Post A Total Of 3 Substantive Responses Over 2 Separate Days For Full Participation.
Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to other students. Throughout the course you will be working with network diagrams. Due Thursday Respond to the following in a minimum of 175 words: Research free network diagramming programs, such as Lucidchart and Gliffy on the Internet. Discuss your findings on programs you may use in this course and the common symbols that are used in network diagrams in the Bedford Campus Network Diagram and the Mayberry Satellite Campus Network Diagram. 175 words post as a typed document not picture of a piece of paper
For Questions 1–3, Write A Short Review On Three Different Hardware Or Software Tools:
For questions 1–3, write a short review on three different hardware or software tools: one that can be used for storing and organising data, one that can be used for data analysis, and one that can be used for data visualisation. Answer the questions by completing the tables provided on pages 5–7 of this document. Each table is split up into four sections, and each section deals with a different aspect of the data analysis tool. The reviews of the tools should touch on each of the four aspects, by addressing the following questions: Benefits and strengths of using this tool: What are some of the benefits of using this tool when working with data, and what are its notable strengths? In other words, why would you recommend using this tool to fulfil a specific purpose? Possible challenges of using this tool: What are the possible challenges or drawbacks of using this tool? For example, is the tool difficult to master, expensive, or hard to integrate with other tools or platforms? Comparison to Microsoft Excel: How does this tool compare to Microsoft Excel? Are there any features that are comparable to those of Excel, and are there aspects that are less or more advanced than Excel? What can this tool do that Excel can’t? Applicability in personal context: Would you be able to utilise this tool in your business context? If so, how would this tool benefit you in your context, and if not, elaborate on why this tool would not be suitable in your context and what context it may be most suited to. Complete all three tables, and ensure that your answer does not exceed 100 words per section of the table (i.e. your response to each of the not exceed 100 words per section of the table listed above). Please ensure that you write down the name for each of the tools in the space provided at the top of each table. Question 2 For questions 1–3, write a short review on three different hardware or software tools: one that can be used for storing and organising data, one that can be used for data analysis, and one that can be used for data visualisation. Answer the questions by completing the tables provided on pages 5–7 of this document. Each table is split up into four sections, and each section deals with a different aspect of the data analysis tool. The reviews of the tools should touch on each of the four aspects, by addressing the following questions: Benefits and strengths of using this tool: What are some of the benefits of using this tool when working with data, and what are its notable strengths? In other words, why would you recommend using this tool to fulfil a specific purpose? Possible challenges of using this tool: What are the possible challenges or drawbacks of using this tool? For example, is the tool difficult to master, expensive, or hard to integrate with other tools or platforms? Comparison to Microsoft Excel: How does this tool compare to Microsoft Excel? Are there any features that are comparable to those of Excel, and are there aspects that are less or more advanced than Excel? What can this tool do that Excel can’t? Applicability in personal context: Would you be able to utilise this tool in your business context? If so, how would this tool benefit you in your context, and if not, elaborate on why this tool would not be suitable in your context and what context it may be most suited to. Complete all three tables, and ensure that your answer does not exceed 100 words per section of the table (i.e. your response to each of the not exceed 100 words per section of the table listed above). Please ensure that you write down the name for each of the tools in the space provided at the top of each table. Question 1 NAME OF TOOL: Tool for storing and organising data Benefits and strengths of using this tool: Start writing here: Possible challenges of using this tool: Start writing here: Comparison to Microsoft Excel: Start writing here: Applicability in personal context: Start writing here: NAME OF TOOL: Tool for data analysis Benefits and strengths of using this tool: Start writing here: Possible challenges of using this tool: Start writing here: Comparison to Microsoft Excel: Start writing here: Applicability in personal context: Start writing here: Question 2 Question 3 NAME OF TOOL: Tool for data visualisation Benefits and strengths of using this tool: Start writing here: Possible challenges of using this tool: Start writing here: Comparison to Microsoft Excel: Start writing here: Applicability in personal context: Start writing here:
For Questions 1–3, Write A Short Review On Three Different Hardware Or Software Tools:
For questions 1–3, write a short review on three different hardware or software tools: one that can be used for storing and organising data, one that can be used for data analysis, and one that can be used for data visualisation. Answer the questions by completing the tables provided on pages 5–7 of this document. Each table is split up into four sections, and each section deals with a different aspect of the data analysis tool. The reviews of the tools should touch on each of the four aspects, by addressing the following questions: Benefits and strengths of using this tool: What are some of the benefits of using this tool when working with data, and what are its notable strengths? In other words, why would you recommend using this tool to fulfil a specific purpose? Possible challenges of using this tool: What are the possible challenges or drawbacks of using this tool? For example, is the tool difficult to master, expensive, or hard to integrate with other tools or platforms? Comparison to Microsoft Excel: How does this tool compare to Microsoft Excel? Are there any features that are comparable to those of Excel, and are there aspects that are less or more advanced than Excel? What can this tool do that Excel can’t? Applicability in personal context: Would you be able to utilise this tool in your business context? If so, how would this tool benefit you in your context, and if not, elaborate on why this tool would not be suitable in your context and what context it may be most suited to. Complete all three tables, and ensure that your answer does not exceed 100 words per section of the table (i.e. your response to each of the not exceed 100 words per section of the table listed above). Please ensure that you write down the name for each of the tools in the space provided at the top of each table. Question 3 NAME OF TOOL: Tool for data visualisation Benefits and strengths of using this tool: Start writing here: Possible challenges of using this tool: Start writing here: Comparison to Microsoft Excel: Start writing here: Applicability in personal context: Start writing here:
Eve, An Eavesdropper, Wants To Capture As Much Communication Traffic As Possible. She Can
Eve, an eavesdropper, wants to capture as much communication traffic as possible. She can eavesdrop on a specific channel for at most two hours, contiguously or otherwise, or she will be detected. There are ten channels for her to choose from and she can eavesdrop for a total of 10 hours. Each channel cycles its transmission, but Eve will learn nothing by capturing the same traffic twice. The following table shows all how much traffic is sent across a channel in the specified transmission time. Channel# 1 2 3 4 5 6 7 8 9 10 Overall traffic volume (Mb) 7 15 12 12 4 10 6 80 64 14 Transmission time (Hours) 1 3 3 2 1 4 6 4 16 2 a) Describe how you can determine the greatest volume of traffic Eve can capture, given the constraints of the system. b) Use your method of part a) to determine which channels Eve should eavesdrop on to maximise the traffic captured. Show the details of your working. c) Specify the overall volume of traffic captured by Eve.
Please Would You Help Me Answer The Following Questions. I Have Some Answers Which
Please would you help me answer the following questions. I have some answers which I have tried out however it keeps coming up with “NOT ENOUGH INPUT ARGUMENTS’. I would very much appreciate if you could please use the following functions provided down below and please answer the questions with all seriousness and I will defiantly give a thumbs up. Thank you very much for your help. A) B) C) D)
In MATLAB How Do You Type ‘e’ As In E = 2.7? What Is
in MATLAB how do you type ‘e’ as in e = 2.7? What is exp in MATLAB?
In MATLAB How Do I Write E^2? And How Do I Write ‘e’ So
in MATLAB how do I write e^2? and how do I write ‘e’ so it returns 2.7183?
MATLAB Please Fix My Error Question Create A Function That Determines The Maximum Number
MATLAB please fix my error Question Create a function that determines the maximum number of motors a customer can purchase given their budget is provided as an input (Hint: you can use the function to round a number down). my code: This is what it should be:
Consider The Code Below Int S =1; For (int I=1; I
Consider the code below int s =1; for (int i=1; i<N; i ){ //Assertion: s = s = s (2*i 1);} printf("%d", s); a) What is a reasonable assertion for the main loop? b) What does the code accomplish? c) Using the method of initalization-maintenance-termination, prove that the invariant holds, and that the final output is correct.
Discuss The Risks Of Deployment Of Cloud Computing Service Models In The Corporate Environment.
Discuss the risks of deployment of cloud computing service models in the corporate environment. Requirements: 1. 300 words at least 2. Two scholarly articles at least as reference Text Book: Cloud Computing: Concepts, Technology
Python Programming Language Graphs 1. When Implementing A Graph With A Node/edge List, If
python programming language Graphs 1. when implementing a graph with a node/edge list, if the graph has n nodes and m edges, what is the big O (O()) complexity for the following operations. Explain your answer, and specify all your assumptions. 1. InsertVertex() 2. InsertEdge() 3. DeleteVertex() 4. DeleteEdge() 5. GetEdge(u,v): returns the edge connecting node u to node v, if one exists 2. when implementing a graph with an adjacency list, where the list is implemented with a doubly linked list, what is the big O (O()) complexity of the following operations. Explain your answer, and specify all your assumptions. 1. DeleteVertex() 2. DeleteEdge() 3. GetEdge(u,v): returns the edge connecting node u to node v, if one exists 3. when implementing a graph with an adjacency map, what is the big O (O()) complexity of the following operations. Explain your answer, and specify all your assumptions 1. InsertVertex() 2. InsertEdge() 3. DeleteEdge(u,v)
Hello Can I Please Get Help With This C# Problem? Thank You. Create An
Hello can I please get help with this C# Problem? Thank you. Create an application class named BillDemo that instantiates objects of two classes named Bill and OverdueBill, and that demonstrates all their methods. The Bill class includes auto-implemented properties for the name of the company or person to whom the bill is owed and for the amount due. Also, include a ToString() method and returns a string that contains the name of the class (using GetType()) and the Bill’s data fields values. Create a child class named OverdueBill that includes an auto-implemented property that holds the number of days the bill is overdue.
Box Of Oranges* Three Travelers Arrive Late At Night At The Inn, But The
Box of oranges* Three travelers arrive late at night at the inn, but the kitchen is already closed. The innkeeper mutters: all I have is a box of old oranges… The travelers say that is fine since the alternative is no food at all. The innkeeper disappears and the three travelers have fallen asleep by the time he comes back. The innkeeper does not want to wake the travelers so he leaves the box on the table and goes to bed. The first traveler wakes up and finds the box of oranges. Not wishing to make a pig of himself and not knowing if anyone else has eaten something already, he throws away one orange that looks bad and eats a third of what is left. He goes back to sleep. The second traveler wakes up. This traveler wants to be fair too. He throws out two ugly, dried out oranges, eats a third of what remains and goes back to sleep. The third traveler wakes up. He throws out three half rotten oranges and eats a third of what remains. It is almost morning and the innkeeper returns and takes away the box. Only six left, mutters the innkeeper. Calculate how many oranges there were in the box to start with? Motivate your answer and explain which strategy you have used.
Research IT Performance Tools For Monitoring And Evaluation Of The KPIs. Include How Each
Research IT performance tools for monitoring and evaluation of the KPIs. Include how each tool effectively meets assurance practices and IT performance. Discuss how KPIs can be tied to strategic vision and project planning
Add To The Schema With Question Asked. Can Be Drawn By Pen And Paper
add to the schema with question asked. can be drawn by pen and paper
When The Loader Loading User’s Code Into PCSpim, The System Should Have Some Way
When the loader loading user’s code into PCSpim, the system should have some way to effectively determine the 1st instruction of user’s code. Think about the mechanism for PCSpim to locate the 1st instruction of user’s code based on the program’s memory image. Note that PCSpim doesn’t have pre-knowledge of user’s source code. It is also assumed that you understand the entry point concept from learning Programming Fundamentals (Java). Question: Describe how you would recognize the right address at the first instruction of user’s code loaded into PCSpim. Which value for the address would you enter for setting a breakpoint to stop user’s program execution at the first instruction.
This Is A MULTIPLE ANSWER Question, Which Means You Are Able To Select One
This is a MULTIPLE ANSWER question, which means you are able to select one or more answers as being correct. Note that this does not necessarily mean that there are multiple correct answers. In any case, select all the answers you believe are correct. (NB: There are no part marks awarded for multiple answer questions.) You will encounter runtime error messages when a programming error is caught by the development environment. This question is designed to test your ability to interpret error messages and Python documentation. Consider the following error message that was generated in IDLE: Traceback (most recent call last): File “E:error_tester.py”, line 11, in students[3] IndexError: list index out of range Which of the following statements are indicated by the error message?
*PLEASE DO NOT REPLY IF YOU’RE NOT GOING TO ANSWWER ALL MY QUESTIONS.* Question
*PLEASE DO NOT REPLY IF YOU’RE NOT GOING TO ANSWWER ALL MY QUESTIONS.* Question 5 According the Radicati Group, approximately ____% of all email messages sent every day are spam. a. 50 b. 40 c. 75 d. 90 Question 6 All of the following are popular choices for virus protection EXCEPT _____. a. ZoneAlarm b. McAfee Intel Security c. SpamBeGone d. Symantec Question 7 All of the following are ways to use Chrome efficiently EXCEPT: a. use the shift key and the spacebar to scroll up one page b. use the control key and the key to zoom in c. use the space bar to scroll down one page d. use the control key and the = key to zoom to the original page view Question 8 Copying and pasting contents of a received message into a new message allows you to ____. a. remove viruses embedded in the text b. see who received a Bcc of the original message c. forward a message while maintaining the privacy of the original sender d. all of the above Question 9 Ctrl S in most browsers allows you to save a webpage in all of the following formats EXCEPT: a. webpage complete b. webpage HTML only c. text file d. webpage, no ads Question 10 Edge includes a _____ feature that allows users to manage their online reading. a. Library b. Reading List c. Bookshelf d. Read Now Question 11 Edge includes a _____, which is a streamlined and less cluttered view that allows readers to focus on the selected material a. Reading View b. NewsPrint View c. Reduced View d. Book View Question 12 Edge uses the _____ search engine as its default. a. Google b. Bing c. Ask.com d. Yahoo Question 13 Even though U.S. law has a(n) ____ provision that allows students to use limited amounts of copyrighted information in term papers, you should always cite your sources. a. lien b. escape clause c. Freedom of Information Act d. fair use Question 14 Firefox allows for easy drag-and-drop modifications to its _____. a. history list b. navigation list c. menu d. address bar Question 15 Firefox is an open-source software, which means that Mozilla has given others the right _____. a. study its code b. modify its code c. all of the above d. distribute its code Question 16 Firefox uses _____ to enhance and extend its functionality. a. add-ons b. apps c. web enhancers d. extensions Question 17 Google’s browser is called ____. a. Chrome b. Safari c. Firefox d. Opera Question 18 HTML stands for ____. a. HotMail b. Hypertext Media Language c. Hypertext Markup Language d. Hex Traffic Media Link Question 19 If you receive an email message from a sender that you don’t recognize and the message contains an attached file, you should ____. a. only open the file in the evenings, when malicious code is less virulent b. contact the local police so they can run a trace on the email c. immediately delete the email and reboot the computer d. avoid opening the file until you are sure that it doesn’t contain a virus Question 20 If you type nbc.com in the Address bar, your browser will convert it to ____ and load the home page at that URL. a. ftp://nbc.com b. http://www.nbc.com c. ftp://nbc.net d. http://www.nbc.com.home
*PLEASE DO NOT REPLY IF YOU’RE NOT GOING TO ANSWER ALL MY QUESTIONS.* Question
*PLEASE DO NOT REPLY IF YOU’RE NOT GOING TO ANSWER ALL MY QUESTIONS.* Question 45 Which of the following browsers replaces Internet Explorer as the pre-loaded Microsoft browser on new Windows machines? a. Chrome b. Firefox c. Edge d. Bing Question 46 While working in Chrome, if you encounter a webpage in another language, you should _____. a. block the page so you don’t go there again b. click the Translate this page icon in the right corner of the omnibox c. look for a link to an English version of the page d. click the Back button to navigate away from the page Question 47 You can use the Address bar to do all of the following EXCEPT: a. type a search phrase b. click a link on the menu that opens as you type c. type a URL d. click the address book and select a link Question 48 You can use the address bar in Chrome to do all of the following EXCEPT: a. as a calculator b. as a search box c. as a calendar d. as a conversion tool Question 49 You might customize your Chrome browser using a theme for all of the following EXCEPT: a. to make the browser experience feel more personal b. to create an identifiable style c. to select a distinct color palette that reflects you d. to make searching easier Question 50 You might want to delete your browser history when you have been working on any of the following EXCEPT _____. a. your friend’s computer b. a public computer such as a a library c. a school