Python coding help

  

Task 2

Given two lists, write python code to print “True” if the two lists have at least one common element. For example, x = [1,2,3], y=[3,4,5], then the program should print “True” since there is a common element 3.

Hint: 

We can first calculate set(x) – set(y). set(x) – set(y) is to remove the element in x that also exists in y (3 in this case). So set(x) – set(y) will be equal to (1,2), which is a set. And its length is 2 if you calculate len(set(x) – set(y)).

if set(x) – set(y) has a smaller length than set(x), i.e. len(set(x) – set(y))

This will get easier after we learn the iteration structure and the conditional statement in the next few weeks. 

Enterprise Risk Management

 

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Research Paper ISOL

 Intellectual property vs. the Internet.

Intellectual property still exists in the age of the Internet and is still protected under the law. However, since it is possible to download or copy and paste almost anything off the Internet intellectual property has been abused more and more often. There have been numerous examples of literary prizes awarded and then rescinded over plagiarism and theft of intellectual property.  Currently China is open and above board about acquiring intellectual property. The government of China will not allow any company, particularly American companies, to conduct business in their country unless the company agrees to give up any intellectual property regarding the products they sell in China. Younger students today don’t think there is anything wrong with copying information off the Internet and presenting it as their own work. I have had discussions with students in which they proposed the idea that since they searched for the information on the Internet and then found it, they could copy it and present it as their own work. The concept of intellectual property seems to be falling by the wayside due to the Internet. Develop a hypothesis as to whether we should continue or even strengthen intellectual property laws, or should we simply abandon intellectual property laws and make anything that is posted on the Internet fair game.  

Write a research report on the main topic: Software Engineering and Traditional Development Models in APA format

Word count: 3500 words

Be sure to narrow the research focus

  • Search the literature database to find a problem that you will focus on – Add to this section: (Introduction–>Problem Statement)

 For example:

   Main topic: Software Engineering and 3D Printing 

 Research Title: The impact of 3D printing software on sales and productivity in the retail industry

  • Determine at least TWO questions that you will focus on in the research solution

                  Add to this section: (Introduction–> Research Questions

Research Report Guide:

  • The structure of the paper  MUST follow the guide. The guide can be found in the Research Report Help section.
  •  Include All sections
  1. Front Matter – Title page (with Running head“), blank Approval page, Abstract, blank Acknowledgement page, Table of Contents, List of Figures  (if necessary), List of Tables (if necessary)
  2. Chapters 1 – 5
  3. References (as per APA)
  4. Appendices (if necessary)

BSWA Week 6

 

Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 300 words. 

Security Overview Presentation

 

Create a 10- to 12-slide, multimedia-rich presentation in which you provide:

  • A definition of cybersecurity and further explain how cybersecurity differs from enterprise security
  • A timeline of cyber milestones, including graphics and a brief explanation of the milestone
  • An explanation of why knowing cyber milestones is important for improving security for the organization’s current and future environment
  • A chart presenting 4 strategies that could be used to determine the organization’s current security environment, the impact of the strategy, and resources (personnel, finances, etc.)

Your presentation should also include:

  • Speaker notes
  • At least 2 references to support the presented facts/etc. Format your citations according to APA guidelines.

Note: “Multimedia-rich” presentation typically means including several of the following: appropriate charts, graphics, video or audio samples, or images

Research Paper

 Any one of the below topics:

  • Information systems infrastructure: evolution and trends 
  • The strategic importance of cloud computing in business organizations 
  • Big data and its business impacts 
  • Managerial issues of a networked organization 
  • Emerging enterprise network applications 
  • Mobile computing and it’s business implications  

Research paper basics: 

  • 8-10 pages in length 
  • APA formatted 
  • Minimum six (6) sources – at least two (2) from peer reviewed journals 
  • Include an abstract, introduction, and conclusion 
  • ABSOLUTELY NO PLAGIARISM!!!! Attach a plagiarism report. 

Research project on k-d trees

K-dimensional trees or k-d trees organize and represent spatial data. These data structures have several applications, particularly in multi-dimensional key searches like nearest neighbor and range searches. Here is how k-d trees operate:

  • Every leaf node of the binary tree is a k-dimensional point
  • Every non-leaf node splits the hyperplane (which is perpendicular to that dimension) into two half-spaces
  • The left subtree of a particular node represents the points to the left of the hyperplane. Similarly, the right subtree of that node denotes the points in the right half.

You can probe one step further and construct a self-balanced k-d tree where each leaf node would have the same distance from the root. Also, you can test it to find whether such balanced trees would prove optimal for a particular kind of application. 

Project 2 – Cipher implementation in Python

The primary goal of this project is to understand how Caesar cipher works. Here, we are using the python programming language to implement the Caesar cipher algorithm. It is not mandatory to know python in order to run the program. The main focus is to understand how the input message is converted into ciphertext with the help of encryption logic and then use a similar pattern to perform decryption. You will be provided with a python code that has implemented encryption logic. Your task is to understand the logic and implement decryption by simply writing the logic explained in the pdf file.