research paper need 800 – 1000 word review

Once you have finished reading the article, select a second article from the references in the first article or closely related to the topics in the first article and then write an 800 – 1000 word review of the two articles (combine the two reviews; do not write two separate reviews) in an R Markdown document. What are the main issues they address? How are the two article connected? List three things that you learned or three key take-aways (from either of the two papers). Are there statements that you do not agree with?

Please see the attached article 

Wandering in the Woods Game:

Projects in the list below are for the same overall effort, namely making computer simulations (many of which end up looking like games, sort of). These simulations are meant to help K-8 students learn about computation, computational thinking, math concepts, and computer science. 

the project will have 3 pieces: 

  • a fairly simple visualization designed to show grades K-2 students the basic idea (and perhaps entertain them); students will make some choices, and see what develops
  • a slightly more complicated version in which grades 3-5 students make choices, see data, and meet additional challenges; we are aiming for grades 3-5 students to work with single data generating events, “small data”
  • a still more complex version for grades 6-8 in which students work with local and big data, graphs are generated, and students make judgments that change the data in meaningful ways; for this oldest group, we want to introduce the ideas of working with BIG data sets, interpreting something from multiple sources, over time

A big idea of the simulation is that students will have a similar look and feel to each of the three stages. When they encounter the second and third stages (as described above, K-2, 3-5, and 6-8) when they progress through their school years, the learning curve for the later stages will be shorter. Also, they can have more confidence that they will be successful at the new challenges.

Each of these simulations are designed for a pair of students working together in front of the same screen. The simulations should include audio directions and prompts, and assessments to see how the students are doing with the challenges.

  1. Wandering in the Woods Game: This project has a direct tie to assignment 1. People are “lost in the woods” where the woods are represented by a rectangular grid. The woods are dense, and the people can’t see or hear each other until they are in the same cell of the grid. In grades K-2, the grids are always square, there are always two people, and they start out in diagonally opposite corners of the grid. They wander about randomly, and each move is counted, with a counter for each person. Music plays as cartoon characters wander in the woods. When the people bump into each other, there is a happy graphics display, and statistics from the wandering are displayed and announced audibly. Then the game is reset, and students can start it up again. For grades 3-5, students can set up the size of a grid, which can be rectangular (instead of just square). There can be 2, 3, or 4 people, and students can place them wherever on their grid. Once the game is started, it can be played and replayed multiple times. Statistics (such as longest run without meeting, shortest run, and average run) are displayed. In grades 6-8, students have all the control of the 3-5 game, but 6-8 students will be challenged to run experiments to determine how the average run varies with the size and shape of the grids. They will also be able to explore different protocols for wandering, and to decide which is the best way to wander if you want to shorten the time it takes to meet up.

A really great team is likely to make their simulation much better than I have suggested here. For example, exponential growth might be illustrated using zombies! When you give me you preferred choices, you are invited to tell me why you think your group would be best to do that particular project. Part of your justification could be neat ideas your group has for making your simulation better (more fun, more clever, more educational) than my descriptions are.

Exp19_Excel_Ch04_HOEAssessment_Investments

 Exp19_Excel_Ch04_HOEAssessment_Investments

Project Description:

You have been hired as a junior financial analyst at Bristol Investments. As part of your tasks, you will help track transactions, commodity prices, and broker efficiency. To complete the task, you will create an Excel table, use data filters, conditional formatting, and lastly you will prepare the document to print.

Redo-2

 Q1. Research paper: 5 pages ——- Separate Document 

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

a)Computer and email acceptable use policy

b)Internet acceptable use policy

c)Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select.  Include at least 3 scholarly references in addition to the course textbook.  At least Five of the references cited need to be  peer-reviewed scholarly journal articles from the library.  Your paper should meet the following requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

 Q2.  Research paper: 5 pages 

This week, you have to read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

a)Describe the organization’s environment, and evaluate its preparedness for virtualization.

b)Explain Microsoft (or another product) licensing for virtualized environments.

c)Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

d)Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.   Your paper should meet the following requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Q3.  Research paper –  COSO Framework : 5 pages ——- Separate Document

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. Your paper should meet the following requirements:

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

computer forensic

Research the use of computer forensics in court cases and choose one case. Write about 400 words about the case (summarize it in your own words – no copy and paste) and how digital forensics was used in the case.

