleSales worksheet. Use the first (only) recommended

PivotTable – Sum of Quantity by State.

b. Create a 2-D pie PivotChart from the PivotTable data.

c. Hide the chart title.

d. Apply the chart Quick Style Style 11.

e. Copy the chart.

f. Save and close the Excel file.

8. Return to the PowerPoint presentation and navigate to Slide 9.

a. Change the layout for Slide 9 to Title Only.

b. Paste the chart you copied from Excel into the slide. Use the Keep Source Formatting & Embed

Workbook paste option.

c. Drag the chart down so it is positioned in the middle of the slide.

d. Save and close the presentation.

9. Upload and save your project file.

10. Submit project for grading. Step 2 Upload & Save

Step 3

Grade my Project

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

New Perspectives Word 2016 | Module 2: SAM Project 1a

 

C:\Users\akellerbee\Documents\SAM Development\Design\Pictures\g11731.pngNew Perspectives Word 2016 | Module 2: SAM Project 1a

Transportation Technology Report

preparing a research paper

GETTING STARTED

Open the file NP_WD16_2a_FirstLastName_1.docx, available for download from the SAM website.

Save the file as NP_WD16_2a_FirstLastName_2.docx by changing the “1” to a “2”.

0. If you do not see the .docx file extension in the Save As dialog box, do not type it. The program will add the file extension for you automatically.

With the file NP_WD16_2a_FirstLastName_2.docx still open, ensure that your first and last name is displayed in the footer.

· If the footer does not display your name, delete the file and download a new copy from the SAM website.

 

PROJECT STEPS

For your Emerging Technology class, you are part of a group writing a research paper on new transportation technologies. Your paper is about self-driving cars and must follow the MLA format. Change the Citation & Bibliography Style of the document to MLA.

Apply the Capitalize Each Word case to the title paragraph “Future transportation technology: self-driving cars”.

Insert a header to meet MLA standards as follows:

a. From the Top of Page page number gallery, insert a Plain Number 3 page number to the header of all pages in the document.

b. Without moving your insertion point, type Cooper and then press the Spacebar.

c. Close the Header & Footer Tools.

Find the word “machine” and replace all instances with the word computer. (Hint: Do not include the period. You should find and replace four instances.)

Create a First Line Indent of 0.5″ to indent the first lines of all the body paragraphs beginning “In California and Nevada…” and ending “…vehicle owners enjoy the benefits.”

Move the second body paragraph beginning “A self-driving car…” so that it becomes the new first body paragraph.

Find the paragraph beginning “Three technologies are required….” Move the insertion point before the colon and insert a citation from a new source using the information shown in Table 1 on the next page.

Table 1: Periodical Source

 

 

Type of Source Article in a Periodical
Author Pullen, John Patrick
Title Driverless Cars
Periodical Title Time Magazine
Year 2015
Month February
Day 24
Pages 35-39
Medium Print

 

 

Edit the new Pullen citation to add 37 as the page number.

Create a numbered list from the paragraphs beginning with “Global positioning system (GPS) – A high-definition GPS…” and ending with “…from the other two systems.”

In the paragraph beginning “The third major advantage…”, read the comment from Abby Markham and then reply to it with the text:

Thanks, this looks great.

In the same paragraph, move the insertion point before the period in the sentence “The idea behind platooning…according to an article in Science News.” Insert a citation that creates a new source with the information shown in Table 2 below.

 

Table 2: Journal Source

 

 

Type of Source Journal Article
Author Wu, Karen
Title Look Ma, No Hands!
Journal Name Science News
Year 1997
Pages 162-175
Medium Print

 

 

 

In the paragraph beginning “The substantial benefits…”, respond to the comment as follows:

d. Read the comment and then delete it.

e. Change the text “$50,000” to $100,000 in the middle of the paragraph.

Move the insertion point before the period in the sentence you modified in the previous step (“The cost of the new technology…for most car owners.”), and then insert a citation to the existing Fagnant, Daniel and Kockelman, Kara source.

Edit the new Fagnant citation to add 9 as the page number.

Move the insertion point to the end of the document, and then insert a bibliography as follows:

f. Insert a page break.

g. Insert a Works Cited from the Bibliography gallery.

You notice an error in the Fagnant source. Edit the Fagnant source so that the Name of Web Page reads “Preparing for a Nation of Autonomous Vehicles”.

Update the Works Cited list to reflect the edit you made to the source.

Format the “Works Cited” heading as follows:

h. Apply the Normal style to the heading.

i. Center the heading.

Select the entire document and format it as follows:

j. Change the font size to 12 pt.

k. Change the line spacing to double.

Move the insertion point to the beginning of the document, and then insert a comment with the following text:

Please review the format of the document.

Check the Spelling & Grammar in the document to identify and correct any spelling errors. (Hint: Ignore proper names. You should find and correct at least one spelling error.)

Your document should look like the Final Figure on the following pages. Save your changes, close the document, and then exit Word. Follow the directions on the SAM website to submit your completed project.

