Categories
Internet Technology (IT)

Define and describe disk defragmenter, disk cleanup, and task scheduler.

Define and describe Disk Defragmenter, Disk Cleanup, and Task Scheduler. Provide an example of how the tool can be used.

Categories
Internet Technology (IT)

Why are these tools included with the os?

Define and describe Windows Defender, Microsoft Security Essentials, and Malicious Software Removal Tool. Why are these tools included with the OS?

Categories
Internet Technology (IT)

In what order should you install the operating systems and hypervisor?

Post a response to a new thread to ONE of the following topics. Your post should be in complete sentences, in your own words, and with correct spelling/grammar/punctuation. Be specific and detailed when posting. Vague or incomplete responses will not receive full credit.
Since this is the final discussion forum, you may also include a farewell message to the class.
Topics:
Your boss has instructed you to set up a virtualization workstation that will provide help-desk users with access to Windows 10 Pro and Home, Windows 7 Pro and Home Basic, Ubuntu Desktop, Linux Mint, and Android Oreo and Pie. She also wants you to use Client Hyper-V as the hypervisor. In what order should you install the operating systems and hypervisor? Why is this important?
You’re responding to a troubleshooting ticket about a laser printer in HR that isn’t working. According to reports, the printer runs the print job and successfully sends the paper through. The paper shows the text prints correctly. However, the toner smudges easily and sticks to other papers, equipment, and clothes. Which part in the printer probably needs replacing? List the steps necessary to complete the task.

Categories
Internet Technology (IT)

Your outline should include 5 to 7 major points (“slide titles”) followed by 3 to 5 supporting points for each.

Your task: You have been asked to give a presentation at Business Round Table Event. Attendees are owners of small businesses and corporate managers whose employees are now working from home due to the global pandemic. The need for physical security to protect equipment and other assets has risen in priority for these business owners and managers as they realize that they have a gap in their business continuity planning and response which needs to be addressed.
Background: During the global pandemic, many companies throughout the region, both small businesses and larger corporate entities, successfully transitioned to “work from home” allowing them to continue operating despite the issuance of “work from home” and “stay at home” orders from governmental entities. Storefronts and offices for non-essential businesses and services were shuttered or reduced to minimal staffing. Concerns about the potential for thefts, break-ins, and other forms of unauthorized entry have been raised in many organizations who were not prepared for extended periods in which their facilities would be unoccupied / unattended.
For this presentation, identify and discuss five or more technologies and countermeasures which can be implemented to address the problem of providing physical security in an unoccupied/unattended facility (you should not propose any measures that rely upon guards or other personnel who would need to be physically present). Your presentation should address both preventive and detective controls for physical security, e.g. perimeter fencing, gates, bollards, lighting, CCTV, audio scanning, alarm systems, key-card controlled entry, etc.
Format: This week, the format for your deliverable (posting) will be “Talking Points.” Talking points are presented in outline format and contain the content that you would put on slides in a slide deck. Your outline should include 5 to 7 major points (“slide titles”) followed by 3 to 5 supporting points for each. Remember to put enough information into the talking points that your peer reviewers can understand what you intend to cover in each section of your briefing. Remember to introduce the topic at the beginning, present your analysis, and then close your briefing with an appropriate summary. Include a list of sources (3 or more) which attendees could refer to if they wish to fact check your work.

Categories
Internet Technology (IT)

Resources

Assignment Content
During your weekly trip to the grocery store, you purchase bread, milk, cold cereal, bananas, and ice cream. The purchase was made using a debit card.
Create a table listing at least 7 data items collected in this transaction and how they are entered into the system.
Submit your assignment.
Resources
Center for Writing Excellence
Reference and Citation Generator
Grammar Assistance

Categories
Internet Technology (IT)

See the following links for guidelines.

Case Study (CS2) – Deutsche Bank: Pursuing Blockchain Opportunities (A)
Your case study analysis should be a thoughtful write up including:
a brief case analysis
key questions and answers
from the case
from your unique perspective
a
summary and/or recommendations
relevance to Digital Transformation ideas and concepts
relevance to strategic thing and planning
It is important to tie the concepts of digital mastery and the readings back to the case when applicable.
The document MUST follow General APA Guidelines. See the following links for guidelines.

Categories
Internet Technology (IT)

Instructions on how to add audio to microsoft® powerpoint® presentations can be found on the microsoft® office® support site: add or delete audio to your powerpoint® presentation.

Week 2
Wk 2 – Computer Networking and Configurations [due Mon]
Assignment Content
You are hired as a chief technology officer (CTO) of a start-up company, which has two branches: one in Los Angeles and one in San Francisco. The company hired employees to begin working on the design of the product. As CTO, you need to explain to the board of directors your idea in interconnecting the two offices to ensure consistency and collaboration. Employees’ computer systems need to be connected and permitted to connect remotely (i.e. from outside of the office).
The following needs to be taken into consideration:
Network topology
Network protocols
Cost of implementation
Cloud productivity software
Choose a delivery method from the following options to present your explanation to the board of directors:
Visual diagram with a brief explanation (PDF format)
Diagrams can be made using any Microsoft® Office® product or a site like Lucidchart.
Matrix
5-slide presentation with narration or detailed speaker notes
Instructions on how to add audio to Microsoft® PowerPoint® presentations can be found on the Microsoft® Office® Support site: Add or Delete Audio to Your PowerPoint® Presentation.

