...Unit 2 Analysis 2 Computer Shopper Listed below are the computers I selected for this analysis. I used www.bestbuy.com for the information contained within. The three different Professions I choose were, Graphic Designer, Engineer, and a Lawyer. Graphic Designer The computer I would choose for this profession would be one with high memory or expandable (16GB, expandable to 32GB), a large hard drive (1TB and fast read/write times) for storage along with a graphics card (NVIDIA GTX475) capable of delivering the type of images the designer is looking for. A system for this use would also require a processor able to handle the raw computing needs. I would use a i7 Core running at 3.0 GHz or better. This would also need to have a fast Ethernet connection for uploading or downloading of files. Engineer The computer I would choose for this profession would be very similar to that used by the Graphic Designer, except that it would not need to have as high a graphics card. It would need to have the same or higher memory and a processor at 4.0 GHz or better. Lawyer Due to the nature of this profession, I would recommend a laptop so that it could be carried around to the different places this profession would need it. For this I choose a Apple MacBook Pro. My reason for this choice is because the MacBook is small, yet powerful. The MacBook Pro is loaded with hardware and software that would make its job easy for the profession. Computers ...
Words: 1049 - Pages: 5
...Unit 2 Interactive Assessment 1. Which view from Psychology & Christianity resonated with you? Why? To begin, each view read was better than the last. Having said that, Powlison’s Bibilical counseling view was the most interesting, most relatable view for me. While reading his perspective I not once ever felt as if I was being preached to. This is an extremely important element if Christianity is expected to excel in a field that is heavily dominated by secular psychology. Powlison summed up his entire viewpoint with the opening sentence, “Christian faith is a psychology” (Myers & Johnson, 2010, p. 245). He methodically and logically presented his case in such a manner that was easy to understand and seems to be easily applied to a person’s...
Words: 329 - Pages: 2
...NT1100 - COMPUTER STRUCTURE AND LOGIC_V1.0 | Computer Shopper | Unit 2 Analysis 1 | | Dohna M Kerckhove-Powless | 7/16/2014 | | Name / Price | | | New Inspiron 17 5000 Series$76999 | Latitude 14 3000 Series$59900 | Latitude E6540$ 1589.00 | Inspiron Desktop 3000 Series$511.00 | XPS 8700$74999 | Processor | 4th Generation Intel® Core™ i5-4210U processor (3M Cache, up to 2.7 GHz) | Intel® Core™ i3-4030U Processor (Dual Core, 1.9GHz,3M) | | 4th gen Intel® Core™ i7-4810MQ Processor (2.8GHz, 6M cache, Upgradable to Intel® vPro™ technolog | | 4th Generation Intel® Core™ i3-4150 processor (3M Cache, 3.5 GHz) | | 4th Generation Intel® Core™ i5-4460 Processor (6M Cache, up to 3.4 GHz) | | Operating System | Windows 7 Professional English 64bit (includes Windows 8.1 Pro 64bit License and Media) | | | | Windows 7 Professional English 64bit (Includes Windows 8.1 Pro license and media) | | | | Windows 7 Professional, 64-bit, English | | Windows® 7 Professional, 64Bit, English | Windows 7 Professional English 64bit (includes Windows 8.1 Pro 64bit License and Media) | Display | 17.3 inch LED Backlit Display with Truelife and HD+ resolution (1600 x 900) | 14.0 inch HD (1366x768) Anti-Glare WLED-backlit | | 15.6in FHD (1920x1080) Anti-Glare LED | | | | Memory | 8GB2 Single Channel DDR3 SDRAM at 1600MHz | | | 4GB2 DDR3L at 1600MHz | | | 8GB2 DDR3L at 1600MHz | | | 4GB2 Single Channel DDR3 SDRAM at 1600MHz | | | 8GB2...