Final Figure

  

2
 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

CSE205 Object Oriented Programming And Data Structures Homework 1 :: 25 Pts assignment Help

CSE205 Object Oriented Programming And Data Structures Homework 1 :: 25 Pts assignment Help

CSE205 Object Oriented Programming and Data Structures Homework 1 :: 25 pts
1 Submission Instructions
Create a document using your favorite word processor and type your exercise solutions. At the top of the document be
sure to include your name and the homework assignment number, e.g. HW1. Convert this document into Adobe PDF
format and name the PDF file <asuriteid>.pdf where <asuriteid> is your ASURITE user id (for example, my ASURITE
user id is kburger2 so my file would be named kburger2.pdf). To convert your document into PDF format, Microsoft Office
versions 2008 and newer will export the document into PDF format by selecting the proper menu item from the File
menu. The same is true of Open Office and Libre Office. Otherwise, you may use a freeware PDF converter program, e.g.,
CutePDF is one such program.
Next, create a folder named <asuriteid> and copy <asuriteid>.pdf to that folder. Copy any Java source code files to this
folder (note: Java source code files are the files with a .java file name extension; do not copy the .class files as we do not
need those).
Next, compress the <asuriteid> folder creating a zip archive file named <asuriteid>.zip. Upload <asuriteid>.zip to the
Homework Assignment 1 dropbox by the assignment deadline. The deadline is 11:59pm Wed 26 Mar. Consult the online
syllabus for the late and academic integrity policies.
Note: not all of these exercises will be graded, i.e., random ones will be selected for grading.
2 Learning Objectives
1. Use the Integer and Double wrapper classes.
2. Declare and use ArrayList class objects.
3. Write code to read from, and write to, text files.
4. Write an exception handler for an I/O exception.
5. Write Java classes and instantiate objects of those classes.
6. Read UML class diagrams and convert the diagram into Java classes.
7. Identify and implement dependency, aggregation, inheritance, and composition relationships.
3 ArrayLists
3.1 Write code that creates an ArrayList<Integer> object named list and fills list with these numbers (using one or a
pair of for or while loops):
0 1 2 3 4 0 1 2 3 4
3.2 Consider the ArrayList<Integer> object named list containing these Integers:
list = { 1, 2, 3, 4, 5, 4, 3, 2, 1, 0 }
What are the contents of list after this loop completes?
for (int i = 1; i < 10; ++i) {
list.set(i, list.get(i) + list.get(i-1));
}
3.3 Write an enhanced for loop that counts how many numbers in an ArrayList<Integer> object named list are negative.
Print the count after the loop terminates.
3.4 Write a method named arrayListSum() that has one parameter pList which is an object of the class ArrayList
<Integer>. The method shall return the sum of the elements of pList.
3.5 Write a method named named arrayListCreate() that has two int parameters pLen and pInitValue. The method
shall create and return a new ArrayList<Integer> object which has exactly pLen elements. Each element shall be
initialized to pInitValue.
Arizona State University Page 1
CSE205 Object Oriented Programming and Data Structures Homework 1 :: 25 pts
3.6 Write a void method named insertName() that has two input parameters: (1) pList which is an object of ArrayList
<String> where each element of pList is a person’s name; and (2) a String object named pName. Assume the names
in pList are sorted into ascending order. The method shall insert pName into pList such that the sort order is
maintained.
3.7 Write a void method named arrayListRemove() which has two parameters: pList is an object of the ArrayList
<Integer> class and pValue is an int. The method shall remove all elements from pList that are equal to pValue.
4 Text File Input/Output
4.1 Explain what happens if you try to open a file for reading that does not exist.
4.2 Explain what happens if you try to open a file for writing that does not exist.
4.3 Name your source code file Hw1_1.java. Write a program that prompts the user for the name of a Java
source code file. The program shall read the source code file and output the contents to a new file named the same
as the input file, but with a .txt file name extension (e.g., if the input file is foo.java then the output file shall be
named foo.java.txt). Each line of the input file shall be numbered with a line number (formatted as shown below) in
the output file. For example, if the user enters Hw1_1.java as the name of the input file and Hw1_1.java contains:
//***************************************************************
// CLASS: Hw1_1 (Hw1_1.java)
//***************************************************************
public class Hw1_1 {
public static void main(String[] pArgs) {
}
public Hw1_1() {
}
}
then the contents of the output file Hw1_1.java.txt would be:
[001] //***************************************************************
[002] // CLASS: Hw1_1 (Hw1_1.java)
[003] //***************************************************************
[004] public class Hw1_1 {
[005] public static void main(String[] pArgs) {
[006] }
[007] public Hw1_1() {
[008] }
[009] }
Hint: to print an integer as shown above in a field of width 3 with leading 0’s use the printf() method with a format
specifier of %03d.
5 Exceptions and Exception Handling
5.1 Explain the difference between throwing an exception and catching an exception, i.e., explain what happens when an
exception is thrown and when one is caught?
5.2 Explain what a checked exception is. Give one example.
5.3 Explain what an unchecked exception is. Give one example.
5.4 Which type of uncaught exceptions must be declared with the throws reserved word in a method header?
5.5 Why don’t you need to declare that your method might throw an IndexOutOfBoundsException?
Arizona State University Page 2
CSE205 Object Oriented Programming and Data Structures Homework 1 :: 25 pts
5.6 Is the type of the exception object always the same as the type declared in the catch clause that catches it? If not,
why not?
5.7 What is the purpose of the finally clause? Give an example of how it can be used.
5.8 Which exceptions can the next() and nextInt() methods of the Scanner class throw? Are they checked exceptions or
unchecked exceptions?
6 Objects and Classes
6.1 Explain how an instance method differs from a class method (static method).
6.2 Explain what happens if we write a class named C but do not implement any constructors in C.
6.3 (a) In a static method, it is easy to differentiate between calls to instance methods and calls to static methods. How
do you tell them apart? (b) Why is it not as easy for methods that are called from an instance method?
6.4 Explain what happens when this application runs and why.
public class C {
private int x;
private String s;
public static void main(String[] pArgs) {
new C();
}
public C() {
x = s.length();
System.out.println(“x = ” + x);
}
}
6.5 Write the declaration for a class named C that declares: (1) a private int instance variable named mX; (2) a private
int class variable named mY initialized to 0; (3) a private int class constant named A which is equivalent to 100; (4)
a public int class constant named B which is equivalent to 200; (5) public accessor and mutator methods for mX
named getX() and setX(); (6) public accessor and mutator methods for mY named getY() and setY(); (7) a
constructor that has one int input parameter named pX which calls setX() to initialize mX to pX; (8) a default
constructor that calls C(int) to initialize mX to -1.
6.6 Continuing with the previous exercise, write the declaration for a class named Main that implements the main()
method. Within main() suppose we wish to instantiate a C object named cObj1 calling the default constructor.
Write the code to do this.
6.7 Continuing, write the code to instantiate another C object named cObj2 calling the second constructor to initialize
the mX instance variable to 10.
6.8 Continuing, within main(), are the following statements legal, i.e., do they compile? If so, explain what happens
when the statement is executed. If not, explain why the statement is illegal.
(a) int a1 = C.mX;
(b) int a2 = C.mY;
(c) int a3 = C.A;
(d) int a4 = C.B;
(e) cObj1.C(20);
(f) int a5 = cObj1.getX();
(g) cObj1.setX(20);
(h) cObj2.setX(cObj1.getX());
(i) int a6 = C.getX();
(j) C.setX(20);
(k) int a7 = cObj1.getY();
(l) cObj1.setY(20);
(m) int a8 = C.getY();
(n) C.setY(20);
Arizona State University Page 3
CSE205 Object Oriented Programming and Data Structures Homework 1 :: 25 pts
6.9 Continuing, suppose we add these two methods to the declaration of class C. For each assignment statement, if it is
legal (compiles) explain what happens when the statement is executed. For each assignment statement that is illegal
(syntax error) explain why the code is illegal.
public void f() {
mX = 0;
mY = 0;
}
public static void g() {
mX = 0;
mY = 0;
}
7 Object Oriented Design and UML Class Diagrams
7.1 Below is the code for a Java class named C. Draw the UML class diagram that corresponds to this code. There are
several free and open-source tools for drawing UML diagrams. Two reasonably simple and cross-platform (Windows,
Mac, Linux) tools are Umlet (http://www.umlet.com/) and Violet (http://alexdp.free.fr/violetumleditor). I have been
using Umlet for the diagrams I am drawing and I highly recommend it as it is very easy to quickly draw a
nice-looking class diagram. Using Umlet, you can export your diagram as an image file by selecting File | Export
As… on the main menu. I recommend you export the diagram as a .png image and then copy-and paste the .png
image into your word processing document.
public class C {
public static final int CONST1 = 100;
private int mX;
private double mY;
private String mZ;
public C() { this(0, 0, “”); }
public C(int pX, double pY, String pZ) { setX(pX); setY(pY); setZ(pZ); }
public int getX() { return mX; }
public int getY() { return mY; }
private String getZ() { return mZ; }
public void setX(int pX) { mX = pX; }
public void setY(int pY) { mY = pY; }
private void setZ(int pZ) { mZ = pZ; }
}
7.2 On the next page is a UML class diagram that shows several classes that are related in various ways. (a) What type
of class relationship, if any, exists between Course and Roster? If there is a relationship, modify the diagram to
indicate the relationship and label each end of the relationship with a multiplicity. (b) What type of class
relationship, if any, exists between Roster and Student. If there is a relationship, modify the diagram to indicate the
relationship and label each end of the relationship with a multiplicity. (c) What type of class relationship, if any,
exists between Student and UndergradStudent? If there is a relationship, modify the diagram to indicate the
relationship and label each end of the relationship with a multiplicity. (d) What type of class relationship, if any,
exists between Student and GradStudent? If there is a relationship, modify the diagram to indicate the relationship
and label each end of the relationship with a multiplicity. (e) What type of class relationship, if any, exists between
UndergradStudent and GradStudent? If there is a relationship, modify the diagram to indicate the relationship and
label each end of the relationship with a multiplicity.
Note: Draw this diagram in a UML diagramming tool such as Umlet or Violet and copy-and-paste your completed
diagram into your word processing document.
Arizona State University Page 4
CSE205 Object Oriented Programming and Data Structures Homework 1 :: 25 pts
Arizona State University Page 5

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Assessing Security Culture Homework

Assessing Security Culture

This week we learned about security culture and how to promote it within organizations.

It’s important that all employees are aware of common security risks and treat security seriously. The majority of cyberattacks aim to exploit human weaknesses with methods like phishing.

For this reason, people are most often the weakest link in an organization’s security defenses.

Scenario

  • Employees at SilverCorp are increasingly using their own personal devices for company work.
  • Specifically, over half of all employees check their work email and communications via Slack on their personal mobile phones.
  • Another 25% of employees are doing other work-related activities using work accounts and work-related applications on their personal phone.
  • Allowing sensitive work information to be shared on employees’ personal devices has a number of security implications.
  • You must research these security risks and use the security culture framework to develop a plan to mitigate the concerns.

Instructions

Compose the answers to the following four steps on Word Document.

Step 1: Measure and Set Goals

Answer the following questions:

  1. Using outside research, indicate the potential security risks of allowing employees to access work information on their personal devices. Identify at least three potential attacks that can be carried out.
  2. Based on the above scenario, what is the preferred employee behavior?
    • For example, if employees were downloading suspicious email attachments, the preferred behavior would be that employees only download attachments from trusted sources.
  3. What methods would you use to measure how often employees are currently not behaving according to the preferred behavior?
    • For example, conduct a survey to see how often people download email attachments from unknown senders.
  4. What is the goal that you would like the organization to reach regarding this behavior?
    • For example, to have less than 5% of employees downloading suspicious email attachments.

Step 2: Involve the Right People

Now that you have a goal in mind, who needs to be involved?

  • Indicate at least five employees or departments that need to be involved. For each person or department, indicate in 2-3 sentences what their role and responsibilities will be.

Step 3: Training Plan

Training is part of any security culture framework plan. How will you train your employees on this security concern? In one page, indicate the following:

  • How frequently will you run training? What format will it take? (i.e. in-person, online, a combination of both)
  • What topics will you cover in your training and why? (This should be the bulk of the deliverable.)
  • After you’ve run your training, how will you measure its effectiveness?

This portion will require additional outside research on the topic so that you can lay out a clear and thorough training agenda.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science homework help

Computer Science homework help

A node in a binary tree is called a(n) ____ if it has no left and right children.
edge
branch
leaf
path
A node in a binary tree is called a(n) ____ if it has no left and right children.
edge
branch
leaf
path
Every node in a doubly linked list has two pointers: ____ and ____.
previous; next
back; next
current; next
previous; current
In a graph G, if the edges connecting two vertices have weights assigned to them, the graph is called a ____ graph.
source
weighted
spanning
minimal
The edges connecting two vertices can be assigned a non-negative real number, called the ____ of the edge.
key
weight
width
height
The ____ executes when the object goes out of scope.
default constructor
destructor
copy constructor
iterator
Popping an element from an empty stack is called ____.
overflow
underflow
exception
overloading
The addition and deletion of elements of the stack occurs only at the ____ of the stack.
head
bottom
top
middle
In a graph directed G, for each vertex, v, the vertices adjacent to v are called ____ successors.
immediate
adjacent
path
parallel
The key of the right child below the root node of a search binary tree is 40. The value in the root node could be ____.
30
40
50
60
What is the purpose of the following code?current = head;while (current != NULL){    //Process current    current = current->link;}
Insertion of a node
Selection of a node
Traversal of a linked list
Creation of a new list
In a linked list, the order of the nodes is determined by the address, called the ____, stored in each node.
head
tail
link
first
A linked list is a collection of components, called ____.
elements
nodes
members
pointers
Which of the following is a basic operation performed on a queue?
push
pop
isEmptyQueue
top
The function ____ of the class linkedListType returns the last element of the list.
tail
lastNode
back
last
The ____ operation returns a pointer to the position before the first element in container ct.
ct.front()
ct.rbegin()
ct.rend()
ct.end()
In a binary search tree, the data in each node is ____ the data in the left child.
larger than
smaller than
equal to
larger or equal to
An iterator to a vector container is declared using the ____ iterator.
new
vector
typedef
typeiter
The ____ nodeType defines the node of a binary tree.
struct
class
template
array
Which of the following correctly initializes a doubly linked list in the default constructor?
head = NULL;back = NULL;
head = 0;back = 0;count = 0;
first = 0;last = 0;
first = NULL;last = NULL;count = 0;
Which of the following is a valid function of the class stackType?
int isEmptyStack() const;
void push();
void pop();
type pop();
Using the binary search algorithm, in an unsuccessful search, how many key comparisons are performed during the last iteration of the loop?
0
1
2
n, where n is the number of items in the list
The link field of the last node of a linked list is ____.
0
1
n-1
n
In a(n) ____ graph, the edges are drawn using arrows.
pointed
vector
directed
undirected
If data needs to be processed in a LIFO manner, use a(n) ____.
stack
linked list
queue
deque
Predicates are special types of function objects that return ____ values.
character
string
Boolean
Integer
Two well-known algorithms, Prim’s algorithm and ____’s algorithm, can be used to find a minimal spanning tree of a graph.
Euler
Dekart
Kruskal
Dijkstra
To describe a queuing system, we use the term ____ for the object receiving the service.
client
server
customer
provider
The initializeList operation on a doubly linked list can be done by using the operation ____.
empty
clear
destroy
delete
The ____ sort algorithm sorts the list by moving each element to its proper place in the sorted portion of the list.
bubble
quick
merge
insertion
The level of the children of the root node is ____.
0
1
2
3
When traversing a binary tree with the pointer current, the pointer current is initialized to ____.
NULL
llink
rlink
root
Each link (pointer) in a binary tree node points to a(n) ____ of that node.
parent
child
value
sibling
Given the unordered list [10, 7, 19, 5, 16], which of the following sequences represents the result of the first iteration of the bubble sort algorithm?
[7, 10, 19, 5, 16]
[10, 7, 5, 16, 19]
[19, 10, 7, 5, 16]
[7, 10, 5, 16, 19]
What is the output of the following code?stackType<int> stack;int x, y;x = 4;y = 2;stack.push(6);stack.push(x);stack.push(x + 1);y = stack.top();stack.pop();stack.push(x + y);x = stack.top();stack.pop();cout << “x = ” << x << endl;
x = 4
x = 5
x = 6
x = 9
What is the access modifier of the variable count in the linkedListType class?
public
private
protected
friend
The sequence of operations in a postorder search is ____.
traverse left; traverse right
traverse left; traverse right; visit
visit; traverse left; traverse right
traverse left; visit; traverse right
Suppose that the pointer head points to the first node in the list, and the link of the last node is NULL. The first node of the linked list contains the address of the ____ node.
head
first
second
tail
The postfix expression 5 6 + 4 * 10 5 / – = evaluates to ____.
10
30
42
44
A queue is a data structure in which the elements are ____.
added to the rear and deleted from the front
added to and deleted from the rear
added to and deleted from the front
added and deleted in the middle
Which of the following operations removes the first element from the deque object deq?
deq.front()
deq.push_front()
deq.pop_front()
deq.push()

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

R Studio And Tweets homework help

R Studio And Tweets homework help

BUS 393 – Assignment 2

 

Please follow the steps and answer the questions:

Load the necessary packages first:

library(tm)

library(openNLP)

library(textstem)

 

1. Import the twitter dataset using readreadline() function.

2. Inspect the first 10 tweets from the data.

3. We will specifically look at a tweet at index number 8. Assign a variable name to this tweet. For example: tweet8.

4. Check the data type of tweet8. Before changing the tweet8 to String type, firstly allow tweet8 to go through stemming. How many words in this sentence has been stemmed? What are the original form and base form respectively?

5. Remove the stop words from stemmed tweet8. Compare the original tweet8 and transformed tweet8. What are the stop words removed?

6. Reassign the 8th tweet to tweet8. Lemmatize the tweet8. What are the words has been lemmatized? What are the original forms and base forms respectively?

7. Change tweet8 to String type.

8. Use sentence tokenization function to segment tweet8. How many sentences are generated after tokenization?

9. Use word tokenization function to divide the words from the sentences. How many words have been generated? Display the words and sentences.

10. Use part of speech tagging function to assign POS tag to each word. Check the word and POS frequency. How many words have been assigned POS tags “VBD” (verb past tense)? What are the words being assigned with POS tags “VBD”?

11. Use name entity recognition function to detect name entities from this tweet. Does this function detect any name entities?

12. Use parsing function to parse this tweet. How many verb phrases (VP) are there? What components compose the last verb phrase? (If your parser does not work, you could skip this question)

 

 

Submission:

 

Create a R script file and write the R commands for each question. Write down the answers to the questions such as “How many words in this sentence has been stemmed?” as R script comments in the same R script file. Submit the file on blackboard.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Computer Science project homework help

Project Description:

You are a real estate analyst who works for Mountain View Realty in the North Utah County area. You have consolidated a list of houses sold during the past few months and want to analyze the data. For a simple analysis, you will outline the data and use the Subtotal feature. You will then create two PivotTables and a PivotChart to perform more in-depth analysis.

 

Exp19_Excel_Ch07_Cap_Real_Estate

Project Description:

You are the office manager for a real estate company in northern Utah County. You tracked real estate listings, including city, agent, listing price, sold price, etc. Agents can represent a seller, a buyer, or both (known as dual agents). Your assistant prepared the spreadsheet structure with agent names, agent types, the listing and sold prices, and the listing and sold dates. You want to complete the spreadsheet by calculating the number of days each house was on the market before being sold, agent commissions, and bonuses. In addition, you will use conditional functions to calculate summary statistics. For further analysis, you will insert a map chart to indicate the average house selling price by city. Finally, you will create a partial loan amortization table and calculate cumulative interest and principal to show a potential buyer to help the buyer make decisions.

Steps to Perform:

 

Step

Instructions

Points    Possible

 

1

Start   Excel. Download and open the file named Exp19_Excel_Ch07_Cap_RealEstate.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

0

 

2

The spreadsheet contains codes (BA, DA, SA) to   represent agent roles (Buyer’s Agent, Dual Agent, Seller’s Agent). You want   to switch the codes for the actual descriptions.
In cell E12 of the Details sheet, insert the SWITCH function to evaluate the   agent code in cell D12. Include mixed cell references to the codes and roles   in the range J2:K4 for the values
and results arguments. use all cell references in the function. Copy the   function to the range E13:E39.

5

 

3

Now you   want to calculate the number of days between the list date and sale date.
In cell J12, insert the DAYS function to calculate the number of days between   the Listing Date and the Sale Date. Copy the function to the range J13:J39.

5

 

4

You want to calculate agent commissions based on   their role.
In cell K12, insert the IFS function to calculate the agent’s commission   based on the agent code and the applicable rates in the range L2:L4. Use   relative and mixed references correctly. Copy the function to the range   K13:K39.

