Metaphors are common in software (especially in WIMP interfaces) and websites to facilitate the interaction between the users and applications.
For this discussion, provide the following:
Provide an example of a good metaphor. Why is it good? Provide a screenshot of the metaphor.
Which task is this good software metaphor trying to accomplish?
How equal/different is this software metaphor from its equivalent in the real world?
Provide an example (with a screenshot) of a bad metaphor. Why is it bad?
If you contrast your examples of good and bad metaphors, what would you change in the example of the bad metaphor to make it useful?

Research the use of relational databases in social media marketing by using these resources.

Research the use of relational databases in social media marketing by using these resources. Compile these resources into a three page, APA formatted commentary, which answer the elements in part ©, below.
a. Hoffman, Fodor. Can You Measure the ROI of Your Social Media Marketing? MIT Sloan Management Review. Fall 2010. Pdf version here – https://sloanreview.mit.edu/article/can-you-measure-the-roi-of-your-social-media-marketing/
b. Lynda.com. How Relational Databases Work. link here – https://www.youtube.com/watch?v=z5YnKt2aOCs
C. Comment upon a recent social media campaign which you have experienced, personally.
What was the subject of the campaign, and by whom?
What venue did the campaign use (instagram, facebook, google ads, etc)
What language, messaging, or other communication techniques did it use? Why, do you believe, did this marketing communication arrive in your online experience, or be shown to you?
What data did it attempt to collect from you?
What actions did it prompt you to take, or how did it try to compel you to act, in relation to the brand?
How impactful was the campaign, in compelling you, as a consumer, to act?
Did the marketer learn more about the demographic it targeted? If so, how, or why not?
Assume the campaign targeted several groups, and how did it spur them to respond. How did it measure its impact?
Did you observe any advertising technology, used by the campaign? What tools did the campaign appear to use, to analyze the viewer?
Research the concept of relational database schema. What would the database schema look like, for this project?

Create a new database and restore the database from the backup to the new database.

Overview
Throughout this course, you will be creating a simple database for tracking information about volunteers working and raising money for a community organization. This assessment requires that you create the initial table, called PERSON, to hold basic information about volunteers. You will be redefining the design and building the database in the other assessments.
Instructions
Your assessment will be scored on the following criteria. Use the Weekly Solutions Submission Template to submit your assessment.
1. Use the mysqldump.exe command line tool to backup the data in your volunteer database.
To access the mysqldump.exe tool, start the MySQL command line tool.
Use the quit command to exit to the system command prompt.
Run mysqldump.exe and direct the output of the backup to an appropriately named file.
Create a new database and restore the database from the backup to the new database. Submit a screenshot to document the restoration of the data to a new database.
2. Write SQL CREATE TABLE statements and run them to create three new tables (ADDRESS, PHONE, AND EMAIL) to split out the contact information for your volunteers that is currently contained in the PERSON table.
Each table should have a unique primary key and foreign key constraint reference to the PERSON table.
Save your SQL statements to a text file using the MySQL tee command and document the process with screenshots.
3. After creating the new tables (in Step 2), write and run SQL to insert the relevant data for the volunteers in the new tables.
Save your SQL statements to a text file using the MySQL tee command and document the process with screenshots.
4. Modify the PERSON table using the ALTER TABLE statement to remove the columns for the data moved to the new tables.
Save your SQL statements to a text file using the MySQL tee command and document the process with screenshots.
Continuation from the previous assignment. Please use MariaDB 10.5 (x64)

Write and run SQL INSERT statements to insert rows in each new table for 10 volunteers.

In this assessment, you will add two additional tables to track hours worked per week by the volunteers and amount of funds raised each week. You will then create SQL queries with JOIN clauses to retrieve information for all volunteers.
Note: Remember to design the new tables with the appropriate primary and foreign keys so you can relate these records to volunteers in the PERSON table. Each table should include an ID column as the primary key and a column to hold a date to identify the start of the week.
Instructions
Your assessment will be scored on the following criteria. Use the Weekly Solutions Submission Template to submit your assessment.
1. Create a new table named HOURS for your volunteer database. The HOURS table will be used to track hours worked per week by the volunteers.
Write and run SQL INSERT statements to insert at least 10 rows of data into the HOURS table.
2. Create a new table named FUNDS for your volunteer database. The FUNDS table will be used to track amount of funds raised per week by the volunteers.
Write and run SQL INSERT statement to insert at least 10 rows of data into the FUNDS table.
3. Write and run SQL INSERT statements to insert rows in each new table for 10 volunteers.
4. Save your SQL statements to a text file using the MySQL tee command and document the process with screenshots.
5. Reflecting on this assessment, summarize the steps taken and any issues you encountered.

Create a Business Letter with a Letterhead and Table

Assignment 4 (Word 3)  (Learning Outcome 1 from e-Syllabus)

Create a Business Letter with a Letterhead and Table

Objectives:

  • Change margins
  • Insert the format a shape
  • Change text wrapping
  • Insert and format a clip art image
  • Insert a symbol
  • Add a border to a paragraph
  • Clear formatting
  • Convert a hyperlink to regular text
  • Create a file form an existing file
  • Apply a Style
  • Set and use tab stops
  • Insert the current date
  • Create, insert, and modify a building block
  • Insert a Word table, enter data in the table, and format the table
  • Address and print an envelope

GCF Office 2016 (Word 2016) link: http://www.gcflearnfree.org/word2016/ (Links to an external site.)

