Write a program in c++ that can read answers from an input file and then take correct answers already given and compare the two set of answers. They have to be graded on a scale of 1 to 100. The program has to show when an answer is incorrect.
R language part 1
There are various languages, some are better for data visualization than others. Please review the basics of Python, SAS, R, and SQL. What are the qualities of each language regarding data visualization (select at least two to compare and contrast)? What are the pros and cons of each regarding data visualization (select at least two to compare and contrast)?
Reply post:
When replying to peers, note your opinion on their thoughts. Add your thoughts and continue the conversation regarding the languages (Python, SAS, R, and SQL) and other visualization tools as well.
Annotation
Read two articles and complete an annotated bibliography for each article (scholarly/peer-reviewed journal articles
Articles should be no older than 2018.
Be sure to bold type the bibliographic information and set it apart from the annotation,
data management
Background
In March of 2000, a local mountain-biking club (Mountain-Bikers for Life) was organized for recreational purposes in West Virginia. Through the years the club had many members come and go, but the club continued to grow in popularity. As some members moved to other parts of the country, they began to form their own “Mountain-Bikes for Life” Club. The various clubs would even have events once or twice a year with one another. This sport has become so popular that, The Extreme Mountain Bike Racing League (EMBRL) was birthed. The headquarter for the EMBRL is in West Virginia, but they have racing locations in Colorado, Maui, New England, Tennessee, Wisconsin, and Minnesota.
You went to college with the Mike “Mountain Man” Miller, who is the founder and CEO of the EMBRL. He has contacted you to see if you would be interested in creating a database application for his newly formed league. You have been doing contract work for an IT consultant form and have recently left to start your own business and this may just be the opportunity that you have been looking for to jumpstart your business.
After jumping at the opportunity, you scheduled a meeting with Mike to discuss his data needs. After your initial interview with Mike and after having subsequent meetings, Mike has provided you with the Logical Design Criteria listed below.
Logical Design Criteria
The logical and relational requirements for the database that you are designing for the EMBRL are as follows:
- The database must keep track of all of the riders who are part of the league. They need to have easy access to their personal address information, contact information, the date they joined the EMBRL and who their agent is.
- Each rider is part of a given team. Each team consist of 4 riders. We need to keep track of the team name, the riders on that team.
- Many riders have pushed the limit of their bikes by tinkering with them by adding to and/or taking away from the original design of the bikes. This often gives some riders an unfair advantage over the other riders. It is important that the database keeps track of the approved mountain bikes, along with their name, description, weight and a picture. Also, it is important to know which bike a rider is using in a given race.
- Since the potential is there for the riders to now get paid quite a bit of money for winning races and even participating in races or outside engagements, the riders thought it necessary that each of them have their own agent. Often, a single agent will represent one or more riders. We need to know the agent’s name, address information, contact info and which riders they represent.
- The EMBRL even has corporate sponsors. These sponsors give financial support to the various events (which consist of 1 or more races) and even directly sponsor individual riders. A rider may have 0, 1 or many sponsors and a company may also sponsor 1 or more events. We need to know the name of the sponsor, address information, contact information, which riders they sponsor (if any) and which events (if any) they sponsor. Also, a given company can very well sponsor riders, or events or both, but they will sponsor at least one of them. You cannot be a sponsor and not sponsor anybody.
- All advertising is first done at the Event level. The Events may consist of 1 or more races. The races that make up a given event may be in the same location or different locations or even different levels of rider expertise. The event information that we need to track is the name of the event, event location, address information, the beginning and ending dates and who the corporate sponsor of that event is. Again, each Event may consist of one or more races. For example, you may have 4 races spread out over a given weekend that makes up one particular Event. The race(s) that make up a given event keeps track of information about the location of the particular race, the rider’s level of experience, the date of the race, the distance of the race and the start and ending times of the race in question.
- Each rider can participate in one or more races. We need to know which riders are riding in which races and what approved bike they are using for that particular race. Lastly, we will need to keep track which place the rider finished in the respective race that they are riding in. We will track all riders placements at the end of each race. Each of these places has bearing on which team wins the overall season’s title and prizes will be dispersed accordingly based on which team has the lowest points of the season.
Deliverables and Grading Rubrics
- Entity Relationship Logical Data Model: A visual model which represents each table (entity) and the relationships between the tables. Refer to the Power Point Presentations that cover “Entity Relationship Diagrams” – on the Canvas Schedule page. This diagram can be completed with MS. Word, Visio, Smartdraw, lucid charts or some other graphics program of your choice. However, copy and paste your diagram back into Word along with the other two deliverables or submit it in a PDF format.
- Field List: Shows the fields (attributes) for each table (entity) and identify the primary key (by underlining it). Identify any Alternate Keys, Secondary Keys and all Foreign Keys. The field list should include all fields which are found in the problem. We will use the Relational Database Shorthand from the Power Power Point Presentation “Database Design – Using ER Diagrams” on the Canvas Schedule Page.
- Technical Summary: The technical summary provides verbal support for the relational data model. The technical summary should answer the question, “Why this logical data design and not some other?” or “Why are these relationships one-to-many or many-to-many?” This is the portion where you get to talk the database language and explain/support your Entity Relationship Logical Data Model. At Least 1 page 12 pt font double-spaced.
Discussion and research reports on cyber security with no plagiarism found
Need to present a Discussion with a word count of above 120+ words and each discussion need a separate reference link for sure.
