Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

computering

SEE ATTACTED

Module 4 Homework

Here are the instructions for Module 4 Homework. You will use the Module 4 Homework Submit link to submit your work. If you do not see a link, this means you have missed completing a previous assignment or task. 

Fix the emails! We have covered some email etiquette in the module now let’s see what you have learned.

Copy and paste the poorly written emails below into Microsoft Word, and then correct them using Microsoft Word Review and Markup tools. Again you MUST utilize the MS Word Review tools to show all mark up and track changes AND show all comments so that I can see all of your edits!

Once your edits are complete and your document is saved complete the following steps.

Create a single folder in your OneDrive titled Module 4 HW where you will store your finished document.

Upload your document to the folder you created in step one.

Using the skills you learned from the module tutorials, create a shared link to this folder. NOTE: Your link MUST be accessible. The permissions must be set to “anyone with a link can view.”

Copy the share link you created from step C and paste in the submission text box for the assignment.

Upload a copy of your document submission link.

Make sure that both your link is in the text box and your file is uploaded, then click submit.

Here is the link the OneDrive Tutorial as a refresher:

This assignment can only be done in the full desktop version of MS Word. Do not use the web version and be sure you are using your own Microsoft account!

Minimum requirements:

Submit only one document via the link.

Use the review and markup tools in MS Word as indicated

Place a header on your page that contains your first and last name, the assignment name, and the course code from the syllabus.

Your document must be one of the following formats (.doc, .docx, or .rtf).

Cite any and all sources.

Save the file as <LastNameFirstInitial_M4HW> Example: OserK_M4HW

__________________________________________________________________________________________________________________

To: [email protected]

From: [email protected]

Subject: Assignment

Hey, Got in a wreck and totaled my car on my way to class and I’m not sure exactly at what point next week I’ll be back (im mostly okay but im sorting everything out) what can i do to stay caught up with the material in the mean time?

thank you and see you soon

__________________________________________________________________________________________________________________

To: [email protected]

From: [email protected]

Subject: COSC1301: Class attendance

Dear Professor,

This is Lexie Brown, from COSC1301-TD001. I am writing to inform you that I won’t be able to attend your class on Thursday, as I have a doctor’s appointment at 11 AM.

Please find attached my assignment we are supposed to submit by Thursday. I will also do my best to look through the materials you provided for this class and ask my classmates to share their notes.

Thank you.

Best regards,

Lexie Brown

__________________________________________________________________________________________________________________

To: [email protected]

From: [email protected]

Subject: Computer Class

Ms. O!!!!

Sup? girl you gotta tell me what we have to do for the next class cuz I take 3 claeses and i wrk parttime and I dont have time 2 git to a comupter to look n e thing up I rlly like your cls bcuz your funny well let me know cuz im a rlly gd stdt and need a A in the class.

[no signature]

__________________________________________________________________________________________________________________

To: [email protected]

From: CandyMan6969 <[email protected]>

Subject: WTF

Why did you give me an F? I attended most of the classes and at least tried to understand the materials. I think I deserved at least a passing grade. I studied hard for the exam in hopes that I would at least pass the class. Now I am behind another 2 semesters because I have to retake this class and then take Managerial Acct. Can you please reconsider? Hope to hear from you soon.

Thanks,

George

__________________________________________________________________________________________________________________

To: [email protected]

From: Thor God of Thunder <[email protected]>

Subject: Hey teach!

Ummm where are we suppose to see the websites we are to review and leave comments on?

__________________________________________________________________________________________________________________

To: [email protected]

From: [email protected]

Subject: websites

Hello,

I just wanted to inform you that i turned in the 4.2 assessment project and did the best i could under the circumstances with my father and hes only getting worse. I am in michigan taking care of him full time. I didnt realize the final assessment was so intricate and to be honest i feel i wont be able to get all of it done by the due date. There is too much going on with my dad to concentrate on this final project. Ive completed all the work in my other classes but it was easier for me for some reason. I dont know why I am having a hard time grasping the things you require in the projects. I feel my dads situation has a majority to do with it. It is impossible to sit down for 2 minutes to think about anything. I dont know if i will be able to turn it in by your due date. I am doing my dads dialysis myself and having a parent in the same situation im sure you know how it feels. I can provide proof if needed. Im trying to be upfront with you so you are informed of why things arent done on time. The only thing i can think of is i may have to repeat the course. But i WANT to continue in this course until the end of it in case i am able to finish the project in time. As i said i just wanted to keep you updated. 

__________________________________________________________________________________________________________________

To: [email protected]

From: [email protected]

Subject: Hey teach!

Dear Dr. Oser,

You don’t actually know me, but my boyfriend, StudentX, is in your class. I would just like to apologize for the fact that he was not in class on Monday. He did something really schetchy this weekend and I sort of punched him in the face. He was too embarassed to come to class with the black eye, and it was my fault–although if he hadn’t done it neither would I–and I’m sure he’ll be in class on Friday.

Really sincerely,

Girlfriend

__________________________________________________________________________________________________________________

To: [email protected]

From: [email protected]

Subject: Hey teach!

what’s up kat

i left my test in the back of the classroom. i was hoping you could pick it up and give me comments on it and also maybe make a study schedule for me so i know how to improve.

i know ur busy so thanks

__________________________________________________________________________________________________________________

To: [email protected]

From: [email protected]

Subject: Assignment

Hey Dr. O

I can’t find my copy of the assignment you was telling us about. Do ya think you could get me another one ASAP?

Thanks bunches!!!

Peace and love,

heather ♥

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

The Equifax Data Breach

Briefly explain what the Equifax data breach was, why it happened, and why it was important. You should mention that Equifax failed to protect personal data, discuss the ethical and security issues involved, and explain what companies can learn from the incident. Please see attached documents. 

Reflection on Big Data and AI

please see attached DAT 260 Module Five Journal Guidelines and Rubric Overview In this journal assignment, you will reflect on key concepts covered in this module. This assignment directly supports your work in Project Two, which is due in Module Seven. Directions In a well-crafted journal entry, address the following:

Disaster Recovery

  Questions: Research the network and server outage problems experienced during a previous man-made or natural disaster and answer the following questions: What parts of the infrastructure was impacted? How were the networks recovered? How redundancy could have mitigated the impact of the disaster?

Network Design and Plan Purpose

Please review attachment Mod 4 Project: Network Design and Plan Purpose In this module, we will introduce a course design project that will be completed in four parts during the course. This project provides you an opportunity to solve a comprehensive problem in firewall and virtual private network (VPN) implementation

Memecoins & Stablecoins Development

Please take a look at the attachment. Lab #3: Blockchain-Based Ecosystems: Memecoins & Stablecoins Development, Attack Simulation, and Auditing Lastname: ______________ First name:____________Date_______ TA_Prove_ Yes/No 1. Overview This lab guides students through designing, implementing, deploying, testing, and auditing a simple memecoin (ERC‑20) and a minimal ecosystem around it (liquidity pool,

Blockchain Presentation

presentation about a blockchain Term Project CIS 5730- Blockchain Application Project Guideline Part ii–Presentation Along with the project you will present what you did to the class in a short presentation. If you want, you can demonstrate the project, or just present an overview of what you did. Presentations should

Network Threats

  Questions: Below is a list of common network attacks: Distributed Denial of Service (DDoS) DNS poisoning ARP poisoning Domain hijacking MAC flooding MAC cloning Man-in-the-Middle Explain two of these network attacks and discuss methods/techniques for protecting the network against them.

Best Practices for Role-Based Privilege Management in Databases

  Research the best practices for managing and securing role-based privileges in databases and address the following questions in your discussion post:  What are the key challenges in managing role-based privileges, and how do they impact database security? Can you provide a real-world scenario where poor role-based privilege management led

Computer Science Cloud Computing assignment

Please see attachment for details 4 [ Note: To complete this template, replace the bracketed text with your own content. Remove this note before you submit your paper.] Cloud Computing Evaluation Paper 1 Cloud Computing [Differentiate between cloud computing models and their uses. What are the different types of deployment

Computer Science- Python Python Programming Assignment

Computer Science Python Programming Lab assignment help. Design a Python program that calculates a credit card customer’s minimum payment based on their balance. Please use If Else and elif statements in your code. You must add comments in your code. Please round the minimum payment to two decimal places using

Blockchain Application

I need help with my coursework project. Let me know if you need any help from me.  Lab 2: Blockchain-Based Academic Credentials Lab Lastname: ______________ Firstname:________________ 1. Overview AETHELRED UNIVERSITY Registrar’s Office wants to start issuing a digital transcripts and diploma for graduating students. You are called to build the

LOREM, IPSUM

The ability to develop a risk register is a skill needed by all cybersecurity leaders when assessing cybersecurity risks. A risk register provides a detailed listing of known risks as well as quantitative or qualitative assessments of those risks, resulting in the prioritization of action.

Virtual LANs

  Questions: A VLAN allows different devices to be connected virtually to each other as if they were in a LAN sharing a single broadcast domain. 1. Why a network engineer would want to deploy VLANs? 2. How do VLANs improve network security?

compliance and rules to follow in cybersecurity.

Follow the attached instructions to complete this work. Note: Make sure to follows rubric or aligns with Rubric. Unit 8 Assignment Directions: Case Study Review the following hypothetical case study. Consider the big-picture ideas and the specific concerns. Make use of the key terms and concepts from the readings in

Discussion on data ( computer science)

Follow the attached direction to complete this work Unit 7 Discussion   Overview Consider this scenario: PQR Corporation provides facial recognition technology to customers. Its products include customer access to consumer electronics as well as mass surveillance capabilities through networked camera systems. While operating legally, PQR has maintained a low

Computer Science – Machine Learning Python Programming Assignment

Assignment Help. Please don’t forget to add comments in the code Page 1 of 3 NorQuest College – CMPT 1011: Lab Assignment 5 CMPT 1011: Introduction to Computing Lab Assignment 2: Variables, mathematical operations and data types Value This coding challenge is worth 3% of your final grade. Background In