This assignment is about the use of computer forensics in cases that reached the court. Research the use of computer forensics in court cases and choose one case. Write about 400 words about the case (summarize it in your own words – no copy and paste). Briefly write about the case, include basic information such as the name of the case and the year (exampe: Daubert vs. Merel Dow Pharmaceuticals 1993), the subject of the case, and how digital forensics was used in the case.

Project 2

  • What are the key elements of a multilayer process for managing security vulnerabilities based on the concept of reasonable assurance?
  • What actions must be taken in response to a security incident?
  • What is computer forensics, and what role does it play in responding to a computer incident?

Percentage overall grade

Assignment 3 – The card game: War

Percentage overall grade: 5%

Penalties: No late assignments allowed
Maximum Marks: 10

Pedagogical Goal: Refresher of Python and hands-on experience with algorithm coding, input validation, exceptions, file reading, Queues, and data structures with encapsulation.

The card game War is a card game that is played with a deck of 52 cards.

The goal is to be the first player to win all 52 cards. It is played by two players but can also be played with more.

The deck, after being shuffled, is divided evenly between the players. When there are two players each one receives 26 cards, dealt one at a time, face down. So the cards and their order are unknown. Each player places their stack of cards face down. It may seem as a STACK as we know it, since the player takes and plays one card at a time from the top of this stack. However, it is more like a QUEUE, since as we shall see it, when a player wins cards, these are placed at the bottom of this stack of cards.

How do we play the game

Each player turns up a card at the same time and the player with the higher card takes both cards and puts them, face down, on the bottom of their stack.

If the cards are the same rank, it is War. Each player turns up one, two, or three cards face down (so they are not seen) and one card face up. The player with the higher cards face-up at the end takes both piles (six, eight or ten cards). If the turned-up cards are again the same rank, it is War again and each player places another set of cards (one, two or three) face down and turns another card face up. The player with the higher card face-up at the end takes all placed cards, and so on. The game continues until one player has all 52 cards and is declared the winner. There are three versions of this game depending upon the number of cards we place face-down when there is War: one card, two cards, or three cards. It remains consistent throughout the game.

A deck of cards:

Suits

A deck of 52 cards has four suits: diamonds, clubs, hearts, and spades). In each suit, we have the King, the Queen, the Jack, the Ace, and cards from 2 to 10.

The Ace is the highest rank, followed respectively by the King, the Queen, the Jack then the cards 10 down to 2. Cards from different suits but with the same rank are equivalent.

To display the cards on the screen, we use two characters to represent a card. The first character is the rank and the second the suit. The rank is either K for king, Q for queen, J for Jack, A for Ace, then 2 to 9 for the numbers and 0 for 10. The suits are D, C, H, and S. Example 8D is eight of Diamond; 0H is 10 of hearts.

Card Deck

Task 1 : Reading and Validating cards

You are given a text file of 52 shuffled cards, each card is in a line coded on two characters as described above. You need to prompt the user for the name of the file, open the file and read it. Make sure the file exists and make sure the cards in the file are correctly formatted as described above. If the cards are in lower case, it is not an error as you can simply transform them in upper case. You can assume the cards are shuffled but don’t assume they are formatted as specified or that there are exactly 52, or even that they are not repeated. Make sure all the standard 52 cards are there in the shuffled deck. You are not asked to correct the cards, but your program must raise and catch an exception if card validation does not go through. The program should then display an appropriate error message and terminate the program in case there is an issue with the cards.

You are given a python program shuffleCards.py that generates the file shuffledDeck.txt as we described above with 52 lines constituting the shuffled deck. However, while this program generates a correct input to your program don’t assume the input file is always correct. The assessment of your assignment may be made with a file that is incorrect.

Task 2: Distributing cards

Now that you have read the 52 cards from the file and you know you shuffled deck is complete and correct, distribute the cards to both players: the user and the computer. You may call them player1 and player2. You should give one card to each player repeatedly until all cards are distributed. You should start randomly with either player.

The players keep their cards in such a way that the first card served is the first that will be played. In other words, the containers of these cards should receive the cards on one end and use them from the other end.  use the circular queue we saw and implemented in class to represent the player’s hand. The capacity should be set to 52 since you will never have more than 52 cards. The Circular Queue class should be inside assignment3 file that you submit.

Task 3: Asking user for data

Ask the user whether they would like to play a war with one, two, or three cards face-down. validate the input from the user and don’t proceed until a valid input is given.

