Read the articles below and write an informative 2-page essay about the potential risks associated with spreadsheets.

Risks Inherent in Spreadsheets.

As part of your AOL assignment discuss the risks associated with spreadsheets.

Read the articles below and write an informative 2page essay about the potential risks associated with spreadsheets:

1. Spreadsheet horror stories: https://handsontable.com/blog/articles/2020/10/spreadsheethorrorstories
2. 5 of the most terrifying Excel spreadsheet horror stories we’ve ever heard:
https://www.caspio.com/blog/5ofthemostterrifyingexcelspreadsheethorrorstoriesweveeverheard/
3. Spreadsheet horror stories:
https://www.qcommission.com/blog/spreadsheethorrorstories.html
4. Spreadsheet blunders costing business billions:
http://www.cnbc.com/id/100923538
5. Every spreadsheet has an error: 7 lessons motivated by Reinhart and Rogoff:
https://www.forbes.com/sites/billconerly/2013/04/25/everyspreadsheethasanerror7lessonsmotivatedbyreinhartandrogoff/?sh=3110e9553f2b
6. Eight of the worst Excel blunders:
https://www.cio.c

Design a network for a luxury residence hall that will serve honor students at the University of Houston.

Designing a Network

MAIN DETAILS: Design a network for a luxury residence hall that will serve honor students at the University of Houston. The residence will be eight floors, with a total of 162 two-bedroom, one-bathroom apartments on floors 3–8. The first floor has an open lobby with a seating area and separate office area, whereas the second floor has meeting rooms. Floors 1 and 2 are smaller than the upper floors (100 feet by 70 feet)because a parking garage is built around the outside of these floors. The measurement of the third to eight floors is 240 by 150 feet. The offices and server room on the first floor is for the university’s residence hall administration, which manages all the university’s residences. One design goal is to keep this network as separate as possible from the network in the rest of the building to provide greater security.

Deliverables:

1. Design the LANs for the first floor and second floor only, the distribution layer backbone that will connect the different floors in the building, and the part of the network that will connect to the campus core backbone. So what is needed in this first part of the project are maps of the first three floors in Visio or a similar program following the below instructions and documentation for the subnets to explain the maps.

Specify where the network equipment would be placed (use the floor plans provided). The required maps for your design are listed inside the CIS3347 file. The design must contain the type of cables, name of the devices, Wi-Fi channels, IPs, subnets, connections, and other related information for the physical topologies.

Document the subnets for the first floor, per LAN, and per access – secured or guest. Plan carefully when listing the CIDR ranges for each subnet. The recommendation is to use the provided reference tables when deciding the ranges for your subnets.

Tagging of photos and geotagging is a great way to let your friends know [a] the subject and occasion for the photos, and [b] where the photo was taken. But, is there such a thing as too much information?

IT-501-09 INFORMATION SYSTEM DESIGN AND ANALYSIS AND MANAGEMENT IN IT

Tagging of photos and geotagging is a great way to let your friends know [a] the subject and occasion for the photos, and [b] where the photo was taken. But, is there such a thing as too much information?

What are some of the major issues with geotagging? What concerns you the most?

Case 1: Using the example of an online cell phone apps store, list relevant data flows, data stores, processes, and sources/sinks. Assume that, the customer would like to purchase an application for his smartphone. Question 1 Draw a CONTEXT DIAGRAM Hint (context diagram). Use Draw.io and make sure you “ Turn on The Data Follow Diagram “ module.

Explain how statistical anomaly detection and rule-based intrusion detection are used to detect different types of intruders.

Network and Internet Security

Explain how statistical anomaly detection and rule-based intrusion detection are used to detect different types of intruders.

An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check, and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system, administrator monitoring the responses generated.

Write a program to produce Dragon curves with rounded corners, as shown in Fig. 8.4.

Computer graphics

1 Write a program to produce Dragon curves with rounded corners, as shown in Fig. 8.4.

2 Program ColorCircles.java in Sect. 7.3 is based on the additive color system. Modify this program so that it produces the diagram for the subtractive color system as shown in Fig. 7.2b

3 Complete Problem 8.3 (page 280) of the textbook.

Textbook: https://cloudflare-ipfs.com/ipfs/bafykbzacecigpnafypxp4s44qu7pzxkfm2ofzmnalblnhhjlz22c7o6izf63s?filename=Leen%20Ammeraal%2C%20Kang%20Zhang%20-%20Computer%20Graphics%20for%20Java%20Programmers-Springer%20International%20Publishing%20%282017%29.pdf

Task: Edit the “tool used”slide and for the tools used, you can look in `package.json` for each repo and see what was used.

Edit the “tool used “slide for bucket list project

https://cis-linux2.temple.edu/bucketlist/home

Task: Edit the “tool used”slide and for the tools used, you can look in `package.json` for each repo and see what was used.

Design a simple processor called “X” using a Hardware Description Language (HDL) such as Verilog or VHDL.

Design a simple processor called “X”

Overview: In this assignment, you will be designing a simple processor called “X” using a Hardware Description Language (HDL) such as Verilog or VHDL. The processor should be able to perform basic arithmetic and logic operations. The detailed description of X can be found at the end of this document.

The goal of this assignment is to help you understand the basic concepts of HDL and how to design a simple yet functional processor using HDL.

  • https://www.studypool.com/questions/download?id=2817653&path=uploads/questions/6364028/20230421180257attachment_2__8_.pdf&fileDownloadName=attachment_1
  • https://www.studypool.com/questions/download?id=2817653&path=uploads/questions/6364028/20230421180302attachment_1__11_.pdf&fileDownloadName=attachment_2

 

Write a summary (between 1,500-2,500 words that describes the technology and how it can be used, its implications, and issues related to either information. Create a presentation slides on the above topic.

Module 12 – Mini Presentation – Communicating Research

QUESTION

  1. The objective of this assignment is to challenge you to effectively communicate the state of scholarly literature and research for a specific cybersecurity topic orally and in The topic in question is:

Blockchain technology in the context of information security

  1. Write a summary (between 1,500-2,500 words that describes the technology and how it can be used, its implications, and issues related to either information.
  2. Create a presentation slides on the above topic.

Explain how statistical anomaly detection and rule-based intrusion detection are used to detect different types of intruders.

Network and Internet Security

Explain how statistical anomaly detection and rule-based intrusion detection are used to detect different types of intruders.

An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check, and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system, administrator monitoring the responses generated.

Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.

Final Portfolio Project

Final Portfolio Project (submission in Week 15)

Class, the final project is due next week (week 15). Please use this week to get a start on this final project. Start working on a draft that you can continue to work on into next week for submission in Week 15 (nothing is submitted to Week 14).

Final Project Prompt:

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited).

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?

Prompt 3 “Green Computing” (1-2 pages): One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.