Words: 537 - Pages: 3
...Computer | Hard Drive Capacity | RAM | Processor Speed | Price | USB Ports | Style | | HP-Pavilion Slimline 400-224 | 1 TB | 6 GB | 1.5 GHz | $379.99 | 6 (2 3.0, 4 2.0) | Desktop | | Lenovo Erazer | 1 TB + 128 GB | 12 GB | 3.6 GHz (turbo up to 3.8) | $1,419.99 | 10 (3 3.0, 7 2.0) | Desktop | | HP-Pavilion 17-ell3dx | 750 GB | 4 GB | 1.9 GHz (turbo up to 2.8) | $399.99 | 3 (2 3.0, 1 2.0) | Laptop | | Toshiba Satellite | 750 GB | 8 GB | 1.6 GHz (turbo up to 2.6) | 699.99 | 4 (2 3.0, 2 2.0) | Laptob | | Term trader: A term trader will need a computer with good memory and capable speed for online trading of energy at up to the second pricing. If he uses a computer that is short on the needed speed than he could miss out on a good trading price for oil, electricity, or nuclear fuels. For this job 4 GB of RAM and at least 1 GB of hard drive will suffice just fine. But for up to the second price change you will most likely want a processor speed of 3 Ghz. So for this job you want the Ghz of the Erazer but only need the hard drive and RAM of the Slimline. So I would go with a model type that would have those specifications. Which isn't in the above table. Graphic designer: Graphic design integrates computers in virtually every step of the design process from conception to production and in a range of media including print, video, and web. For graphic design 8 GB or more of RAM is preferred and 750 GB of hard drive capacity. Processor speed is not as important as it...
Words: 382 - Pages: 2
...observed or missing. If data are Missing at Random, we can take unbiased results of the analysis by only use the available data. Conversely, if the missigness is not random, the missing values cannot be ignored and we have to model them precisely in order to achieve accurate results. A common method to deal with the problem of missing data when are MNAR is the Heckman's method. Unfortunately, this method will not be discussed here. To understand exactly the meaning and the differences between the three types of missing data, we will use an informative example (Little-Rubin page 16):\\ Assume that we have a survey with two questions, "what is your age" and "what is your income". If the probability that income is missing is the same for all individuals who take part in this survey, independently of the age and the income they may have, we can say that the data is MCAR. Now, in the case that they do not answer the question about their income and the probability of missingness differs according to the age of the individual but does not vary according to the income of him, we conclude that the data is MAR. Lastly, if the probability that income is observed differs according to the income for those who have the same age, we say that the data are MNAR. There are several methods that can be used for handling missing data. Here we will focus on Complete-case and Available-case Analysis, Mean and Multiple Imputation and Maximum Likelihood method. Some of them assume that the...
Words: 785 - Pages: 4
...Spatial continuity/ temporal continuity Selected clip: 5:10 - 07:17; 9 shots; 2 temporal ellipses. The beginning of the scenes is a peaceful sea and a man walk into the scenes. The radio sound gives audience a feeling of a normal morning. The second shot turns to a woman on bed. The shot is logical, as the audience expected that it is a normal morning and the characters are just awoke. There is a guess at this point, about the relationship of these two people. The third shot gives us a full view of the room with a man sitting at the edge of the bed. We can notice the relationship of the woman and the man should be a couple. In the third shot, we know they are not just a couple but a family with children. The forth shoot is short, which is a close shot to the woman's talking. And the next shot turns to a close shoot of the man. He picks up his clothes and walking out of the bedroom. Everything represent a typical morning for a family. Spatial continuity can be seen. The shots are logical and make sense. Temporal continuity is shown. They are the normal process of waking up in a morning. Every shot reveals more information to the audience....
Words: 462 - Pages: 2
...Task 2(2) 2- Milestones and estimated time When we install the new system there will be lot of milestones. Firstly if when we plug the monitor it starts working then it is one of the milestones. second we have to check whether mouse and keyword are also work fine, if it is working then this is another milestone. If the processor which we have installed started working then it is one milestone. In addition to this we have added 2 RAM in different slot if both of the RAM is working in the computer then it is another milestone. We also have installed a hard drive in the system, if it is storing the data without any of the problem then it another milestone. After plugging the modem if it starts the working like modulating the signals then it is also a milestone. For the video conferencing of the John we also have placed a webcam. If this webcam is working without any fault like it is showing the image clear then another milestone. We have also added speakers for listening the voice during the video conferencing if speaker is working without any vibrate voice or we can say in with clear frequency then this is also another milestone. We also have attached it with the printer. If we try to print something and we are able to do so then this is another milestone. In addition to this opening the Microsoft word, Skype and...
