...Hello, Professor and Classmates! 1.Have you successfully downloaded and saved the Final Project from Doc Sharing? If not, please do so now and then return to this area to complete this Discussion. Yes, I have successfully downloaded and saved the Final Project from Doc Sharing. I’m done with my final project, but I plan on taking the class on 12th, so I can make sure I have done all the area correctly. 2.Have you successfully downloaded the Project Dataset from Doc Sharing? If not, please do so now and then return to this area to complete this Discussion Yes, I have successfully downloaded the Project Dataset from Doc Sharing. It’s easy to do if you have Excel installed on the computer. 3. Have you located the Excel tutorials that you may use for the Final Project in Doc Sharing? Which tutorial have you found to be the most useful?...
Words: 525 - Pages: 3
...Table of Contents Question 1: Three New Knowledge/Items Learned From The Videos. 2 1.1 Before the OSI model 2 1.2 The OSI Model is Just a model 3 1.3 TCP/IP Model Addressing 3 Question 2: Two Interesting Topics 4 2.1 The Arpanet 4 2. Different Types of Operating Systems 4 Question 3: One Question or Doubt 6 Has CSMA CD become Obsolete? 6 Referencing 7 Apprentices 8 Turnitin Plagiarism Report 8 Question 1: Three New Knowledge/Items Learned From The Videos. 1.1 Before the OSI model Imagine this: Mr. Mac wakes up from a wonderful dream and he’s dying to share it with somebody. He walks out of his house and grabs Mr. Novell, the first man he sees. He starts sharing with Mr. Novell his dream only to realize a minute later that Mr....
Words: 1128 - Pages: 5
...Blue screen for xp professional xp3 Whenever; the electric goes off for a certain interval, I find that my system displays a blue screen specific issue. Whenever; I start the computer, I perceive that there is a typical form of blue screen highlighted. The Bug Check String which remains associated along with a similar type of fault reads as: SYSTEM_THREAD_EXCEPTION_NOT_HANDLED and the Bug Check Code get highlighted as: 0x1000007e. What must I do? "Fake" high cpu usage on Windows 10 It has been quite some time from now on that I keep experiencing my laptop fan to have become a lot noisier. In fact; I find that the “Task Manager” process keeps consuming a high amount of memory and CPU. Also; within a few seconds, I note that the unusually high numbers switches to an acceptable value of 4-5%. What can be done regarding such a typical form of fault? Keyboard mute key stays on after upgrading to Windows 10 Since after carrying out an upgrade process from Windows 7 to Windows 10, I find that the mute key icon remains in an ‘ON’ mode and this holds true irrespective of whether the speaker remains in a muted state or not. I have simply not been able to enjoy any forms of assistances from the Microsoft website. What can be done regarding such an issue? Windows 8.1 BSOD (possibly ntsokrnl.exe) For no valid reasons, I find that by system keeps experiencing a series of BSOD related issues and the fault message remains highlighted by the string as: DRIVER_POWER_STATE_FAILURE. Carrying out...
Words: 1248 - Pages: 5
...proposed network the physical topology is a Star. This topology accurately represents the current and proposed network because the way the network is physically installed is replicated below, that is; each device is connected to a switch (FitzGerald and Dennis, 2005). Servers Domain Controller (runs DHCP and DNS functions) all users File Server: 40 users Web application server (internet): all users Database server: all users Microsoft Exchange (Mail) + Shared folders (File Server) + Shared printers (Print Server) on the one physical machine: all users Total: 5 2.3 SOFTWARE Users Applications Programmers (Project Teams 1 – 26, 208 users) use Microsoft Visual Studio 2012. The product allows programming, scheduling, debugging, agile project management capability. The applications run on Windows. Project Teams 1-26 also runs Microsoft Project 2012 as their project management software. This application runs on Windows. Adobe Creative Suite 6 is used by the Graphics Team (25 users). The application contains numerous graphics tools including Photoshop, Dreamweaver, Illustrator and Flash Professional. The application runs on Windows. (Adobe 2013). Each of the applications above is compatible with the existing choice of operating system software: Microsoft’s Windows 7. (Microsoft 2013) The products perform satisfactorily with the exception of MYOB and Microsoft Dynamics, which are now not meeting the needs...
Words: 946 - Pages: 4
...across in your musical life (and there are plenty of chords out there), build the chord by placing the appropriate intervals or scale notes on top of the root note. For example, C6 means play a C major chord and add the sixth interval (A); Cm6 means to play a C minor chord and add the sixth interval. Here, you see the tune “Bingo” with its chord symbols written above it in the treble staff. The notes in the bass staff match the chord symbols and show you one way to play a simple chord accompaniment in your left hand. image0.jpg Play the chord with the melody note that’s directly below the chord symbol. The chord lasts until you see a chord change at the next chord symbol. So if you see a C chord at the beginning of measure 1, like in “Bingo,” play it on beat 1. If there isn’t a chord change, like in measure 5, you can play the C chord again, or not — your...
Words: 614 - Pages: 3
...Area 2 Name : The Application Purpose : There are 2 accounts types : The professor account contains a personal data storage of 10GB. The professor will be able to see his schedule and his courses. For each course, the professor will be able to download the students' assignments and review them. All courses will be recorded, the professor will be able to show a file of his storage on the classroom's projector when connected to the LAN through the classroom's computer. If the course is online, the professor will be able to upload video. The student account contains a personal storage of 1GB. The student will be able to access to the university computers by login to his session. The computers will not save anything, they just contain computer...
Words: 1527 - Pages: 7
...Assignment 1 Task 1 Task 1 a): Iron Man DVD Interface The purpose of this example, is that it is a DVD that is made for the entertainment of who ever watches the movie. It gives you four things to choose from, Play, Set up, Special features and scene selection. The menu uses button that are interactive and take you to different scenes that have different types of media, for example the special features button will take you to a new scene with different features such as deleted scenes and a cartoon adventures. I think the DVD is a very good display of imagery and animation. It’s very easy to navigate, the buttons are clear and is just a very simple user interface. The graphics used are very crisp and clear. They are well sized as they are...
Words: 1493 - Pages: 6
...This photograph is of Ed Mirvish in front of his store, Honest Ed's, on the corner of Bathurst and Bloor St. West in Toronto and was taken in 1983. The photograph was taken by Tibor Kolley for the Globe and Mail and was sourced on their website from the news article on the history of Honest Ed's. This image interested me because of Honest Ed's recent closure, as well as because I find it visually interesting as there is something going on in the fore, middle, and background of the image. Reading Reflection #1: Barthes’ concepts of Connotation & Dennotation This image relates to Barthes concept of the photographic message, specifically in relation to the “denotation” and “connotation” of the messages that can be read from press images. To summarize, Barthes describes that a press photograph has both a denoted message and a connoted message. Essentially, the denoted message is whatever is in the image (Barthes 17). In the case of my own chosen photograph, it is an older male in a suit standing in front of a street corner with a gathering of people around a building behind him. Secondly, press photographs also have a connoted message, which the public decides...
Words: 896 - Pages: 4
...What did you notice about the information in these reports? My first reaction is that the reports seemed kind of shady to me. The video did not give a thorough report and it felt like I would have to go and do research myself if I really wanted to know the answer. It basically presented a topic for me to now have to go and research because I know my mother would freak out about it and nag me to death when she hears it from one of her friends at work. I know that my parents get most of their “news” from coworkers and from the evening news but to me I, it was more frustrating being presented that video than helpful. Studies and reports were cited, but they could have been taken out of context. I would have to further review those institutions data to see for myself. As for the article, it started off with a mother giving birth because of advanced healthcare. Shawn Thierry researched to show the significant number of deaths in African American mothers. She was trying to gain more funding toward treatment and care for the mother after birthing. What was the primary message being put forth in these reports? Did you note any bias?\ The primary message is to show that Texas has one of the highest maternal mortality rates. I don’t think it is biased due to research being presented from three different sources. In the end the video says that the reports can be a bit skewed, but confirms that maternal death rates is a big concern. Primary message in the article was that deaths of the...
Words: 589 - Pages: 3
...1. Teacher summarize the key concept to the student. 2. Answer any questions the student might have. Teacher says: “Now that you get a chance to use prediction and confirmation during reading, do you see how this can help you with all types of text, especially the non-fiction text? Making prediction before reading is great because this get our mind running about the text. This way, you are more engage in the text you are reading. By keeping the predictions in mind, we can start to look for clues and details to help us figure out if our predictions are true or not. Imagine you are going to a movie. You read the title of the movie and watched a trailer. During the trailer of the movie, don’t you have some predictions about the movie? For example...
