FTK report
PART I: Familiar with FTK Imager
Bonus Exercise 1 (5 points): Assume that you have a write-protected USB device.
Image a USB device or a floppy disk to create an image in a DD format. (Note: You are not able to use the 841_Win_Forensics_Updated VM to perform this bonus exercise. You have to use your own computer for this exercise).
Provide a snapshot from FTK Imager.
Requires: a USB device or a floppy disk
Launch FTK Imager
Click File > Create Disk Image
Click Physical Drive and Next
Select the device and select Raw (dd) Image Type
Exercise 2: View images
Click File > Add Evidence Item
Select Image file and then click Next
Browse to your WinLabEnCase.E01 image and click Finish
View the image in the Evidence Tree view
Question 1: What is the VBR file used for? How to export this file? How to export a file Hash?
VBR file contain information that will enable client machine to use the remote application . we can export this file by press export , hash file will export as a plain text.
Exercise 3: Convert the WinLabEnCase image to a DD image
Exercise 4: Verify images
Question 2: What are the results of verification? Comparing both hashes, are they same or not?
The verification matched and both hashes are the same
PART II: Working with FTK 1.8x
DETAILED PROCEDURES THAT MAY HELP YOU TO GO THROUGH THE FTK SOFTWARE
Exercise 1: Starting a New Case
Question 3: What information is required to create a new case using the FTK New Case Wizard?
The information needed are : investigator name , address , phone , email , case number , case name , case path , case folder and case destination
Question 4: What are the types of evidence that can be added to a case in FTK?
Image of drive , local drive , folders and individual file
Exercise 2: Working with FTK
Click the OVERVIEW tab; note the numbers for each type of file.
Question 5: How to make the number of the Checked Items to go up? How to make the number of Flagged Thumbnails to go up?
After open each file , items will added to the checked item folder , flagged thumbnails will go up with each file we change the point which down it from red to green .
File Signatures
A file type (JPEG, Word Document, MP3 file) can be determined by the file’s extension and by a header that precedes the data in the file. If a file’s extension has been changed, then the only way to determine its type is by looking at its header.
Question 6: Click on Bad Extension from Overview tab. Do you find any signature mismatch? What are they?
There are 11 files , 8 of them are TMP extension , 1 XLS , 1 PDF and 1 DOC
Data Carved Files:
Question 7: Check the number of Data Carved Files, what is the number?
zero
Question 8: Check the number of Data Carved Files from Overview, how many files added to the case by data carving?
TWO
Question 9: What are those files found by performing data carving process? Why is this process so important?
The files which found are the files with GIF extension , th.
841- Advanced Computer Forensics
Unix Forensics Lab
Due Date: Please submit your answers to the Linux Lab dropbox by midnight of July 2nd 2013.
******************************************************************************
To challenge yourself, you may work on the advanced Unix forensics lab analyzing the Lewis USB image and writing a report about this case. See the file UNIXForensicslab-usb for details.
******************************************************************************
Objective
This lab will use Autopsy, PTK, Sleuthkit and foremost to analyze a given image. Read the entire document before starting to be sure you have all the necessary tools and files required to complete the lab. You should further explore the tools used in this lab to ensure your familiarity with alternative investigation options.
Deliverable
Answer all the exercise questions and include screenshots as supporting data if necessary.
OPTIONS:
You can work on this lab by
1. using a bootable live CD, for example, backtrack 5
2. using the RLES vCloud.
3. using SANS Investigate Forensic Toolkit (SIFT) Workstation, http://computer-forensics.sans.org/community/downloads.
4. installing the software on your own system (check the appendix for more installation details).
If you choose to use the RLES vCloud, please continue.
Lab Setup for using RLES vCloud
This lab is designed to function on the RLES vCloud via https://rlesvcloud.rit.edu/cloud/org/NAT. Please FIRST read the RLES VCLOUD user guide in myCourses > Content > Hands-on Labs.
Special Browser Setting Requirement (See RLES VCLOUD user guide)
In order to view the console of virtual machines, the VMRC plugin must be installed within the browser. The first time the console is accessed, the plugin can be downloaded. In Internet Explorer, https://rlesvlcoud.rit.edu must be added to the Local intranet zone.
(Go to Tools -> Internet Options -> Security tab -> Local intranet, click the Sites button, click Advanced and add the URL.)
The interface is available by navigating to https://rlesvcloud.rit.edu/cloud/org/NAT. (Yes, we know the certificate wasn’t issued by a commonly trusted certificate authority. Also check the user guide for your browser compatibility).
Use your RIT Computer Account credentials to gain access to the rlesvcloud interface.
To start, you will first create your vApp by following the instructions of Add a vApp Template to My Cloud in the RLES VCLOUND user guide. Make sure to follow the vApp name convention defined in the RLES VCLOUND user guide and select the vApp template, 841_Linux_Forensics, from the Public Catalogs. No network/IP address is needed for this lab.
Double click on the virtual machine to power it on, now you should have a Linux forensics machine with all the forensics’ tools to provide you with a highly interesting experience in forensics investigation. Login to the virtual machine with
Username: root
Password: netsys
Exercise 1:Using Autopsy and Sleuthkit
Require.
Digital Forensic Examination Summary Report(for ALL lab assignme.docxlynettearnold46882
Digital Forensic Examination Summary Report
(for ALL lab assignments except Lab 0; remove red writing before submitting assignments)
Examiner: your name and company (simulated)
______________________________________________________________________________
Case Background: give an adequate description of the scenario as if the reader knows nothing about this case. why are you conducting this examination? who requested it? This should be more than 2-3 sentences. Use what's given to you in the lab scenario assignment to establish a quality case background.
______________________________________________________________________________
Legal Authority: (to conduct exam i.e. warrant, consent, government / organizational property. This must be always stated in a report):
______________________________________________________________________________
Tools Used:
for the readers sake who often are not technical, break up this section into subsections
Hardware
Software
(include full software versions (simulate when necessary); include hardware i.e. the system you used to conduct the examination with serial numbers (your desktop / laptop). Also, simulate using a hardware write-blocker if the scenario doesn't specify how the data is write protected.
A write-blocker prevents any writes to the media being examined so the examiner can acquire it safely without altering original evidence.)
______________________________________________________________________________
Initial Processing (show both acquisition and verification hash sums; list the media examined with description and serial number / see Addendum A) example verbiage: "The processing included inspection, photography, anti-virus scan, and the imaging laptop. The imaging of the media created forensic evidence files for use in the subsequent forensic examination. Methods were forensically sound and verifiable."
______________________________________________________________________________
Preliminary Findings: (out of analyzing X number of files, X were of forensic value; briefly describe the partition and file structure of the media examined; this is a synopsis of what you found of forensic value.)
______________________________________________________________________________
Detailed Findings: (this is where most or all of the case questions can be answered along with whatever else is required in the grading deliverables. This will always be the longest part of your report. If you feel that some detailed findings would be better placed in an Addendum, that's a good place too).
______________________________________________________________________________
Conclusions / Further Actions Required: (just state the facts; recommend what other devices could be examined to further the case; recommend interviews of subjects if applicable; are there protected files that need decryption?
Do not make judgment calls i.e. John Smith should be removed from his position; give the client the facts and let th.
841- Advanced Computer Forensics
Unix Forensics Lab
Due Date: Please submit your answers to the Linux Lab dropbox by midnight of July 2nd 2013.
******************************************************************************
To challenge yourself, you may work on the advanced Unix forensics lab analyzing the Lewis USB image and writing a report about this case. See the file UNIXForensicslab-usb for details.
******************************************************************************
Objective
This lab will use Autopsy, PTK, Sleuthkit and foremost to analyze a given image. Read the entire document before starting to be sure you have all the necessary tools and files required to complete the lab. You should further explore the tools used in this lab to ensure your familiarity with alternative investigation options.
Deliverable
Answer all the exercise questions and include screenshots as supporting data if necessary.
OPTIONS:
You can work on this lab by
1. using a bootable live CD, for example, backtrack 5
2. using the RLES vCloud.
3. using SANS Investigate Forensic Toolkit (SIFT) Workstation, http://computer-forensics.sans.org/community/downloads.
4. installing the software on your own system (check the appendix for more installation details).
If you choose to use the RLES vCloud, please continue.
Lab Setup for using RLES vCloud
This lab is designed to function on the RLES vCloud via https://rlesvcloud.rit.edu/cloud/org/NAT. Please FIRST read the RLES VCLOUD user guide in myCourses > Content > Hands-on Labs.
Special Browser Setting Requirement (See RLES VCLOUD user guide)
In order to view the console of virtual machines, the VMRC plugin must be installed within the browser. The first time the console is accessed, the plugin can be downloaded. In Internet Explorer, https://rlesvlcoud.rit.edu must be added to the Local intranet zone.
(Go to Tools -> Internet Options -> Security tab -> Local intranet, click the Sites button, click Advanced and add the URL.)
The interface is available by navigating to https://rlesvcloud.rit.edu/cloud/org/NAT. (Yes, we know the certificate wasn’t issued by a commonly trusted certificate authority. Also check the user guide for your browser compatibility).
Use your RIT Computer Account credentials to gain access to the rlesvcloud interface.
To start, you will first create your vApp by following the instructions of Add a vApp Template to My Cloud in the RLES VCLOUND user guide. Make sure to follow the vApp name convention defined in the RLES VCLOUND user guide and select the vApp template, 841_Linux_Forensics, from the Public Catalogs. No network/IP address is needed for this lab.
Double click on the virtual machine to power it on, now you should have a Linux forensics machine with all the forensics’ tools to provide you with a highly interesting experience in forensics investigation. Login to the virtual machine with
Username: root
Password: netsys
Exercise 1:Using Autopsy and Sleuthkit
Require.
Digital Forensic Examination Summary Report(for ALL lab assignme.docxlynettearnold46882
Digital Forensic Examination Summary Report
(for ALL lab assignments except Lab 0; remove red writing before submitting assignments)
Examiner: your name and company (simulated)
______________________________________________________________________________
Case Background: give an adequate description of the scenario as if the reader knows nothing about this case. why are you conducting this examination? who requested it? This should be more than 2-3 sentences. Use what's given to you in the lab scenario assignment to establish a quality case background.
______________________________________________________________________________
Legal Authority: (to conduct exam i.e. warrant, consent, government / organizational property. This must be always stated in a report):
______________________________________________________________________________
Tools Used:
for the readers sake who often are not technical, break up this section into subsections
Hardware
Software
(include full software versions (simulate when necessary); include hardware i.e. the system you used to conduct the examination with serial numbers (your desktop / laptop). Also, simulate using a hardware write-blocker if the scenario doesn't specify how the data is write protected.
A write-blocker prevents any writes to the media being examined so the examiner can acquire it safely without altering original evidence.)
______________________________________________________________________________
Initial Processing (show both acquisition and verification hash sums; list the media examined with description and serial number / see Addendum A) example verbiage: "The processing included inspection, photography, anti-virus scan, and the imaging laptop. The imaging of the media created forensic evidence files for use in the subsequent forensic examination. Methods were forensically sound and verifiable."
______________________________________________________________________________
Preliminary Findings: (out of analyzing X number of files, X were of forensic value; briefly describe the partition and file structure of the media examined; this is a synopsis of what you found of forensic value.)
______________________________________________________________________________
Detailed Findings: (this is where most or all of the case questions can be answered along with whatever else is required in the grading deliverables. This will always be the longest part of your report. If you feel that some detailed findings would be better placed in an Addendum, that's a good place too).
______________________________________________________________________________
Conclusions / Further Actions Required: (just state the facts; recommend what other devices could be examined to further the case; recommend interviews of subjects if applicable; are there protected files that need decryption?
Do not make judgment calls i.e. John Smith should be removed from his position; give the client the facts and let th.
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxSANSKAR20
Evaluate a Health Website
Name Click here to enter text. Course Click here to enter text.Date Click here to enter text.
Pick one disease disorder or condition. Find two medicine-based websites that discuss it, such as WebMD, MedicineNet, the American Heart Association website, the American Diabetes Association website, and so on. Compare how the two websites you pick treat the subject. Then answer the following questions.
Question 1: What disease or condition did you pick?
Click here to enter text.
Question 2: What are the two websites you looked at?
1.
2.
Question 3: What differences did you find in how the two websites described the disease or condition?
Click here to enter text.
Question 4: Did one of the websites seem to be more reliable? If so, which, and why? If not, why not?
Click here to enter text.
Question 5: After reading the article, what three questions might a patient have about the condition that weren’t addressed?
1.
2.
3.
Page 1
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 20 ...
Assessment item 1 File Systems and Advanced Scripting .docxdavezstarr61655
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 200G.
3. uni2 with mount point /users/deleted& reservation of 100G.
4. uni3 with mount point /users/staff& reservation of 100G.
5. uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for how you will ensure the volumes
outlined above are provisioned whilst ensuring there data protection. Document this accordingly
along with a suitable rationale for your design.
Part 3: Implementing the Filesystem (4 marks)
Given the strategy defined in part two, your job is to implement the storage system.
1. To do this install the latest version of Ubuntu Server on a virtual machine. You will need to
ensure the networking is bridged and the root portioning is managed appropriately. You will
need to add additional virtual disks to meet the storage needs above.
2. Install the ZFS package and configure it such that pools of storage are created to meet the above
requirements including redundan.
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...Blancco
Do organizations have a defined process for wiping sensitive company information before discarding/reselling old drives and mobile devices?
In this webinar, Randy F. Smith and data security experts from Blancco Technology Group explore the following topics:
- How easily residual data can be recovered from hard drives and mobile devices
- The risks leftover data can pose to organizations
- The most secure ways to wipe company data from end-of-life devices and drives
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxchristinemaritza
Chapter 8: Common Forensic Tools
Overview
In this chapter, you'll learn more about:
· Explore disk imaging tools, forensic software tool sets, and miscellaneous software tools
· Understand computer forensic hardware
· Assemble your forensic tool kit
The first steps in any investigation nearly always involve old-fashioned detective work. As a forensic investigator, you need to observe and record your observations first. Once you start examining media contents, you'll need some tools to help you find and make sense of stored data.
Forensic investigators and computer examiners need several different types of tools to identify and acquire computer evidence. Some evidence is hidden from the casual observer and requires specialized tools to find and access. In this chapter, we'll examine a sampling of some common and popular tools available to carry out computer forensic tasks.
Disk Imaging and Validation Tools
After identifying the physical media that they suspect contains evidence, forensic investigators must make sure media is preserved before any further steps are taken. Preserving the media is necessary to provide assurance the evidence acquired is valid.
Chapter 3, "Computer Evidence," and Chapter 4, "Common Tasks," both emphasize the importance of copying all media first and then analyzing the copy. It's usually best to create an exact image of the media and verify that it matches the original before continuing the investigation. It's rare to examine the original evidence for any investigation that might end up in court. For other types of investigations, however, forensic investigators might perform a targeted examination on the original evidence. For example, assume the job is to examine a user's home folder on a server for suspected inappropriate material. It might be impossible or extremely difficult to create a mirror image of the disk drive, but the disk can be scanned for existing or deleted files while it is in use. Although examining media while in use might not always be the best practice, informal investigations use this technique frequently.
To Copy or Not to Copy?
Whenever possible, create a duplicate of the original evidence, verify the copy, and then examine the copy. Always invest the time and effort to copy original media for any investigation that might end up in a court of law. If you are sure your investigation will not end up in court, you might decide to analyze the original evidence directly. This is possible and desirable in cases where copying media would cause service interruptions.
Your choice of tools to use depends on several factors, including:
· Operating system(s) supported
Operating system(s) in which the tool runs
File systems the tool supports
· Price
· Functionality
· Personal preference
The following sections list some tools used to create and verify media copies. Some products appear in two places in the chapter. That's because several products play multiple roles. This section lists several products ...
SysInfoTools MS Word DOCM Recovery software is an advanced solution to fix corrupt .docm files of Microsoft Word. It recovers maximum possible data from corrupt .docm files and enables users to see the preview of recovered data in both text and image form. It supports recovery of multiple .docm files at a time. The software maintains the file structure, formatting and properties while recovering corrupt .docm files.
Examine Evidence PartitionsAnalysis of four small partitions ext.docxcravennichole326
Examine Evidence Partitions
Analysis of four small partitions extracted from a suspect's hard drive. Your analysis will assess the nature of each partition—specifically, whether each partition is encrypted, compressed, wiped, or none.
Demonstration and hands-on training are always most effective, so you turn to the former in Step 2. Digital forensic investigators need to understand how to examine evidence partitions. In a case that you are working on currently, the suspect's computer contains four disk partitions. A disk partition is a portion of a whole disk with its own file system. Access the virtual lab to examine evidence partitions in order to determine whether files on each partition are encrypted, defragmented, securely deleted, or none of these. If they have been encrypted, what process was used: NTFS encrypted file systems, BitLocker, PGP, etc.?
After conducting your analysis, you demonstrate how you would document your findings in a formal forensic report. Include descriptions of destruction strategies such as wiping, overwriting, corruption, and degaussing. Make sure these strategies are explained in terms that IT temps, recent hires, and other nonexperts can understand in a consistent way. This will be the first section of your investigative report.
Share this section of the report with a colleague (your instructor) for review and feedback before continuing to the next step, where you will search for hidden data in files. Make sure to incorporate any suggested changes. This will be the first section of the sample investigative report to be included in the job aid submitted in the final step.
Lab Work Instruction:
Examine Evidence Partitions
You are provided four NTFS partitions from a hard drive, each about 100MB in size. One of the partitions has been defragmented, one used file encryption, and one used secure file deletion; no action has been taken on the other. Your task is to determine which action (if any) has been applied to each partition.
