Python coding Variables, IF/THEN/ELSE, Loops

 

You will complete this assignment in Python 3.x. Make sure you have downloaded the software and it is installed correctly. You will download it from this site

You will code the following and submit it in one file. Use the information in the Content area for this week to assist you. Save it as a python file (.py), and upload it into the Assignments area.

Create 2 Python programs based on week 5 flowcharts and requirements. You must use loops, do not use function call

Here is a SAMPLE run for a simple calculator to add to numbers (this is for reference only)

Simple Calculator

What is your name –> Supa

Enter first number –> 7

Enter second number –> 5

Supa, The total of 7.0 + 5.0 = 12.0

Do you want another calculation ? (y/n) y

What is your name –> Lupa

Enter first number –> 21

Enter second number –> 11

Lupa, The total of 21.0 + 11.0 = 32.0

Do you want another calculation ? (y/n) n

Thanks for using my calculator

physical security

Two Pages Reaction paper:(chapter 1-15 synopsis included in pdf docuement)

Study entire package, synopsis of Chapters 1-15 and study the course textbook by

Fennelly, (2017), Effective Physical Security. Fifth Edition. ISBN:978-0-12-804462-9

Provide a well-synthesized two-pages typed reaction paper on any segment of your choice based on the reading and the synopsis of Chapters 1-15 and course materials. 

Instructions:

Your response must be supported with four (4) cited references in compliance with American Psychological Association (APA) format and guideline set forth by the University of the Cumberlands.

Fennelly, Lawrence J. (2017). Effective Physical Security. Fifth Edition, Elsevier, Inc. 255 Wyman Street, Waltham: MA.

businesses have integrated Big Data

This week’s article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.  Search the University Library and/or Google Scholar for a “Fortune 1000” company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence. 

Your paper should meet the following requirements:

• Be approximately 3-5 pages in length, not including the required cover page and reference page.

• Follow APA guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your response with the readings from the course and at least five peer-reviewed articles or scholarly journals to support your positions, claims, and observations. 

• Be clear with well-written, concise, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Access tools in Cybersecurity

Describe identity and access management tools and explain the importance of these tools to a business.  Choose an industry and discuss how identity and access management is employed in that industry. 

2 pages 

portfolio assignment

 

Portfolio Project: This week discuss a current business process in a specific industry. 

Note the following:

-The current business process itself.
-The industry the business process is utilized in.
After explaining the current situation, take the current learning from the course and:
Explain a new technology that the business should deploy. 

Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).

Note the pros and cons of the technology selected.

Note various factors the business should consider prior to deploying the new technology.

The companies with cases in the text – you can’t use the same subject matter of those cases.  As such no case content within the text is to be used for this assignment. The purpose is for you to do research not to restate a case in the textbook.  As well, no content from any of your prior work is to be reused including your Residency paper.  In a nutshell, content must be new and unique as well as the business (so if you wrote on Amazon in any of your papers, you need to select a different company).  Remember that the text as well as your former papers are all in the SafeAssign data repository and will bring back a high percentage rate indicating plagiarism from your former work which is not acceptable.  SafeAssign should be below 25% and your subject matter for this assignment needs to be new.

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work, one being your text.  I would expect to see approximately 4-8 in-text citations.

Business Intelligence and Analytics (Exercise)

  

Watson and its success on Jeopardy! cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report

linux

1. For this discussion topic, you will need to research methods of dealing with add in hardware devices and how they work with virtualization.  Add in hardware would be items outside of the standard server configuration and might include things like USB license keys, barcode scanners, specialty video cards etc.  As part of the discussion you will want to identify the type of hardware you found and some recommended solutions for making it work with a virtual server. 

2. For this assignment, you need to investigate what options the hypervisor you recommended in your type 1 hypervisor compare assignment have to provide highly available services.  How do these items tie into what you read about in the chapter and which ones would you recommend implementing?  While you investigate the process of making your virtual machines highly available, what else did you run across that could have an impact on the availability of your machines and services that is outside of the control of your hypervisor?  Write up a summary of the features of the hypervisor you choose, a brief section on the non-hypervisor factors and your recommendations for which features are most important to implement to ensure the best availability of your virtual machines. (which i used Oracle Virtualbox)

DF FP

In 750 words.
Data analysis techniques for fraud detection.
Include 5 resources.

 

Table of Contents

Data analysis techniques for fraud detection. 

What is  Data analysis techniques for fraud detection / Summary

Advantages/Disadvantages

Challenges one might face

Conclusion:

References: