OPEN THE ATTACHMENT BELOW AND FOLLOW THE SCREENSHOTS STEP BY STEP AND USE THE AN

OPEN THE ATTACHMENT BELOW AND FOLLOW THE SCREENSHOTS STEP BY STEP AND USE THE AN

OPEN THE ATTACHMENT BELOW AND FOLLOW THE SCREENSHOTS STEP BY STEP AND USE THE ANSWER FILL IN DOCUMENT ATTACHMENT BELOW TO ADD IN THE BUBBLE IN ANSWERS, SHORT-WORD ANSWERS, AND/OR SCREENSHOTS FROM THE ANSWERS YOU RECEIVE FROM THE PACKET TRACER ACCORDING TO THE “FIREWALL AND ACCESS CONTROL” DOCUMENT.
_____
DIRECTIONS ON HOW TO DOWNLOAD PACKET TRACER >>>>>>>
Click the following link (https://auth.socialgoodplatform.com/auth/realms/skillsforall/protocol/openid-connect/auth?client_id=b2e-marketplace&redirect_uri=https%3A%2F%2Fskillsforall.com%2F%2Fdashboard&state=fb50a882-ba15-49d3-becd-d3f87c188672&response_mode=fragment&response_type=code&scope=openid&nonce=82315c40-ff0b-4753-acfa-97f89676cedd&ui_locales=en-US) and log in with the following information (Copy the login information and paste so it’s easier): Username- *********@SNHU.EDU Password- **********
Click the following link(https://skillsforall.com/resources/lab-downloads?userLang=en-US&courseLang=en-US) and scroll down to where it says Cisco Packet Tracer 8.2.1 for MacOS, Ubuntu, and Windows. Click the blue highlighted download link for whichever is compatible with your computer.
The Cisco Packet Tracer should be installed to your computer. You can use this application to do the project assignment. To Download The Cisco Packet Activity “.pkt” file click the following link : Module Four Activity Student File . Then Login with the following information :
username: *****
password: *****
Once logged in click allow to download the packet tracer .pkt file. Open the file that you’ve just downloaded that says “CYB 220 MODULE FOUR ACTIVITY STUDENT FILE.PKT” once you have the Cisco Packet Tracer application already open and running.

1)Ski West, Incorporated, operates a downhill ski area near Lake Tahoe, Californ

1)Ski West, Incorporated, operates a downhill ski area near Lake Tahoe, Californ

1)Ski West, Incorporated, operates a downhill ski area near Lake Tahoe, California. An all-day adult lift ticket can be purchased for $85. Adult customers also can purchase a season pass that entitles the pass holder to ski any day during the season, which typically runs from December 1 through April 30. Ski West expects its season pass holders to use their passes equally throughout the season. The company’s fiscal year ends on December 31.
On November 6, 2024, Ski West sells a season pass to Jake Lawson for $450.
What are the financial statement effects from the sale of the season pass on November 6, 2024
A company provides the following information related to its inventory.InventoryNumber of UnitsUnit CostUnit NRV
Item A3,800$ 52$ 46
Item B4,2002830
Item C2,5003431
Item D1,300222
Calculate ending inventory using the lower of cost and net realizable value rule.
Based on your analysis, prepare the journal entry needed to adjust inventor
3)Sara’s Boutique has the following transactions related to its top-selling Gucci purse for the month of October.
DateTransactionsUnitsUnit CostTotal Cost
October 1Beginning inventory6$ 730$ 4,380
October 4Sale4
October 10Purchase57403,700
October 13Sale3
October 20Purchase47503,000
October 28Sale7
October 30Purchase87606,080
$ 17,160
1. Calculate ending inventory and cost of goods sold at October 31, using the specific identification method. The October 4 sale consists of purses from beginning inventory, the October 13 sale consists of one purse from beginning inventory and two purses from the October 10 purchase, and the October 28 sale consists of three purses from the October 10 purchase and four purses from the October 20 purchase.
2. Using FIFO, calculate ending inventory and cost of goods sold at October 31
3. Using LIFO, calculate ending inventory and cost of goods sold at October 31.4. Using weighted-average cost, calculate ending inventory and cost of goods sold at October 31.
Note: Round your intermediate calculations to 4 decimal places and final answers to 2 decimal places.

IT 423 Module Four Activity Guidelines and Rubric Overview Many organizations an

IT 423 Module Four Activity Guidelines and Rubric
Overview
Many organizations an

IT 423 Module Four Activity Guidelines and Rubric
Overview
Many organizations and IT professionals use cloud services to launch a site because of the cost-benefit and time savings. Not only does it usually take only one professional to set up, but it can be easily preconfigured and deployed. For this activity, you will launch a site on an EC2 instance.
By applying this knowledge, you can launch a website on a virtual machine. To prepare for this activity, log on to your AWS Academy Learner Lab course and access the AWS Console.
As a friendly reminder, you should strive to use the free-tier services in the console whenever possible (even if you have remaining credits on your account).
For the purposes of this activity, imagine that your project manager has tasked you with setting up a test environment for the new company blog, where the rest of the development team can create a demo for review. Instead of providing a hardware server, they wish to use the cloud. Since you have no prior experience with setting up a WordPress site on an EC2 instance in AWS, they have provided a tutorial (the tutorial is attached below) for you to complete this task. WordPress is a commonly used content management system.
Prompt
For this activity, you will:
Set up an EC2 instance and install all the proper components by following the tutorial. Take screenshots to show your work.
Answer the following questions in a typed reflection:Comparison: How does this process differ from traditional in-house server creation? Consider costs, speed, and security.
Advantages: Given the quick turnaround in technology, how can the company take advantage of EC2 instances in its testing environments?
Improvement: Was the tutorial easy to follow? What issues did you run into? What are some possible improvements you would give for the EC2 setup process?
After installing WordPress on your EC2 instance and working through the setup, take screenshots to show your work, and answer the following:Admin Tools: What are three of the included admin tools (listed on the left side menu in the admin panel) in a base setup, and how can they be used to manage content on your site?
Plug-Ins: How are plug-ins used within WordPress and, other than phpMyAdmin, what plug-in is useful for data management? How is it useful?
*** What to Submit ***
Your submission should be in a Word document (.docx) and should include the following:
Answers to the prompt questions
Screenshots that show the following:Running EC2 Instance: This screenshot should be of your EC2 dashboard listing your current running instances. To make it clearer, right-click and rename your EC2 instance to include your name (for instance, JohnSmith-EC2-34256t).
Running EC2 Instance (Public IP Address): The public IP address of your running EC2 instance. This can be found on your main EC2 dashboard list, after clicking on your EC2 instance on the bottom right of the screen.
WordPress on EC2 Instance: The deployment of a WordPress site on an EC2 instance.
Module Four Activity Rubric
CriteriaExemplaryProficientNeeds ImprovementNot EvidentValue
Running EC2 InstanceN/ALaunches an EC2 Instance on AWS Academy and confirms with screenshot and public IP address (100%)Shows progress toward proficiency, but with errors or omissions; areas for improvement may include a screenshot, but no IP address (55%)Does not attempt criteria (0%)25
WordPress on EC2 InstanceN/ADeploys a WordPress site on an EC2 instance and confirms with a screenshot (100%)Shows progress toward proficiency, but with errors or omissions; areas for improvement may include errors with the deployment (55%)Does not attempt criteria (0%)20
ComparisonExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner (100%)Compares in-house server setup to virtual server setup (85%)Shows progress toward proficiency, but with errors or omissions; areas for improvement may include inadequate comparisons on security, costs, or speed (55%)Does not attempt criteria (0%)10
AdvantagesExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner (100%)Reflects on the advantages of EC2 instances in test environments (85%)Shows progress toward proficiency, but with errors or omissions; areas for improvement may include missing key advantages to EC2 instances (55%)Does not attempt criteria (0%)10
ImprovementExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner (100%)Analyzes the process of following the tutorial and ways to improve the setup (85%)Shows progress toward proficiency, but with errors or omissions; areas for improvement may include failure to cover all parts of the tutorial or not providing improvements (55%)Does not attempt criteria (0%)10
Admin ToolsExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner (100%)Analyzes how admin tools can be used to manage content on a site (85%)Shows progress toward proficiency, but with errors or omissions; areas for improvement may include listing tools without describing how they are used (55%)Does not attempt criteria (0%)10
Plug-InsExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner (100%)Analyzes how plug-ins can support data management (85%)Shows progress toward proficiency, but with errors or omissions; areas for improvement may include providing an overview of plug-ins but no detail on how they support content (55%)Does not attempt criteria (0%)10
Articulation of ResponseExceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner (100%)Clearly conveys meaning with correct grammar, sentence structure, and spelling, demonstrating an understanding of audience and purpose (85%)Shows progress toward proficiency, but with errors in grammar, sentence structure, and spelling, negatively impacting readability (55%)Submission has critical errors in grammar, sentence structure, and spelling, preventing understanding of ideas (0%)5
Total:100%