5

 

5

You   want to calculate a bonus if the sold price was at least equal to the listing   price, and if the house sold within 30 days after being listed.
In cell L12, insert an IF function with a nested AND function to calculate a   bonus. The AND function should ensure both conditions are met: Sold Price   divided by the Listing Price is greater than or equal to 100% (cell L7) and   the Days on Market are less than or equal to 30 (cell L8). If both conditions   are met, the bonus is $1,000 (cell L9). Otherwise, the bonus is $0. Use mixed   cell references to the input values in the range L7:L9. Copy the function to   the range L12:L39.

5

 

6

The top-left section of the spreadsheet is designed   for summary statistics for one condition. You will calculate average selling   prices and the number of houses sold in each city (the condition).
In cell B2, insert the AVERAGEIF function to calculate the average Sold Price   for houses in the city of Alpine. Use mixed references for the range; use a   relative reference to cell A2. Copy the function and use the Paste Formulas   option to paste the function in the range B3:B5 so that the bottom border in   cell B5 is preserved.

5

 

7

You   want to count the number of houses in one city.
In cell C2, insert the COUNTIF function to count the number of houses in the   city of Alpine. Use mixed references for the range; and use a relative   reference to cell A2. Copy the function and use the Paste Formulas option to   paste the function in the range C3:C5 so that the border in cell C5 is   preserved.

5

 

8

You want to calculate the total commissions for   each agent (the condition).
In cell B7, insert the SUMIF function to total the commissions by agent. Use   mixed references for the ranges; and use a relative reference to cell A7.   Copy the function and use the Paste Formulas option to paste the function in   the range B8:B9 so that the borders are preserved.

5

 

9

The   top-middle section of the spreadsheet is designed for summary statistics for   multiple conditions. You will calculate the number of houses sold for each   agent when he or she served as a Dual Agent (DA). Use mixed references for   ranges and the agent code condition in cell J3. Use relative cell references   to the agent condition in cell E2. When you copy the formulas, use the paste   Formulas options to preserve border formatting.
In cell F2, insert the COUNTIFS function in cell F2 to count the number of   houses sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for   that house. Use all cell references in the function. Copy the function to the   range F3:F4 and preserve the bottom border for cell F4.

5

 

10

You are ready to calculate the total value of those   houses for each agent when he or she served as a Dual Agent (DA). Use mixed   references for ranges and the agent code condition in cell J3. Use relative   cell references to the agent condition in cell E2. When you copy the   formulas, use the paste Formulas options to preserve border formatting.
In cell G2, insert the SUMIFS function to sum the selling prices of the   houses sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for   that house. Copy the function to the range G3:G4 and preserve the bottom   border for cell G4.

5

 

11

Now,   you will calculate the highest-price house highest-price house sold for each   agent when he or she served as a Dual Agent (DA). Use mixed references for   ranges and the agent code condition in cell J3. Use relative cell references   to the agent condition in cell E2. When you copy the formulas, use the paste   Formulas options to preserve border formatting.
In cell H2, insert the MAXIFS function in cell H2 to display the highest-price   house sold by the first agent (cell E2) who was a Dual Agent (DA) (J3) for   that house. Copy the function to the range H3:H4 and preserve the borders in   the range H3:H4.

5

 

12

The Map worksheet contains a list of cities, postal   codes, and average house sales. You will insert a map chart to depict the   averages visually using the default gradient fill colors.
Display the Map worksheet, select the range B1:C5 and insert a map chart.

5

 

13

Cut the   map chart and paste it in cell A7. Set a 2.31″ height and 3.62″ width.

5

 

14

You want to enter a meaningful title for the map.
Change the map title to Average Selling Price by Zip Code.

2

 

15

Display   the Format Data Series task pane, select the option to display only regions   with data, and show all labels. Close the task pane.

3

 

16

You are ready to start completing the loan   amortization table.
Display the Loan worksheet. In cell B8, type a reference formula to cell B1.   The balance before the first payment is identical to the loan amount. Do not   type the value; use the cell reference instead. In cell B9, subtract the   principal from the beginning balance on the previous row. Copy the formula to   the range B10:B19.

5

 

17

Now,   you will calculate the interest for the first payment.
In cell C8, calculate the interest for the first payment using the IPMT   function. Copy the function to the range C9:C19.

5

 

18

Next, you will calculate the principal paid.
In cell D8, calculate the principal paid for the first payment using the PPMT   function. Copy the
function to the range D9:D19.

5

 

19

Rows   21-23 contain a summary section for cumulative totals after the first year.
In cell B22, insert the CUMIPMT function that calculates the cumulative   interest after the first year. Use references to cells A8 and A19 for the   period arguments.

5

 

20

The next summary statistic will calculate the   principal paid after the first year.
In cell B23, insert the CUMPRINC function that calculates the cumulative   principal paid after the first year. Use references to cells A8 and A19 for   the period arguments.

5

 

21

Rows   25-28 contain a section for what-if analysis.
In cell B27, use the RATE financial function to calculate the periodic rate   using $1,400 as the
monthly payment (cell B26), the NPER, and loan amount in the original input   section.

5

 

22

In cell B28, calculate the APR by multiplying the   monthly rate (cell B27) by 12.

2

 

23

Create   a footer with your name on the left side, the sheet name code in the center,   and the file name code on the right side of each worksheet.

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Project Part 1: Network Design homework help

Project Part 1: Network Design homework help

Project: Network Design and Plan

 

Purpose

This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation at various levels. You will play the role of an employee participating in network design and planning of a specific business situation.