Words: 643 - Pages: 3
...For the unit 2 assignment, you will develop a program that will simulate the rolling of a pair of dice. Your program must simulate rolling two dice and keep track of how many rolls are required before snake eyes are rolled (Note: “Snake Eyes” means that both dice show a value of 1). You will need to use a loop structure to repeatedly ‘roll the dice’. You will also need to make use of the if statement to determine if both die show a 1. You can use the example of an if statement below in your program and you can also read ahead to next week's lesson for more information on the if statement. To roll the dice, you can use the following Java statement which generates a random number between 1 and 6 (to represent the six sides of the dice). die1 =...
Words: 486 - Pages: 2
...1.) Pricing and Features | Comparison | Source: newegg.com | | Product | Type | Hard Drive | Processor | RAM | GPU | Price | Acer A6-Series APU A6-6310 | Desktop | 1 TB SATA | AMD 1.8GHz Quad Core | 4 GB DDR3 | Integrated | $ 279.99 | iBUYPOWER NE784K | Desktop | 1 TB SATA + 120 GB SSD | Intel i7 3.3GHz Quad Core | 16GB DDR4 | NVIDIA GTX 980 4 GB | $ 1,849.99 | ASUS F554LA-WS52 | Notebook | 500 GB HDD | Intel i5 2.2GHz Dual Core | 8GB DDR3 | Integrated | $ 529.99 | MSI WS60 2OJ-006US | Notebook | 1 TB HDD + 128 GB SSD | Intel i5 2.5GHz Quad Core | 16GB DDR3 | Nvidia K2100M 2GB | $ 2,199.99 | DIY (price includes peripherals) | Desktop | 2 TB SATA + 250 GB SSD | AMD 8350 4.2GHz 8 Core | 16 GB DDR3 | EVGA GTX 980 4GB | $ 1,301.91 | 2.) A recommendation for a student going to college based on the above table would be the ASUS notebook. I would recommend this based on a number of things. The first and foremost being the low price point for a notebook. I recommend a notebook over a desktop for a student because of its mobility. A student could take it to the library, to class, to study partners’ homes, coffee shops, etc. For the price a student would get all the necessary functionality out of it. The storage space is on the lower side. However 500GB is plenty of space to store Microsoft Office documents, including PowerPoint presentations, through the lifetime of his or her college career. The Processor and RAM is more than adequate to run...
Words: 755 - Pages: 4
...0 ≤ s ≤ 1 territory, where 0 shows no comparability and 1 demonstrates high likeness. This score speaks to a standardized assessment of the quantity of coordinating elements in the capabilities comparing to the antiquities from which the closeness summaries were made. Normalization strategy: The similitude capacity can take after one of two standardization procedures, contingent upon whether the calculation depicts likeness or regulation. For similarity questions, the quantity of coordinating components will be weighed against the aggregate number of elements in both articles. On account of regulation questions, the calculation may dismiss unmatched components in the bigger of the objects' two-capabilities. Since components and capabilities can be self-assertively complex and, besides, manage byte-level structures to which significance is not obviously doled out, the understanding of the similarity score can demonstrate testing. To address this issue, some rough approximate matching calculations make utilization of an experimentally decided limit worth to endeavor to correspond bytewise similarity scores with larger amount properties of hobby. In such cases, the comparability score can be dealt with as a confidence score, where results over the edge quality are viewed as liable to display regular human-conspicuous attributes. Like traditional hash functions, there are a few characterizing qualities that approximate matching techniques ought to show. Every calculation ought...
Words: 758 - Pages: 4
...Microsoft Environment Analysis Abstract Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser. The worm named Code Red was observed on the internet on July 13, 2001. Computers running Microsoft IIS web server were attacked with this worm. Code Red worm did not infect the largest amount of computers until July 19, 2001 with 359,000 hosts being infected. The worm would spread itself in a vulnerability known as a buffer overflow. It would do this by using a long string of the repetition of the letter “N” to overflow a buffer. Spida worm infects via Microsoft SQL installations with administrator accounts that have no passwords defined. Microsoft recommends the “sa” account be set upon installation but many servers are not properly secured after installation. The main purpose of the Spida worm is to export an infected server’s Sam password database. SQL Slammer worm caused a denial of service on Internet host and slowed down general internet traffic. On January 25, 2003 it spread rapidly and infected 75,000 victims in ten minutes. The worm exploited the buffer overflow and would generate random IP addresses, send itself out to those addresses. If one of those addresses happens to belong to a host that is running an unpatched...