You will examine each partition using FTK (Imager is sufficient) and the Windows operating system. Your guidance for determining which actions have been taken on a specific partition are as follows:
Normal (no action):
· files are scattered throughout the partition
· you will see deleted files with content
· you will see data in file slack space
Defragmentation:
· files are stored in contiguous locations
· file slack space is zeroed out
· measurable with native OS tools
Encryption:
· file contents are “jibberish” (very little readable plain text)
· FTK may show a "key" icon
· OS may indicate encryption (e.g., "lock" icon)
Secure Wipe:
· deleted files in unallocated space will not contain any readable content
· there will not be any data in file slack space
To examine each of the partitions, perform the following steps until you are confident about which action was applied to each partition. The partitions for this exercise are raw dumps and are named partition_blue.d.
The Doc Repair software of SysInfoTools is an ideal solution for MS Word users. The software helps users repair corrupt word documents (Doc) and recover maximum recoverable data from them. It enables users to recover single as well as multiple Doc files simultaneously. It safely restores data from selected Doc file(s) such as: formatted text, images, tables, graphs, charts, hyperlinks, headers & footers without causing any damage or alteration. It supports previewing of recovered data in two forms: text and image. The software is available with free demo version to examine the performance and features before purchasing the full version.
OpenOffice Writer Repair software of SysInfoTools is an advanced solution to repair highly corrupt ODT documents of OpenOffice Writer and recover maximum possible data from them. The software successfully resolves all the error messages from corrupt open office documents. It supports recovery of multiple corrupt ODT files simultaneously. The ODT recovery is executed in two recovery modes: standard and advanced mode. It supports all major versions of OpenOffice (from v1.0 to v3.4). The preview of recovered data is shown in two forms: text and image form. And, all the recovered data can be saved in two formats: ODT and HTML.
SAMPLE Project (Answers and explanations are in red)I opened t.docxagnesdcarey33086
SAMPLE Project (Answers and explanations are in red)
I opened the Week 1 Project from Doc Sharing.
Projects
Project 1: Working With the Data Editor.
Downloading Statdisk
1) First go to the website at www.statdisk.org and then scroll down to the bottom of the page to download
the Statdisk program version 11.1.0. by clicking on the windows or the MAC version.
I went to www.statdisk.org and downloaded the statdisk 11.1.0 windows version.
Download Statdisk Version 11.1.0
Statdisk 11.1.0 Windows 2K, XP, Vista
Statdisk 11.1.0 OSX
See the included ReadMe.txt file for details.
Open A Saved Data File
2) After you have opened the Statdisk program, go to Datasets and then Elementary Stats, 9th Edition.
Open the file named SUGAR. The data will appear in column 1 in the Sample Editor.
I opened the statdisk program, went to Datasets, then Elementary Stats, 9th edition and opened the Sugar file.
Copy and Paste a Data File
3) Make a copy of the data values listed in column 1. Paste the data files into column 2. Re-name the title
of column 2 to COPY.
I went to Copy and then selected column 1. I then selected copy. Then I clicked on Paste and chose column 2. I then had 2 identical columns of the Sugar data.
Sorting Data Values
4) Make another copy of the data values listed in column 1 and paste those into column 3. Then sort only
the data values in column 3. Label the column SORT.
I selected Copy and clicked on column 1 and then pasted them into column 3. I clicked on Sort and then selected column 3.
Entering a Set of Data Values
5) Manually enter all of the data values listed below into column 4 in the Statdisk editor. Type all of the data values into the one column in vertical fashion like the other data values are listed in the other columns. It does not matter what order you input the data values. Label the data values with the name of IQ.
I typed the following data into column 4.
83
56
43
65
74
28
88
77
74
51
65
46
55
66
35
75
54
63
74
48
37
57
37
62
32
48
43
52
52
61
80
75
54
45
44
60
65
44
33
32
41
52
38
62
74
74
46
37
37
39
6) What are some of the problems that could occur when entering data values into a statistics technology
editor?
Problems that could occur when entering data values into a statistics technology editor include ………………………………………………………………………..
Sample Transformation
7) Go to the Data menu then select Sample Transformations to add 100 to all of the data values in column 4 and then paste them into column 5.
I went to the Data menu and ……………………………………………………………………………..
Classifying Variables
8) Would the grams of sugar data in column 1 be considered a sample or a population?
The grams of sugar data in column 1 would be considered a ……………..
9) State whether the sugar variable is qualitative or quantitative?
The sugar variable is ……………………………..
10) State whether the sugar variable is discrete, continuous or neither?.
Why deleted files or files saved in delete/formatted partition can be recovered? How to erase private and sensitive data permanently? Here are answers.
 Assignment 1 Discussion Question Prosocial Behavior and Altrui.docxbudbarber38650

Assignment 1: Discussion Question: Prosocial Behavior and Altruism
By Saturday, July 11, 2015, respond to the discussion question. Submit your responses to the appropriate Discussion Area. Use the same Discussion Area to comment on your classmates' submissions by Saturday, July 11, 2015, and continue the discussion until Wednesday, July 15, 2015 of the week.
Consider and discuss how the phenomena of prosocial behavior and pure altruism relate to each other and how they differ from each other.
Pure altruism is a specific kind of prosocial behavior where your sole motivation is to help a person in need without seeking benefit for yourself. It is often viewed as a truly selfless form of behavior.
Provide an example each of prosocial behavior and pure altruism.

.
● what is name of the new unit and what topics will Professor Moss c.docxbudbarber38650
● what is name of the new unit and what topics will Professor Moss cover? How does this unit correlate to modern times?
● what problems were apparent in urban America?
● what were the three main streams of immigration up through the 1920s? What are "birds of passage?" How were Japanese and Korean immigrants different than Chinese immigrants? What is meant by "pale of settlement" and "pogrom."
● What is meant by "Americanization" and how did this process occur?
● What were the various forms of popular culture during this era, and why were they important?
● what forms of popular culture did working women enjoy? How did middle-class reformers react to these forms?
● what is meant by "the new woman" and "mothers to society?"
● How did middle-class men generally respond to the changing times? Why were people like Eugene Sandow and Harry Houdini so significant at this time?
● What were some of the examples of nativism at this time?
● What was the Social Gospel and what are settlement houses?
.
More Related Content
Similar to FTK report PART I Familiar with FTK ImagerBonus Exerc.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxSANSKAR20
Evaluate a Health Website
Name Click here to enter text. Course Click here to enter text.Date Click here to enter text.
Pick one disease disorder or condition. Find two medicine-based websites that discuss it, such as WebMD, MedicineNet, the American Heart Association website, the American Diabetes Association website, and so on. Compare how the two websites you pick treat the subject. Then answer the following questions.
Question 1: What disease or condition did you pick?
Click here to enter text.
Question 2: What are the two websites you looked at?
1.
2.
Question 3: What differences did you find in how the two websites described the disease or condition?
Click here to enter text.
Question 4: Did one of the websites seem to be more reliable? If so, which, and why? If not, why not?
Click here to enter text.
Question 5: After reading the article, what three questions might a patient have about the condition that weren’t addressed?
1.
2.
3.
Page 1
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 20 ...
Assessment item 1 File Systems and Advanced Scripting .docxdavezstarr61655
Assessment item 1
File Systems and Advanced Scripting
Value: 15%
Due Date: 26-Aug-2018
Return Date: 31-Aug-2018
Length: 15 - 20 pages including screenshots
Submission method options: Alternative submission method
Task
back to top
In this assignment you will develop simple scripts to manage the user and file system whilst
developing some expertise in managing a complex file system.
Part 1: Automated Account Management (4 marks)
You have been asked by your boss to prepare two shell scripts which manage user information.
You are to prepare a simple shell script which reads a text file called users.txt. The file is in the
form
dfs /home/dfs Daniel Saffioti
and creates these users on the system without any interactive input. To do this you will need to
use the adduser(1) and passwd(1) commands. You will need to randomly produce the password
and report this to the administrator.
You can assume the fields being username, home directory and GCOS string are separate by a
single white space.
You can assume all users are in the same group.
The program should output the username and generated password once created.
Part 2: Design of a File System (3 marks)
https://outlines.csu.edu.au/delivery/published/ITC333/201860/SM/I/outline.html#contentPanel
You work for the Information Technology Department in your University and you have been
asked to build a server to store user data (home directories).
The volumes can grow without bounds, so it was felt that the ZFS file system should be used for
each volume. The operating system itself need not be on a ZFS volume.
All volumes including the operating system should be engineered in such a way to ensure the
best data protection is afforded in the event of local disk failure. It is expected that no more than
1 hours worth of data will be lost.
The volumes required are as follows:
1. uni0 with mount point /users/ug& quota of 200G.
2. uni1 with mount point /users/pg& quota of 200G.
3. uni2 with mount point /users/deleted& reservation of 100G.
4. uni3 with mount point /users/staff& reservation of 100G.
