Each use case represents a unit of useful functionality that subjects provide to actors. An association between an actor and a use case indicates that the actor and the use case somehow interact or communicate with each other. Create a use case diagram with flows and alternative flows for an online shopping scenario. Provide an overview of your diagram, including a detailed description of the actor(s) in your diagram.
Case study
Please follow the attached CASE study. I need two pages for the following questions with APA format along with zero plagiarism.
1. How would you conduct the study any differently?
2. Given the nature in the advance of technology, how do you foresee technology changing the way studies such as these are conducted in the future?
Problem 2- Project Processes
Activity 2
Activity I: A young engineer decides to save $240 per year toward retirement in 40 years.
- If he invests this sum at the end of every year at 9%, then how much will be accumulated by retirement time?
- If by astute investing the interest rate could be raised to 12%, then what sum could be saved?
- If he deposits one fourth of this annual amount each quarter ($60 per quarter) in an interest bearing account earning a nominal annual interest rate of 12%, compounded quarterly, how much could be saved by retirement time?
- In part (c), then what annual effective interest rate is being earned?
Activity II: Maurice Micklewhite has decided to replant his garden. Show him what the cost is of making an erroneous decision at various stages of the project, starting with conceptual design and ending with the ongoing maintenance of the garden.
Read
Chapter 3. Engineering Economic Analysis
Chapter 4. Life-Cycle Costing
Book
Title: Project Management ISBN: 9780134478661 Authors: SHTUB Publisher: Pearson Edition: 3RD 17
Completely on Matlab
1. Download and install MATLAB. Develop the following function using MATLAB
a. Write a script that loads data from a file and display the first five instances. Create a matrix from the loaded instances.
b. Divide the loaded instances into two sets with one set containing 70% of the instances and the other containing 30% of the instances. Save each set into a variable. Name the variables ‘TrainingSet’ and TestingSet’.
c. Save the two new variable to a ‘.mat’ file.
2. Implementing Fisher LDA method using MATLAB.
a. Write functions that take the provided data set and compute the optimal projection vector following the fisher criterion.
b. The output from the main function must be the identified projection vector.
3. Write functions to evaluate the LDA method using MATLAB.
a. Write a script to perform cross-validation and report the average accuracy, standard deviation, sensitivity, and specificity.
NOTE: There is no requirement to develop a GUI to visualize the intermediate or the results.
A report that includes the following items is due in addition to the source code for the functions:
– A description of each function,
– How to run the functions to get the reported results, and
– The experimental results.
Project 5: Administration Cybersecurity Policy Review
Project 5: Administration Cybersecurity Policy Review
Step 5: Complete the Recent Administration Cybersecurity Policy eLearning Module
So far in this project, you have completed the developing cybersecurity law and policy eLearning module and the Federal Cybersecurity Agency SIMTRAY to familiarize yourself with how cybersecurity laws and policies are developed. However, you should also understand how prior administrations have affected current policy.
In this step, you will complete the Recent Administration Cybersecurity Policy eLearning module to better understand how the prior administration handled cybersecurity policy. You will cover the key points of the Cyberspace Policy Review and the US Government Accountability Office (GAO) report, which is a follow-up to the review. You will also cover the role of the cyber czar, and how the Cyberspace Policy Review findings eventually led to the new cyber command, USCYBERCOM.
Take notes on the key concepts that will help you in your analysis of the current and previous administration’s cybersecurity policies.
Computer Science lab weekly lab work
Its a weekly lab Will explain to serious tutors only
Info on Tech and Society
Impact of Information Technology on Society
The technology landscape is ever-evolving, interweaving the depths and use of information technology into our daily lives. Very few areas of life are not impacted by technological advancements. Our daily use of IT solutions facilitates further deployment of technologies today and in future generations. IT solutions have increased our standard of living through domestic, work, and leisure activities.
Research the Internet and write a 5–7 page paper on the evolution of IT and the positive and negative impacts on the following:
- Educational environment.
- Medical and health literacy solutions.
- Home and domestic activities.
- Information sharing (digital communication).
- Information sharing (human communication).
- Societal norms.
- Financial markets.
- Jobs (include workplace efficiencies or inefficiencies).
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library has many excellent resources.
Your assignment must follow these formatting requirements:
- This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.
The specific course learning outcome associated with this assignment is:
- Evaluate the impact of IT on society.
Module 4: Database Project Phase 3 Instructions
Module 4: Queries & SQL
Database Project Phase 3 Instructions
Following are instructions for Database Project Phase 3. Remember that each phase is built on the instructor-approved outcome of the previous phases and reflects all recommended changes and corrections. Follow all submittal instructions at the bottom of this document.
Phase 3: Build and Populate Tables, Perform Queries: In this phase of the project your work will be done in MS Access. You will build the approved tables, populate the tables with data and perform a variety of queries as stated below:
- Create a new database named after your project title.
- Follow the examples in Chapter 3 of the MS Access textbook and create tables in Design View. Be sure to use a variety of data types. Explore data types other than text. Use numeric, date, etc.
- Make sure tables have the appropriate primary key matching the approved table structure from Phase 2.
- Populate tables with data with a minimum of 10 records. There may be one or two tables with fewer records. For example, in the case of the daycare example, there may be only two to three teachers.
- In a Word document, propose five different types of queries to be performed on your database tables. Include a variety of queries as follows:
- And query
- Or query
- Multi-table query
- Parameter query
- Perform the proposed queries and save them in your database. Assign a meaningful name to each for easy reference as you will be using them in future phases.
- Submit your MS Access database file and word document to the assignment submission folder in Module 4.
Term Paper for DBMS Subject
I need a Term Paper on
Data Warehousing, Multi-Dimensional Data Models and OLAP
or
Systems for machine learning and model management
Which should not have any plagiarism
Discussion
Re-introduce yourself to the class. Tell us something about yourself. Describe your technical skills and background..
Why do you think that a study of Digital Forensics is important?