Categories
Internet Technology (IT)

The number will not be displayed to players, but it will be used to secretly set up the game world and put a dragon in one of the tunnels.

Lab: Tunnels and Dragons
The Original Adventure Game Was Text Based. Gamers spent hours and hours immersed in a world of 11 caves, treasure, riddles, and dangers. In this lab, you’ll get into that retro vibe while designing the gateway to an adventure game. It is a fun way to learn some programming basics and gain appreciation for the programmer’s mind-set.
Requirements:
For this lab, you’ll need a Windows or Apple computer with access to the Internet. The lab requires a Python development environment. You can use a locally installed Python IDE, or you can follow the instructions in Step 1 to access a free Web-based IDE. The lab instructions are generalized; they provide helpful guidelines, but not specific steps. Work carefully; programming requires precision, so type program statements exactly as they are printed. If you encounter syntax or runtime errors, look carefully at each line to find the errors.
Assignment:
1.
Search Google for Python online to locate an interactive Python programming environment, such as Repl.it or Codevolve. If the site requires registration, go ahead and register. (Hint: Be sure to use Python 3.0 or above. The syntax is slightly different from that of Python 1.0 and 2.0.) You may also opt to download Python at python.org. Python is an open source tool.
2
Enter a comment and a command to output a message:
Type # Adventure Game YourName on line 1, substituting your full name for “YourName.”
Press the Enter key to move down to line 2, and then type the following all on one line:
monofont
Run your program. (Hint: For Repl.it, select the Run button; with Codevolve, select Run Program.)
If you receive an error message, make sure you’ve included the parentheses and quotation marks, and then try to run the program again.
monofont
3
Generate a random number.
Your Adventure program must generate a random number between 1 and 2. The number will not be displayed to players, but it will be used to secretly set up the game world and put a dragon in one of the tunnels.
The secret number will be stored in a variable that is called dangerTunnel.
Add the following statements to your program:
Test your program to make sure you don’t get an error message. The output should be “You are lost underground in a maze of tunnels.” The screenshot below shows the program and output within the Repl.it environment.
4
Ask players to choose a tunnel.
The next program segment asks players to select tunnel 1 or tunnel 2. The use of int in this statement ensures that the numbers entered by players are stored as integers.
Enter the following all on one line:
monofont
5
Compare the chosen tunnel to the tunnel that contains a dragon, and then tell players if they are safe. Enter the following, making sure to indent the two print statements as shown:
A screenshot of the code with text reads “print (“You chose tunnel “, tunnelChoice) if tunnelChoice == dangerTunnel: print (“You entered a tunnel with a dragon. Watch out.”) else: print (“You entered an empty tunnel. You are safe for now.”)”
Run the program and debug any syntax errors that might result from missing punctuation.
6
Make sure the program does not contain any logic errors.
The program should display the “watch out” message when players select the number of the tunnel that contains a dragon. But how do you know if the program is doing that? To find out, you can print the number of the dangerTunnel just as a test. You can comment it out later if the program is working correctly.
Insert a print statement as line 5, so the program contains the following statements:
A screenshot of the code that reads “# Adventure Game Sarah Smith print (“You are lost underground in a maze of tunnels.”) import random dangerTunnel = random.randint(1,2) print (“Dragon in tunnel “, dangerTunnel) tunnelChoice = int(input(“Choose tunnel 1 or tunnel 2: “)) print (“You chose tunnel “, tunnelChoice) if tunnelChoice == dangerTunnel: print (“You entered a tunnel with a dragon. Watch out.”) else: print (“You entered an empty tunnel. You are safe for now.”)”The supporting text pointing the code line five reads “Add this line.”

Categories
Internet Technology (IT)

Reference and citation generator

Assignment Content
During your weekly trip to the grocery store, you purchase bread, milk, cold cereal, bananas, and ice cream. The purchase was made using a debit card.
Create a table listing at least 7 data items collected in this transaction and how they are entered into the system.
Submit your assignment.
Resources
Center for Writing Excellence
Reference and Citation Generator
Grammar Assistance

Categories
Internet Technology (IT)

Present your case for upgrading to a database-driven solution for tracking sales and inventory to the store owners.

Wk 3 – Automating Sales and Inventory
Assignment Content
As the new manager of a convenience store, you have noticed issues with the manual method of tracking sales using paper sales tickets and spreadsheets, as well as shortages on some of the more popular items carried in the store.
Present your case for upgrading to a database-driven solution for tracking sales and inventory to the store owners. They are concerned about the cost and want to know what this upgrade would entail.
Include the following:
How a system could improve efficiency
How a system could improve accuracy
How sales of individual items would be entered
How the database would store the data compared to the current spreadsheet method
How monitoring of inventory levels based on sales using the database would work
Prepare A written business proposal (approximately 2 pages)