Use this link to cover the Word 2016 topics that are required for this assignment. Word 2016 also has a help function that is also explained in the above GCF web site.

ASSIGNMENT:

There is one file for this assignment. Upload your file before you submit the assignment in CANVAS.

(Lab 4: Create a Cover Letter with a Table)

  1. Change the document theme to Celestial of some other similar them.
  2. Insert the Up Ribbon shape. Change the text wrapping for the shape to Top and Bottom. Add your name to the center of the shape. Insert a an image from the “online pictures” option that can be reversed on both sides of the shape.
  3. Insert the small dots (these are symbols) in the contact info right under the ribbon, remove the hyperlink from the email address. enter a bottom border right below the ribbon/contact info.
  4. Create the letter shown in the attached example below. Set the left-aligned tab stop to 4″ mark on the ruler for the date and signature lines.
  5. Insert and center the table in the example, apply any table style format (pick something).
  6. Upload via Assignment 4 link in CANVAS (do not submit until the lab is uploaded and you see it in CANVAS, the file name should be “Lab 4 – Internship Letterhead” or “Lab 4”).

Lab 4 Letterhead.pdf

 

What is the present value of $10,000 to be received in 8 years? Your required rate of return is 6% per year.

Calculations

  1. What is the present value of $10,000 to be received in 8 years? Your required rate of return is 6% per year.

r = 6%

n = 8

PV

PV

PV = $ 6,274.12

  1. If you invest $1,000 a year for 15 years at 6% annual interest, how much will you have at the end of the 15th year?

r= 6%

n = 15

FV

FV = 1000 *

FV = $23,275,97

  1. If you buy a 10 year, 2% CD for $12,000. How much is it worth at maturity?

r= 2%

n= 10

FV= PV *

FV = 12,000 *

FV = $14,627,93

  1. How much would you be willing to pay today for an investment that pays $1,300 per year at the end of the next 10 years?  Your required rate of return is 7% per year.

r=7%

n=10

CF=$1,300

PV

PV = 1,300 *

PV = $9,130,66

Paid for Amount: $9,130,66

What are some ways investigators analyze electronic evidence such as tools, methods and sources of artifacts.

For this assignment, you will conduct Internet research and create a guide for how you, as an investigator, plan to accomplish the following:

Collect electronic evidence – list the tools and methods you would use to collect a forensic image of a hard drive while on scene.
Store electronic evidence – explain best practices for storing, packaging and documenting the evidence found on scene.
Analyze electronic evidence – what are some ways investigators analyze electronic evidence such as tools, methods and sources of artifacts.
This guide should assume that the evidence will be used in a legal proceeding. You may include templates and forms which you would use while at the crime scene or in the lab (an example would be a sign in and out log for the storage area).

How do you feel when someone uses a sexist term when addressing or discussing a woman/women? Is it appropriate?

To earn a superior grade, this paper (and all papers in this class) should be written like a research paper with citations from the assigned readings throughout. Keep your personal opinions confined to the self-reflection paragraph. Questions posed here in my instructions are meant to be a jumping-off place, and not meant to be literally interpreted, or answered strictly, or directly. Your paper should be in a narrative format, not a Q&A. See Rubric to fully understand how the paper will be scored.

Using readings from the class thus far (all units), consider the following:

Gender normative patterns of communication. What consequences do women face when norms are broken? What are the benefits?

Can language, or ways of speaking, be used a form of resistance to the hetero-patriarchy?

Further:

Should women “tone down” how they talk to each other, and to men/gender neutral?

What about men? What role do they have in language about or towards women?

Discuss in your writing, language about women.

Last, briefly reflect: How do you feel when someone uses a sexist term when addressing or discussing a woman/women? Is it appropriate?

Be sure to cite from the articles and chapter readings, and include a reference list. You should have at least 3 references (minimum 3 Authors; use reference list to fully understand when you using a different source) and many, many citations in your paper.

Add a reference list so I know which articles you pulled from (min, 3 listed for full points).

Research and identify the type of business you’d like to start

Assignment:  To research and identify the type of business you’d like to start

Background:

A new venture begins with an inspiration, a passion, an idea.

Step One:

Through research and self-reflection decide on two different business that you would like to start if given the opportunity.  It is preferred that these businesses relate to the Tourism & Hospitality Industries.  These should be small businesses, not large endeavors like a big hotel or restaurant chain.

Step Two:

Open a Word Document and provide the answers to the following questions.  Make sure to use full sentences, not fragments or one-word answers.

  1. Identify the two types of businesses you’d like to start
  2. In each case, explain why you’d like to start this type of business
  3. Discuss how you would make your businesses different from those that already exist
  4. Explain which business is your preferred business
  5. Explain why

Step Three:

Save your completed, typewritten Word document and post the assignment responses on under the Assignments Tab Blackboard.  This assignment is due by Friday, October 2, 2020.

Which are popular two-factor authentication strategies used by online services like cloud storage or online banking?

Which are popular two-factor authentication strategies used by online services like cloud storage or online banking?
Security tokens are small devices that typically generate random-looking numbers (one-time passwords or OTPs) every 30 seconds. Alternatively, software programs such as Google Authenticator do the same as mobile apps. How do they synchronize the OTPs with the server?
Hint: Refer to RFC 6238 available at the following link:
M’Raihi, D., Machani, S., Pei, M., & Rydell, J. (May, 2011). TOTP: Time-based one-time password algorithm (Links to an external site.). IETF RFC 6238