Required Source Information and Tools

 

 

Web References: Links to web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on September 18, 2020.

 

 

The following tools and resources are needed to complete this project:

A web browser and access to the Internet to perform research for the project

(Optional) A tool for creating basic network diagrams, such as draw.io or Microsoft PowerPoint

Learning Objectives and Outcomes

Apply core competencies learned throughout the course to a single project.

Analyze and apply knowledge of firewalls, VPNs, and other network defense measures.

Demonstrate logical reasoning and decision-making skills.

Overall Project Scenario

Corporation Techs provides remote and on-site support to small and mid-size businesses. Clients use Corporation Techs’ services to solve problems involving malware removal, to manage data recovery and network issues, and to install hardware and software.

Due to recent developments, most technical representatives will begin working from home within the next six months. Because Corporation Techs provides 24/7 support, its systems and communications pathways must be fully operational at all times. In addition, the company has been experiencing unprecedented growth and is preparing to double its client-facing staff.

You are a junior network architect who is responsible for helping to plan and design network enhancements to create a more secure internal network, and to ensure secure remote access.

Deliverables

The project is divided into several parts. Details for each deliverable can be found in this document. Refer to the course Syllabus for submission dates.

Project Part 1: Network Design

Project Part 2: Firewall Selection and Placement

Project Part 3: Remote Access and VPNs

Project Part 4: Final Network Design Report

 

Project Part 1: Network Design

Scenario

The Corporation Techs’ current network consists of 1 web server (accessible by the public), 2 application servers, 2 database servers, 2 file and print servers, and 50 workstations. The web server runs Linux/Apache, the other servers run Microsoft Windows Server, and the workstations run Microsoft Windows. The network is connected through a series of switches, is not physically connected to other networks, and runs Internet Protocol version 4 (IPv4). The network is protected by a single border firewall. The senior network architect, whom you work for directly, has verified the company’s business goals and has determined the features and functions required to meet those goals.

The senior network architect has asked you to create a network design that includes the following components:

Current infrastructure elements

A logical topology that separates the Accounting and Sales departments

Redundant communications

Justification for continuing with IPv4 or upgrading to IPv6

Tasks

For this part of the project, perform the following tasks:

1. Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.

2. Design a network configuration with physical and logical topologies. Identify major network elements (e.g., servers, switches, gateways) and their locations within the private and protected network segments.

3. Include a high-level plan that ensures communications are available 24/7.

4. Recommend whether to continue using IPv4 or upgrade to IPv6, and explain why.

5. Create a basic network diagram that illustrates the current network and enhancements. Include a few workstations to represent all workstations on the internal network. The diagram will be very high level at this stage and include only necessary details. You may use a software tool or simply pencil and paper. You will update this design later in the project.

6. Create a draft report detailing all information as supportive documentation.

7. Cite sources, where appropriate.

Required Resources

· Internet access

· Course textbook

Submission Requirements

· Format: Microsoft Word (or compatible)

· Font: Arial, size 12, double-space

· Citation style: Your school’s preferred style guide

· Length of report: 3–4 pages

Self-Assessment Checklist

· I determined the best network design to ensure the security of internal access while retaining public website availability.

· I designed a network configuration with physical and logical topologies, and identified major network elements and their locations within the private and protected network segments.

· I created a plan that ensures communications are available 24/7.

· I recommended whether to continue using IPv4 or upgrade to IPv6, and explained why.

· I created a basic network diagram that illustrates the current network and enhancements.

· I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

· I followed the submission guidelines.

 

Project Part 2: Firewall Selection and Placement

Scenario

The senior network architect at Corporation Techs has informed you that the existing border firewall is old and needs to be replaced. He recommends designing a demilitarized zone (DMZ) to increase network perimeter security. He also wants to increase the security of network authentication, replacing the current username and password approach.

Tasks

For this part of the project, perform the following tasks:

1. Research and select firewalls for the Corporation Techs network.

a. Describe each firewall, why you selected it, and where it should be placed for maximum effectiveness.

b. Address network, server, and workstation firewalls.

2. Describe a plan for creating a DMZ, and explain how it makes the network more secure.

3. Research network authentication and create a high-level plan for secure authentication to internal network resources.

4. Create a draft report detailing all information as supportive documentation.

5. Cite sources, where appropriate.

Required Resources

· Internet access

· Course textbook

Submission Requirements

· Format: Microsoft Word (or compatible)

· Font: Arial, size 12, double-space

· Citation style: Your school’s preferred style guide

· Length of report: 3–4 pages

Self-Assessment Checklist

· I researched and selected firewalls.

· I described each firewall, why I selected it, and where it should be placed for maximum effectiveness.

· I addressed network, server, and workstation firewalls.

· I described a plan for creating a DMZ and explained how it makes the network more secure.

· I created a high-level plan for secure authentication to internal network resources.

· I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

· I followed the submission guidelines.

 

 

Project Part 3: Remote Access and VPNs

Scenario

As you are aware, many remote users will soon need access to the internal network and services. A remote access and virtual private network (VPN) plan is needed to connect it all together.

The senior network architect has asked you to create the plan that will allow secure remote access to the internal network while preventing unauthorized access. He specifically requested that all information transferred between remote users and the organizational servers be protected against snooping.

