R-Programming

 

Environmental Protection Agency (or EPA for short) is responsible for regulating the amount of pollutant emission from all automobiles that run on American roads. You are asked to analyze the data released by EPA for more than a decade, specifically for three time periods: 2010 – 12, 2014-16, and 2018 – 20. There are several objectives to this case analysis, one of which is to test and learn about the possible changes in the amount of pollutions emitted by vehicles overtime. You are also asked to analyze similarities between vehicles over the three time periods and empirically determine if certain vehicles became more (or less) polluting over the period of study.

You will analyze various aspects of vehicle induced pollution using R programing. You are expected to submit findings in a report format. The report must be at least 20 pages long with written description and explanation of your findings to the questions asked below. Make sure to run all code using R Markdown and create a formal report with your remarks, comments or explanations embedded within the document.   

You are given nine years of individual EPA data in csv format. The data files are not very large (each file is approx. 1 MB) . Each yearly file contains thousands of vehicles along with their vital information and pollution testing records. Each file contains 42 columns, the details of which are given in the Data Dictionary document. Please note that the original data had more columns, and some of them were removed for the consistency purposes. The deleted columns also exist in the data dictionary and you are asked to ignore them while referring to the dictionary.   

There are three sections to this case study : Merging and cleaning ( 20 points), Data Analysis ( 6 0 points), Visualization ( 20 points) 

help sorting student directory and emailing students in my class using mail merge

I need someone to help me send my campus a circular. I have a list of emails and phone numbers for all of the sophomores and I need someone I can trust to create a five page drive pamphlet that will tell them about the fund drive and direct them to the site. It’s like ‘Go fund me’, but a project for my IT class. So you have to know how to work with mail merge and know how to sort phone numbers on excel comma separate values (csv) spreadsheet to successfully finish the project. It is due by Monday. So please, only serious takers. 

Site to add list to is here: https://myualr-leaks.wixsite.com/astudemy

Some students from Arkansas and some from Minnesota have zip codes that you will need to ask me about before you can add their info

2/3 Discussion

  1. Review Chapter 14 in Principles of Information Systems.
  2. In the discussion linked below, respond to the following prompts:
    1. From the textbook reading, what concerns are apparent in the use of technology and the internet and one’s expectation of privacy? Of the concerns described, which is most relevant to you? Consider why this is important to you. How does this affect your personal life?
    2. What are the most significant laws and regulations in place to protect people and organizations? After thinking about the current legal environment, what do you believe still needs to be addressed regarding the personal privacy of a user’s information?
    3. As you think about current and emerging technologies (artificial intelligence, for example), what privacy issues will require some kind of remediation?
  3. Your initial post should be a minimum of 300 words and is due by the fourth day of the workshop week.

IT project

 

week 5 assignment is going to be similar to the assignment you completed for Week 4. You will get an opportunity to build a substance-based PowerPoint presentation. If you want to use a video to complete Week 5 Assignment: Build a substance-based PowerPoint presentation (with audio support using MS PowerPoint Voice Over feature, Prezi Video, MyComputer video feature, Zoom or other available audio/video software) that is fine. However, you will need at least 10 slides with an Introduction, Body, and Summary. Be sure to address each item, so you capitalize on all available points. Remember to provide a summary and note that the quality of your presentation will have some bearing on your total points. You want to use images, videos on YouTube, if available, hyperlinks and other supportive diagram where necessary.

 

  • Introduction – provide the reader a bulleted list of all the points your will discuss in the presentation.
  • From the Analog to the Digital Age – discuss how digital and analog data differ and what a modem does
  • Explain Network Architectures
  • Networks – discuss the benefits of networks and three types of networks, their components, and variations 
  • Wired Communication Media – discuss three types of wired communications media
  • Wireless Communication Media – discuss three types of wireless communications media (
  • Cyberthreats, Hackers, & Safeguards – describe areas of concern for keeping a computer system safe 
  • Summary – provide the reader a bulleted list of all the major points you discussed in the presentation.

Discussion

-need one page

 

  1. In 100-200 words, please explain in your own words the difference between Authentication and Authorization and how they work together.
  2. In 100-200 words, outline the Incident Response steps. Does Digital Forensics work into the Incident Response process? If so, please explain. 

excel spreadsheet expert required

Fashion merchandising excel spreadsheet

1 excel spreadsheet completed (get inspired and use the same formulas to complete the actual assignment) 

1 excel spreadsheet to complete (3 different windows to complete)

Heuristic Usability Analysis

 Home>Computer Science homework helpnetworkingCybersecurity

Heuristic Usability Analysis of your Prototype

  1. Usability Test/Test Plan
    1. Scenarios (from project 3)
    2. Tasks (from project 3)
    3. Task List (from project 3)
  2. Usability Data
    1. Use two participants.
    2. You can observe them using your prototype.
    3. Write your observation.
    4. Interview them after they used your product.
    5. Give them a questionnaire. 
    6. Make sure your data is clear and understandable. 
  3. Recommendations
    1. After your users have used your product, what are your recommendations for any usability problems that you observed from your users or that you got from the questionnaire.
    2. You can also rate the recommendations as major, minor, or non-issue, etc. if you like.

vul dis 6

 

During job interviews, employers often ask if you are familiar with cybersecurity software. For this reason, it is a good idea to become familiar with commonly used software, including capabilities and limitations. These software products are the tools for conducting your day-to-day duties.

For the first six weeks of this course, you have been exposed to many different tools that an analyst should become familiar with: analyst tools, exploitation tools, and forensics tools. Provide a response in which you:

1. Describe a lab or a software tool that you used that has helped you to better understand the role of an analyst within an organization, such as:

  • Kali
  • Metasploit
  • Nessus
  • Nmap
  • Process Explorer
  • Splunk
  • Wireshark
  • Any other tool used in the course

2. Describe the process to install, set up, and configure the tool you selected above. Did you find the tool easy to use? Did you encounter challenges?

3. Highlight some of the benefits of the tool you selected above. Provide some examples of where you think using the tool would benefit you as a cybersecurity threat analyst. Why do you think the tool would be best?