1) Code signing (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed
2) The Amnesic incognito Livesystem ( TAILS) = (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed)
3) Garlic routing= 120 words Need link reference as well
4)Rendezvous protocol = (120+120 = 240 words around) Need this same topic in 2 different formats and 2 different URL links as well needed)
5) The Onion router = 120 words Need link reference as well
Need to present a research report on with a word count no more than 70-110 words(not more than the count provided) and should provide a separate
URL reference link too
1) Best practices for beginning programmers – ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)
2) Python weaknesses = 70+ words Need link reference as well
3)Penetration testing methods = 70+ words) Need link reference as well
4)Vishing = 70+ words Need link reference as well
5)SPIT ( Spam over IP Technology) ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)
6) Evaluating your web browsers security settings = 70+ words Need link reference as well
7) Code signing = ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)
8) The Amnesic incognito Livesystem ( TAILS) = ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)
9) Garlic routing = 70+ words Need link reference as well
10) Rendezvous protocol ( Need this same topic in 2 different formats and 2 different URL links as well needed) (70+70=140 words)
11) The onion router(TOR) = 70+ words Need link reference as well
It is suggested you use a Research Theme to help you stay focused, and to provide continuity throughout your research. Here is a list of ideas, but this list is not all-inclusive:
Current technologies available to support management functions,
Best Practices,
Future improvements/technologies, or
Other standards related to your specific field.
Note: The content should be in a general words with no technical jargons.
This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.
NO PLAGIARISM STRICTLY and do not use AI to get the copy paste information lik Chatgpt
Each one should be different and no each topic information should be similar to the other topic strictly.
Content should be unique and in a simple understanding way.
Deadline: 03/26/2023 11:59PAM CST
Also provide me the separate files for discussion and the research reports instead of submitting in a single file.
Case Study – Week 2- Strategy applied in Project Management
Read the case “The POM+ Project*- Part 1 APPENDIX 2
Big Kola Company has been concerned that specialized fruit drinks have been eroding their cola market. The CEO mandates that “If you can’t beat them, join them.” Grape juice was the first product that was successful after an advertising blitz claiming the antitoxin benefits. Lately, competition is compressing grape juice margins and profits. Months of additional market surveys and focus groups have resulted in three potential high-margin drinks: cranberry, blueberry, and pomegranate. All these choices represent antitoxins. The decision is to produce the pomegranate drink that has many health claims. For example, the relative ability of these juices to eliminate harmful free radicals (antitoxins) is 71 percent for pomegranate, 33 percent for blueberry, and 20 percent for cranberry (Technion Institute of Technology). The market potential appears very attractive and should have a higher profit margin than the other potential juice products. Another appeal for pomegranate juice is its familiarity in the Middle East and Asia. (See full details on pages 639-341)
Note: Use any project management tool that you have available to you. However, ProjectLibre project management software is free and can be found at www.projectlibre.com
Part 1
1. Develop the WBS outline using the software available (save your file).
2. Use this file and the information provided below to create a project schedule.
3. The following holidays are observed: January 1, Martin Luther King Day (third Monday in January), Memorial Day (last Monday in May), July 4th, Labor Day (first Monday in September), Thanksgiving Day (4th Thursday in November), December 25 and 26.
4. If a holiday falls on a Saturday then Friday will be given as an extra day off, and if it falls on a Sunday then Monday will be given off.
5. The project team works eight-hour days, Monday through Friday.
6. The project will begin on January 3, 2012. 7.
Note: Based on this schedule, submit a memo (500 words) that answers the following questions:
a. When is the project estimated to be completed? How many working days will it take?
b. What is the critical path?
c. Which activity has the most total slack?
d. How sensitive is this network?
e. Identify two sensible milestones and explain your choice.
Text
Title: Project Management: The Managerial Process
ISBN: 9781260238860
Authors: Clifford F. Gray, Erik W. Larson
Publisher: McGraw-Hill Education
Publication Date: 2020-01-09
Python program: Prediction with Logistic Regression
The file Invistico_Airline_LR.csv contains information from an airline using the alias Invistico Airline on customer satisfaction, as well as details on each customer. The columns of interest are Gender, Age, Class, Arrival_Delay_in_Minutes, and satisfaction.
- Read the file Invistico_Airline_LR.csv into a data frame.
- Obtain user defined values female, age, economy, and delay.
- Re-code the categorical variables Gender, Class, and satisfaction into dummy variables.
- Create a new data frame X from the predictor variables Gender_female, Age, Class_Eco, and Arrival_Delay_in_Minutes, in that order.
- Create a response variable Y from the dummy variable satisfaction_satisfied.
- Perform logistic regression on X and Y.
- Use the user defined values to predict the probability that a customer with those values is satisfied.
Ex: If the input is 1 34 0 10 the ouput is:
[0.62343979]
30/s4
Write a 4-5 page paper (deliverable length does not include the title and reference pages)
- Why must companies place an increased emphasis on the use of high-quality software in business systems, industrial process-control systems, and consumer products?
- What potential ethical issues do software manufacturers face in making trade-offs between project schedules, project costs, and software quality?
- What are the four most common types of software product liability claims?
Data mining
Q1. Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.
Q2. What are the privacy issues with data mining? Do you think they are substantiated?
Each response should be 300 words. There must be at least one APA formatted reference to each question (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words, and continue to use in-text citations.
Python Programming
Need this python work to be done by Feb 14.