Tasks

For this part of the project, perform the following tasks:

1. Research and recommend the most appropriate VPN technology. The most likely solution is either an Internet Protocol Security (IPSec) VPN or SSL/TLS VPN. Describe the VPN technology and explain why it is the best choice for Corporation Techs.

2. Recommend any other forms of remote access that are relevant and describe how they would be used.

3. Create a draft report detailing all information as supportive documentation.

4. Cite sources, where appropriate.

Submission Requirements

· Format: Microsoft Word (or compatible)

· Font: Arial, size 12, double-space

· Citation style: Your school’s preferred style guide

· Length of report: 3–4 pages

Self-Assessment Checklist

· I researched and recommended an appropriate VPN technology.

· I described the VPN technology and explained why it is the best choice.

· I recommended other forms of remote access that are relevant and described how they would be used.

· I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

· I followed the submission guidelines.

 

Project Part 4: Final Network Design Report

Scenario

You are ready to create and submit a final network design and plan to the senior network architect, who will present it to senior management and other decision makers.

Tasks For this part of the project, perform the following tasks:

1. Create a final network diagram that includes the basic diagram and all relevant network enhancements.

2. Create a professional report that includes content from each draft report. Include details for all relevant information, persuasive justification for your recommendations, and methods to measure the success of each major network enhancement. Include a 1- to 2-page executive summary.

3. Use simple, clear language that primary stakeholders (non-IT) can understand easily.

Submission Requirements

· Format: Microsoft Word (or compatible)

· Font: Arial, size 12, double-space

· Citation style: Your school’s preferred style guide

· Length of final report: 10–16 pages, including executive summary and network diagram

Self-Assessment Checklist for Final Report

· I developed a network design that meets the requirements.

· I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

· I described technology recommendations, provided justification for those recommendations, and described methods to measure the success of each major network enhancement.

· I included an executive summary and a final network diagram.

· I included citations for all sources used in the report.

· I followed the submission guidelines.

 

© 2022 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Page 7

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!

Access Skills Approach homework help

Access Skills Approach homework help

A Skills Approach: Access 2016 Chapter 3: Working with Forms and Reports

1 | Page Challenge Yourself 3.3 Last Updated 9/18/17

Challenge Yourself 3.3 In this project you will continue working with the greenhouse database from Chapter 2, Challenge Yourself 2.3. You will

create a variety of forms for entering plant and maintenance information.

Skills needed to complete this project:

• Creating a Single Record Form Based on a Table or Query

• Moving and Arranging Controls

• Creating a Multiple Items Form

• Creating a Split Form

• Adding Fields to a Form in Layout View

• Creating a Form Using the Form Wizard

• Creating a New Blank Form in Layout View

• Resizing Controls

• Applying a Theme

• Modifying the Layout of a Form or Report

• Formatting Controls

• Adding Design Elements to Form and Report Headers

1. Open the start file AC2016-ChallengeYourself-3-3.

2. If necessary, enable active content by clicking the Enable Content button in the Message Bar.

3. The file will be renamed automatically to include your name. Change the project file name if directed

to do so by your instructor.

4. Create a Single Record form using the Plants table as the record source. Save the form with the name

PlantsSingleRecord and close it.

5. Create a Multiple Items Form using the Plants table as the record source. Save the form with the

name PlantsMultipleItems and close it.

6. Create a Split Form using the MaintenanceLog table as the record source. Save it with the name

MaintenanceLogSplit and close it.

7. Use the Form Wizard button to create a form showing employee information in the main form with a

subform showing related maintenance records.

a. Add the following fields to the form in this order:

From the Employees table: EmployeeID, LastName, FirstName, WeeklyHours

From the MaintenanceLog table: MaintenanceDate, Plant, Watered, Inspected, Pruned

b. Organize the form by the Employees table with data from the MaintenanceLog table as a subform.

c. Format the subform as a Datasheet form.

d. Name the main form: EmployeeWorkLog

e. Name the subform: EmployeeWorkLogSubform

f. Review the form in Form view, and then close it.

Step 1

Download start file

A Skills Approach: Access 2016 Chapter 3: Working with Forms and Reports

2 | Page Challenge Yourself 3.3 Last Updated 9/18/17

8. Create a form from scratch in Layout view.

a. Start with a new blank form in Layout view. Save the form with the name:

EmployeeDetails

b. Add the following fields from the Employees table to the form in this order:

EmployeeID, LastName, FirstName

c. Apply the Facet theme to the database.

d. Save and close the form.

9. Add controls to the MaintenanceLog form.

a. Open the MaintenanceLog form in Layout view.

b. Move the Plant label and bound text control above the Employee controls.

c. Add the Inspected field immediately below the Watered control.

d. Add the Pruned field immediately below the Inspected control.

e. There is an extra row in the form layout. Delete it.

10. Format controls in the MaintenanceLog form.

a. Change the MaintenanceDate label to: Date

b. Change the font color for all the label controls to the theme color Dark Green, Accent 2.

c. Modify the MaintenanceDate bound text box control to use the Long Date format.

d. Add the title Maintenance Log to the form header. Be sure to include a space between the

words in the title.

11. Save the form and close it.

12. Close the database and exit Access.

13. Upload and save the project file.

14. Submit project for grading.

Step 2

Upload & Save

Step 3

Grade my Project

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!