ple week13 p13 final

Hello,

i need this paper by 4/22 afternoon 12am.

Strictly No plagiarism please use your own words.

Topic: Digital Surveillance as an Aspect Surveillance of State

Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the  Danforth Library Research Databases.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

CYBERLAWS & ETHICAL HACKING

Determine whether a network scenario is fully secure.
Requirements:

Administrators often implement firewalls and intrusion detection systems (IDSs) as part of a defense-in-depth strategy.

Answer the following question(s):

  1. 1. If your network has both a firewall and an IDS deployed, would you consider it to be fully secure? Why or why not?

Fully address the question(s) in this task; provide valid rationale for your choices, where applicable.

Comp Sci

 

Q1) Write a program that asks the user for a file containing a FASTA nucleotide sequence (included is a file called sequence.fasta you can use). Then prompt the user to select from the following menu: 

  1. A. Calculate DNA composition: This will print to the screen the numbers of A, G, C and T nucleotides, and any unknowns (N’s). 
  2. B. Calculate AT content: Prints to the screen the percentage of AT in the sequence. 
  3. C. Calculate GC content: Prints to the screen the percentage of GC in the sequence. 
  4. D. Compliment: Prints to the screen the compliment of the DNA sequence. 
  5. E. Reverse compliment: Prints to the screen the reverse compliment. 

Each menu item above should be implemented in its own function. The function should be called when the user selects the respective menu item. The functions should accept as argument the DNA sequence and then perform the appropriate calculationsalgorithm. 

Input validation: Check to see that the file name entered by the user exists AND that the sequence is in FASTA format. You can assume that there is only one sequence in the file. 

Q2) Write a program that asks the user for a file containing a FASTA nucleotide sequence (you can use the same sequence.fasta file as above). Then prompt the user to select a frame (number 1 through 6). Your program should then find the translation (protein sequence) of the nucleotide sequence in that frame. Print the translation to the screen. 

Input validation: Check to see that the file name entered by the user exists AND that the sequence is in FASTA format. You can assume that there is only one sequence in the file. 

Q3) Write a program that asks the user for a sequence in GenBank format (included is a file called sequence.gb that you can use). Your program should convert the GenBank formatted sequence into FASTA format. Write the FASTA formatted sequence to a file, name of which should include the accession number (i.e. NM_001250672.txt, where NM_001250672 is the accession number). 

Q4) Write a program that asks the user for a file containing a nucleotide sequence AND the name of a restriction enzyme. Your program should return the positions in the sequence where the enzyme cuts. Parse out the enzymes and their cut sites from the attached RestrictionEnzymes.txt file. 

Q5) Read in a whole genome (in FASTA format – file called genome.txt, see attached) and compute the background codon frequencies. The background frequency of a codon is computed by the formula: background_frq(codon) = 100 * N(codon)/ Total_codons where N(codon) is the number of occurrence of the codon across the entire genome, and Total_codons is the total number of all codons in the whole genome. Print out the background frequency of each codon, from AAA to TTT. Use a dictionary in your solution. Your program should count codons that appear in all reading frames and then calculate and display the average. 

C# Array Class members

 What other constructs are available in C# that can provide array-type functionality? Provide examples and discuss them in relation to simple array structures. 

300 words

Discussion

 

There are TWO tasks that you would need to do( they are separate): 

Task 1 (Minimum 300 words): 

 Describe the ethical challenges faced by organizations operating globally. 

– Minimum two references. 

TASK 2:

Write a reply to the two responses in the attached document ( Response 1 and Response 2) with 150 words for each. 

There should be no plagiarism. Attach a plagiarism report with 0 % similarity index

Exp19_Excel_Ch12_Cap_Bulldog_Collectibles | Exp19_Excel_Ch12_Cap_Inventory

#Exp19_Excel_Ch12_Cap_Bulldog_Collectibles

 #Exp19_Excel_Ch12_Cap_Inventory 

 Project Description:

You are the operations manager for Bulldog collectables, a small start-up company that deals with sports memorabilia. As you prepare to document your inventory, you decide to utilize a template to save time. To complete this task, you will create a worksheet based on an Office.com template; you will also use the Macro Recorder and Visual Basic for Application to automate sorting and calculations within the workbook.

     

Start   Excel. Download and open the file named EXP19_Excel_Ch12_Cap_Inventory.xlsx. Grader has automatically added   your last name to the beginning of the filename. 

 

Delete the Inventory Pick List   and Bin Lookup worksheets.

 

Delete the INVENTORY PICK LIST   and BIN LOOKUP icons located respectively in cells E2 and F2. Then Clear all   existing Data Validation in the range A1:K15.

 

Delete the values in the range   B5:J15.

 

Record a macro named Sort, be sure to use relative   references. Ensure the macro sorts the data in the table in ascending order   based on SKU (column A). Stop the Macro Recorder and Save the workbook as a   Macro-Enabled Template.

 

Create a form control button   that spans the cell E2:E3. Assign the Sort macro and edit the button text to Sort.

 

Use the VBA Editor to create a   new module.
 

  Type the following VBA code to create a custom Inventory Value function then   save and exit the VBA Editor (be sure to leave a blank line between each line   and before End Function):
 

Function   InventoryValue (QTY, COST)
 

InventoryValue   = QTY * COST
 

 

Click cell J5 and use the newly   created InventoryValue function to calculate the value of the inventory for   each item in column I.

