need it by 1 july
Jupyter Notebook for Big Data Visualization
Explain how to use Jupyter Notebook for Big Data visualization. Provide a Jupyter Notebook file with an example. Feel free to use any open-source dataset available to download.
Be sure to support your statements with logic and argument, use at least two professional or peer-reviewed articles and cite them to support your post. Submit your initial response early and check back often to continue the discussion. Be sure to respond to two of your peers’ posts as well.
Security – multivariate, multidimensional events
Given multivariate, multidimensional events generated by adaptive human agents, perhaps it would not be too far a stretch to claim that no two events are precisely the same. Given the absence of actuarial data, what can a poor security architect do?
Answer the question with a short paragraph, with a minimum of 300 words in APA format with in-text citations. Minimum of two references are required.
Operational Excellence W6
Information Systems for Business and Beyond Questions
Chapter 11 – study questions 1-10, Exercise 1
Chapter 12 – study questions 1-11, Exercise 1
Information Technology and Organizational Learning Assignment:
Chapter 9 – Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cyber threat noted in the textbook. Research other peer-reviewed source and note additional methods to reduce cyber-attacks within an organization.
Chapter 10 – Review the section on the IT leader in the digital transformation era. Note how IT professionals and especially leaders must transform their thinking to adapt to the constantly changing organizational climate. What are some methods or resources leaders can utilize to enhance their change attitude?
The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.
**Remember the APA cover page and the references (if required) do not count towards the page length**
Note the first assignment should be in one section and the second section should have the information from the Information Technology and Organizational Learning assignment. The paper requirements for the two-pages applies to the second part of the assignment directly related to the Information Technology and Organizational Learning assignment.
By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
200 words Paper on RSA (eNCRYPTION)
Using the Web or other resources, write a brief paper about RSA, its history, its methodology, and where it is used.
2). Send a brief message (ten words minimum) using the Caesar Cypher.
Exp19_PPT_Ch01_Cap_WantToWaffle.pptx.
StepInstructionsPoint Value1Start PowerPoint. Download and open the file named Exp19_PPT_Ch01_Cap_WantToWaffle.pptx. Grader has automatically added your last name to the beginning of the filename. 02Change the theme variant to the last one (orange variant).53Change the theme color to Red Orange and the theme font to Candara.64Create a new slide after Slide 1 using the Panoramic Picture with Caption layout. Type Interested in Bringing Waffle Love to Your Town? in the middle placeholder. Type The opportunity can be yours! in the bottom placeholder.95Select the text Waffle Love in the middle placeholder, change the font size to 32 pt, apply Shadow, and change the font color to Gold, Accent 2.
Note, Mac users, to apply the shadow, on the Shape Format tab, click WordArt Styles, and then click Shadow.66Click Slide 2. Use the Reuse Slides option to insert all of the slides from Waffles.pptx into the open presentation. Ensure the Use source formatting or Keep source formatting check box is not selected so that the inserted slides take on the design and formatting of the open presentation.67Type the following speaker note on Slide 1: We have a great opportunity for you to join our waffle family. (Include the period).
38Delete Slide 3. Move Slide 5 (92% increase in sales) so that it becomes Slide 4.
49Create a Notes and Handouts footer with the following: Franchise Information. Apply to all.
410Click Slide 1. Insert the WaffleTexture.jpg image file. Crop the image by dragging the middle bottom sizing handle up until it is at 0″ on the vertical ruler. (HINT: Shape Height will be 3.75″ at this point). Change the width of the cropped image to 13.33“.
811Apply the Drop Shadow Rectangle Picture Style. Set the horizontal position of the image to 0″ and the vertical position to 0″.
1012Click Slide 2 and insert the DessertWaffle.jpg image file. Apply the Simple Frame, White Picture Style.713On Slide 8, insert the Waffle.jpg image file. Change the width of the image to 7.3″.714Apply the Simple Frame, White Picture Style. Set the horizontal position of the image to 5.4″ and the vertical position to 1.6″.
615On Slide 7 convert the list to the Step Up Process SmartArt graphic.
Note, Mac users, convert the list to the Basic Process SmartArt graphic.816On Slide 3, select the text Why We’re HOT in the title placeholder and apply the Fill: Red, Accent color 1; Shadow WordArt Style to the text. Increase the font size of the WordArt to 60 pt.717Check the presentation for spelling errors. Make corrections as needed on the slides.418Save and close Exp19_PPT_Ch01_Cap_WantToWaffle.pptx. Submit the file as directed.0
Activity 1- Project Risks
Problem Set #1
#1 Back to basics to start this course:
- Define project.
- What are the five project process areas – give a short explanation of each.
- What are the ten project knowledge areas – give a short explanation of each.
- Define Project Risk – list the major processes related to project risk – explain how risk remediation is a part of our every day lives.
- How would you define quality in a project?
- Why is risk a dynamic variable within a project?
- How can a risk be related to a desirable event?
Text
Title: Managing Project Risks
ISBN: 9781119489733
Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards
Publisher: John Wiley & Sons
Publication Date: 2019-08-13
Urgent 2
Hello
these are three assignments of UML. please check and let me know.
Desktop Migration Proposal
Instructions
This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet research you conducted, submit your recommendation to the assignment folder. As you are writing your recommendation, ensure your analysis and recommendations align with your manager’s priorities and concerns.
You should carefully document any assumptions made (e.g., how you analyzed the requirement for upgrading monitors, peripherals devices, etc.).
Refer to the HFA Desktop Migration: Corporate PC Refresh Documentation for the company’s needs (requirements). Your justification should clearly indicate how you bridge the gap between the existing desktop specifications and the new machines you recommend.
How Will My Work Be Evaluated?
