I need help with my computer class

  21FA CGF32 LECTURE INFO 1120 Microcomputer Applications |  

 Access 2019 Skills Approach – Ch 3 Challenge Yourself 3.3 

 

  1. Open the start file AC2019-ChallengeYourself-3-3.
  2. If the database opens in Protected View, click the Enable Content button in the Message Bar at the top of the database so you can modify it.
  3. Create a new query named: GreenhouseTechsFT
    1. Add all the fields from the Employees table.
    2. The query should list all employees whose Position begins with the word greenhouse and whose weekly hours are greater than or equal to 20. Hint: Include a wildcard character in the criterion for the Position field.
    3. Modify the query design so results are sorted alphabetically by last name.
    4. Add the MaintenanceLog table to this query and include the MaintenanceDate field after the WeeklyHours field.
    5. Run the query to review the results. There should be 16 records in the results.
    6. Save and close the query.
  4. Export the GreenhouseTechsFT query to an Excel spreadsheet.
    1. Name the Excel file: GreenhouseTechsFT
    2. Include formatting and layout.
    3. Save the export steps with the name: GreenhouseTechsFTExport
  5. Create a new query named: NewPlants.
    1. Add all the fields from the Plants table except ScientificName.
    2. The query should list all white or blue colored plants whose DatePlanted is greater than or equal to 1/1/2019.
    3. Modify the query design so results are sorted by values in the DatePlanted field with the newest plants listed first.
    4. Run the query to review the results. There should be three records in the results.
    5. Save and close the query.
  6. Export the NewPlants query to a text file.
    1. Name the text file: NewPlants
    2. Use Tab as the delimiter.
    3. Include the field names in the first row.
    4. Save the export steps with the name: NewPlantsExport
  7. Create a new query named: RedPlantSale
    1. Add the following fields from the Plants table to the query: CommonName, PrimaryColor, PurchasePrice
    2. Select only those plants with a red color, but don’t show this field in the query results.
    3. Add a calculated field that displays a sale price that is 75 percent of the purchase price. Hint: Use an expression that calculates the value of the PurchasePrice field multiplied by 0.75. Use the name SalePrice for the new field.
    4. Run the query to review the results. There should be five records in the results.
    5. Save and close the query.
  8. Use the Find Unmatched Query Wizard to create a new query that identifies the plants that have no entry in the MaintenanceLog.
    1. Include all fields from the Plants table except the PlantID.
    2. Name this query: PlantsMissingMaintenance
    3. Review the query results. There should be 15 records in the results.
    4. Close the query.
  9. Create a new parameter query named: PlantsByColor
    1. Add the following fields from the Plants table to the query: CommonName, PrimaryColor, DatePlanted, PurchasePrice
    2. Configure the PrimaryColor field so the user is prompted to enter the primary plant color with this message: Enter plant color
    3. Test the query using the color violet. There should be three records in the results.
    4. Save and close the query.
  10. Open the MaintenanceLog table. Apply a filter that shows only those plants that have been watered and pruned. Close the table. There should be one record in the results.
  11. Close the database and exit Access.
  12. Upload and save your project file.
  13. Submit project for grading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

300 words

 

Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.

Write a short paper, 200-300 words, using WORD 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Term Paper

Topic: Dynamic Host Configuration Protocol (DHCP)

The term paper should include the following:

1. Introduction: Which introduces your topic and provides an overview

2. Detailed Description: Which describes your topic in detail

3. State-of-the-Art applications: (if any), which describe important applications of your topic. For example, “Wireless Sensor Networks” have many important applications in environmental monitoring and in military domains. Again, “Fog Computing” has important applications for providing real-times services to system such as networked autonomous vehicles. You can provide an overview of such applications depending on your topic.

4. Results: Which, as appropriate based on your topic, describe important result/observations and provide insights

5.Summary: Which summarizes the key points of the report

6. References: Which cite the literature/sources your term paper builds on

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Responses week 1

Provide (4) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1, 2, 3 and 4 below. Ensure you list and break down each response in a word document. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

ISSC 471

1. What is IT Security Auditing? What does it involve?

An IT security audit is a comprehensive examination and assessment of an information security system. By conducting regular audits, organizations can identify weak spots and vulnerabilities in their IT infrastructure, verify security controls, ensure regulatory compliance, and more. It involves running scans on IT resources like file-sharing services, database servers and SaaS applications to assess network security, data access levels, user access rights and other system configurations. It includes physically inspecting data centers for resilience to fires, floods, and power surges as part of a disaster recovery evaluation. Finally, it involves interviewing employees outside the IT team to assess their knowledge of security concerns and adherence to company security policy.

2. Why are Governance and Compliance Important?

To ensure that businesses protect their information, have consistent cohesion departmentally, and follow all governmental regulations, a governance, risk, and compliance program is important. This helps to minimize the threats and risks that companies are exposed to on a daily basis.

3. Explain in detail the roles and responsibilities in an organization associated with the following:

According to our lesson, the risk manager, auditor, and executive manager have the following responsibilities:

  • Risk Manager – responsible      for identifying organizational risk.
  • Auditor – responsible for      conducting information assurance audit and applying frameworks to the      seven domains to align with compliance.
  • Executive Manager – responsible      for aligning external or internal compliance with governance requirements.

4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.

It is my understanding that the C&A process is outdated, and we now use assessment and authorization (A&A) to follow terminology in the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). In my job, we follow NIST guidelines, and all of our accreditation processes follow the RMF process. The C& process was initiation and planning, certification, accreditation, and then continuous monitoring. Though I never worked with the C&A process, I have been working with RMF for about 2 years now, and it is very involved.

References:

Tierney, M. (2020, Aug 5) IT Security Audits: The Key to Success. Retrieved from: https://blog.netwrix.com/2020/04/09/it-security-audit/

Hall, K.T. (n.d.) Why a Governance, Risk, and Compliance Program is Important for Your Business. Retrieved from: https://www.scripted.com/writing-samples/why-a-governance-risk-and-compliance-program-is-important-for-your-business

Sengupta, S. (2018, Apr 13) Cyber Security – Certification and Accreditation. Retrieved from: https://www.nxtkey.com/cyber-security-certification-and-accreditation

-JAMIE

RESPONSE 2:

1. What is IT Security Auditing? What does it involve?

According to the reading this week an IT Security Audit is an internal assessment of an organizations policies, controls, and activities. An audit ensures that an organization is in compliance with legal regulations and that their security controls are adequate. Audits can involve any number of aspects within a business’ activities including finances, compliance, operations, investigations and information technology. An IT Security Audit also involves three goals, providing an objective and review of policies, providing reasonable assurance controls are in place, and recommendations for improvement.

 2. Why are Governance and Compliance Important?

As businesses become ever more reliant on technology governance and compliance become a more integral part of business function. Governance of IT systems ensures proper use as well as compliance and risk management, all vital to the success in a business environment. Compliance is important and beneficial to all aspects of a business, it ensures the reliability as well as public trust of a business which is vital to the business’ success.

 3. Explain in details the roles and responsibilities in an organization associated with the following:

   Risk Manager- A risk manager is familiar with the risks and vulnerabilities that an organization faces, as well as creating and evaluating risk management procedures. They are also responsible for knowing auditing controls as well as reporting procedures (Patel, 2016)
    Auditor- The roles and responsibilities of an auditor include assessing current security controls and risk management procedures, advise management on how to improve security controls, evaluate risks, and analyze internal operations (Kumar, 2017)
    Executive Manager- The Executive Manager is responsible for ensuring their department is aligned with company vision and goals. They help to create and implement policies and procedures, and they make business decisions, such as security policy changes, based on the information received from the risk manager and auditor (Woodman, 2018)

4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.

The Certification and Accreditation process is a standardized process, activities, and management to validate, implement and ensure security. The phases of the C&A process include Phase I Initiation and Planning: Which defines the C&A effort, it documents the steps needed to achieve the desired accreditation. Phase II Certification: This phase verifies system compliance with the identified security standards. Phase III Accreditation: Here validation is made that the system is compliant and security accreditation is achieved. Phase IV Post Accreditation: This phase continuously monitors the system to ensure it remains compliant with accreditation standards (QTS, 2019).

Alysha Macleod

Kumar N. (2017) Roles and Responsibilities of an Internal Auditor. EnterSlice

https://enterslice.com/learning/roles-and-responsibilities-of-internal-auditor/

Patel N. (2016) A Risk Manager’s Role in Strategic Leadership. NIC State.

https://erm.ncsu.edu/library/article/risk-manager-strategic-leadership

QTS. (2019) The Four Phases of the Certification and Accreditation Process. QTS

https://www.qtsdatacenters.com/resources/articles/the-four-phases-of-the-certification-and-accreditation-process

Woodman C. (2018) Job Description of an Executive Manager. Career Trend

https://careertrend.com/about-6507018-executive-manager-job-description.html

ISSC 341

RESPONSE 3:

There are 7 layers to the Open Systems Interconnection (OSI) model, but I will be discussing layers one and two. The first layer, physical layer, is responsible for the physical cable or wireless connection between the network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices, and is responsible for transmission of raw data (Os and 1s). The second layer, data link layer, establishes and terminates a connection between two physically connected nodes on a network. It is comprised of two parts, Logical Link Control (LLC) which identifies protocols and performs error checking/synchronizes frames. Media Access Control (MAC) uses MAC addresses to connect devices and define permissions to transmit and receive data.

           IPv6 is the latest version of internet protocol and was introduced in 1998 by the Internet Engineering Task Force (IETF) to solve address space exhaustion. IPv6 uses 128-bit addressing instead of IPv4 32-bit addressing scheme. What that means is IPv4 address method uses four sets of one-to-three-digit number (192.0.2.146), and IPv6 uses eight groups of four hexadecimal digits (2001:0db8:85a3:0000:0000:8a2e:0370:7334). While IPv6 may seem more secure and will eventually replace IPv4 one day, the adoption of it has been delayed because there’s a dual stack requirement. IPv6 is not backwards compatible with IPv4. There is a problem with the network address translation (NAT), which takes private IP address and turns them into public IP addresses.

           IPv4 allows for a variation of the network and host segments of an IP address, known as subnetting. It can be used to design a network physically and logically. Subnetwork addresses enhance local routing capabilities, while reducing number of address required. The subnet mask is used to show what part of the addresses is the network portion and what part is the host portion. In IPv4, there are 3 default subnet masks corresponding to three classes of IP address.

           Hope everyone is having a great start to their week!

Regards,

Al

Works Cited:

McKeever, G., Sillam, Y., R.M., Hathaway, M., Houcheime, W., P.W., Kerman, D., Lynch, B., Hewitt, N., & Ray, T. (2020, June 10). What is OSI Model | 7 Layers Explained | Imperva. Learning Center. https://www.imperva.com/learn/application-security/osi-model/

Fruhlinger, K. S. A. J. (2020, August 26). What is IPv6, and why aren’t we there yet? Network World. https://www.networkworld.com/article/3254575/what-is-ipv6-and-why-aren-t-we-there-yet.html

Google IPv6 adoption Statistics. (2020). IPv6. https://nfware.com/blog-what-is-ipv6

IPv4 subnetting. (2021). IPv4 Subnetting. https://www.ibm.com/docs/en/zos/2.4.0?topic=internetworking-ipv4-subnetting

-ALI

RESPONSE 4:

1. For this discussion, compare and contrast two layers of the Open Systems Interconnection (OSI) Reference Model, including the protocols that run on each layer. 

The Open Systems Interconnection (OSI) Reference Model consist of 7 layers and they are from top to bottom application, presentation, session, transport, network, data link and physical. The architecture of the OSI reference model is separated into 7 layers so it aids in development, design, and troubleshooting and provides changes in one layer without effecting the other therefor all layers are equally important. These 7 layers of OSI reference model are divided into 2 groups upper (top 3 layers) and lower layers (bottom 4 layers). The upper layers define communication between the applications of the end users and the lower layers define how the data is transmitted between the two applications. Common protocols used in the layers are TCP, IP/IPX and Ethernet for the lower group and for the upper group HTPP, SSL and RPC just to name a few. 

2. What was the reason that IPv6 was introduced? Why do you think many organizations are not

upgrading their network solely to IPv6 and run that protocol instead of running IPv4?

IPv6 was introduced for its capacity over the IPv4, IPv4 is out of IP addresses and holds 4.3 billion addresses. With the growing devices like the smartphone, tablets, computer and other devices IPv4 was not able to support which gave birth to IPv6 which supports 128 bit addressing. Many organizations are not upgrading because IPv4 is enough for the company and because the internet at large doesn’t support IPv6 end to end there is a need to encapsulate IPv6 traffic into IPv4.

3. What is the purpose of subnetting when using IPv4 addressing? What role does subnet mask play in subnetting of IPv4?

Subnetting provides network security, better performance while providing clean separation for troubleshooting. Subnet mask plays important part of masking the IP address. Looking forward to reading other post and learning the role of IPv4 and 6 as my knowledge on the subject is limited. Have a good rest of the week.

References:

Imperva. (n.d.). What is OSI Model | 7 Layers Explained | Imperva? Learning Center. Retrieved from https://www.imperva.com/learn/application-security/osi-model/

PARR, B. (2011, February 03). IPv4 & IPv6: A Short Guide. Retrieved March 05, 2019, from Mashable:

https://mashable.com/2011/02/03/ipv4-ipv6-guide/#MFRFxeOnk

-TAVEN

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Own word, discussion

 After watching the videos, discuss at least two concepts you learned from the videos and provide at least one additional technical resource about conducted or wireless media to your classmates.Fibre (Fiber) vs Copper as Fast As Possible (Links to an external site.)Tri Band WiFi as Fast As Possible (Links to an external site.) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java Code

