short answer

 

Please respond to the following:

  • There’s no real prominent certification in the programming industry that says to an employer that you have programming skills. What are some tips you have for your classmates on how you plan to showcase what you have learned as a programmer? How do you plan to document your education and experience to look valuable to a potential employer?

Leader Traits and attributes

Discuss and identify leader traits and attributes that are most beneficial in implementing the best decisions in an organization. 

  1. Explain the differences in charismatic and transformational leadership and how both leadership styles impact organizational effectiveness.  Please note how these leadership styles affect implementing new innovative technologies.
  2. Review table 8.1 in the reading this week, note the work characteristics and the traditional versus high-performance focus, note which focus is best for strategic decisions and which is best for operational decisions.  Please explain.

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Use APA references and in-text citations.

Week 3 IT impact

This week we will tackle the tough topics of anonymity, net neutrality, censorship, and controlling speech. All these topics can easily start a debate among the most conservative individuals. It is important to understand these concepts can sometimes counteract the progression of technology in society.

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 200 words and appropriately cites your resources.

Respond to two of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

You will not be able to see your classmates’ posts until you make your first post.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Discussion_Grading_Rubric_Final (2).docx

Grading_Late_Discussion-1 (3).docx

Topics:

  • What is the Telecommunications Act of 1996?
  • How has the idea of offensive speech changed since technology has progressed?
  • Do you consider the internet an appropriate tool for children? At what age do you introduce children to the internet?
  • What is data leakage? What does the term insider threat mean?
  • What are some kinds of Web sites that should prohibit anonymity?

You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal.

You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different level: Semester and Department.  Your program will be a menu based application. Assume that you project file is myproject.py. Once you run, it will show last 5 semester (fall, spring, summer only, (not winter, may mini))

> python myproject.py
Choose a semester: 1) Sprint 2021   2)Fall 2020  3)Summer II  4)Summer I 5)Spring 2020 
Selection: 2

Here, your program will parse the data from website and show only last (most recent) 5 semesters. User will make selection, then, you will show departments for the selected semester (Fall 2020). Note that selected semester is visible before a “>” sign.

Fall 2020> Select a department:
1) Undeclared
2) Accounting and Finance
3) Art
4) Ag Science & Natural Resources


30) Social Work
31) Theatre
Q)Go back

Selection: 3

Fall 2020> Art > Select an option:
1) List courses by instruction name
2) List courses by capacity
3) List courses by enrollment size
4) List courses by course prefix
5) Save courses in a csv file
6) Search course by instruction name
7) Search courses by course prefix
Q)Go back
Selection: ??

Here, your program will parse the data from website and show all available department then list of tasks. Q (go back) option will take user to previous level. 

Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by prefix ” should show

PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532

as first 5 rows.

You will follow above headers and order (prefix (col. width 6), ID (5), Sec (5) ,Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left justified. A course name should not have a word more than 5 chars. For instance Algorithms should be abbreviated as “Algor”. The length of course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as .csv format. User will be able to provide a filename for csv file.

For this program you need to develop at least one class (chapter 10) with (possible) many methods.

Virtualization

 Consider, in 500 words or more, how business processes as services can improve efficiency. This discussion is about the business process as a service and security.  

  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand-alone quotes will not count toward the 3 required quotes. 

Wk-3

  

Assignment 1

What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?

Refer to Chapter 5 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Assignment 2:

List and briefly describe the nine-step process in conducting a neural network project.

Refer to Chapter 6 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

****Separate document for each assignment.****

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add references separately for each assignment question.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

ET WK4

Some of the different cybercrime such as Computer:

550 words

Crime, Internet, Telecommunication, Piracy,  Identity theft, Cyberspace, Denial of service attack, Spam, Zombie computer.  Select  one area of Cybercrime and discuss how to develop a security policy and various security and privacy regulations. Internet-related crime occurs every minute. Cybercriminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cybercriminals?

BSWP Week 2

 

In 300 words
 

OWASP( Open Web Application Security Project ) Vulnerabilities.

Please describe the below in 300 words.

  • Broken Authentication – OWASP Vulnerabilities.