Categories
Computer Science

Ribe 2 or 3 characteristics, protocols, or functions of each layer (i.e., what happens in each layer or what it does) in 1 or 2 paragraphs each.

ribe 2 or 3 characteristics, protocols, or functions of each layer (i.e., what happens in each layer or what it does) in 1 or 2 paragraphs each.

Categories
Computer Science

This should address: the problems encountered when tetra shillings accounting fell victim to a ransomware attack that resulted in the loss of critical data.

Your final project will be to design a training presentation to the client’s IT staff.
If you haven’t already done it last week,:
Download the Client Presentation Template to get started.
Review the Presentation Resources which may help you get started.
The presentation must meet the following requirements:
11 to 15 slides of easy-to-understand content (text and visuals). Remember, your audience is the IT team within an accounting firm.
voice annotation for every slide (excluding the reference slide)
at least two references
The presentation can incorporate screenshots from Project 2 along with additional screenshots as needed. Content should include work that needs to go into making the upgrade successful, how to improve security using two or three of the Windows 10 built-in features, and how-to backup and restore Windows 10 data using some of the tools available in Windows 10.
The presentation should address your recommendations for the following items:
Version Summary
Recommended version of Windows 10 (e.g., Windows 10 Pro, Enterprise, Pro Workstation) and specific reasons for your choice (e.g., security features, technical and business requirements).
Installation Methods
Explain Windows 10 deployment methods. Which method or methods you think will be appropriate for the upgrade? Consider the hardware specifications outlined in the project scenario.
Security Features
Windows Security, BitLocker, Defender, Local Security Policy
Backup and Recovery Overview
Discuss the importance of backing up and recovery of Windows 10. This can include explaining what types of files and data that can backed up and restored. This should address:
the problems encountered when Tetra Shillings Accounting fell victim to a ransomware attack that resulted in the loss of critical data.
the concerns that Tetra Shillings Accounting has concerning recovering data that is lost due to deletion, corruption, or media failure.
the ability to restore system files and settings without affecting the user’s personal files and data.
the concerns that the client has about recovering systems that are negatively impacted by an operating system update.
Backup and Recovery Tools
You will need to explain how to use Windows 10 backup and recovery tools to meet these objectives. Provide a brief overview of each tool and how it can be used to address the company’s concerns. Use screenshots to demo how to configure backups that address the firm’s need to recover from a ransomware attack and restore the system to a state before a Windows update, driver, or application was installed.
Backup to Recover from Ransomware Attack
Describe how to back up and restore individual files using the utilities available in Windows 10. This should provide the client the ability to restore files lost due to ransomware attacks or other potential risks.
Backup and Recover a Restore Point
Research how to protect backup data that is stored on the network. Based on your research, you need to present a strategy to protect backup data that is compromised during a ransomware attack. This will most likely require a strategy to store, copy, or move backups to an offsite location. In this slide, you will need to explain the risks of only having only having a single copy of a backup stored on the network. Think about if the client suffers another ransomware attack and the corrupted data cannot be restored because the backups were also compromised during the attack.

Categories
Computer Science

• with references

This assignment is to show off your presentation skills using Microsoft Office products. You can present about anything that is near and dear to your heart. The presentation should include:
• Include a 10 slide PowerPoint Presentation
• With references

Categories
Computer Science

Please write the requirements for voting rights using citations from these three sources.

source:
https://www.sciencedirect.com/science/article/abs/pii/S0920548906000754
Please write the requirements for voting rights using citations from these three sources. Thank you.

Categories
Computer Science

Research and find a net neutrality-related article published in a professional it magazine, news magazine/website.

Research and find a Net Neutrality-related article published in a professional IT magazine, news magazine/website.
1. What is Net Neutrality and why is it important? (50 points)
Explain your answer.
(150 – 250 words)
2. Do you agree or disagree with the issues and /or arguments in the article? (15 points)
(50 – 100 words)
3. Identify 1-2 resources published in 2017-2022 that helped you answer these questions.
Properly reference your resources
(APA (Links to an external site.)/MLA (Links to an external site.)format). (10 points)
Resources to use from the class materials.


https://www.uscourts.gov/about-federal-courts/educational-resources/about-educational-outreach/activity-resources/what-does
Law panel | Truth, Trust and the First Amendment in the Digital Age (Youtube video)

Categories
Computer Science

Normalization is actually a technique for reviewing the database design and it includes a set of mathematical rules.