5. uni4 with mount point /users/guest & reservation of 250G.
Given the above your task is as follows define a strategy for how you will ensure the volumes
outlined above are provisioned whilst ensuring there data protection. Document this accordingly
along with a suitable rationale for your design.
Part 3: Implementing the Filesystem (4 marks)
Given the strategy defined in part two, your job is to implement the storage system.
1. To do this install the latest version of Ubuntu Server on a virtual machine. You will need to
ensure the networking is bridged and the root portioning is managed appropriately. You will
need to add additional virtual disks to meet the storage needs above.
2. Install the ZFS package and configure it such that pools of storage are created to meet the above
requirements including redundan.
What One Digital Forensics Expert Found on Hundreds of Hard Drives, iPhones a...Blancco
Do organizations have a defined process for wiping sensitive company information before discarding/reselling old drives and mobile devices?
In this webinar, Randy F. Smith and data security experts from Blancco Technology Group explore the following topics:
- How easily residual data can be recovered from hard drives and mobile devices
- The risks leftover data can pose to organizations
- The most secure ways to wipe company data from end-of-life devices and drives
Chapter 8 Common Forensic ToolsOverviewIn this chapter, youl.docxchristinemaritza
Chapter 8: Common Forensic Tools
Overview
In this chapter, you'll learn more about:
· Explore disk imaging tools, forensic software tool sets, and miscellaneous software tools
· Understand computer forensic hardware
· Assemble your forensic tool kit
The first steps in any investigation nearly always involve old-fashioned detective work. As a forensic investigator, you need to observe and record your observations first. Once you start examining media contents, you'll need some tools to help you find and make sense of stored data.
Forensic investigators and computer examiners need several different types of tools to identify and acquire computer evidence. Some evidence is hidden from the casual observer and requires specialized tools to find and access. In this chapter, we'll examine a sampling of some common and popular tools available to carry out computer forensic tasks.
Disk Imaging and Validation Tools
After identifying the physical media that they suspect contains evidence, forensic investigators must make sure media is preserved before any further steps are taken. Preserving the media is necessary to provide assurance the evidence acquired is valid.
Chapter 3, "Computer Evidence," and Chapter 4, "Common Tasks," both emphasize the importance of copying all media first and then analyzing the copy. It's usually best to create an exact image of the media and verify that it matches the original before continuing the investigation. It's rare to examine the original evidence for any investigation that might end up in court. For other types of investigations, however, forensic investigators might perform a targeted examination on the original evidence. For example, assume the job is to examine a user's home folder on a server for suspected inappropriate material. It might be impossible or extremely difficult to create a mirror image of the disk drive, but the disk can be scanned for existing or deleted files while it is in use. Although examining media while in use might not always be the best practice, informal investigations use this technique frequently.
To Copy or Not to Copy?
Whenever possible, create a duplicate of the original evidence, verify the copy, and then examine the copy. Always invest the time and effort to copy original media for any investigation that might end up in a court of law. If you are sure your investigation will not end up in court, you might decide to analyze the original evidence directly. This is possible and desirable in cases where copying media would cause service interruptions.
Your choice of tools to use depends on several factors, including:
· Operating system(s) supported
Operating system(s) in which the tool runs
File systems the tool supports
· Price
· Functionality
· Personal preference
The following sections list some tools used to create and verify media copies. Some products appear in two places in the chapter. That's because several products play multiple roles. This section lists several products ...
SysInfoTools MS Word DOCM Recovery software is an advanced solution to fix corrupt .docm files of Microsoft Word. It recovers maximum possible data from corrupt .docm files and enables users to see the preview of recovered data in both text and image form. It supports recovery of multiple .docm files at a time. The software maintains the file structure, formatting and properties while recovering corrupt .docm files.
Examine Evidence PartitionsAnalysis of four small partitions ext.docxcravennichole326
Examine Evidence Partitions
Analysis of four small partitions extracted from a suspect's hard drive. Your analysis will assess the nature of each partition—specifically, whether each partition is encrypted, compressed, wiped, or none.
Demonstration and hands-on training are always most effective, so you turn to the former in Step 2. Digital forensic investigators need to understand how to examine evidence partitions. In a case that you are working on currently, the suspect's computer contains four disk partitions. A disk partition is a portion of a whole disk with its own file system. Access the virtual lab to examine evidence partitions in order to determine whether files on each partition are encrypted, defragmented, securely deleted, or none of these. If they have been encrypted, what process was used: NTFS encrypted file systems, BitLocker, PGP, etc.?
After conducting your analysis, you demonstrate how you would document your findings in a formal forensic report. Include descriptions of destruction strategies such as wiping, overwriting, corruption, and degaussing. Make sure these strategies are explained in terms that IT temps, recent hires, and other nonexperts can understand in a consistent way. This will be the first section of your investigative report.
Share this section of the report with a colleague (your instructor) for review and feedback before continuing to the next step, where you will search for hidden data in files. Make sure to incorporate any suggested changes. This will be the first section of the sample investigative report to be included in the job aid submitted in the final step.
Lab Work Instruction:
Examine Evidence Partitions
You are provided four NTFS partitions from a hard drive, each about 100MB in size. One of the partitions has been defragmented, one used file encryption, and one used secure file deletion; no action has been taken on the other. Your task is to determine which action (if any) has been applied to each partition.
You will examine each partition using FTK (Imager is sufficient) and the Windows operating system. Your guidance for determining which actions have been taken on a specific partition are as follows:
Normal (no action):
· files are scattered throughout the partition
· you will see deleted files with content
· you will see data in file slack space
Defragmentation:
· files are stored in contiguous locations
· file slack space is zeroed out
· measurable with native OS tools
Encryption:
· file contents are “jibberish” (very little readable plain text)
· FTK may show a "key" icon
· OS may indicate encryption (e.g., "lock" icon)
Secure Wipe:
· deleted files in unallocated space will not contain any readable content
· there will not be any data in file slack space
To examine each of the partitions, perform the following steps until you are confident about which action was applied to each partition. The partitions for this exercise are raw dumps and are named partition_blue.d.
The Doc Repair software of SysInfoTools is an ideal solution for MS Word users. The software helps users repair corrupt word documents (Doc) and recover maximum recoverable data from them. It enables users to recover single as well as multiple Doc files simultaneously. It safely restores data from selected Doc file(s) such as: formatted text, images, tables, graphs, charts, hyperlinks, headers & footers without causing any damage or alteration. It supports previewing of recovered data in two forms: text and image. The software is available with free demo version to examine the performance and features before purchasing the full version.
OpenOffice Writer Repair software of SysInfoTools is an advanced solution to repair highly corrupt ODT documents of OpenOffice Writer and recover maximum possible data from them. The software successfully resolves all the error messages from corrupt open office documents. It supports recovery of multiple corrupt ODT files simultaneously. The ODT recovery is executed in two recovery modes: standard and advanced mode. It supports all major versions of OpenOffice (from v1.0 to v3.4). The preview of recovered data is shown in two forms: text and image form. And, all the recovered data can be saved in two formats: ODT and HTML.
SAMPLE Project (Answers and explanations are in red)I opened t.docxagnesdcarey33086
SAMPLE Project (Answers and explanations are in red)
I opened the Week 1 Project from Doc Sharing.
Projects
Project 1: Working With the Data Editor.
Downloading Statdisk
1) First go to the website at www.statdisk.org and then scroll down to the bottom of the page to download
the Statdisk program version 11.1.0. by clicking on the windows or the MAC version.
I went to www.statdisk.org and downloaded the statdisk 11.1.0 windows version.
Download Statdisk Version 11.1.0
Statdisk 11.1.0 Windows 2K, XP, Vista
Statdisk 11.1.0 OSX
See the included ReadMe.txt file for details.
Open A Saved Data File
2) After you have opened the Statdisk program, go to Datasets and then Elementary Stats, 9th Edition.
Open the file named SUGAR. The data will appear in column 1 in the Sample Editor.
I opened the statdisk program, went to Datasets, then Elementary Stats, 9th edition and opened the Sugar file.
Copy and Paste a Data File
3) Make a copy of the data values listed in column 1. Paste the data files into column 2. Re-name the title
of column 2 to COPY.
I went to Copy and then selected column 1. I then selected copy. Then I clicked on Paste and chose column 2. I then had 2 identical columns of the Sugar data.
Sorting Data Values
4) Make another copy of the data values listed in column 1 and paste those into column 3. Then sort only
the data values in column 3. Label the column SORT.
I selected Copy and clicked on column 1 and then pasted them into column 3. I clicked on Sort and then selected column 3.
Entering a Set of Data Values
5) Manually enter all of the data values listed below into column 4 in the Statdisk editor. Type all of the data values into the one column in vertical fashion like the other data values are listed in the other columns. It does not matter what order you input the data values. Label the data values with the name of IQ.
I typed the following data into column 4.
