mark the problems

 The answers of the problems already there 

 slide 6-10 have problems COLOR/PUT A MARK LIKE THE FIRST 5 SLIDES FOR  THESE PROBLEMS IN EACH YOU WILL FIND THE ANSWERS IN THE LAST SLIDE , 

USE THE SAME FILE TO DO IT 

AT FIRST YOU WILL SEE EXAMPLES THAT HELPS 1-5

Business Intelligence

 This short 5-6 page APA paper should discuss business intelligence and your organization’s level of business intelligence 

 

A suggested layout for your 5-6 page paper (including cover and references pages) would be:

  • Cover page
  • Introduction to your paper (tell the reader what you’re going to discuss in this paper – one to two paragraphs)
  • Introduction to BI (what it is, why it’s important – at least three subheaders/topics – at least 1.5 pages)
  • [Your Organization]’s Level of Business Intelligence (at least 1 page)
  • What [Your Organization] Can Do to Increase the Level of Business Intelligence (at least 1 page)
  • Summary (about two-three paragraphs)
  • References page (at least four)

Computers and the Patriot Act

 

In order to complete assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 2

  1. For apps to be featured on the iPhone, developers must build it with Apple’s software development kit and then apply for approval. Apple rejected the Google Voice iPhone App, and further stated that it would not accept any applications that incorporated Google Voice functionality. Apple reasoned that this app duplicates the phone’s core features. It also rejected Google’s location-based app Google Latitude. If you were developing a collaborative platform, do you think the best model is this collaborative model, or is the open innovation model better – if your main goal is to maximize innovation? What if your main goal is to make money?

Chapter 3
2.Plaintiffs filed a class action lawsuit against investment banks alleging that they inflated prices on more than 300 IPOs, causing IPO investors to overpay for stock, and unlawfully benefited these banks through overcompensation of banking commissions and profits made through quick sales of this stock in their own accounts before prices settled into a more realistic valuation. How would you combat such abuses going forward?

3. Read the following laws and articles:

1. The Computer Security Act of 1987

2. The Patriot Act.

3. Jaeger, P. T., McClure, C. R., Bertot, J. C., & Snead, J. T. (2004). The USA PATRIOT Act, the Foreign Intelligence Surveillance Act, and information policy research in libraries: Issues, impacts, and questions for libraries and researchers. The Library Quarterly, 74(2), 99-121.

4. Politics

Discuss the relationship and impacts of CSA, USA PATRIOT ACT, and FISA. Also discuss the current status of these laws and the replacement of these laws.

discussion question (1 paragraph)

Please respond to the following:

  • Companies use web analytics to gather data and measure a website’s  design effectiveness among its users. Of the two web analytic categories  (on-site and off-site), speculate on which one is more effective.

Unit 7: Animation Software

  Research programming languages that are used for animation and select the one you feel is the best.  Be sure to include the name of the program, the source of the program, and the cost.  Explain your reasons for selecting this program. Describe a project that you could create using this program.

Lab 1

   

CSS 300 Module 1 Lab Activity Worksheet
Use this worksheet to complete your lab activity. Submit it to the applicable assignment
submission folder when complete.
Deliverable:
– Answers to the questions in Part 1
– An image of the results from Part 2
Part 1 – Getting to Know a Dataset
Download the US Weather Events dataset. You can find out more about this dataset at Kaggle’s
US Weather Events (2016-2019).
Answer these questions to understand the US Weather Events dataset:
1. Where did the data come from? Is it static, or will it be updated on a consistent basis?
Is it reliable?
2. Check the dimensions of the table. How many columns are there? How many rows?
3. What are the data types of each column? Are they continuous/numeric? Are they
integer? Are they categorical?
Part 2 – Importing a Dataset in Python
If you need Python follow this link:
1. Import the Pandas package using the Anaconda install option:
https://docs.continuum.io/anaconda/
2. Launch the Anaconda Application on your computer
3. Launch the Jupyter Application within Anaconda
4. Navigate to the folder with the dataset and run a New Python 3 Terminal within Jupyter
5. Import dataset from Part 1 by using the following code:

import pandas as pd
df = pd.read_csv(“US_WeatherEvents_2016-2019.csv”)
6. Print the data to the screen by using the following code:
df.head()
7. Print more information for the dataset by using the following code:
df.info()

Project 5: Administration Cybersecurity Policy Review Step 10

 

Project 5: Administration Cybersecurity Policy Review
Step 10: Focus on FISMA Report

Use your discussion from the previous step as a basis for the report in this step.

Remember, there are methods that the government uses for quantifying information security and loss. Create a two-page document that summarizes the impact of FISMA upon the quantification within the government, how FISMA implementation can affect the quantification, and the need for FISMA adherence across the federal government.

Write a two-page discussion with the following points:

  • Describe and discuss the objectives of policy makers.
  • Describe and discuss the general problems that limit the effectiveness of vehicles that try to govern cybersecurity.
  • Considering the general problems discussed in the previous point, discuss ideas for improving cybersecurity.
  • Discuss how well you think FISMA works in the workplace.

This document will serve as the FISMA conclusions section of your final report. Submit your Focus on FISMA report for feedback.

analyzing and visualizing data midterm

 Review the attached file. Suzie has an issue. She can either move to NY or FL and needs to review some data that her agent gave her. The agent reviewed house prices and crime ratings for houses that Suzie would be interested in based on her selection criteria.  She wants to live in an area with lower crime but wants to know a few things:

  1. Is it more expensive or less expensive to live in FL or NY?
  2. Is the crime rate higher in FL or NY (Note a low score in crime means lower crime)?
  3. Is the crime rate higher in lower or higher house price areas?

Using the R tool, show the data in the tool to answer each of the questions.  Also, show the data visualization to go along with the summary.

  1. If you were Suzie, where would you move based on the questions above?
  2. After you gave Suzie the answer above (to #4), she gave you some additional information that you need to consider:
    1. She has $100,000 to put down for the house.
    2. If she moves to NY she will have a job earning $120,000 per year.
    3. If she moves to FL she will have a job earning $75,000 per year.
    4. She wants to know the following:
      1. On average what location will she be able to pay off her house first based on average housing prices and income she will receive?
      2. Where should she move and why?  Please show graphics and thoroughly explain your answer here based on the new information provided above.

Note: The screenshots should be copied and pasted and must be legible.  Only upload the word document.  Be sure to answer all of the questions above and number the answers.  Be sure to also explain the rational for each answer and also ensure that there are visuals for each question above. Use two peer reviewed articles to support your position. 

Security Architecture and Design Individual Assignment 3

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Assignment must be at least 600 words. Include a coversheet with a title, your name, class ID and date at minimum. Report due by Saturday.

Using Figure 5.4 as the target architecture (see attached), who are the threat agents who will be most interested in attacking Web applications created through AppMaker?