3) Normalization is one of the important processes while designing databases. Normalization is actually a technique for reviewing the database design and it includes a set of mathematical rules.
Answer the following questions using specific examples:
Does normalization always lead to a good design? Why or why not?
What kind of issues, problems are possible in the normalization process? Use APA Citation

Categories
Computer Science

Give examples from the textbook and from your personal experience with computing devices.

while security is everyone’s concern when it comes to computing, data security seems to be overlooked by the end-user. Please explain what data security is and how we can all protect ourselves from potential security issues. Give examples from the textbook and from your personal experience with computing devices.
Please provide apa sources

Categories
Computer Science

The results of this assignment should have lines of power shell commands such as this so i can input into my lab and fulfill the requirements.

The results of this assignment should have lines of power shell commands such as this so I can input into my lab and fulfill the requirements. $SalesUsers = Get-ADUser -filter {Department -eq ‘Sales’} -Properties Department $ADDisabledOU = if (-not (Test-Path ‘AD:OU=DisabledUsers,DC=Adatum,DC=com’)) {New-ADOrganizationalUnit -Path ‘DC=adatum,DC=com’ -Name DisabledUsers} $UsersToDisable = $SalesUsers | Get-Random -Count 5 $UsersToDisable | Select-Object -Property Name, Department | ConvertTo-Csv -NoTypeInformation | Out-File e:DisableList.csv -Force

Categories
Computer Science

R studio problem.

R studio problem.
Code already runs fine, just need questions under this:
Create a graphic or graphics (choose which you think is best and explain why you chose it as a comment in your code or as a separate document) for the group protesting by date (assoc_actor1). Amongst the choices are a stacked bar graph and overlaid lines, but you are free to choose something else.
Identify the type of variable for each and the distribution for each (again, as a comment in your code or as a separate document
Have R return the data type for each variable. Did R guess the data type correctly?

Categories
Computer Science

 the bibliography should hold last 10 reviewed sources (articles or books), at least 5 of them

I finshed the app system and diagram and system architects and ….. is already prepared
FORMAL REQUIREMENTS
 General requirements:
 Fulfillment of all conditions:
– min. 50 pages (counted from the first page of the Introduction chapter to the last page
of the Summary),
– min. 10 000 words in the body of the thesis (excluding tables, captions, codes and
pseudocodes).
 In the case of work done by several authors:
– can be written jointly by maximum of 2 students,
– requirements regarding the number of pages and words should be multiplied by the
number of authors,
– the parts prepared by individual students should be distinguished, and thus each
author’s contribution to the preparation of the thesis should be specified.
 The thesis should comply with the provided template.
 Page, chapter, section, subsection, table, figure and listing numbering is obligatory.
 The technical documentation should be uploaded to the APD system separately.
 The diploma thesis is submitted through the APD system only. Submission requires uploading
of all files necessary to evaluate the thesis (thesis text and additional files, if needed,
according to the supervisor’s directions).
 The required statements and documents (according to current regulations of the Silesian
University of Technology) should be submitted to the Student Services Office.
 Figures and tables:
 Each figure has a number and a caption below.
 Each table has a number and caption above.
 Each table and each figure has to be referenced at least once in the body of the thesis.
 A table or a figure must not be separated from its caption (e.g. by page break).
 Figures, tables, chapters etc. should be referenced by their number. Do not use phrases like
„the figure below” or „the table above…”.
 All figures should be created by the author of the thesis, justified cases of figures from other
sources should be properly referenced and included after proper permissions from their
authors have been granted.
 Language:
 Use correct English – spelling, style etc.
 Do not use slang or informal language.
 Use precise language, adequate terms.
 Symbols and math formulae
 Mathematical formulas should be composed according to the rules of mathematical
typesetting.
 Each formula must have a number.
 Bibliography:
 All cited parts have to be clearly marked as citation (from the beginning to the end). Sources
of all cited parts have to be referenced – failure to meet these conditions may result in
the work being considered plagiarism. All these are checked in the Unified Anti-plagiarism
System (Jednolity System Antyplagiatowy).
 Figures taken from other publications (in well justified cases) should indicate a proper
reference.
 The bibliography should hold last 10 reviewed sources (articles or books), at least 5 of them
must not be more than 10 years old.
 All referenced sources have to be cited in the thesis.
 The bibliography list should be placed after the body of the thesis.