83
56
43
65
74
28
88
77
74
51
65
46
55
66
35
75
54
63
74
48
37
57
37
62
32
48
43
52
52
61
80
75
54
45
44
60
65
44
33
32
41
52
38
62
74
74
46
37
37
39
6) What are some of the problems that could occur when entering data values into a statistics technology
editor?
Problems that could occur when entering data values into a statistics technology editor include ………………………………………………………………………..
Sample Transformation
7) Go to the Data menu then select Sample Transformations to add 100 to all of the data values in column 4 and then paste them into column 5.
I went to the Data menu and ……………………………………………………………………………..
Classifying Variables
8) Would the grams of sugar data in column 1 be considered a sample or a population?
The grams of sugar data in column 1 would be considered a ……………..
9) State whether the sugar variable is qualitative or quantitative?
The sugar variable is ……………………………..
10) State whether the sugar variable is discrete, continuous or neither?.
Why deleted files or files saved in delete/formatted partition can be recovered? How to erase private and sensitive data permanently? Here are answers.
 Assignment 1 Discussion Question Prosocial Behavior and Altrui.docxbudbarber38650

Assignment 1: Discussion Question: Prosocial Behavior and Altruism
By Saturday, July 11, 2015, respond to the discussion question. Submit your responses to the appropriate Discussion Area. Use the same Discussion Area to comment on your classmates' submissions by Saturday, July 11, 2015, and continue the discussion until Wednesday, July 15, 2015 of the week.
Consider and discuss how the phenomena of prosocial behavior and pure altruism relate to each other and how they differ from each other.
Pure altruism is a specific kind of prosocial behavior where your sole motivation is to help a person in need without seeking benefit for yourself. It is often viewed as a truly selfless form of behavior.
Provide an example each of prosocial behavior and pure altruism.

.
● what is name of the new unit and what topics will Professor Moss c.docxbudbarber38650
● what is name of the new unit and what topics will Professor Moss cover? How does this unit correlate to modern times?
● what problems were apparent in urban America?
● what were the three main streams of immigration up through the 1920s? What are "birds of passage?" How were Japanese and Korean immigrants different than Chinese immigrants? What is meant by "pale of settlement" and "pogrom."
● What is meant by "Americanization" and how did this process occur?
● What were the various forms of popular culture during this era, and why were they important?
● what forms of popular culture did working women enjoy? How did middle-class reformers react to these forms?
● what is meant by "the new woman" and "mothers to society?"
● How did middle-class men generally respond to the changing times? Why were people like Eugene Sandow and Harry Houdini so significant at this time?
● What were some of the examples of nativism at this time?
● What was the Social Gospel and what are settlement houses?
.
…Multiple intelligences describe an individual’s strengths or capac.docxbudbarber38650
“…Multiple intelligences describe an individual’s strengths or capacities; learning styles describe an individual’s traits that relate to where and how one best learns” (Puckett, 2013, sec. 7.3).
This week you’ve read about the importance of getting to know your students in order to create relevant and engaging lesson plans that cater to multiple intelligences and are multimodal.
Assignment Instructions:
A. Using
SurveyMonkey
, create a survey that has:
At least five questions based on Gardner’s theory of multiple intelligences
At least five additional questions on individual learning style inventory
A specific targeted student population grade level (elementary/ middle/ high school/adults)
Include the survey link for your peers
B. Post a minimum 150 word introduction to your survey, using at least one research-based article (cited in APA format) explaining how it will:
Evaluate students’ abilities in terms of learning styles/preferences
Assist in the creation of differentiated lesson plans.
.
• World Cultural Perspective Paper Final SubmissionResources.docxbudbarber38650
•
World Cultural Perspective Paper Final Submission
Resources
•
By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and assignment criteria:
•
Competency 1:
Evaluate communication issues and trends of various cultures within the United States.
•
Utilize effective research methods using a variety of applicable sources.
•
Demonstrate an ability to connect suitably selected research information with course content.
•
Competency 2:
Develop cultural self-awareness and other-culture awareness.
•
Investigate the interactive effect that cultural tendencies, issues, and trends of various cultures have on communication.
•
Competency 4:
Analyze how nonverbal communication (body language) affects intercultural communication.
•
Explain how personal interactions are affected by the nonverbal characteristics and differences specific to the U.S. culture.
•
Competency 5:
Communicate effectively in a variety of formats and contexts.
•
Write coherently to support a central idea in appropriate format with correct grammar, usage, and mechanics.
Instructions
This paper is one piece of your course project. Complete the following:
•
Choose a world culture that is unfamiliar to you and is represented domestically in the United States.
•
Use research to collect a variety of resources about the culture. This includes interacting with members of the culture. In particular, focus your research on a small number of social issues surrounding the culture, along with cultural tendencies and trends, and the effect of these things on communication. Types of resources include interviews, media presentations, Web sites, text readings, scholarly articles, and other related materials.
•
In a paper of 500–1,000 words, address these things:
•
Investigate the effect that the tendencies, issues, and trends of the culture have on communication.
•
Explain how characteristics of nonverbal communication and other differences between your selected culture and U.S. culture affect personal interactions between members of the two cultures.
•
Connect the research you gathered to your ideas and explanations.
Refer to the World Cultural Perspective Paper Final Submission Scoring Guide as you develop this assignment.
Assignment Requirements
•
Written Communication:
Written communication is free of errors that detract from the overall message.
•
APA Formatting:
Resources and citations are formatted according to APA style and formatting.
•
Page Requirements:
500–1,000 words.
•
Font and Font Size:
Times New Roman or Arial, 12 point.
Develop your assignment as a Microsoft Word document. Submit your document as an attachment in the assignment area.
Note:
Your instructor may also use the Writing Feedback Tool to provide feedback on your writing.
In the tool, click on the linked resources for helpful writing information.
•
Intercultural Competence Reflection
Resources
Review the situation in the media.
• Write a story; explaining and analyzing how a ce.docxbudbarber38650
•
W
rite a story; explaining and analyzing
how a certain independent variable ( at the individual, group or organization levels) affects a dependent variable (behaviour or attitude),
•
You will freely select your story from “ life” : from college, home, neighborhood, a book , a video/ movie, TV…etc. as long as the story has two clear dependent and independent variables.
•
You will finish with a conclusion that lists both variables and explain their relationship (cause and effect).
•
Assignment words limits 200 words (minimum)
WITH REFRENCES ABOUT THE STORY/ SCENARIO SOURCE !
.
•Use the general topic suggestion to form the thesis statement.docxbudbarber38650
•Use the general topic suggestion to form the
thesis statement
which will be an opinion on the topic. The thesis must have
three
controlling ideas.
•Develop an essay
map or informal outline
•Develop each paragraph using a specific
topic sentence
related to the controls in your thesis; thus, announcing the subject matter of that paragraph.
•Use
transitional devices
throughout the essay and in each paragraph.
•Use any combination of modes to support your arguments.
• Have a well-developed introduction and conclusion.
•Use quotes from the text to support your arguments.
•You must have a title.
•Make a “Work Cited” page with the text as the only source.
Topic:
Reading helps students to develop skills that will make them into a more optimally rounded person. Choose any three skills learned in reading and discuss how each one can help students to be more academically inclined.
the text
“The 1960s: A Decade of Promise and Heartbreak”
By Kenneth T. Walsh
March 9, 2010
US News
It was a decade of extremes, of
transformational
change and
bizarre
contrasts: flower children and
assassins
,
idealism
and
alienation
, rebellion and
backlash
. For many in the
massive
post-World War II baby boom generation, it was both the best of times and the worst of times. (7 words)
There will be many 50-year anniversaries to mark significant events of the 1960s, and a big reason is that what happened in that remarkable era still
resonates
today. At the dawn of that decade of contrasts a half century ago—on Jan. 2 ,1960—a
charismatic
young senator from Massachusetts named John F. Kennedy announced that he was running for president, and he won the nation's highest office the following November. He remains one of the
iconic
figures in U.S. history. On February 1, four determined black men sat at a whites-only lunch counter at a Woolworth's in Greensboro, N.C., and were denied service. Their act of
defiance
triggered a wave of sit-ins for civil rights across the South and brought
unrelenting
national attention to America's original sin of racism. On March 3, Elvis Presley returned to the United States from his Army stint in Germany, resuming his career as a pioneer of rock-and-roll and an icon of the youth culture celebrating freedom and a growing sense of rebellion.(5 words)
By the end of the decade, Kennedy had been
assassinated
, along with his brother Robert and the Rev. Martin Luther King Jr. America's cities had become powder kegs as African-Americans, despite historic gains toward legal equality, became more impatient than ever at being second-class citizens. Women began demanding their rights in
unprecedented
numbers. Young people and their parents felt a widening generation gap as seen in their differing perceptions of
patriotism
, drug use, sexuality, and the work ethic. The now familiar culture wars between liberals and conservatives caused angry divisions over law and order, busing, racial preferences, abortion, the Vie.
•The topic is culture adaptation ( adoption )16 slides.docxbudbarber38650
•
The topic is
culture adaptation ( adoption )
16 slides
FIrst part
1- I have to interview 4 people ( Indians Chinese....)
(Experts professors students......)
-What kind or type of culture shock they experienced when they first came to Kuwait?
And whether they tolerated? how do they feel where they tolerated by Kuwaitis ?
- why culture tolerance of a foreign country is required in international marketing.
Based on what you learn those people, you will learn about feelings and their problems and difficulties when they first arrived in foreign countries. And knowing this, now you have to take this knowledge and apply to marketing and answer the questions whether it's difficult to adopt to foreign culture if it's difficult for people it's probably will be very difficult to also introduce those products and adopt those products to foreign culture. So that's why am asking you why culture tolerance in other nations are important and required to International marketing. you have to answer those
The second part of the presentation
You will identify or you will give domestic examples and foreign examples ( culture imperatives + culture electives + culture exclusive) examples of each category what is it about
The last question of the presentation
To Discuss the factor that determined successfully global adaptation
you have to
inculde a video
( 1 min max: 2 min)
Chapter 5 and you may find it in other chapters
This is the book for my course marketing you can get infomation from it :
https://docs.google.com/file/d/0B8pig2KdTaOBSkRzVjJvR1pLUkU/edit
.
•Choose 1 of the department work flow processes, and put together a .docxbudbarber38650
•Choose 1 of the department work flow processes, and put together a thorough 1-paragraph summary to explain to the team the importance of this process and how it works with the EHR. Choose 1 work flow process from the following choices: ◦Appointment scheduling
◦Front desk or check-in
◦Nursing or clinical support
◦Care provider
◦Check-out desk
◦Business office or billing
◦Clinical staff or care provider
•Discuss and describe 3 facility software applications that integrate with the EHR. Examples of software applications are electronic prescribing, speech recognition, master patient index, encoder, picture archiving and communication, personal health record (PHR), decision support, and more.
•Prepare a 3-paragraph summary of each application for the implementation team, and discuss any problems that may be encountered during EHR implementation.
•Describe the impact of 2 advantages and 2 disadvantages of the EHR so that the implementation team can start to prepare for this discussion with the administrators
650 words
.
‘The problem is not that people remember through photographs, but th.docxbudbarber38650
‘The problem is not that people remember through photographs, but that they remember only photographs. This remembering through photographs eclipses other forms of understanding, and remembering.
Harrowing photographs do not inevitably lose their power to shock. But they are not much help if the task is to understand. Narratives can make us understand. Photographs do something else: they haunt us
’ (Sontag, p. 79-80). Discuss the implications of Sontag’s claim for contemporary politics and humanitarian organisations.
* 3500 WORDS
*font 12
*Double Spaced
*8 resources at least
.
·
C
hoose an article
o
1000 words
o
Published in 5 years
o
Credible (e.g. Wall Street Journal, Asia Times, Fortune)
·
Write 3 single spaced analysis
o
Relate to Organizational Behavior
o
APA style
o
Name of theory; Definition of the theory; Location of link in the article
o
Explain and make analysis
.
·You have been engaged to prepare the 2015 federal income tax re.docxbudbarber38650
·
You have been engaged to prepare the 2015 federal income tax return for Bob and Melissa Grant.
·
Your tax form submission should include: Form 1040, Schedules A, B, D, E, and Forms 4684 and 8949 as applicable. You will come across many items on the tax return we have not talked about in class; if we have not covered it in class, and it is not included in the information below, you do
not
need to address it on this assignment.
·
Your solution should contain a detailed workpaper that calculates the tax due or refunded with the return and calculated in the form of the tax formula (see Ch. 4 lecture slides). The calculation should be well labeled and EASY to follow. This presentation will be factored into your grade. Do NOT include any references or citations on your workpaper.
·
You may complete the return by hand (
neatly
) or typed using 2015 forms found on Blackboard or the IRS website. You may complete the form using software, one version of which is available in the ACELAB.
o
Note – ACELAB software is for the 2014 tax year; if you choose to use this method, you do not need to override the automatically calculated 2014 information, but your workpaper must detail each line item that will differ between the 2014 form generated and the 2015 forms).
·
Use the following assumptions in preparing the return:
o
The general method of accounting used by the Grants is the cash method.
o
Use all opportunities under law to minimize the 2015 federal income tax.
o
Use whole dollars when preparing the tax return.
o
Do not prepare a state income tax return.
o
Ignore the Line 45 calculation for alternative minimum tax.
o
If required information is missing, use reasonable assumptions to fill in the gaps.
Client memo (5 points)
·
Complete a letter to the client regarding tax planning advice. Identify and explain two reasonable tax planning items the family could use to minimize their tax liability and/or maximize their wealth. All items would be implemented in future years and do not impact the current tax return.
BOB AND MELISSA GRANT
INDIVIDUAL FEDERAL INCOME TAX RETURN
Bob (age 43, SSN #987-45-1234) and Melissa Grant (age 43, SSN #494-37-4893) are married and live in Lexington, Kentucky. The Grants would like to file a joint tax return for the year. The Grants’ mailing address is 95 Hickory Road, Lexington, Kentucky 40502.
The Grants have two children Jared (SSN #412-32-5690), age 18, and Alese (SSN #412-32-6940), age 12. Jared is still in high school and works part time as a waiter and earns about $2,000 a year. The Grant’s also provide financial support to Bob’s aged (85 years) grandfather, Michael Sr., who is widowed and lives alone. Michael Sr.’s Social Security number is 982-21-5543. He has no income and the Grant’s provide 100 percent of his support.
Bob Grant’s Forms W-2 provided the following wages and withholding for the year:
Employer
Gross Wages
Federal Income Tax Withholding
State Income Tax Withholding
National Sto.
·Time Value of MoneyQuestion A·Discuss the significance .docxbudbarber38650
·
Time Value of Money
Question A
·
Discuss the significance of recognizing the time value of money in the long-term impact of the capital budgeting decision.
Question B
·
Discuss how the internal rate of return (IRR) method differs from the net present value (NPV) method. Be sure to include an explanation of what the IRR method is and what the NPV method is.
The initial post by day 5 should be a minimum of 150 words. If you use any source outside of your own thoughts, you should reference that source. Include solid grammar, punctuation, sentence structure, and spelling.
.
·Reviewthe steps of the communication model on in Ch. 2 of Bus.docxbudbarber38650
·
Reviewthe steps of the communication model on in Ch. 2 of
Business Communication
. See Figure 2.1.
·
Identify one personal or business communication scenario.
Describe each step of that communication using your personal or business scenario. Use detailed paragraphs in the boxes provided
Steps of communication model
Personal or business scenario
1.
Sender has an idea.
2.
Sender encodes the idea in a message.
3.
Sender produces the message in a medium.
4.
Sender transmits message through a channel.
5.
Audience receives the message.
6.
Audience decodes the message.
7.
Audience responds to the message.
8.
Audience provides feedback to the sender.
Additional Insight
Identify
two potential barriers that could occur in your communication scenario and then explain how you would overcome them. Write your answer(s) below.
.
·Research Activity Sustainable supply chain can be viewed as.docxbudbarber38650
·
Research Activity
Sustainable supply chain can be viewed as Management of raw materials and services from suppliers to manufacturers/ service provider to customer - with improvement of the social and environmental impacts explicitly considered.
Carry out a literature review on sustainable / green supply chain and prepare:
·
A report (provide an example) -2500-3000 words approximately and
Issues/topics that
you may like
to address/consider are:
1.
Drivers for Sustainable SCM
2.
Analysing the impact of carbon emissions on manufacturing operation, cost and profit by focusing on product life cycle analysis.
Analyse aspects of the product life cycle in terms of; Outlining CO2 emission points and scope, defining CO2 baseline, prioritising measures to reduce or off set emissions and finally planning and initiating actions.
3.
New ways of thinking/information sharing
Seven key solution areas were identified:
·
In- store logistics: includes in-store visibility, shelf-ready products, shopper interaction
·
Collaborative physical logistics: shared transport, shared warehouse, shared infrastructure
·
Reverse logistics: product recycling, packaging recycling, returnable assets
·
Demand fluctuation management: joint planning, execution and monitoring
·
Identification and labelling: through the use of barcodes and RFID tags. Identification is about providing all partners in the value chain with the ability to use the same standardised mechanism to uniquely identify parties/locations, items and events with clear rules about where, how, when and by whom these will be created, used and maintained. Labels currently are the most widely used means to communicate about relevant sustainability and security aspects of a certain product towards consumers
·
Efficient assets: alternative forms of energy, efficient/aerodynamic vehicles, switching modes, green buildings
·
Joint scorecard and business plan: this solution consists of a suite of industry-relevant measurement tools falling into two broad categories: qualitative tools, which are a set of capability metrics designed to measure the extent to which the trading partners (supplier, service provider and retailer) are working collaboratively; and quantitative tools, which include business metrics aimed at measuring the impact of collaboration
4.
