Abstract Data Types

 Please respond to the following discussion question below with at least 175. Be sure to cite your references.

Use examples to discuss the differences between general purpose  data structure and abstract data types (you can choose one general  purpose data structure and one abstract data type in Discussion). 

week-11

 Do a bit of research on penetration testing techniques. Investigate and document the following: Five network penetration testing techniques, Advantages and disadvantages of each, One notable social engineering test, Possible negative implications of penetration testing.

Excel

this assigment have to be done in Excel. I have uploaded two documents. The first one are the instructions and the second one is the format with Excel that I have to complete with the instructions mentioned. 

Datamining Case study by Krizanic 2020

 

  1. What is the definition of data mining that the author mentions?  How is this different from our current understanding of data mining?
  2. What is the premise of the use case and findings?
  3. What type of tools are used in the data mining aspect of the use case and how are they used?
  4. Were the tools used appropriate for the use case?  Why or why not?

Emerging Technologies

 

Chapter 9 Exercise.

There continues to be a disparity between the advertising dollars spent on reaching TV viewers and Internet users versus the amount of time that is spent interacting with each medium. A large degree of Google’s success is attributable to taking advantage of this large gap. Research to determine (a) TV advertising dollars and Internet advertising dollars spent, and (b) the amount of time spent watching TV versus using the Internet. How has Google taken advantage of this disparity? What other major societal trends are forecasted that will continue to shift advertising dollars to new media, and why?

Your response should be at least 300 words, single-spaced. Provide references in APA format if necessary. The title page is not needed.

outline of the article

– SHOULD STRICTLY FOLLOW THE INSTRUCTIONS. 

– NEED PLAGIARISM REPORT ALONG WITH WORK. *****

sample , Article and instruction are attached below. 

Turnitin™ enabled

week 1 assignment

 

Week 1 Assignment

Hide Assignment InformationTurnitin™Turnitin™ enabledThis assignment will be submitted to Turnitin™.Instructions

Week 1 Assignment:

In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of one (1) full page in length with a minimum of two (2) outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

                                    (assignment below)

You have been asked to design a security policy for a database that contains very sensitive information. Discuss five important issues that should be addressed.

Discussion 250 -300 words

Do some Internet research on big data best practices. How are businesses are managing their growing volumes of data and using the data that they are amassing for competitive advantage?

Linear Regression in R-studio

build and assess linear regression models that explain variability in the

daily stock price of Vodafone using stock price data from other companies.

(Dataset will be provided)

computing and programming (coding)

 Q1:  A design task involves finding values for three variables. Each variable can take two values. How many solutions are possible? If each solution requires 1 second to be evaluated on a computer, how long does it take to evaluate all solutions? If the number of variables increases to 30, how long does it take to evaluate all solutions?Show your work.Q2: In sorting, stability is defined as the ability of a sorting algorithm to preserve the relative order of equal keys in a file. See illustration below.Comment on the stability of insertion sort and selection sort. Explain why they are stable or non-stable. Q3: Explain the difference between a compiler and an interpreter with your own words Q4:Complete the following Python exercises and include screenshots of your code and execution. 

  • Include      a screenshot of the execution of a simple line of code (e.g., print(“Hello      World”)) on a Python installation on your machine. 
  • Write a program to prompt the user      for hours and rate per hour to compute gross pay.
  • Rewrite your pay computation to      give the employee 1.5 times the hourly rate for hours worked above 40      hours.

Q5  Write a program to prompt for a score between 0.0 and 1.0. If the score is out of range, print an error message. If the score is between 0.0 and 1.0, print a grade using the following table:Score Grade>= 0.9 A>= 0.8  B>= 0.7 C>= 0.6 D< 0.6 FQ6: Write a program which repeatedly reads numbers until the user enters "done". Once "done" is entered, print out the total, count, and average of the numbers. If the user enters anything other than a number, detect their mistake using try and except and print an error message and skip to the next number.
Enter a number: 4Enter a number: 5Enter a number: bad dataInvalid inputEnter a number: 7Enter a number: done16 3 5.333333333333333
Q7:  Take the following Python code that stores a string:`str = ‘X-DSPAM-Confidence:0.8475’Use find and string slicing to extract the portion of the string after the colon character and then use the float function to convert the extracted string into a floating point number.