Drills with R on importing and plotting data, and finding the distribution measures

Provide in the plain text R commands that finds/solves the following:  

  1. The student directory for a large university has 400 pages with 130 names per page, a total of 52,000 names. Using software, show how to select a simple random sample of 10 names. 
  2.  From the Murder data file, use the variable murder, which is the murder rate (per 100,000 population) for each state in the U.S. in 2017 according to the FBI Uniform Crime Reports. At first, do not use the observation for D.C. (DC). Using software:
    1. Find the mean and standard deviation and interpret their values.
    2. Find the five-number summary, and construct the corresponding boxplot.
    3. Now include the observation for D.C. What is affected more by this outlier: The mean or the median? 
  3. The Houses data file lists the selling price (thousands of dollars), size (square feet), tax bill (dollars), number of bathrooms, number of bedrooms, and whether the house is new (1 = yes,0 = no) for 100 home sales in Gainesville, Florida. Let’s analyze the selling prices.
    1. Construct a frequency distribution and a histogram.
    2. Find the percentage of observations that fall within one standard deviation of the mean.
    3. Construct a boxplot. 

Datasets needed are at Index of Data SetsUseful functions in R to solve problems in this assignment: sample, read.table, mean, sd, summary, boxplot, hist, table, cbind, length, case, tapply 

Research paper review in detail

 

I need the following after reviewing the paper

Problem Statement – Issues discussed by the author

Approach & design – How the authors approach to the issue & what proposed ideas they mentioned

Strengths and Weakness – strengths & weakness of the proposed approach & design, and about the paper.  what are the key strengths of the authors proposed system and weakness of the system.

Evaluation(Performance) – How the authors evaluated the proposed system, what parameters they used to test the performance

Conclusion(In readers perspective)

Along with these, I need to have a detailed explanation of the paper section-wise:

sections are:

Abstract

Introduction

FUSE Semantics and API (in detail)

Applications 

Liveness Checking Topologies 

Implementation(in detail)

Experimental Evaluation(in detail

Summary

Conclusion of the authors for proposed system

Psychological Effects of Modern Technology on Children’s Development

  

Modern technology has permeated all domains of society and transformed lifestyles. Overuse or irresponsible use of modern technology, however, has the potential for undermining the psychological well-being of children due to elevated risk of depression and isolation. The nature and extent of the use of the technology underpin the concerns over their implications for the development of children.

The elevated risk of depression due to modern technology has serious implications for children’s development. According to Hoge et al. (2017), some modern technology such as the Internet, notably interactive social media platforms, lead to depression in children in the absence of adequate skills to regulate emotion. In this regard of assignment help service, children without sufficient social support to develop such skills are at greater risk of experiencing the negative effects of modern technology on their development than those with adequate support. Appropriate measures to equip children with relevant skills can help to avert these effects.

Like depression, isolation is a serious effect of the technology. Some modern technology applications push users closer to virtual friends, leading to social isolation (Taheri, 2013). Such users may feel that they are more valued in the realm of modern technology than outside. The resultant inclination toward communication tools encourages social isolation. In children, social isolation fosters behavior that hinders the development of skills needed for success in this stage of life (Chassin et al., 2016). This effect of modern technology can undermine the present and future wellbeing of children (writing help).

The likelihood of developing depression and social isolation reflects the psychological downsides of modern technology on children’s development. Modern technology makes important contributions to the development of children, but the negative effects on development and their serious implications for undermining the wellbeing of children are concerning. Society should adopt appropriate measures to avert these effects while exploiting the positive contributions of modern technology on children’s development.

  

References

Chassin, L., Colder, C. R., Hussong, A., & Sher, K. J. (2016). Developmental Psychopathology, Volume 3: Risk, Disorder, and Adaptation. John Wiley & Sons. https://247essayhelp.com/services/ 

Hoge, E., Bickham, D., & Cantor, J. (2017). Digital Media, Anxiety, and Depression in Children. Pediatrics, 140(Supplement 2), 76-80. https://doi.org/10.1542/peds.2016-1758G https://247essayhelp.com/assignment-help-service/get-business-assignment-help-from-expert-writers/ 

Taheri, M. (2013). The Effect of New Communication Technologies on Social Isolation of Children in Families. Journal of Behavioral Sciences in Asia, 1(1), 61-69.

Computer Programing

In 250 words or more, answer the following.

Understand the concept of a WHILE loop.  Then, suggest a programming situation or a real-life scenario where the use of a while loop is needed.  Identified a reason to use a while loop.

module 02

 

Module 02 Content

  1. For this part of your project, you will refer to the Risk Register submitted in Module 01 to provide a Summary Report to executive management using this Summary Report. For your summary report, you will include a Purpose, Executive Summary, Detailed Summary, Recommendations and Suggested Actions.

    Summary Report

    The Detailed Summary of your report should address the following objectives in depth:

    • Detail the list of operational risks for each business unit (Refer to the Organizational Chart provided and the Risk Register you filled out in Module 1).
    • Describe the operational risks.
    • Describe the possible outcomes.
    • In addition, be sure to address the following in the Recommendations:
    • Provide a recommendation for the creation of a risk assessment team (i.e. security analysts, CIO, HR, Finance etc.)
    • Your summary report should be in narrative form, using full sentences and proper grammar, spelling etc. and incorporate any feedback received from your previous submissions.

      Note: Make sure to refer to your Risk Management Plan and work on the relevant areas. This is a good week to address the Risk Identification section in your Risk Management Plan.

      Risk Monitoring Plan

      Submit your completed assignments by following the directions linked below. Please check the Course Calendar for specific due dates.

       

risk analysis

 Risk Identification, Risk Analysis and Risk Evaluation. These phases allow you to focus  specific groups of people on specific tasks. In this assignment, we will review risk  identification tools and why they are important. Instructions: • Review five tools for identifying risk in an organization. For each tool: o Identify each tool. o Describe its importance in the risk identification process for an  organization. o Give a situation where the tool can be applied. o Discuss the results of the application. Requirements: • Submit a Word document in APA format. • At least three pg in length, excluding the Title and Reference . • At least two resources, k. 

COMPUTER SECURITY FUNDAMENTALS -6

 

Discuss the following…

A) What current dedicated networks are there? Does anyone know how much it cost?

B) Can someone search when to use ring, mesh, star (pick one)? when to use what?

Feel free to show diagrams or videos or animation to help others understand.

crypto

 Find a paper presenting a topic related to cryptography and/or cybersecurity and prepare a brief overview. 

Any topic from here.

  • Digital signature
  • Biometric data encryption
  • Data breach
  • Vulnerabilities based on using old cryptographic technology

 Hide Folder InformationInstructions

Find a paper presenting a topic related to cryptography and/or cybersecurity and prepare a brief overview.

  • Potential topics could come from Chapters 11-13, but don’t have to
    • Digital signature
    • Biometric data encryption
    • Data breach
    • Vulnerabilities based on using old cryptographic technology

Include the following in your overview.

Paper Title and Citation.

•Authors and Affiliations.

• Paper Overview.

•Key methods, technologies used.

•Major Results.

•What I learned or is interesting these findings.

•What fields of cryptography are related to the paper.

IT473: Interactive Computer Graphics

 

Discussion Week 02

Write a short survey on computer graphics.

The question is: How has computer graphics influenced the gaming industry?

This assignment is not a group paper. Follow the APA Publications Manual sixth Ed. Limit your first post to a minimum of 300 words. You must include five verifiable references.

The responses should 150 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response may not be to a peer already responded to more than twice.