For this assignment, you are asked by your manager to research the replacement of 50 aging desktop machines with new laptops. Review the business needs from your manager carefully so that you fully appreciate the requirements you must address in selecting the new laptops.
For example, what is significant about the need for “multiple external monitors”? Ask yourself what it takes to connect a laptop to external monitors. What ports are included on your recommended laptop? What kind of cables are required? Can those ports/cables be used with the external monitors? Does the laptop have sufficient graphics capabilities to drive external displays and if so, how many and at what resolution? Follow this same process for all the business needs.
By documenting your choices and the overall recommendation in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.1.3: Present ideas in a clear, logical order appropriate to the task.
1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.
1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.
2.1.2: Describe the context surrounding the issue or problem.
2.3.3: Explain inferences and deductions that follow logically from the evidence provided.
10.1.3: Define the specifications of required technologies.
13.1.1: Create documentation appropriate to the stakeholder.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
This project is a three- to four-page business-oriented proposal should contain the following:
- at least one high-quality graphic
- one or more tables to present information
- at least one online configurator
- your purchase recommendations, specifications, and justification for your choice
- one to two IEEE references
Course Resource
HFA Desktop Migration: Corporate PC Refresh Documentation
Background Information
HFA Associates User Profiles, Existing Desktop Computer Specifications, and Requirements Analysis
HFA Associates User ProfilesCommon UsersSuper Users Common users are goal- oriented and focus on what they want to accomplish. They may not understand nor care about the technology and software used but just want to type a document, send an email, or use the internet. These users need basic machines with office productivity software, a web browser, and other common programs associated with the average business machine. are goal- oriented and focus on what they want to accomplish. They may not understand nor care about the technology and software used but just want to type a document, send an email, or use the internet. These users need basic machines with office productivity software, a web browser, and other common programs associated with the average business machine.Creative users are application-oriented and have the training and experience to employ expensive purpose-built and often complex software. They are typically computer-savvy because using these complex applications requires them to know the technology at a level beyond goal-oriented users. Creatives require capable machines with better-than-average processors and memory, and a high-DPI display.Coders use the most advanced features of their computer hardware and operating systems to develop specific HFA workflows, applications, and websites. Coders are characterized by a high degree of technological competence. These users require highly specialized programming utilities and applications, and the most capable, innovative machines with multiple/fast processors, substantial amounts of memory, and multiple high-resolution displays.HFA Associates Existing Desktop Computer Specifications CommonCreatives and CodersNumber:4010Processor:Intel I3 Dual CoreIntel I5 Dual CoreMemory:4 GB8 GBGraphics:HDHD+Storage:3.5″ 7,200 RPM 500 GB HDD3.5″ 7,200 RPM 1 TB HDDApplications:Office 2013, Microsoft Internet ExplorerAdobe Illustrator, CLO Enterprise Edition, ApparelMagic Enterprise Edition, Safari
All users require the capability to add external peripheral via fast USB connections and/or the latest Bluetooth standard. Additionally, all computing devices must be physically secured against theft. You should include warranty, support, antivirus, and office/mobility accessories. Consider if external monitors are appropriate to the user profile. All users should be afforded the capability to quickly disconnect from the office environment.
Management made a business decision to standardize on two configurations. Thus, the Creative and Coder user types will receive the same machines. You should ensure that both groups of users’ requirements are satisfied. Note: You are not required to include purchase recommendations on software applications.
HFA Associates Minimum Requirements Analysis CommonCreatives and CodersNumber:4010Processor:Intel I3 Dual CoreIntel I5 Dual CoreMemory:4 GB8 GBGraphics:HDHD+Storage:256GB SSD500GB SSD and additional storageApplications:Microsoft Office, Internet BrowsersAdobe Illustrator, CLO Enterprise Edition, ApparelMagic Enterprise Edition, Internet Browsers
Proposal Requirements
Section 1: PC Purchase Research
Using the background information above, research a PC purchase meeting all HFA Associates’ requirements at the best price:
- Purchase of 50 new PCs to replace all existing employee desktops with laptops.
- Consider external/multiple monitors.
- Consider additional peripherals via USB 3.0 and Bluetooth.
- Consider physical security mechanisms.
- Consider the capability to allow users to quickly disconnect in the office environment.
Section 2: PC Purchase Recommendation
Using an online configuration/customization tool, build out your recommended PC purchase. Use a tool from one of HFA’s three preferred vendors:
As you formulate your recommendation, follow these general guidelines:
- Add the recommended build to a cart or quotation:
- Ensure your configuration includes the estimated cost per machine
- Using the vendor’s “comparison” feature can be helpful
- Use the “build your own” or configure options
- Build your configuration. Proceed to the shopping cart/other stage to view the result:
- Enter “first name last name CMIT 202 xxxx Semester Year,” where xxxx is the section number and semester is the UMGC term (example: CMIT 202 6380 Spring 2021) into the coupons form area.
- Note: Do not click on “apply coupon” and do not submit the cart!
- Print the pages to PDF (ensure the headers/footers are on)
In your proposal:
- Include warranty, support, antivirus, and accessories.
- Add the recommended build to a cart or quotation.
- Enter “first name last name cmit 202 xxx” where xxxx is the section number (example: 6380) into the coupons form area. Do not click on apply coupon and do not submit the cart!
- Print the pages to PDF (ensure the headers/footers are on) and upload the image to the assignment folder along with your report.
- Ensure you have included a cost estimate.
Compare & Contrast Wireshark & Glass wire
Compare and contrast Wireshark and GlassWire, two free network monitor & security tools. Explaining the benefits and features of each, then decide which of these two choices you would prefer to use if you were the Network Manager. Explain why you made your decision.
Need this in a word document with no less than “350 words in APA format with Two references & Citations”