Diversity, Equity, and Inclusion Campaign

 

Scenario

You are newly appointed to the communications team for a reputable, multi-faceted philanthropic organization, Momentum for Better. The current task for your team is to create a brand-new campaign that promotes Diversity, Equity, and Inclusion. To kick off this campaign, you have been asked to develop a mood board presentation and written summary that you will present to leadership at the upcoming annual meeting.

You are reminded that a mood board is a deliverable—a collage of images, colors, patterns/textures, and text—that visually describes the intended look & feel of the campaign.

You DON’T need to be an artist or designer to create a mood board, but you DO need to have a keen understanding of what various visuals communicate and how they make people feel. Keep in mind the various ways that you analyzed and evaluated visuals throughout this course.

Instructions

Mood Board Presentation

  1. First, create a Microsoft PowerPoint presentation. Your presentation will need to have the slides listed below clearly labeled.
  2. Visually compelling title slide
  3. Colors and Patterns
  4. Logos, Ethos, Pathos
  5. Graphics
  6. Delivery Methods
  7. Memes
  8. Second, think about the overall look & feel that you want the campaign to have. Then, search the web for examples of the kinds of images, graphics, colors, and patterns/textures that you have in mind.
  9. Third, copy and paste those images, graphics, etc., into the appropriate slides of your Microsoft PowerPoint presentation. You must have at least four (4) images per slide, except for the Memes slide, which just needs two (2). The images should fill up as much of the slide as possible but DON’T stretch or squish the images. Here is more detail about the types of images you need to include in the slides.
  10. Visually compelling title slide
  11. Include one main image and a title for your presentation.
  12. Include the organization’s name, Momentum for Better.
  13. Colors and Patterns
  14. Your color scheme must feature two colors.
  15. Images of color swatches or things that are your chosen colors (e.g., fire engine red, canary yellow, etc.).
  16. Patterns or textures that feature strong use of lines (e.g., stripes, swirls, borders, plaid, etc.).
  17. Logos, Ethos, Pathos (choose one main rhetorical approach)
  18. Photos of people that signify your chosen rhetorical approach.
  19. Photos must include people of various genders, ethnicities, and ages.
  20. Graphics
  21. Logo and/or symbol graphics that convey diversity, equity, and inclusion.
  22. Delivery Methods
  23. Images of two (2) chosen delivery methods for spreading awareness about the campaign. For example, if you want social media to be one of the options, then include photos of a person using social media.
  24. Memes
  25. Create two (2) positive, inspiring memes that fit the overall message of Diversity, Equity, and Inclusion. Don’t make the memes funny, satirical, or divisive.
  26. You can only use public domain or Creative Commons licensed images. You CAN’T use images from movies, shows, comics, books, video games, etc.
  27. You may use PowerPoint, Canva, Adobe Express, Microsoft Paint, or any other app to create the memes. Save them as a JPG or PNG file, then insert them into your PowerPoint presentation.
  28. Fourth, as you develop the visually compelling title slide and all the other slides, you need to demonstrate your understanding of visual presentation. In other words, your slides need to be aesthetically pleasing with good visual connectivity.

Written Summary

Once you’ve finished creating your mood board presentation, you need to write a detailed summary explaining why you chose the visuals that you did. Your summary should include the following:

  1. In a Microsoft Word document, use APA formatting. The title on your title page must match the title slide of your mood board presentation.
  2. Your introductory paragraph must explain your overall intended look & feel for the campaign and how it will communicate Diversity, Equity, and Inclusion. For example, will it be serene, energetic, serious, or something else?
  3. Include section headings in your summary, and these must match the slide labels from your mood board presentation.

Each section must contain 2–3 full paragraphs explaining your chosen images in detail. Keep in mind how you’ve analyzed and evaluated visuals throughout this course. Connect them to the overarching message of Diversity, Equity, and Inclusion. You’ll be graded on your ability to defend your choices and clearly articulate your analysis.

