1. The purpose of this assignment is to teach you about encryption and for you to be able to encrypt and protect your important documents before you store them in the cloud.
2. Please be careful with the encryption. If you loose or forget the password of your encrypted file, you will not be able to recover the documents.
3. Take Backup of your System. It is important to take backup anytime you are installing or removing a program. It is also important to take regular backups.
4. Download an encryption software. I recommend veracrypt (https://www.veracrypt.fr/en/Home.html (Links to an external site.)) but you are free to use any software other than built in filevault or bitlocker. Create an encrypted container of 10MB. Add a file to the container. Try to mount and dismount and see how you can access the files.
5. If you get a message, "OSXFuse seems to be missing on your machine. VeraCrypt requires OSXFuse 2.5 or above." Go ahead and install that too. OSXfuse adds to Mac's file handling capabilities.
6. Take 4-5 screenshots of the entire process and paste it on a word document and upload it here.
In: Computer Science
Database Normalization
Please if you don't know the answer don't comment as "Need More
Information."
Introduction:
This lab is designed to help you with practicing normalization
concepts implementation.
Submission:
After finishing the task below, convert the word file to a PDF
document and submit it to Brightspace.
Task:
Using this file, normalize the following tables to be in the third
normal form. Remember to consider having the data when you do the
normalization.
| Course_Title | Course_Credit_Hours | Professor_ID | Professor_Name | First_day_work | Professor Specialization_ID | Professor Specialization |
| Accounting, Finance | 3,3 | 234 | Patric | 14/2/2008 | 7 | Accounting |
| Marketing, Business administration | 3,2 | 564 | Mary | 15/4/2010 | 5 | Business Management |
Notes: • Every course can be taught by more than one professor and each professor can teach more than one course
Table B
| Employee_ID (P.K) | Project_ID (P.K) | E_Name | P_Name | E_Assigned_Hours |
| 100 | 101 | Cedric | Acct. | 13 |
| 200 | 110 | Natali | Finance | 15 |
| 300 | 111 | Maria | BD | 12 |
Marking Criteria:
• Entities titles
• Attributes:
• PKs:
• FKs:
• Relationships:
• Handling data:
In: Computer Science
1 of the following government intervention programs:
WRITE a 700- to 1,050-word summary of your analysis. Identify the intervention and the market failure leading up to the intervention. Complete the following in your paper:
In: Economics
As a auditor, I was assigned to a team to audit possible payroll fraud. The company we were auditing always handed the Friday payroll checks to the department supervisor to disburse. On this visit it was my responsibility to gather a signatures, verify the employee ID to the payroll register for the shipping/warehouse department. Paychecks were always presented at 9AM, so the employees were there to pick them up as we were told.
This one department always had a high turnover rate. On this Friday I was in the warehouse managers office ready to go. One by one the drivers and warehouse personnel came in with ID and signed for their checks. At the end of the time period there were three checks leftover. The warehouse manager said three employees were out doing deliveries. I said have them see me when they come back, I will be here all day (10 hours).
Question:
1. Identify one way that the warehouse manager could defraud the company under the present system.
2. Discuss a control feature that the company can use to safeguard against fraud.
In addition, there is a 200 word minimum for your initial post.
In: Accounting
(using for loop, parameters, if, else condition only )Python: Write a program that prompts the user to enter a positive integer value, and compute the following sequence: • If the value is even, halve it. • If it's odd, multiply by 3 and add 1. • Repeat this process until the value is 1, printing out each value. • Then print out how many of these operations you performed. If the input value is less than 1, print a message containing the word Error and exit the program. assume that the input will have smaller than 200 operations. This is how the output should look like: Initial value is: 9 Next value is: 28 Next value is: 14 Next value is: 7 Next value is: 22 Next value is: 11 Next value is: 34 Next value is: 17 Next value is: 52 Next value is: 26 Next value is: 13 Next value is: 40 Next value is: 20 Next value is: 10 Next value is: 5 Next value is: 16 Next value is: 8 Next value is: 4 Next value is: 2 Final value 1, number of operations performed 19
In: Computer Science
In: Economics
Super Lumber Inc. is a retailer of hardwood flooring in the US. Its basic business model is to offer great value, superior service, and a broad selection of high-quality hardwood flooring products. The strategic objective, or company mission, is to continue to increase revenues and profitability by strengthening its position as a leading provider of hardwood flooring within its growing market. Specific business objectives are: 1. expand its store base; 2. Improve productivity and efficiency; 3. build on core strengths; 4. leverage its multichannel sales and brand marketing. Which of the following identified risks should be considered having a key link with the 2nd objective, (in another word, a key risk to the 2nd objective), hence should be the focus of internal audit function?
Select one: a. Lack of availability of sufficient suitable hardwood in the market. b. Decrease in home remodeling activity and homebuilding industry in the event of economic decline. c. Increased competition in terms of price and variety of products from other flooring companies operating in the same areas as Super Lumber Inc. d. Inability of management information systems to support planned expansion and development of new stores.
In: Accounting
The following is a free response question to be used as practice for future exams. You can complete the assignment in this document, using the drawing tools in Word (or any photo editing program) or print this document, and complete the activity by hand, submitting a scan or photo of your work. When you are done, submit the assignment for grading by your instructor. This question will be graded out of 6 points.
1. The table below shows the production possibilities curves for two countries: China and the United States. Using equal amounts of resources, China can produce 200 computers or 400 cars, whereas the United States can produce 200 computers or 1,200 cars.
|
CARS |
COMPUTERS |
|
|
United States |
1200 |
200 |
|
China |
400 |
200 |
(a) Calculate the opportunity cost of a computer in China.
(b) If the two countries specialize and trade, which country will import computers? Explain.
(c) If the terms of trade are 4 cars for 1 computer, would trade be advantageous for each of the following?
(i) United States
(ii) China
(d) If productivity in China doubles, which country has the comparative advantage in the production of cars?
In: Economics
Throughout this course, you will be learning about object-oriented programming and demonstrating what you learn by writing some programs in Java. The first step will be to install and integrated development environment (IDE) that will be where you will write and compile your programs. You will also write your first program using Java to show that you have correctly installed the IDE.
The project instructions and deliverables are as follows:
In: Computer Science
Read the following scenario. Janice was hired by Dream Massage to be a massage therapist. She is engaged as an independent contractor and, therefore, receives no tax withholding or employment benefits. Dream Massage requires Janice to work a set schedule, provides her with clients and all her massage products, and exercises complete control over how Janice does her work. In addition, when Janice shows up to work the first day, she is informed by Dream Massage that she cannot wear her hijab as it violates the company's dress code policy. The owner of Dream Massage comes to you, a human resources (HR) consultant, to find out if Janice is properly classified as an independent contractor and if there is potential liability concerning the hijab. Create a 700- to 1,050-word HR report for Dream Massage in which you examine the employment issues presented in the scenario. Include the following: Analyze whether Janice qualifies as an employee or should be classified as an independent contractor. Discuss whether Dream Massage has potentially violated any employment discrimination laws. Analyze ethical considerations associated with the maintenance of a rigid company dress policy. Cite a minimum of three references.
In: Operations Management