lab computer d. your personal computer Question 51 You should preview a webpage before printing it for all of the following reasons EXCEPT: a. be sure linked pages will print too b. be sure extra pages will not print c. be sure the page is legible d. be sure the information you want will print Question 52 Your browser stores the location of each webpage you visit during a single session in a(n) ____. a. history list b. bookmark c. favorites list d. search engine Question 53 “Email” is short for ____. a. ethernet mail b. electronic mail c. everyday mail d. encoded mail Question 54 A ____ usually identifies one person’s email account on a mail server. a. domain name b. web address c. username d. IP address Question 55 A ____ contains information about the message. a. message body b. salutation c. message header d. signature Question 56 A ____ message is a copy of the sender’s original message with your inserted comments. a. quoted b. drafted c. volley d. plagiarized Question 57 A ____ might appear at the bottom of an email message and contain standard information about the sender. a. salutation b. message body c. signature d. message header Question 58 A file that has been attached to an email message will be received by those recipients in the ____ line(s) of the message header. a. To only b. Bcc only c. To, Cc, and Bcc d. To anc Cc only Question 59 A forwarded message ____. a. does NOT include the email addresses of previous recipients and senders b. does include the email addresses of previous recipients and senders c. includes only the email addresses of previous recipients d. includes only the email addresses of previous senders Question 60 A group of keyboard characters that, viewed together, represent a human expression is known as a(n) a. e-doodle b. web face c. Nettitude d. emoticon
Create A 3NF Data Model For A Department Store. Include Information For Sales, Inventory,
Create a 3NF Data Model for a department store. Include information for sales, inventory, employees, orders, customers. Make sure each one has at least 5 attributes.
VideoDev Ltd Is A Video And Production Development Company Which Works For Clients Across
VideoDev Ltd is a video and production development company which works for clients across Australia and New Zealand. The company is considering moving some of its computer infrastructure into the Cloud. The VideoDev Board is contemplating this move as a way to increase the company’s flexibility and responsiveness, as well as to achieve some savings on the cost of maintaining their ICT infrastructure. VideoDev has engaged you as a consultant to advise them on the use of Cloud Computing in their daily operations. They have some 100 video production, engineering and support staff that work on different projects for clients in Australia and New Zealand. They have been advised that a move to using a Cloud based infrastructure would be an advantage to them. VideoDev have a number of application servers in their Sydney and Melbourne datacentres that provide video processing capabilities for their staff. These servers are quite heavily customised and run reasonably heavy workloads while doing video processing. There is often a considerable queue of jobs waiting to be processed, which causes backlogs in getting jobs completed on time. The Board hopes that a move to a cloud based operation may help to relieve these backlogs. Another of VideoDev’s initial projects is to provide all their staff with a Standard Desktop Operating Environment (SDOE) on their desktop. This would include providing a standard desktop to any device that their staff may be using, as well as access to office automation, such as email, word processing, spreadsheet capabilities, as well as online storage for their files. The Board want the SDOE to be available on any device that their staff use, whether they are in the office, at home, or deployed at a customer’s office in the field. VideoDev is considering the use of either Amazon WorkSpaces (https://aws.amazon.com/workspaces/) or Windows Virtual Desktop (https://azure.microsoft.com/en-au/services/virtual-desktop/) as a replacement for their existing desktop environment. Your task is to (need answer to only 3rd and 4th question ) Explain the differences between the service models IaaS and PaaS (10 marks) What type of service model you would recommend? (10 marks) What other types of architectural patterns could be used in this deployment? (20 marks) How that move would assist in removing backlogs? (10 marks)
The post Post A Total Of 3 Substantive Responses Over 2 Separate Days For Full Participation. appeared first on Smashing Essays.