Submit a PowerPoint presentation (PPTX) and Microsoft Word document (DOCX).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Investigation 3 – Digital Forensics Report

Purpose

In this assignment, you will examine a forensic disk image for evidence of coupon forgery creation. Read the scenario document carefully, as you may consider it interview notes with your client. This represents a more complex scenario than Investigation 2 and thus contains a greater degree of irrelevant data. Be sure to give yourself plenty of time to perform the examination and be sure to take advantage of Autopsy’s features to assist your disambiguation. 

Instructions

You’ll need to use the following resources to complete the assignment:

  • Investigation 03 Sample Evidence*
  • Autopsy the open-source forensic suite* (or another suite, such as EnCase or FTK.)
  • (Optional) Download and use the report template (See the Investigation and Forensics Challenge module for the templates)

*Accessed via the Virtual Lab.

After reading the Investigation 3 Scenario, open your forensic tool and import the sample evidence into the case. Begin a forensic report to document your examination.

Scenario

This scenario takes place circa 2013.

As part of normal business practice, Walmart security receives Counterfeit Coupon Alerts from the Coupon Information Corporation. Within the past month, Walmart security has received specific information regarding fraudulent coupons being passed at their store. Using the received information, they conducted an internal investigation using video surveillance footage in an effort to identify the customers who are engaged in this activity.

One of the suspects was an unknown white, male adult, approximately 28 years old, brown hair, 5′ 9″, 200 pounds, no facial hair, and no visible tattoos. A photograph of this suspect was circulated to the employees in the store.

On December 22, 2013, Craig Tucker was detained by Walmart security as he matched the description, and he had just passed two fraudulent coupons for Monster energy drink and Arizona Iced Tea beverages while paying for other items. Walmart security contacted the Santa Monica Police Department to arrest and prosecute Tucker for theft. Santa Monica PD Officer Smith interviewed Tucker, and he denied knowing the coupons were fraudulent. He claimed to have received the coupons after completing an online survey for students at Santa Monica Community College.

Although Tucker gave consent to the search of his personal computer, a search warrant was obtained to search his computer for evidence as it may be an instrument to committing a crime. You have been given a forensic image of his hard drive. Based on your review of the search warrant, you are authorized to search for any information or communication associated with the creation, downloading, distribution, and possession of fraudulent consumer coupons.

Questions

1) Can we find any digital artifacts indicating recent activity related to coupon fraud, such as temporary files, cache, or registry entries?

2) Are there indications on Tucker’s computer of tools or files used for creating or altering coupons, and evidence in communications of Tucker distributing or discussing fraudulent coupons?

3) Was Craig Tucker communicating with anyone regarding these coupons? 

4) How did Craig know these could be used at Walmart (as there is no indication of this on the coupons themselves)?

5) How long has Craig Tucker been using these coupons? When was the first instance?

6) Is there any evidence to suggest that Tucker visited any websites or other online platforms that are linked to the distribution of fake coupons?

7) Do the file creation or modification dates align with the time Tucker allegedly obtained the coupons?

Format

You can submit your forensic report in Adobe PDF format. It should be a complete report. A template has been provided if you need help, but be aware that not all sections shown in the template will be relevant to this investigation:

  • Upload one file (PDF).
  • Your forensic report should include a cover page and a page dedicated to answering the accompanying questions at the end.
  • You may include screenshots or other evidence to support your conclusions, but a screenshot is not a shortcut to a complete report.

Grading and Submission

In brief, I’ll be evaluating you on the following:

  • Forensic Reporting
  • The report is complete and contains only the truth.
  • Examination Process
  • Your examination is fully documented and uses accepted practices.
  • Identifying Evidence
  • While you are not expected to find every relevant evidence item, you should discover enough to adequately support the conclusions in your report.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Itcc 6

 

Freezing Panes & View Options – Challenge activity

  1. Follow the instruction given here 
    • Freeze First Column and use the horizontal scroll bar to look at sales from 2015.
    • the first column.
    • Select cell G17 and select Split to split the worksheet into multiple panes. Hint: This should split the worksheet between rows 16 and 17 and columns F and G.
    • Use the horizontal scroll bar in the bottom right of the window to move the worksheet so that Column N, which contains data for January 2015, is next to Column F.
    • Open a new window for your workbook, and select the 2012-2013 Sales
    • Move your windows so they are side by side. Now you’re able to compare data for similar months from several different years.
  2. Use the file provided on the site. Create a screen shot of your edited document and paste it in Word before saving. Save as YourName_FreezingAndView.docx

30

Sorting Data – Challenge activity

  1. Follow the instruction given here
    • Selecct Challenge in the bottom-left of the workbook.
    • For the main table, create a custom sort that sorts by Grade from Smallest to Largest and then by Camper Name from A to Z.
    • Create a sort for the Additional Information section. Sort by Counselor (Column H) from A to Z.
  2. Use the file provided on the site. Create a screen shot of your edited document and paste it in Word before saving. Save as Sorting.docx

15

Filtering Data – Challenge activity

  1. Follow the instructions given here
    • Select Challenge in the bottom-left of the workbook.
    • Apply a filter to show only Electronics and Instruments.
    • Use the Search feature to filter item descriptions that contain the word Sansei. After you do this, you should have six entries showing.
    • Clear the Item Description filter.
    • Using a number filter, show loan amounts greater than or equal to $100.
    • Filter to show only items that have deadlines in 2016.
  2. Put your name on the file and screen shot the document showing your name. Paste the screenshot into Word before saving as YourName_Filtering.pdf. (Be sure to save it as a PDF file.)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 assignments & 1 Project paper

Discussion – 1 Page (info security & Risk Management )

Assignment – 1-2 pages. ( answer the questions) – (intro to data mining)

Project 3 – 4-5 pages – (info security & Risk Management )

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IMPACT OF IT -Disc 2

Data flows freely throughout the internet, corporate, and commercial networks. Privacy has become paramount to businesses big and small. Understanding privacy concerns and where they come from is important you as a student, individual, employee, etc.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources. 

Topics:

  • What is freedom of surveillance? How does it apply to you at your place of employment? Are there exceptions?
  • What is an inadvertent leak of information? How has it affected the adoption of technology?
  • How do businesses benefit from search engines?
  • Should we allow facial recognition at sporting events? What about shopping malls?
  • How much should a user post on social media? Why?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

COMPUTER SECURITY FUNDAMENTALS -2

 

Week 2 discussion topic

1) Computer security is essential to the protection of personal information and your company’s intellectual property. Please name some common procedures companies use to prevent business assets. Make sure to use real examples and share any resources you have studied? 

2) What is NIST 800-115. Explain how it works?  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

excel independent project 6-5

 

Independent Project 6-5

Windows   Mac

Classic Gardens and Landscapes counts responses to specialty promotions to determine effectiveness. You use SUMIFS and an IFS formula to complete the summary. You also calculate insurance statistics and display full names in one cell.

[Student Learning Outcomes 6.1, 6.2, 6.3, 6.6, 6.7]

File Needed: ClassicGardens-06.xlsx (Available from the Start File link.)

Completed Project File Name: [your name]-ClassicGardens-06.xlsx

Skills Covered in This Project

  • Nest MATCH and INDEX functions.
  • Create DSUM formulas.
  • Build an IFS function.
  • Build SUMIFS formulas.
  • Use TEXTJOIN to join labels.
  1. Open the ClassicGardens-06 start file. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
  2. Create a nested INDEX and MATCH function to display the number of responses from a city.
    1. Click the Mailings sheet tab and select and name cells A3:D28 as Responses.
    2. Click the Mailing Stats sheet tab.
    3. Click cell B21 and type Carthage.
    4. Click cell C21, start an INDEX function, and select the first argument list option.
    5. Choose or type the Responses range name for the Array argument.
    6. Click the Row_num box and nest a MATCH function. Select cell B21 for the Lookup_value and cells A3:A28 on the Mailings sheet for the Lookup_array. Click the Match_type argument box and type 0.
    7. Click INDEX in the Formula bar. Click the Column_num box and nest a second MATCH function to look up cell D3 on the Mailings sheet in the lookup array A3:D3.
    8. Click the Match_type box and type 0 (Figure 6-106) and click OK. The result displays as 343.00.MATCH statements are the row_num and col_num arguments.Figure 6-106 Nested MATCH and INDEX functions
    9. Format the results to show zero decimal places.
    10. Type Smyrna in cell B21.
  3. Use DSUM to summarize mailing data.
    1. Select the Mailings sheet and note that number mailed is located in the third column and response data is in the fourth column.
    2. Click the Criteria sheet tab. Select cell B2 and type lan* to select data for the Landscape Design department.
    3. Type law* in cell B5 for the Lawn & Maintenance department.
    4. Type pat* in cell B8 for the Patio & Furniture department.
    5. Click the Mailing Stats sheet tab and select cell B7.
    6. Use DSUM with the range name Responses as the Database argument. Type 3 for the Field argument (# Mailed column), and enter an absolute reference to cells B1:B2 on the Criteria sheet as the Criteria argument.
    7. Copy the formula to cell C7 and edit the Field argument to use the fourth column (# Responses).
    8. Use DSUM in cells B8:C9 to calculate results for the two remaining departments.
  4. Use SUM in cells B10:C10.
  5. Format all values as Comma Style with no decimal places.
  6. Create an IFS function to display a response rating. Note: If your version of Excel does not include the IFS function, build the following nested IF function =IF(C7/B7>=20%,$C$15,IF(C7/B7>=15%,$C$16,IF(C7/B7>=11%,$C$17,$C$18))) to display the rating.
    1. Click cell D7. The response rate and ratings are shown in rows 14:18.
    2. Start an IFS function and select C7 for the Logical_test1 argument. Type / for division and select cell B7. Type >=20% to complete the test.
    3. Click the Value_if_true1 box, select C15, and press F4 (FN+F4) (Figure 6-107).Each logical_test argument has a corresponding value_if_true argument.Figure 6-107 First Logical_test and Value_if_true arguments
    4. Click the Logical_test2 box, select C7, type /, select cell B7, and type >=15%.
    5. Click the Value_if_true2 box, click cell C16, and press F4 (FN+F4).
    6. Complete the third and fourth logical tests and Value_if_true arguments (Figure 6-108).Several arguments are scrolled out of viewFigure 6-108 Completed IFS function arguments
    7. Copy the formula in cell D7 to cells D8:D10.
  7. Use SUMIFS to total insurance claims and dependents by city and department.
    1. Click the Employee Insurance sheet tab and select cell E25.
    2. Use SUMIFS with an absolute reference to cells F4:F23 as the Sum_range argument.
    3. The Criteria_range1 argument is an absolute reference to cells E4:E23. The Criteria1 argument is bre* to select the city of Brentwood.
    4. The Criteria_range2 argument is an absolute reference to cells D4:D23, the department column, with criteria of lan* to select the Landscape Design department.
    5. Click OK. The result for cell E25 is 10.
    6. Build SUMIFS formulas for cells E26:E28 based on the criteria displayed in cells C26:C28.
    7. Format borders to remove inconsistencies, if any, and adjust column widths to display data.
  8. Use TEXTJOIN to display names. Note: If your version of Excel does not include the TEXTJOIN function, use CONCAT or CONCATENATE to build the function.
    1. Click the Full Names sheet tab and select cell E4.
    2. Start a TEXTJOIN function and press Spacebar for the Delimiter argument.
    3. Click the Text1 box and select cell C4.
    4. Complete the Text2 and Text3 arguments to show middle and last names and click OK (Figure 6-109).The quotation marks display when you move to the next entry box in the list.Figure 6-109 Delimiter is a space
    5. Copy the formula to display full names in column E.
  9. Save and close the ClassicGardens-06 Excel workbook (Figure 6-110).Completed worksheets for Excel 6-5

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cybersecurity 14

 

Create a one-page document of a personal disaster recovery procedure for your home computer. Be sure to include what needs to be protected and why. Also include information about where your data backups are stored and how they can be retrieved. Does your DRP show that what you are doing to protect your assets is sufficient? Should any changes be made?

Include in your plan, several good online backup services can help make data backup easy for the user. Use a search engine to search for online backup service reviews, and select three different services. Research these services and note their features. Create a table that lists each service and compare their features. Be sure to also include costs. Which would you recommend? Why?

Also consider, although not as full-featured as online backup services, several free synchronization storage tools allow users to back up data by synchronization: when you place a file in a designated folder, it is automatically stored to the remote site. Several of these sites offer free storage from 5 GB to unlimited space. Use a search engine to search for free cloud synch storage, and select three different services. Research these services and note their features. Create a table that lists each product and compare their features. Be sure to include storage space limits. How do they compare to online backup services? Which would you recommend? Why?

Write at least a one-page document of a DRP, include the use of online backup services (paid/free) and the table that list and compare the backup services. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cybersecurity 15

 

Create your own acceptable use policy (AUP) for the computers and network access for your school or organization. Make sure to cover computer use, Internet surfing, email, web, and password security. Compare your policy with those of other students in the class. Finally, locate the acceptable use policy for your school or organization. How does it compare with yours? Which policy is stricter? Why? What changes would you recommend in the school’s or organization’s policy?

Include, security awareness and training available at your school or place of business? How frequently is it performed? Is it available online or in person? Is it required? Are the topics up-to-date? On a scale of 1–10, how would you rate the training?

Write a one-page paper on your findings.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Interaction Framework Research

 

Part 1: Interaction Framework Research

Complete the unit reading and then research Norman’s execution/evaluation action cycle to complete this part of the assignment. Locate one other source about the framework. Use this other source (not the textbook) as the basis for this part of your paper.

In one paragraph:

  • Describe the main parts of Norman’s execution/evaluation framework and summarize other information provided in your source related to this framework. This might be an example, its uses, or its shortcomings.
  • Pick a sample process and explain how each step or phase would be applied to your example.
  • Do not quote; write only in your own words.
  • Include an in-text citation for your source.
  • Minimum length is 130 words.

Part 2: Device Assessment

Select a computing device that you use often. Choose a cell phone, ebook reader, or tablet. Then write an evaluation, answering the following questions in your own words (do not use source material for this part):

For your first paragraph:

Overview

  • Identify the device and its purpose, intended user, and typical location for use (if any). Include an image of the device you selected.

For your second paragraph:

Mapping

  • Explain how easy it is to determine possible actions on this device.
  • Explain the mapping from intention to physical movement on the device.

For your third paragraph:

Use by the novice

  • Explain what you think might be the novice user’s understanding between the system state and their interpretation of that state.
  • Describe possible confusion that might arise for novice users.

Write in your own words, write in full sentences, and do not copy the instructions. The minimum length requirement for this part of your assignment is 150 words.

Part 3: Gulf of Execution

What is a gulf of execution? Why is it important to minimize in the electronic world? Some simple additional research online may help clarify the gulf of execution and its importance in interface design.

In 1 paragraph and in your own words:

  • Define gulf of execution.
  • Give an example of how this might present itself in the workplace. The example must reflect a gulf of execution from a digital device.
  • Write at least 60 words, and do not use source material for this part. Write from experience and your understanding of the reading material.

Part 4: Mental Models

The textbook describes mental models. You know that they rely on the user’s human perception.

In 1 paragraph and in your own words:

  • Explain and give details about why it is still important to consider mental models in interaction design.
  • Write at least 60 words, and do not use source material for this part. Write from experience and your understanding of the reading material.

Part 5: Applying the concepts.

List 2 groups of software/website users that have special needs.

  • For each group, suggest a way that interfaces could be improved.
  • How could using Norman’s execution/evaluation action cycle when considering these groups help with design?
  • How could the use of mental models help?
  • Write at least 100 words. Write from experience and your understanding of the human computer interaction and the limitations within the interface. Cite any references that are used.

Provide a final page of properly formatted APA reference entries.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now