Sustainability in the carbon economy
5.
Introducing/developing sustainable KPI
s
to SC, SCOR,GSCF Models
Wal-Mart
may be a good example to look at: when you burn less, you pay less and emit less, and the benefits can ripple further. The big advantages for organisations in becoming sustainable are reducing costs and helping the environment. For example: Wal-Mart sells 25% of detergent sold in the United States, by replacing regular washing detergent with concentrate they will save: 400 million gallons of water, 125 million pounds of cardboard and packaging, 95 million pounds of plastic.
.
·DISCUSSION 1 – VARIOUS THEORIES – Discuss the following in 150-.docxbudbarber38650
·
DISCUSSION 1 – VARIOUS THEORIES – Discuss the following in 150-200 words with in text citations and references:
·
Differentiate between the various dispositional, biological and evolutionary personality theories.
·
DISCUSSION 2 – STRENGTHS AND LIMITATIONS – Discuss the following in 150-200 words with in text citations and references:
·
Explain the strengths and limitations of dispositional, biological and evolutionary personality theories.
·
DISCUSSION 3 – ANALYZE PERSONALITY CHARACTERISTICS – Discuss the following in 150-200 words with in text citations and references:
·
Analyze individual personality characteristics using dispositional, biological and evolutionary personality theories.
·
DISCUSSION 4 – INTERPERSONAL RELATIONS – Discuss the following in 150-200 words with in text citations and references:
·
Explain interpersonal relations using dispositional and biological or evolutionary personality theories.
·
DISCUSSION 5 – ALLPORTS BELIEF – Discuss the following in 150-200 words with in text citations and references:
·
Do you agree or disagree with Allport's belief that individuals are motivated by present drives, not past events? Why?
.
·
Module 6 Essay Content
:
o
The Module/Week 6 essay requires you to discuss the history and contours of the “original intent” vs. “judicial activism” debate in American jurisprudence.
o
Part 1: Introduce and explain the key arguments supporting the “original intent” perspective and the argument for “judicial activism.”
o
Part 2: Weigh the merits of both sides and provide an assessment of both based upon research and analysis.
·
P
age Length:
At least three (3) pages in addition to the title page, abstract page, and bibliography page
·
Sources/Citations
: At least ten (10) sources, combining course material and outside material, are required. Key ideas from the required reading must be incorporated.
.
·Observe a group discussing a topic of interest such as a focus .docxbudbarber38650
·
Observe a group discussing a topic of interest such as a focus group, a community public assembly, a department meeting at your workplace, or local support group
·
Study how the group members interact and impact one another
·
Analyze how the group behaviors and communication patterns influence social facilitation
·
Integrate your findings with evidence-based literature from journal articles, textbook, and additional scholarly sources
Purpose:
To provide you with an opportunity to experience a group setting and analyze how the presence of others substantially influences the behaviors of its members through social facilitation.
Process:
You will participate as a guest at an interest group meeting in your community to gather data for a qualitative research paper. Once you have located an interest group, contact stakeholders and explain the purpose of your inquiry. After you receive permission to participate, you will schedule a date to attend the meeting; at which time you will observe the members and document the following for your analysis:
Part I
·
How were the people arranged in the physical environment (layout of room and seating arrangement)?
·
What is the composition of the group, in terms of number of people, ages, sex, ethnicity, etc.?
·
What are the group purpose, mission, and goals?
·
What is the duration of the group (short, long-term)? Explain.
·
Did the group structure its discussion around an agenda, program, rules of order, etc.?
·
Describe the structure of the group. How is the group organized?
·
Who are the primary facilitators of the group?
·
What subject or issues did the group members examine during the meeting?
·
What types of information did members exchange in their group?
·
What were the group's norms, roles, status hierarchy, or communication patterns?
·
What communication patterns illustrated if the group was unified or fragmented? Explain.
·
Did the members share a sense of identity with one another (characteristics of the group-similarities, interests, philosophy, etc.)?
·
Was there any indication that members might be vulnerable to Groupthink? Why or why not?
·
In your opinion, how did the collective group behaviors influence individual attitudes and the group's effectiveness? Provide your overall analysis.
Part II
Write a 1,200- to 1,500-word paper incorporating your analysis with evidence to substantiate your conclusion.
Explain how your observations relate to research studies on norm formation, group norms, conformity, and/or social influence.
Integrate your findings with literature from the textbook, peer-reviewed journal articles, and additional scholarly sources. Format your paper consistent with APA guidelines.
.
·Identify any program constraints, such as financial resources, .docxbudbarber38650
·
Identify any program constraints, such as financial resources, human capital, and local culture.
·
Analyze the relationships between the policy developers and the policy implementers for the selected program.
Topic is Special Supplemental Nutrition Program for Women, Infants and Children (WIC) program. 380 words, APA format.
.
·Double-spaced·12-15 pages each chapterThe followi.docxbudbarber38650
·
Double-spaced
·
12-15 pages each chapter
The following is my layout for thesis:
CHAPTER 5
·
Brazil’s current outcomes in government, Financial, environmental, and community aspects.
1.
Variation in Government economic politics
2.
Yearly Financial growth
3.
Environmental risk factors
4.
Changes in community aspects
CHAPTER 6
·
Predictions of Market progression, Industrial variations, and government changes between 2007 to 2017
1.
Predictions for Industrial progression
a)
Financial variations and deviations
b)
Funding distribution for new technologies research and development
2.
Prediction for Brazil’s political outlook
a)
New economic laws and tax exemptions
b)
Changes in Political parties
3.
Predictions for deviations and variations in Brazil’s Market
a)
International growth
b)
Domestic growth
.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
FTK report PART I Familiar with FTK ImagerBonus Exerc.docx
1. FTK report
PART I: Familiar with FTK Imager
Bonus Exercise 1 (5 points): Assume that you have a write-
protected USB device.
Image a USB device or a floppy disk to create an image in a DD
format. (Note: You are not able to use the
841_Win_Forensics_Updated VM to perform this bonus
exercise. You have to use your own computer for this exercise).
Provide a snapshot from FTK Imager.
Requires: a USB device or a floppy disk
Launch FTK Imager
Click File > Create Disk Image
Click Physical Drive and Next
Select the device and select Raw (dd) Image Type
Exercise 2: View images
Click File > Add Evidence Item
Select Image file and then click Next
Browse to your WinLabEnCase.E01 image and click Finish
View the image in the Evidence Tree view
Question 1: What is the VBR file used for? How to export this
file? How to export a file Hash?
VBR file contain information that will enable client machine to
use the remote application . we can export this file by press
2. export , hash file will export as a plain text.
Exercise 3: Convert the WinLabEnCase image to a DD image
Exercise 4: Verify images
Question 2: What are the results of verification? Comparing
both hashes, are they same or not?
The verification matched and both hashes are the same
PART II: Working with FTK 1.8x
DETAILED PROCEDURES THAT MAY HELP YOU TO GO
THROUGH THE FTK SOFTWARE
Exercise 1: Starting a New Case
Question 3: What information is required to create a new case
using the FTK New Case Wizard?
The information needed are : investigator name , address ,
phone , email , case number , case name , case path , case folder
and case destination
Question 4: What are the types of evidence that can be added to
a case in FTK?
Image of drive , local drive , folders and individual file
Exercise 2: Working with FTK
Click the OVERVIEW tab; note the numbers for each type of
file.
Question 5: How to make the number of the Checked Items to
go up? How to make the number of Flagged Thumbnails to go
3. up?
After open each file , items will added to the checked item
folder , flagged thumbnails will go up with each file we change
the point which down it from red to green .
File Signatures
A file type (JPEG, Word Document, MP3 file) can be
determined by the file’s extension and by a header that precedes
the data in the file. If a file’s extension has been changed, then
the only way to determine its type is by looking at its header.
Question 6: Click on Bad Extension from Overview tab. Do you
find any signature mismatch? What are they?
There are 11 files , 8 of them are TMP extension , 1 XLS , 1
PDF and 1 DOC
Data Carved Files:
Question 7: Check the number of Data Carved Files, what is the
number?
zero
Question 8: Check the number of Data Carved Files from
Overview, how many files added to the case by data carving?
TWO
Question 9: What are those files found by performing data
carving process? Why is this process so important?
The files which found are the files with GIF extension , this
process is very important because it helps the investigator to
4. focus on one type of files which he looking for .
ExploreTab
Checkmark List all descendants.
Question 10: What is the file system of this Image?
FAT 16
Question 11: Right-click a folder and select File Properties,
What information do you get?
Path , file name , system attributes , file source info and file
content info .
Question 12: Select a file, and right-click on that file and select
File Properties, What information do you get?
Path , file name , system attributes , file source info , file
content info and file size .
Question 13: Select Documents and SettingspsmithRecent,
what kind of files contain in this folder? Select each file in this
folder, what kind of information do you get from the up-right
window?
The latest files which open on this machine are on recent file .