Write a function that takes the name of a chess piece and its position, and retu

Write a function that takes the name of a chess piece and its position, and retu

Write a function that takes the name of a chess piece and its position, and returns all the squares that piece can reach after a single move is made.
Assume there are no other pieces on the board. Name the function position(…), it takes two arguments, the piece name and its position (both parameters are strings).
def position ( piece , loc ) :
The function should return a list; the order of the squares in the list does not matter. Valid piece names and a descriiption of how they move are shown in the Table 1.
DO NOT USE AI ! Please make sure the code works correctly and there are no mistakes. We use Python version 3.11.

research proposal should include the following: Cover page including name, ID, T

research proposal should include the following:
Cover page including name, ID, T

research proposal should include the following:
Cover page including name, ID, Title, and executive summary (250 words max)
Introduction including facts and evidence. Why is the topic important and needs to be addressed by the research community? What is your research area, what is the motivation of the research, and how important is it for industry practice and knowledge advancement?
Background provides basic concepts and terminology, historical facts, significant milestones in the development of the topic and related field
Problem statement provides a clear and concise descriiption of the issues that need to be addressed – What is the specific problem in that research area that you will address (e.g., lack of understanding of a subject, low performance …)?
Objectives and a research question (one question will be detailed in the next assignment). This should provide a list of objectives (Theoretical and practical) that will be achieved through the research to be done – What are the benefits/impact (e.g., a better understanding of an area of study, improved method, tools, etc..…) that will be generated if the research problem is answered?
Preliminary literature review. It provides a summary of related research on the research problem and their strength and weaknesses and a justification of your research – What is known/what has been done by others? And why is your research still necessary?
Research methods define the critical research methods and steps in conducting the proposed research. This can be refined during the next stage (literary review). What should be done, and how should the problem be solved to achieve the proposed objectives? Which research methods (e.g., survey, modeling, case study …) will be used? Attach a project schedule table if necessary.
Risk and constraints, such as access to resources, subjects, equipment, data, etc., should be mitigated in the research.
Preliminary References (20-30), including all factual material not original to you, must be accompanied by a reference to its source. Use APA guidelines on reference and citation style
Appendix – Ethical concerns: if anyone or any organization will assist you, or you are using material from an individual, you get the approval and include it in the proposal. For example, your research is part of a project in your workplace.
Kindly for the reference list use from journals only from google scholar and writer has good citatioins number.

1. Time spent on the system/ Resources spent/ ROI 2. Include 2 case studies/ Inc

1. Time spent on the system/ Resources spent/ ROI
2. Include 2 case studies/ Inc

1. Time spent on the system/ Resources spent/ ROI
2. Include 2 case studies/ Include an organization that implemented this system(preferably in the middle east)/ What was the outcome of the data centralization system?
Paper should be written in simple english

Link to article being reviewed: https://cybercrimejournal.com/menuscriipt/index.

Link to article being reviewed: https://cybercrimejournal.com/menuscriipt/index.

Link to article being reviewed: https://cybercrimejournal.com/menuscriipt/index.php/cybercrimejournal/article/view/190/72
The article review should focus on the following:
Describe how the topic relates to the principles of the social sciences;
Describe the study’s research questions or hypotheses;
Describe the types of research methods used;
Describe the types of data and analysis done;
Describe how concepts from the PowerPoint presentations relate to the article;
Describe how the topic relates to the challenges, concerns and contributions of marginalized groups; and
Describe the overall contributions of the studies to society.
The article review must have a clear and meaningful title ( Article review #1 and Title)
The article review must contain headings that guide the reader through your writing.
The article review must contain a clearly labeled conclusion
The article review must have references and corresponding in-text citations as needed – APA format preferred.
Don’t forget to add the source of your article with the associated https:// as I will read the article that you reviewed.

Project implementation is arguably the most exciting stage of the project manage

Project implementation is arguably the most exciting stage of the project manage

Project implementation is arguably the most exciting stage of the project management process. It is during project implementation that project plans come to life and assumptions can be tested and measured in real-life scenarios.

Project documentation is also an important part of implementation. Documentation records and guides the process, specific steps taken, and inputs and outputs, and it provides additional reference and planning details needed to determine how to carry out each subset of a project.

Based on the Project Plan details, develop the following documentation for your project. All information in the documentation should align with these details in your Project Plan:
1. System diagram – a visual representation—a graphic or chart—of the components of your project
2. Network diagram – a visual representation of how data flows in your network
3. Database design document – represents all data that is stored and maintained in the context of your project and includes these specific items:
An entity-relationship diagram
A data dictionary
Table definitions
4. Cybersecurity plan – a clearly articulated plan that explains how the project data and processes will be secured
5. Simple source code – (may be partial source code) code in HTML/JavaScript, Java, C++, or another programming language for at least one software application
6. Quality assurance and software test plan
Review the Sample Software Test Plan for an example of what information is typically included and how it is typically organized in a software test plan.
I have attached 4 docs for reference to help with completing this assignment