  1. Movie Class 10 POINTS
    Write a class named Movie that has fields to hold the following data:

    • Title
    • Studio Name
    • Year produced
    • Rating
    • In the Movie class, also include
    • A mutator (setter) method for each field to set the value for the field
    • An accessor (getter) method for each field to get the value for the field
    • Write a separate demo program (ex: HARDYL_J5B) that utilizes the class by creating three instances of the class and printing the info in them and test all methods in the class.
      Hints/Tips:
    • You’ll have one program (Movie) for the movie class, and the demo program (HardyL_J5B)
    • In the Movie class, define your fields, then your methods
    • In the demo program, instantiate
    • It took me about 30 minutes
    • Rubric:
    • Doesn’t have the class defined -10 (no credit for this part of the assignment)
    • Doesn’t have all the fields defined -.5 per field missing
    • Doesn’t display the result -1
    • Demo program doesn’t test the methods in the class -1
    • Missing demo program -4
  2. Using Java Two C, create a class called Order (ex: p351) that has the following fields:
    • entree A char that holds the person’s burger order
    • drink A char that holds the person’s drink order
    • dessert A char that holds the person’s dessert order
    • The class should have the following methods defined:
    • default constructor – Sets all values to blank
    • Constructor#2 – Accepts an order’s entrée, drink, and dessert selection
    • setEntree – Accepts a char argument that is copied to the entrée field
    • setDrink – Accepts a char argument that is copied to the drink field
    • setDessert – Accepts a char argument that is copied to the dessert field
    • getEntree – Returns the value in entrée
    • getDrink – Returns the value in drink
    • getDessert – Returns the value in dessert
    • getPrice Returns the price of the three items in the order
    • Write a demo program (ex: HARDYL_J5D) that instantiates three people’s orders.  Allow the user to enter the orders.  Display each person’s order price and a total for the entire bill. 
      Example:
      Person #1            $7.00
      Person #2            $8.50
      Person #3            $10.25
      Total                    $25.75Hints/Tips:
    • Your output can look like the example, or you can change it, but make it clear. For example, you might have a column heading for Person and put #1 under the heading.
    • You can also use different field & method names but call your class Order.
    • You do not have to return the description for the selections.
    • Get price will have the same code used in Java 2D, except for description
    • The demo program will have similar code to Java 2D, but you do it 3 times.
    • Don’t worry about validating the input values (you should in business, but I don’t want this to be too complicated/time-consuming for you).
    • Be sure your demo program tests all methods of the class. For one person, get all the values and pass them all back. For another person, instantiate the order, then set the individual values one at a time.
    • When formatting output, you might have to use multiple tabs (\t) to align the data.
    • It took me about 35 minutes
    • Rubric:
    • Doesn’t create Order class -10 (no credit for this part of the assignment)
    • Doesn’t create a Demo program -5
    • Doesn’t have all the class fields -1/per field (3)
    • Doesn’t have all the class methods -.5/per method (9)
    • Doesn’t calculate price -2
    • Doesn’t display results -3
    • Doesn’t display correct total -1

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Crypto – History

In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history. 

1000 words 

You must use a minimum of three scholarly articles to complete the assignment. 

 The assignment must be properly APA formatted. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

permutation

 

Suppose we count a word as having 3 letters. How many “words” can be made from the 26 letters in the English alphabet? 

We know that this is permutation (order matters)  since “its” and “tis” are different words. Note the formula for permutations is n!(n−r)!n!(n−r)! using ‘n’ different things taken ‘r’ at a time

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment and Discussion

 

Week Three Assignment

Do a bit of research on CWE, Common Weakness Enumeration.Write a brief overview of their scoring system.Pick one of common weaknesses identified on their site and describe it.
Your assignment should be 200-300 of your own words. 

 Week Three Discussion

Read the section in this week’s reading assignment on secure passwords.

Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure.t

Read and respond to at least two other students Discussions.

Post between 200 and 300 words.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

project1

In this course you will prepare a project paper and summary presentation analyzing and evaluating the practical aspects of implementing information assurance change in an organization.  To begin your paper, review the systems security knowledge areas already selected for SyncSession Assignment1 (Security and Risk Management, Asset Security, Security Engineering, Communication and Network Security, Identity and Access Management, Security Assessment and Testing, Security Operations, Software Development Security).   From the best practices area selected that is of interest of you as the basis of this Project (Change Management Program), write a two-five page paper that includes the following:

  1. Domain where the need for change (your research problem) exists.
  2. Information Assurance best practice being evaluated or selected and the justification for the selection.  You can make a problem statement and justification.
  3. Summary paragraph of why you think it is important to study the change process as it relates to your selected Information Assurance best practice.  Be sure to address how the change process impacts your research problem.
  4. Annotated bibliographic references of three of the previous articles used in your analysis.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now