Words: 522 - Pages: 3
...Elvie Bramich Unit2 Assignment 2 : Microsoft Environment Analysis 1. WHAT VULNERABILITIES EXIST FOR THIS WORKGROUP LAN BASED ON ADVISORIES?LIST FIVE OF THEM. Answer: 2755801, 2719662, 2854544, 2846338, 2847140. 2. DO ANY VULNERABILITIES INVOLVE PRIVILEDGE ELEVATION?IS THIS CONSIDERED A HIGH-PRIORITY ISSUE? Answer: 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority. 3. IDENTIFY AND DOCUMENT AT LEAST 3 VULNERABILITIES AND THE SOLUTIONS RELATED TO THE CLIENT CONFIGURATIONS. Answer: Three vulnerabilities and Solutions related to client configurations. Advisory Number: 2719662 Microsoft is announcing the availability of an automated Microsoft Fix it solution that disables Windows Sidebar and Gadgets on supported editions of Windows Vista and Windows 7. Disabling Windows Sidebar and Gadgets can help protect customers from potential attacks that leverage Gadgets to execute arbitrary code. Customers should consider the following ways that an attacker could leverage Gadgets to execute arbitrary code: Microsoft is aware that some legitimate Gadgets running in Windows Sidebar could contain vulnerabilities. An attacker who successfully exploited a Gadget vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker...
Words: 468 - Pages: 2
...Unit 2 Journey to Identity Text Analysis |Title: Boy in The Striped Pajamas |Author: John Boyne |Publication Date: 1/05/06 | |I chose this book because (respond in at least 2 sentences): I chose this book because I heard it was fantastic and I’m fascinated with stories from the past. | Connecting with Character: Protagonist ________________Bruno__________________________________ |How do you relate to this character? | |Similarities |Differences | |Beginning: none |Beginning: We are in completely different age groups | | | | | | | |End: We are both curious and have a taste for adventure. |End: I wouldn’t have been so naive ...
Words: 394 - Pages: 2
...Argument 1. ; Newspaper Utah vs. Gay Marriage Derek Kitchen, left, and his partner, Moudi Sbeity, were one of three couples who sued the state. Credit Rick Bowmer/Associated Press Derek Kitchen, left, and his partner, Moudi Sbeity, were one of three couples who sued the state. Credit Rick Bowmer/Associated Press Gay marriage/rights have been an ongoing issue for many years. For me personally it is not an issue at all. Ever since I was a child I’ve had an Aunt that has been a lesbian, even though I never knew until I was in my late teens and early twenties. It didn’t make me feel any different about her. And now, I have many friends that are from all aspects of the LGBT society. (Lesbian, Gay, Bisexual, Transexual) I am a straight male, I have a girlfriend, and we have a child on the way. I am very happy to be straight, and I am also very happy to see my friends that are gay be happy together as well. This debate is one that will likely go on for a long time. Mostly the argument comes down to an opinion debate as well. It has been continually quashed in many political areas and in religious communities. A quote from a Denver reporter in the New York Times from a judge that upheld the rights of Gay unions, “To claim that marriage, by definition, excludes certain couples is simply to insist that those couples may not marry because they have historically been denied the right to do so,” the judges wrote. “One might just as easily have argued that interracial couples are by...
Words: 613 - Pages: 3
...The total score for this section was 22. Using a cutoff of 14, which was the mean of the distribution, we categorized these scores into positive perceptions (14>) and negative perceptions (14≤). The overall scores for these two sections was an indicator of the knowledge levels as well as the associated perceptual attitudes. In the same way, a total score of the systematic and patient-related barriers to breast cancer screening was calculated. Using the same scale (0-2), the total of all items was 22 for the system-related barriers section and 34 for the patient-related barriers section. System-related barriers were classified into low score barrier (>9) and high score barrier (9≤), where 9 represents the mean for the calculated total system-related score. Personal barriers were classified into low score barrier ( ), intermediate score barrier ( ), and high score barrier ( ≤). Cronbach's Alpha for the reliability was 0.867, reflecting an excellent internal consistency of the designed questionnaire. The categorized groups were cross-tabulated using frequency tables and pie charts or bar charts with the socio-economic...
Words: 516 - Pages: 3