Words: 1232 - Pages: 5
...ASSIGNMENT-3 NETWORK ARCHITECTURE-1 Submitted by: YENUGU SATHYADHARI 16190296 Compare GBN, SR and TCP(no delayed ACK).Assume that the timeout values for all three protocols are sufficiently long such that 7 consecutive data segments and their corresponding ACKs can be received( if not lost in the channel) by the receiving host(host B) and the sending host (host A) respectively. Suppose Host A sends 7 data segments to Host B, and the 2nd segment (sent from A) is lost. In the end, all 7 segments have been correctly received by Host B. How many segments has Host A sent in total and how many ACKs has Host B sent in total? What are their sequence numbers? Answer this question for all the 3 protocols? Sol: Given 3 protocols...
Words: 2402 - Pages: 10
...11 provides many different expectations, every that has a notice suffix. These deal with many techniques from the actual wifi expectations themselves, in order to expectations intended for safety factors, high quality associated with assistance and the like: The 802.11 family consists of a series of half-duplex over-the-air modulation techniques that use the same basic protocol. 802.11-1997 was the first wireless networking standard in the family, but 802.11b was the first widely accepted one, followed by 802.11a, 802.11g, 802.11n, and 802.11ac. Other standards in the family (c–f, h, j) are service amendments that are used to extend the current scope of the existing standard, which may also include corrections to a previous specification. [1] ...
Words: 527 - Pages: 3
...Please include the citation for the study you selected. Study title: Validation of Whole Slide Imaging for Primary Diagnosis in Surgical Pathology [2] Objective: To compare WSI versus microscope slide diagnoses of previously interpreted cases after a 1-year delayed re-review (‘‘wash-out’’) period. Design: A priori power study estimated that 450 cases might be needed to demonstrate noninferiority, based on a null hypothesis: ‘‘The true difference in major discrepancies between WSI and microscope slide review is greater than 4%.’’ Slides of consecutive cases interpreted by 2 pathologists 1 year prior were retrieved from files, and alternate cases were scanned at original magnification of X20. Each pathologist reviewed his or her cases using either a microscope or imaging application. Independent pathologists identified and classified discrepancies; an independent statistician calculated major and minor discrepancy rates for both WSI and microscope slide review of the previously interpreted cases. Results: The 607 cases reviewed reflected the subspecialty interests of the 2 pathologists. Study limitations include the lack of cytopathology, hematopathology, or...
Words: 403 - Pages: 2
...Description Risk Category Remediation Method V003 Cross-site scripting (XSS) vulnerability in the highlighter plugin in Joomla! 2.5.x before 2.5.10 and 3.0.x before 3.0.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Critical Validation of vulnerability must be conducted. A Penetration test can be performed. V004 Cross-site request forgery (CSRF) vulnerability in the CSRF content-type check in Jackrabbit-Webdav in Apache Jackrabbit 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.3, 2.10.x before 2.10.4, 2.12.x before 2.12.4, and 2.13.x before 2.13.3 allows remote attackers to hijack the authentication of unspecified victims for requests that create a resource via an HTTP POST request with a (1) missing or (2) crafted Content-Type header. Critical Validation of vulnerability must be conducted. A penetration test can be performed. V005 Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list. Critical Validation of vulnerability must be conducted. A penetration test can be performed. 2.3 Network Vulnerabilities ID Vulnerability Description Risk Category Remediation Method V007 Graphics Device Interface (aka GDI or GDI+)...
Words: 718 - Pages: 3
...which is running in cloud server 1 and Cloud server 1 will encrypt the file and the encrypted file has to send to cloud server 2 using web service concept which will store in cloud server 2. 5.2.2 Algorithm for Decryption: I t is depicted in Figure 5.2.2 Step One: Convert numeric data to DNA sequences. We extract the couple nucleotides in DNA reference sequence according to the index read from the file. Step two: Complementary pair rule. Complementary pair rule is a unique equivalent pair which is assigned to every nucleotides base pair. Step three: Convert DNA sequences to binary...
Words: 1413 - Pages: 6