We can get information about each file like creation time , last
write time , last access time and what kind of file it is.
Question 14: Select Documents and SettingspsmithLocal
SettingsHistoryHistory.IE5index.dat, what kind of files
contain in this file? Select each file, what kind of information
5. do you get from the up-right window?
We can fine internet explorer daily browsing history , we can
get last accessed time for different websites which opened in
the browser .
Question 15: Select Documents and SettingspsmithFavorites,
what are psmith’s favorite links?
www.monster.com
www.aerospace-technology.com/contractors
www.jsfirm.com/searchcontractors.asp
yahoojobs
as we see the suspect man was looking for a job
Question 16: Looking into the Recycled folder, which files are
currently in the recycler? Select the INFO2 file from the
Recycled folder, what information do you get from that file?
We found 2 files , ogdiagram.gif , tse082800.pdf , in the info2
file we get information about last file which put in the recycle ,
what is the name and the time when the file deleted .
Question 17: Looking into WINDOWSSystem32spool folder,
what information can you get from this folder?
From spool we get information about all the drivers and printers
which install on that machine .
Windows Registry
Locate ntuser.dat from the Documents and Settingspsmith
folder
Export the ntuse.dat; then launch the AccessData Registry
Viewer to include this file in the Registry Viewer. (You may
also right click the file and choose View in Registry Viewer
In the Registry Viewer, explore the list.
6. Action 18: List any interesting results
All the information about registry and all softwares which are
on that machine .
Graphics Tab
The Graphics Tab allows you to quickly see all the pictures in
the case.
Checkmark List all descendants.
You will now see all of the pictures contained on all of the
devices in the case.
Question 19: If a file’s extension has been changed to a non-
graphics file type (such as changing jpg to txt), will it be
displayed in the Gallery view? Provide one example to support
your statement. Does EnCase work in the same way?
Yes it does , and this is an advantage of FTK compared to
encase
Export and Copy Special
Export these five graphics to your desktop.
Question 20: What is the major difference between Export a file
and Copy Special a file?
Export will copy the file to a specific location on the machine
while copy special give us option to copy what we need from
file like file type , modification date and so on.
Keywords and Searching
Searching evidence for information pertaining to a case can be
one of the most crucial steps in the examination. FTK support
two kind of search, indexed and live searches. An indexed
7. search uses the index file to find a search term while a live
search involves an item-by-item comparison with a search term.
The index file could be generated during the creation of a case
or be indexed later.
Question 21: What is the advantage to use indexed search vs.
the live search?
Index search will look inside the files for the needed
information while live search check the subject of each file only
Examining the Options and Import feature in the indexed Search
Question 22: What are these two features used for?
Options need for change search brooding options , search result
options and search limiting options.
Import search in side the files as a text file
Question 23: Do you find any files containing US Phone
numbers? List two files that in the result list.
I found 299 hits in 8 files .
Aviation.htm
Contacts.htm
Email
Question 24: Read the manual and find out what kind of email
formats do FTK support?
FTK now supports the decryption of RSA standard PKCS7
8. S/MIME email items. This
includes support for MBOX, DBX, RFC822, and some PST/EDB
archives
Question 25: Did anything happen? Do you find any important
information? If so, what kind of information you got?
ye s I found a lot of information like that the suspect talk with
someone about meeting and offering him an offer of work
Case Report
After performing a thorough forensic investigation, it is critical
that you are able to publish and present your findings. FTK has
a sophisticated report wizard that allows you to assemble and
publish case information. The final report generated by the FTK
wizard is in HTML format.
Click File > Report Wizard
Fill in the Case information which will appear on the Case
Information page of the report.
Create a report to include the following:
a) all bookmarks and export all bookmarked files
b) Export full-size graphics and link them to the thumbnails
c) Include the Date and Time file Properties for the Bookmarked
Files
d) Include only graphics flagged green in the Graphics View
e) Group 6 thumbnail per row
f) Include Bad Extension files in the report and export the files
to the report along with its data and time property
g) Add one or more of your own file to the report that support
your statement
h) Create a custom graphic for the report.
10. 1
Computer Forensics - FTK
Engineering Computer Systems Management – 767425
Project #1
(Due date: Monday 19 August 2013)
The aim of this project is for you to discover how to use a
spreadsheet to “model” a typical engineering
problem, in this case a heat transfer situation. And to discover
how this model can be used to solve
problems that would otherwise require lengthy analytical or
trial and error solutions. The model can then
be used as a design/analysis tool to try out various “what if”
scenarios.
Hot oil is used as an alternative to steam for providing process
heat in some industries. In our scenario the
hot oil is being pumped to the process equipment through an
insulated pipe and we want to determine the
rate of heat loss per metre of pipe. The pipe is made from mild
steel and is insulated with fibreglass and
clad with stainless steel. Heat is being lost from the stainless
steel cladding surface by convection and by
11. radiation. The initial problem is to determine the heat loss ̇
and cladding surface temperature for
various thicknesses of the fibreglass insulation.
Heat Transfer Situation:
The following data is given:
hot oil temperature,
............................................................ 180°C
steel pipe internal diameter,
..................................................... 80 mm
steel pipe external diameter,
.................................................... 90 mm
pipe length,
................................................................................. nominal,
1 m
inside convection heat transfer coefficient,
............................... 50 W/m
2
°C
14. �̇�
�̇�
�̇� �
At first glance this looks to be a relatively simple problem,
however to solve it we need to find the surface
temperature, before we can find the heat loss, ̇ . To solve
for analytically would require the
solution of a polynomial (quartic) equation. With the
spreadsheet we can solve this fairly easily using a trial
and error approach or using one of the advanced tools available
in Excel to automate this process...
Specific requirements:
You are required to:
using Microsoft Excel, as detailed below.
omments and results
as also detailed below.
1. Spreadsheet Model
Set up your spreadsheet model of the heat transfer situation
with an area for input values (all of the
data given above), an area for intermediate answers (eg radii, ̇
, ̇ , ̇ ), and an area for the
final results, and ̇ . Your model should be set up to be as
15. flexible as possible to produce
answers for and ̇ for a given insulation thickness.
(Imagine other engineers might use your
spreadsheet as a tool for similar heat loss situations, so make it
clear, easy to use and helpful).
In your Report (Word document) :
functions or tools you used, and how
you used them to solve for s and ̇loss for a given insulation
thickness.
Provide a table summarising your results ( and ̇ ), for
the following insulation thicknesses:
25 mm, 50 mm, 75 mm and 100 mm.
2. Further Analysis
Use your spreadsheet model to determine the thickness of
insulation required to give a cladding
surface temperature of say 50°C.
In your Report (Word document) :
3. “What if” analysis
Set the insulation thickness to 75mm and then use your model to
investigate the following “what if”
16. situations (ie what happens to surface temperature, and heat
loss, ̇ if the following changes
occurred).
4 or even 0.8
over a period of time as the stainless
steel became more oxidised?
that the thermal conductivity increased
to a value of say 0.06 or 0.1 W/m°C?
ture increased to 250°C or
decreased to 120°C?
increases to 30°C?
to 12 W/m
2
°C or increases to
50 W/m
2
°C.
to 30 W/m
2
°C or increases to
100 W/m
2
17. °C
In your Report (Word document) :
values and new values of and ̇ and
discuss whether or not you think the change is significant.
main factors that affect the rate of heat
loss for an insulated hot oil pipe like this … (use your results
from the above “What if” analysis).
4. Comments and Conclusion
In your Report add a Comments and Conclusions section and
briefly comment on the following:
this on a spreadsheet compared to
using a calculator and /or hand calculations.
-if”
scenarios?
this on a spreadsheet, and other people
using it?
Note: Marks will also be awarded for layout (of spreadsheet
model) and overall ease of use. Bonus
18. marks may be awarded for additional helpful features…
5. Submit the spreadsheet and supporting document for marking
by 4:00 pm, Monday 19 August 2013,
using AUTonline. Instructions for doing this are provided
below and in the Assessments area on
AUTonline for this paper.
Instructions: How to submit Project #1…..
1. Once you have completed Project #1, log on to AUTOnline
and select this paper: Engineering
Computer Systems Management
2. Click the “Projects” button on the menu
3. Select “Project 1 – Excel Model”
4. Click this item:
5. In the section “2. Assignment Materials”…
and word
document), alongside “Attach File” click
the button and select your Project #1 spreadsheet that you are
handing
in for marking, then click the button. This will attach the file
ready for
submitting.
19. ur Project #1 Word
document (Report) that you are
handing in for marking.
to remove the
incorrect file and then repeat the above steps to add the correct
file(s).
t about your assignment if you wish…
6. Once you have attached the two files you are submitting for
Project #1 then in section “3.
Submit”, click the button to submit the two files to your
lecturer for marking.
7. Once you have submitted your Project you cannot resubmit it.
If you have made an error or
mistake after you have clicked the button you will need to see
your lecturer to reset
your Project #1 account.