I have three projects that need to be done how much will they cost. Instructions are in there. I need all three project done and they each of different requirements and instructions. Each instruction is in all three documents. You should complete a project for microsoft word, excel, powerpoint. Chart and powerpoint slides might vary.
I have three projects that need to be done how much will they cost. Instructions are in there. I need all three project done and they each of different requirements and instructions. Each instruction is in all three documents. You should complete a project for microsoft word, excel, powerpoint. Chart and powerpoint slides might vary. I need A on all three can any one do it?
I am including the information that got cut off during the download. While reading through the PDF you will notice missing information. I have included the missing lines or numbers below:
3)Copy and paste the IF function in cell L3 into the range L4:L26 by double clicking the Auto Fill Handle. You will see the word Growth only for stores where sales are growing at a rate greater than 5% compared to last year. The other cell locations in this column will remain blank if the growth rate is at or less than 5%.
9)Click cell O3 on the Sales by Store worksheet. This column will use the OR function within the IF function to identify stores that should be prioritized for merchandise shipments. Begin the function by typing an equal sign (=) followed by the function name IFand an open parenthesis ((). Define the arguments of the function as follows:
Logical_test: The logical test will assess if the change in sales in cell J3 is greater than 8% or if the weeks of supply in cell K3 is less than 5. This will require the use of the OR function. Type the function name OR followed by an open parenthesis ((). Define the first argument by clicking cell J3 and then typing the following: >8%. Type a comma and define the second argument by clicking cell K3 and then typing the following: <5. Type a closing parenthesis followed by a comma (),).
Value_if_true: If the logical test is true, the function should show the word Priority. Type “Priority” with the quotation marks as shown. Complete the argument by typing a comma.
Value_if_false: If the logical test is false, the function should leave the cell blank. To do this, type two quotation marks (“”). Complete the function by typing a closing parenthesis and press the ENTER key on your keyboard.
4.10.In the following, we check the diffusion properties of AES after a single round. LetW= (w0,w1,w2,w3) = (0x01000000,0x00000000,0x00000000,0x00000000)be the input in 32-bit chunks to a 128-bit AES. The subkeys for the computation of the result of the first round of AES areW0,…,W7with 32 bits each are given byW0= (0x2B7E1516),W1= (0x28AED2A6),W2= (0xABF71588),W3= (0x09CF4F3C),W4= (0xA0FAFE17),W5= (0x88542CB1),W6= (0x23A33939),W7= (0x2A6C7605).Use this book to figure out how the input is processed in the first round (e.g., S-Boxes). For the solution, you might also want to write a short computer program or use an existing one. In any case, indicate all intermediate steps for the computationofShiftRows, SubBytesandMixColumns!
1. Compute the output of the first round of AES to the input W and the subkeysW0,…, W7.
2. Compute the output of the first round of AES for the case that all input bits are zero.
3. How many output bits have changed? Remark that we only consider a single round — after every further round, more output bits will be affected (avalanche effect).
You go to Podunk, ND, and find that the local bank encrypts all its information with DES. Discuss what you would do.
I have attached everything you might need for the discussion.
Also, I have attached the book if you want to use it. We are in chapter 4
if you have any questions please let me know.
Imagine you are supporting a major security company and the company Chief Information Security Officer (CISO) asks you to create training covering cybersecurity foundational topics. Since you have experience and knowledge gained from this course, you tell the CISO you will create a PowerPoint presentation covering foundational cyber topics. To create the presentation per the CISO request, use course content (ex: textbook, PowerPoint slides, labs, etc.), covering minimum 3 topics from each module. Submit completed presentation before due date (by 930pm Monday September 19). The presentation should only include content from modules 1-6. Minimum requirements below.
1. Presentation topics should directly align with and minimum 3 topics should be covered from each module.
2. Presentation should include text and pictures where appropriate. This is not an essay, balance text with graphics.
3. Your presentation brief should have a title slide including course information, your name, presentation title and professors name and date
4. The presentation should include a references slide at the end with citations for the content used within the brief.
5. The presentation should include an agenda slide highlighting main topics.
6. Format, text, font, visualization should be easy to see/read.
7. Topics from each module should be clearly defined and explained. Describe topics in your own words, avoid copy and paste.