Example of a War with 3 cards down

Task 4: Comparing cards

You need a way to compare two cards. Write a function that given two correct cards returns 0 if the cards are of equal rank; 1 if the first card is of higher rank; and -1 if the second card is of higher rank. The ranks are explained above. Also, remember that the rank is the first character of the card and the cards are strings of two characters.

Task 5: class OnTable

We need to represent the cards on the table, the cards that are currently placed on the table by both players either face-up or face-down. Create an encapsulated class OnTable with the behaviour described below. We will use two simple lists: one list for the cards and one list to indicate whether they are face-up or face-down. The attributes of the class are: __cards which is a list that will contain the cards, and __faceUp with will have booleans to indicate if the __cards list in the same position in __cards is face-up or face-down. Cards put on the table by player 1 will be added on the left of self._cards. The cards put on the table by player 2 will be added on the right of self._cards. The interface of this class should include place(player, card, hidden), where player is either 1 or 2 for player 1 or player 2, card is the card being placed on the table, and hidden is False when the card is face-up and True when the card is face-down. This method should update the attributes of the class appropriately. The interface should also have the method cleanTable(). This method shuffles and then return a list of all cards on the table as stored in the attribute __cards and resets __cards and __faceUp. All cards returned this way are visible. Finally, also write the method __str__() that should allow the conversion of the cards on the table into a string to be displayed. We would like to display the cards as a list. However, cards that are face-down should be displayed as “XX”. Moreover, player1 and player 2 cards should be separated by a vertical line.Please see sample output.

Task 6: The Game

Given the following algorithm and based on the previous tasks, implement the card game War. Obviously, there are details in the algorithm specific to the implementation in Python that are missing and it is up to you as an exercise to do the conversion from this pseudo-code to Python.

There are other practical details to add to the algorithm. At the end of the game, we need to display who was the winner (player1, the user, or player2 the computer). As indicated in the algorithm, on line 45 and 46, after each round of the game, 60 dashes are displayed and the program will wait for the user to press enter before displaying the next round.

c program, array read

 

Given two binary vectors X = (x1, x2, …, xN) and Y = (y1, y2, …, yN), each a 1-D array of N binary numbers, the number of positions where corresponding bit values of the two vectors are different is called the Hamming distance of the two vectors. For example, if X = (1,1,0,0) and Y = (1,0,0,1) then their Hamming distance is 2 since X and Y differ in their second and fourth positions counting from left to right. The Hamming distance is a useful tool in various subfields of computer science including communication networks where it captures how much two binary vectors differ. In the above example, X = (1,1,0,0) may comprise four bits transmitted by a sender whereas Y = (1,0,0,1) are the actual bits received by a receiver. The Hamming distance, d(X,Y) = 2, indicates that two bits of X flipped — i.e., changed their value from 0 to 1, or 1 to 0 — while traveling from sender to receiver. This is common when sending bits wirelessly using a smartphone or laptop over cellular and WiFi interfaces.

Write an app, calchamming, that takes as input two vectors whose components are binary from stdin, calculates their Hamming distance, and outputs the value to stdout. The format of the input should be

N
x1 x2 … xN
y1 y2 … yN

where N is an integer specifying the size of the 1-D arrays (i.e., dimension of 1-D vector), x1 x2 … xN are the N bit values of the first vector, and y1 y2 … yN are the bit values of the second vector. The individual bit values x1 x2 … xN are separated by a single space. The same holds for y1 y2 … yN. Assume that N cannot be greater than 15. Declare N, X[15], Y[15] to be local variables of main() of type int.

Perform reading of the input from a function

int readinput(int *, int *, int *);

where the first argument is a pointer to N, the second and third arguments point to the two 1-D arrays X and Y. readinput() returns 0 if successful, -1 if there is an error. For example, if N exceeds 15 then readinput() returns -1. Consider other cases that readinput() should consider as invalid input and return -1 to its caller main(). main() checks the return value of readinput() and terminates the app by calling exit(1) if it is -1. Perform calculation of the dot product by calling function

int calchamm(int, int *, int *);

where the first argument is the value of N, and the second and third arguments are pointers to the two arrays. calchamm() computes the Hamming distance of the binary vectors and returns the value to the caller main(). Since readinput() is tasked with checking that the input is valid, calchamm() can focus on performing the Hamming distance calculation. Print the Hamming distance to stdout by calling

void writeoutput(int);

where the int argument is the distance value.