Computer Science homework help

For the GCFLearnFree Power Tutorials assignment I want you to complete the tutorials listed below. You are required to view the whole tutorial (do as much of the hands-on activities as possible) and do as many of the Challenges at the end of the tutorials as possible. You will need to create the presentation described below the list of tutorials. Completing this PowerPoint Assignment is worth 25 points. Computer Science homework help.
 
Before attempting this project you should cover the following tutorials in GCFLearnFree.org for PowerPoint 2016:

PowerPoint Basics

  1. Getting Started With PowerPoint
  2. Creating and Opening Presentations
  3. Saving and Sharing

Working with Slides

  1. Slide Basics
  2. Text Basics
  3. Applying Themes
  4. Applying Transitions
  5. Managing Slides
  6. Presenting Your Slide Show

    ORDER A PLAGIARISM-FREE PAPER NOW

Texts and Objects

  1. Lists
  2. Indents and Line Spacing
  3. Inserting Pictures
  4. Formatting Pictures
  5. Animating Text and Objects

More Objects

  1. Inserting Audio

Scenario:

Rochelle Waters is the owner of the ArtWorks Gallery in Largo, Maryland. The gallery exhibits art from local and national artists and works with corporations throughout the country to procure artwork for their buildings and offices. Rochelle is a graduate of the Prince George’s Community College in Largo, and occasionally visits classes to encourage students to pursue a career in the visual arts. She wants to create a presentation that briefly describes her gallery and explains how to submit art to be exhibited there. You will create this presentation for Rochelle by entering and formatting text, photos, and diagrams. Each students’ photos and images should be different, keep it fun and unique. Computer Science homework help.
Complete the following steps to create a presentation:

  1. Create a new, blank presentation using PowerPoint 2016 named ArtWorksXX where the XX are your initials and save it.
  2. On the title slide, enter ArtWorks: Contemporary Art Gallery as the title and your name as the subtitle.
  3. Add a new Slide 2 with the Title and Content layout, enter About ArtWorks as the slide title, and then in the content placeholder enter the following text:

Contemporary art
Historic neighborhood
Specializing in art for corporate settings
Rotating exhibitions
Lithographs
Paintings
Pastels
Photography
Sculpture

  1. Create a new Slide 3 with the Title and Content layout. Add Artists Seeking Representation as the slide title, and then enter the following text as a numbered list:

Create a CD or DVD of your images and send it to the gallery.
Include a brief biography and list of achievements.
Write “New Artist Submission” on the envelope.
Contact Rochelle Waters for more information.

  1. Create a new Slide 4 using the Two Content layout. Add For More Information as the slide title.
  2. Move the last numbered item on Slide 3 (“Contact Rochelle Waters for more information”) to the left content placeholder on Slide 4.
  3. On Slide 4, delete the bullet symbol or numbered list format from the text you moved, and then add the following text as the next two items in the unnumbered list: Computer Science homework help.

Email: rwaters@gmail.com
Phone: 301-546-2427

  1. Change the font size of the text on this and all slides to at least 30 points.
  2. Delete the text “for more information.” from the left placeholder, including the period. Add a new line with the text Gallery owner below the “Contact Rochelle Waters” line.
  3. In the right placeholder, insert a suitable image for Rochelle. Reposition the photo appropriately on the slide.
  4. Change the presentation theme to Frame and keep the default variant.
  5. Insert a new Slide 3 using the Title and Content layout.
  6. Move the “Rotating exhibitions” bullet and its sub-items from Slide 2 to the content placeholder on Slide 3. Its sub-items cover from Lithographs to Sculpture. Increate the font size of the bulleted list to 30 points. Move the “Rotating exhibitions” text to the title placeholder, and then edit the text so it appears as “Rotating Exhibitions”.
  7. Return to Slide 2 and change its layout to Two Content.
  8. In the right content placeholder, insert a suitable image for an art gallery.
  9. Return to Slide 3 and change its layout to Two Content.
  10. In the right content placeholder, insert a suitable image for a painting.
  11. Resize the photos appropriately on the slides.
  12. Check the spelling in the presentation, save the changes to the presentation, and then review the slide show in Slide Show, Presenter, and Reading views.
  13. Apply transitions to all slides and sound were effective.
  14. Save the presentation and submit it into the Blackboard assignment. Computer Science homework help.

Computer Science homework help

Assignment Content
A   Top of FormBased on the topic Administration and Validation of database. Create a 700-word minimum on Administration and Validation of Database Management Plan.
 

    • List the benefits of data administration compared to database administration.
    • Propose an effective data governance program.
    • Define the standards and approaches for the validation of database and application code. These include coding standards, expectations for what has been checked at each stage of testing (unit test, system test, user test), expectations for code review or inspection, etc.

 
B:  Based on your experience, and research, respond to the following in a minimum of 200 words: (1) Compare and contrast the roles of database administrators and data stewards in an organization; and (2) Describe what responsibilities each has in order to meet data management, quality, and governance standards?  Computer Science homework help.

ORDER A PLAGIARISM-FREE PAPER NOW

Computer Science homework help

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?
Present your discussion post as if you were presenting to senior leaders of your company. Computer Science homework help.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
Ask an interesting, thoughtful question pertaining to the topic
Answer a question (in detail) posted by another student or the instructor
Provide extensive additional information on the topic
Explain, define, or analyze the topic in detail
Share an applicable personal experience
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Make an argument concerning the topic.
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post. Computer Science homework help.

ORDER A PLAGIARISM-FREE PAPER NOW

Computer Science homework help

Provide a reflection of at least 500 words (2 pages double spaced excluding Title and Reference pages) that summarizes what you feel are the most important or interesting concepts you have learned so far in this Cloud Computing course.  Would be good to include an insight as to whether the learning was new to you or reinforced knowledge that you already had. Computer Science homework help.
Requirements:  Provide a 500-word (2 or more pages double spaced not counting the title and reference pages) paper.  The paper should include a title page, body pages, and reference page.  An abstract and introduction is not required for this assignment.  Correct use of APA guidelines for sources and citations is required. If supporting evidence from outside resources is used those must be properly cited.
Concepts covered so far:
 

  1. Introduction to Cloud Computing including History, Cloud Types, Uses, and Virtualization
  2. Software as a Service, Roles and Boundaries, Cloud Characteristics
  3. Platform as a Service, Infrastructure as a Service, Data Center Technology
  4. Identity as a Service, Identity and Access Management, Single Sign On, Cloud Based Security Groups, Hardened Servers
  5. Data Storage in the Cloud, Cloud Storage Device Mechanisms. Computer Science homework help.

ORDER A PLAGIARISM-FREE PAPER NOW

Computer Science homework help

Week 5 – Research Paper Bitcoin Economics
This week’s reading centered around Bitcoin Economics.  For this week’s research paper, search the Internet and explain why some organizations are accepting and other organizations are rejecting the use of Bitcoins as a standard form of currency.  Your paper needs to identify two major companies that have adopted Bitcoin technology as well as one that has refused accepting Bitcoin as a form of currency. Be sure to discuss each organization, how they adopted (or why they won’t adopt) Bitcoin, and what recommendations you have for them to continue to support Bitcoin (or why they should support Bitcoin).Your paper should meet these requirements: Computer Science homework help.

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing. Computer Science homework help.

ORDER A PLAGIARISM-FREE PAPER NOW

Computer Science homework help

  Write short answers, uploaded as a WORD DOCUMENT (300 to 400 words) and attach references

  • 4.1 List ways in which secret keys can be distributed to two communicating parties.
  • 4.2 What is the difference between a session key and a master key?
  • 4.3 What is a key distribution center?
  • 4.4 What entities constitute a full-service Kerberos environment?
  • 4.5 In the context of Kerberos, what is a realm?
  • 4.6 What are the principal differences between version 4 and version 5 of Kerberos?
  • 4.7 What is a nonce?
  • 4.8 What are two different uses of public-key cryptography related to key distribution?
  • 4.9 What are the essential ingredients of a public-key directory?
  • 4.10 What is a public-key certificate?
  • 4.11 What are the requirements for the use of a public-key certificate scheme?
  • 4.12 What is the purpose of the X.509 standard?
  • 4.13 What is a chain of certificates?
  • 4.14 How is an X.509 certificate revoked? Computer Science homework help.

ORDER A PLAGIARISM-FREE PAPER NOW

Computer Science homework help

Cryptography is designed to turn information into a format that is difficult to understand in an effort to keep information confidential. Cryptography has been used for centuries, with one cipher being associated with Julius Caesar. Especially over the last few decades, the use and complexity of cryptography has evolved significantly.
As cryptography became a digital security tool, how has its techniques and complexity changed over the last few decades? Conversely, how have cryptographic attacks evolved? How do you think cryptography will evolve in the future? Computer Science homework help.

ORDER A PLAGIARISM-FREE PAPER NOW

Computer Science homework help

  1. Hackers may be detected in standard computers, but it appears to be much harder to detect their presence in medical devices in a hospital (e.g., an infusion pump). Explain

 

  1. Hospitals generally keep network breaches to themselves”. Why do you think this true? You are about to be admitted to Ascension St. Joseph Hospital in Minnesota. Has it been breached? If so when and what happened? Is there a government reporting requirement? Computer Science homework help.

 

  1. The FDA has some responsibility for regulating medical devices. How did they respond to the problem found with the Hospira fusion pump identified by Rios in the Bloomberg article?

 
 

  1. Health care is considered an easy target for hackers. Why?

 

  1. Irish hospitals suffered a ransomware attack recently in May 2021. What effect did it have on the provision of health care services? Has it been resolved?

 
 

  1. CISA names health care as a critical infrastructure. What part of the government is responsible for managing the sector and where will you find the information on cybersecurity incidents in the sector?

 

  1. How would you define an IMD in your own words? Give five examples.

 
 

  1. Describe how an RPM works and what types of data might be being collecting and transmitting?

 

  1. What are the pros and cons for a hospital to use remote patient monitoring?

 

  1. You are a patient, and your hospital is recommending RPM. What do you see as the pros and cons for you the patient? Computer Science homework help.

ORDER A PLAGIARISM-FREE PAPER NOW

Computer Science homework help

Complete the following assignment in one MS word document:
Chapter 5 –discussion question #1-4 & exercise 6 & internet exercise #7
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Discussion question #1-4
What is an artificial neural network and for what types  of problems can it be used?
2. Compare artificial and biological neural networks. What  aspects of biological networks are not mimicked by artificial ones? What aspects are similar?  Computer Science homework help.
3. What are the most common ANN architectures? For  what types of problems can they be used?
4. ANN can be used for both supervised and unsupervised  learning. Explain how they learn in a supervised mode  and in an unsupervised mode.
exercise 6:
Go to Google Scholar (scholar.google.com). Conduct  a search to find two papers written in the last five years  that compare and contrast multiple machine-learning  methods for a given problem domain. Observe commonalities and differences among their findings and  prepare a report to summarize your understanding.
internet exercise #7
go to  neuroshell.com click on the examples and look at the current examples listed, the Gee Whiz example is no longer on the page.  Computer Science homework help.

ORDER A PLAGIARISM-FREE PAPER NOW

Computer Science homework help

The latest generation of mobile devices are portable enough to carry at all times, connected to voice and data networks, and contextually aware by using sensors and networks to preemptively complete tasks.  Many of today’s mobile applications are personalized, and are not useful if they can only access the data on the phone.  For a user to get, for example, sports scores, retrieve stock quotes, or perform accounting work, the mobile device needs to communicate with one or more servers, starting with the Window servers.

  • Discuss effective use of screen real estate
  • How does mobile user interface designs & websites reduce end-user self-efficacy?
  • What are the challenges of integrating mobile applications with multiple databases?  Computer Science homework help.

Note:

  • You must apply and use the basic citation styles of APA.
  • Use in-text citation and list the reference of your supporting source following APA’s style and formatting
  • Do not copy and paste information or concepts from the Internet and claim that is your work.  It will be considered Plagiarism and you will receive a zero for your work.

ORDER A PLAGIARISM-FREE PAPER NOW