Your manager at work is extremely impressed with your computer skills since you took a computer course. The company is installing computers in its production facility, and she has asked you to create a brief PowerPoint presentation that shows tips for working in the new software. Specifically, she wants the layout and topics for the presentation to be organized as shown below.
Slide 1: Include a title slide.
Slide 2: Describe the basics of computer software and what software does.
Slides 3–4: Describe basic functions and techniques that will be used when creating and editing documents in Microsoft Word.
Slides 5–6: Provide what you think are the top tips for creating aesthetically pleasing PowerPoint presentations.
Slide 7: Outline the basics of opening a blank workbook and using Formulas to work with data in Microsoft Excel.
Slide 8: Discuss some basic features of Microsoft Access (e.g., tables, queries, forms) and how employees might utilize this software to track production.
Slide 9: Include a reference slide.
Category: Computer Science homework help
Choose one of the Business Scenario Options to establish the audience and bu
Choose one of the Business Scenario Options to establish the audience and business perspective for your Emerging Technology Analysis Report.
NASCAR
Consider the Topic Options presented under each of the Emerging Technology Categories and choose one topic option
Picked Blockchain for Data Security
In your role as a consultant in your chosen business scenario, write an informational email to the project manager that includes:
The benefits that business derive from crowdsourcing
The different types of crowdsourcing
Examples of how crowdsourcing can be used to enhance or promote technology solutions
How bias exists in technology solutions
Assessment Requirements/Submission Requirement:
750-word minimum
2 scholarly references
Conduct research and cite supporting sources in APA format where appropriate.
Conduct research and cite supporting sources in APA format where appropriate.
Discuss one measure that organizations can take to protect themselves from each of these attacks – ARP poisoning and MAC flooding. Summarize how you conducted active scanning in the lab “Enumerating Hosts Using Wireshark, Windows, and Linux Commands.”
Describe one tool/technique or command for enumerating 1. Netbios, 2. SNMP and 3. DNS on windows machines.
Describe three Linux commands along with syntax that you can use to enumerate Linux systems.
What is the difference between an auxiliary module and an exploit module in Metasploit? Give an example of a Metasploit post exploitation module along with syntax and description.
Research and find a Metasploit exploit for Android® devices. Describe the exploit and its various Metasploit options. Discuss what a user can do to protect themselves from the exploit.
Here is a hypothetical entry from the /etc/shadow file. Answer the following questions based on this entry:
naina:$1$nfqpGleOffcp0i:13000:0:30:7:1::
Which algorithm was used to hash the password?
What is the maximum number of days the password is valid?
What is the date that this account will expire?
Conduct research and cite supporting sources in APA format where appropriate.
Conduct research and cite supporting sources in APA format where appropriate.
Discuss one measure that organizations can take to protect themselves from each of these attacks – ARP poisoning and MAC flooding. Summarize how you conducted active scanning in the lab “Enumerating Hosts Using Wireshark, Windows, and Linux Commands.”
Describe one tool/technique or command for enumerating 1. Netbios, 2. SNMP and 3. DNS on windows machines.
Describe three Linux commands along with syntax that you can use to enumerate Linux systems.
What is the difference between an auxiliary module and an exploit module in Metasploit? Give an example of a Metasploit post exploitation module along with syntax and description.
Research and find a Metasploit exploit for Android® devices. Describe the exploit and its various Metasploit options. Discuss what a user can do to protect themselves from the exploit.
Here is a hypothetical entry from the /etc/shadow file. Answer the following questions based on this entry:
naina:$1$nfqpGleOffcp0i:13000:0:30:7:1::
Which algorithm was used to hash the password?
What is the maximum number of days the password is valid?
What is the date that this account will expire?
Find a dataset of interest to you that includes at least one nominal, one or
Find a dataset of interest to you that includes at least one nominal, one ordinal, and one interval or ratio variable. This dataset can be sourced online, from your work, or even be a dataset you create yourself. Analysis: Conduct a univariate analysis of each variable you identified. This should include:
Creating a frequency distribution for the nominal and ordinal variables.
Calculating common summary measures (e.g., mean, median, mode, standard deviation, variance) for the interval or ratio variable.
Interpretation: Provide an interpretation of your findings. What can you infer from the distribution and summary measures? How does the type of data (nominal, ordinal, interval/ratio) influence the kind of analysis you can perform and the insights you can gain?
Reflection: Discuss the importance of understanding the type of data and appropriate descriptive statistics in data analysis.
Submission Format: Your submission should be a maximum of 500-600 words. Submit your assignment in APA format as a Word document or a PDF file. Include both your written analysis and any visualizations or tables that support your findings. If you use any software for your calculations (like R, Python, Excel), please include your code or formulas as well.
Q1- What equipment and protocols are required for establishing network enterpris
Q1- What equipment and protocols are required for establishing network enterprise architectures/security architectures? Provide 2-3 examples and discuss how they provide layered security.
Q2- Voice over IP (VoIP) is a central system that manages phones within an enterprise. What advantages does VoIP provide companies in maintaining security?
1. Concerning security assessment, discuss the aspect of internal, external, and
1. Concerning security assessment, discuss the aspect of internal, external, and third-party testing minimum requirements.
> Your assessment should address online vulnerability, penetration testing, code review, interface testing, and other topics.
2. Regarding online managing security operations, discuss the elements of asset inventory, asset management, configuration management, and explaining the need-to-know privileges and service level agreement.
Need 5-6 pages with peer-reviewed citations. No introduction or conclusion needed.
Find a dataset of interest to you that includes at least one nominal, one or
Find a dataset of interest to you that includes at least one nominal, one ordinal, and one interval or ratio variable. This dataset can be sourced online, from your work, or even be a dataset you create yourself. Analysis: Conduct a univariate analysis of each variable you identified. This should include:
Creating a frequency distribution for the nominal and ordinal variables.
Calculating common summary measures (e.g., mean, median, mode, standard deviation, variance) for the interval or ratio variable.
Interpretation: Provide an interpretation of your findings. What can you infer from the distribution and summary measures? How does the type of data (nominal, ordinal, interval/ratio) influence the kind of analysis you can perform and the insights you can gain?
Reflection: Discuss the importance of understanding the type of data and appropriate descriptive statistics in data analysis.
Submission Format: Your submission should be a maximum of 500-600 words. Submit your assignment in APA format as a Word document or a PDF file. Include both your written analysis and any visualizations or tables that support your findings. If you use any software for your calculations (like R, Python, Excel), please include your code or formulas as well.
Q1- What equipment and protocols are required for establishing network enterpris
Q1- What equipment and protocols are required for establishing network enterprise architectures/security architectures? Provide 2-3 examples and discuss how they provide layered security.
Q2- Voice over IP (VoIP) is a central system that manages phones within an enterprise. What advantages does VoIP provide companies in maintaining security?
1. Concerning security assessment, discuss the aspect of internal, external, and
1. Concerning security assessment, discuss the aspect of internal, external, and third-party testing minimum requirements.
> Your assessment should address online vulnerability, penetration testing, code review, interface testing, and other topics.
2. Regarding online managing security operations, discuss the elements of asset inventory, asset management, configuration management, and explaining the need-to-know privileges and service level agreement.
Need 5-6 pages with peer-reviewed citations. No introduction or conclusion needed.