8. Include voiceover PowerPoint verbally explaining topics within each PowerPoint slide. If you cannot do voiceover, provide detailed talking points within notes section for each slide.
Using C++, Java, or Python, design a program that creates an array of Card objects, shuffles them, then
sorts them in the following ways:
1. By value
2. By suit and value
You’ll need to implement both the merge sort and quicksort sorting algorithms. For example, you could
use merge sort to sort by value and a quicksort to sort by suit and value.
Your Card class must contain the following two fields:
• value (a String)
• suit (a String)
You may include any additional fields, constructors, or methods in your Card class as you see fit for
Your array will need to contain 52 Card objects, one for each value of each suit. The values to use are 2
through 10, J, Q, K, and A, with A being the card with the highest value. The suit values to use are H (for
Hearts), D (for Diamonds), C (for Clubs), and S (for Spades).
After building the array, shuffle the array using the Fisher-Yates Algorithm. You must implement this
After shuffling, print each object’s value and suit to show the array was shuffled. The output for each
object printed should be VALUE – SUIT. For example: 2 – H or Q – C
Then, you’ll need to sort the array based on the values. All 2 cards should be at the beginning and all A
cards should be at the end; The suit is irrelevant here. After sorting, print each object’s value and suit
again to show the array was sorted based on the cards’ values.
Finally, you’ll sort the same array based on the suit and value. Clubs should be first, then Diamonds,
then Hearts, then Spades. Each suit should be sorted from 2 through A. After sorting, print each object’s
value and suit again to show the array was sorted based on the cards’ values and suits.
For this discussion, use your own Android device or an emulated Android device. If you’ve not already set up Android Studio’s phone emulator, complete Real Problem 9-1 before completing this project. This project requires you to use a legitimate email account. If you don’t already have one you can use, you can create a free email account of your choice using email providers such as Gmail, Outlook, or Yahoo.
Follow these steps to manually configure the email client on a mobile device:
Open the Gmail app and then tap Add another email address. Gmail can automatically configure email from many providers. Because it’s essential that you know how to manually configure email on a mobile device, tap Other.
Add your email address and tap MANUAL SETUP. Check with your email provider to determine whether to use POP3 or IMAP. What’s the main difference between these two protocols? What are the ports for these two protocols? What are the secure ports for these protocols?
Enter the password, check Keep me signed in, and tap Sign in. On the next screen, tap Yes to agree to the needed permissions.
Add the incoming server settings for your email provider, or check the server suggested by the Gmail app. Which incoming email server are you required to use? When you’re ready, tap NEXT.
Add the outgoing server settings for your email provider, or check the server suggested by the Gmail app. Which outgoing email server are you required to use? When you’re ready, tap NEXT.
Set your account options as desired, then tap NEXT.
If you were successful, you’ll get a notice confirming that your account is set up. Set the account name and your name as desired, then tap NEXT. If you weren’t successful, backtrack and troubleshoot to solve the problem.
When you’re finished, send an email to a classmate, and check an email sent from someone else to confirm that your email account is working on your smartphone.
It is important to know how to change the settings on an account. What steps are required to change the server settings for the account you just added?
You should also know how to remove an email account from a mobile device. What steps are required to remove the email account you just added?
Write a response in a minimum of 175 words summarizing your experience and answering the questions above. Why do you think it is important to practice these steps? How will this experience and other practice experiences help you in your career?
Writing assignment with the required reading attached. The board of directors of your company is currently reviewing its cybersecurity policies and procedures. It has asked you to read the article The Inadequacies of the Cybersecurity Information Sharing Act of 2015 in the Age of Artificial Intelligence and to write a brief report describing the following concepts that were included in a report written by the company’s IT department: Cyber threat indicators Defensive measures Indicators of Compromise (IOCs) Raw Observational Data (ROD) Keep in mind, that the board of directors is making business decisions about how to protect the corporation’s business and reputation. So in describing these concepts make sure that you explain why understanding them is important for making business decisions about the company’s cybersecurity posture.