 

Use the VBA Editor to create a   new module named ProtectWorkbook. Type the following VBA statements to create the   sub procedure (leave appropriate line spacing).
 

Sub   ProtectWorkbook()
 

‘Protect   workbook using the password eXploring
Worksheets(“Inventory   List”).Protect Password:=”eXploring”

 

Insert a new module named UnprotectWorkbook. Type the following VBA   statements to create the sub procedure and then save and exit the VBA Editor   (leave appropriate line spacing).
 

Sub   UnprotectWorkbook()
 

‘Unprotect   workbook using the password eXploring
Worksheets(“Inventory   List”).Unprotect Password:=”eXploring”

 

Insert a Form Control Button   spanning cells F2:F3 named Unprotect. Assign the UnprotectWorkbook macro to the newly   created Control Button.

 

Insert a Form Control Button   spanning the range G2:H3 named Protect. Assign the macro ProtectWorkbook.

 

Insert the comment Inventory   based on values in column J. in cell B3 (include the period).

 

Insert the comment Count of   items in column C.   in cell C3 (include the period).

 

Inspect the document for private   information and hidden properties. Save the file when prompted then remove   Document Properties and Personal Information, and Headers and Footers.
 

  Note: Mac users, from the Excel menu, open your preferences, click Security,   and then click the check box to Remove personal information from this file on   save. Delete any headers or footers in the workbook.

 

Check the document for   accessibility issues. Use the Accessibility Checker pane to change the cell   styles to Normal in order to repair the issue.

 

Check the document for   compatibility with Excel 2010, 2013, and 2016.
 

  Note: Mac users, skip this step.

 

Insert a new worksheet named Code.

 

Open the VBA Editor, open Module   1, and copy the code. Paste the code in the Code worksheet starting in cell   A1. 

 

In the VBA Editor, open Module   2, and copy the code. Paste the code in the Code worksheet starting in cell   A22. 

 

In the VBA Editor, open the   ProtectWorkbook, and copy the code. Paste the code in the Code worksheet   starting in cell A28. 

 

In the VBA Editor, open the   UnprotectWorkbook module, and copy the code. Paste the code in the Code   worksheet starting in cell A35. 

 

Close the VBA Editor and save   the workbook as an xlsx file (not Macro-Enabled).

 

Close EXP19_Excel_Ch12_CAP_Inventory.xlsx. Exit Excel. Submit the file   as directed.

Exp19_Excel_Ch08_ML2_Reading_Scores

Exp19_Excel_Ch08_ML2_Reading_Scores 

Exp19 Excel Ch08 ML2 Reading Scores 

Excel Chapter 8 Mid-Level 2 – Reading Scores

Project Description:

As an elementary school principal, you are concerned about students’ reading comprehension. After conducting a study, you want to calculate some general statistics and then conduct a one-way analysis of variance (ANOVA). Doing so will enable you to compare three sample group means and evaluate the variances within each group compared to the variances among the three groups.

     

Start Excel. Download and open   the file named Exp19_Excel_Ch08_ML2_HW_ReadingScores.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

In the range F2:H2, insert   functions that will calculate the average for each of the groups (Control,   CBT Only, Hybrid).

 

In the range F3:H3, insert   functions that will calculate the median for each of the groups.

 

In the range F4:H4, insert   functions that will calculate the most repetitive value for each of the   groups.

 

In the range F5:H5, insert   functions that will calculate the highest value for each of the groups.

 

In the range F6:H6, insert   functions that will calculate the lowest value for each of the groups.

 

In the range F7:H7, insert   functions that will calculate the variance for each of the groups. Use the   function that includes the .S descriptor.

 

In the range F8:H8, insert   functions that will calculate the standard deviation for each of the groups.   Use the function that includes the .S descriptor.

 

Format the values in the range   F2:H8 with the Comma Style with three decimal places.

 

Use the Data Analysis tools to   perform an analysis of variance using the range A2:C25 as the input range and   E11 as the output range.

 

Format the averages and   variances in the SUMMARY table with the Comma Style with three decimal   places.

 

Save and close   EXP19_Excel_CH08_ML2_HW _ReadingScores.xlsx. Exit Excel. Submit the file as   directed.

Discussion – Information Governance (Regulations and compliance)

 Important Note: Please write this topic on   Impact of Health Information Technology on Patient. Since this is my final topic.Attaching the introduction which I submitted 

Chapter Eight (8): Information Governance and Legal Functions: According to the authors, Smallwood, Kahn, and Murphy, IG is perhaps one of the functional areas that impact legal functions most. Failure to meet them could be literally put an organization out of business or land executives in prison.   Privacy, security, records management, information technology (IT), and business management functions are very important.  However, the most significant aspect of all of these functions relates to legality and regulatory compliance from a critical perspective. 

For this discussion, identify the industry you will be writing about in your final paper and discuss the regulatory compliance requirements that the company has to meet and the corresponding security, privacy, and records management functions that would need to be enabled for that organization. Remember to cite your sources and critically respond to two other learners.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least two scholarly sources should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Article writing

 Write a 3-page paper (1000 words): Describe how social media uses artificial intelligence.
Provide examples and present your written findings. You must write a 3-page essay in APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject.