Problem 1: Create a list that contains the months of the year. Problem 2: Create a loop to print the month number and name

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

Problem 1: Create a list that contains the months of the year.

Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!

Web Development Browser Compatibility Issues and Mobile Device Development one page paragraph

 You should be REPORTING EVIDENCE and EXAMPLES from what you read. Find, Read, and Share – THREE related sources of information 

Report – Three things about the topic that you want to remember forever

  1. Identify the topic for this week.
  2. Find three high-quality sources of related information on the Internet. 
  3. Read your chosen high-quality sources of related information.
  4. state your three sources of information.
  5. DESCRIBE each of the three sources of information within a few sentences providing EXAMPLES.
  6. SUMMARIZE with three things about the topic that you want to remember forever.

Enterprise Risk Management

Description of enterprise risk management. Why do you feel ERM is different from traditional risk management?

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)

Week 15

1) Implement the risk response plan (3-4 pages)

2)  Securing IoT Devices: What are the Challenges? (3-4 pages)

Security practitioners suggest that key IoT security steps include:

a) Make people aware that there is a threat to security;

b) Design a technical solution to reduce security vulnerabilities;

c) Align the legal and regulatory frameworks; and

d) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

3)  Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses? 

machine learning homework

All the requirements are in the picture.

The problem 1 part needs to be done in Python and I need the whole python script.

Any text can be used for the Problem 2~4

Reference Books

– parts of “Machine Learning” by Marsland (2nd edition) ISBN-13: 978-1466583283. 

Research paper

This is a graduate course and students will be expected to research and write papers summarizing in their own words what they have found on current topics from the weekly readings. Research is a theoretical review of relevant literature and application of findings in the literature to a topic related to a specific industry, field, or business problem.

Assignment Requirements:

  1. Choose a research topic from the chapter readings or from the list provided by your professor.
  2. Research/find a minimum of at least four (4), preferably five (5) or more, different peer-reviewed articles on your topic from the University of the Cumberlands Library online business database. The article(s) must be relevant and from a peer-reviewed source. While you may use relevant articles from any time frame, current/published within the last five (5) years are preferred. Using literature that is irrelevant or unrelated to the chosen topic will result in a point reduction.
  3. Write a four (4) to five (5) page double spaced paper in APA format discussing the findings on your specific topic in your own words. Notepaper length does not include a cover page, abstract, or references page(s).
  4. Structure your paper as follows:
    1. Cover page
    2. An overview describing the importance of the research topic to current business and professional practice in your own words.
    3. The purpose of Research should reflect the potential benefit of the topic to the current business and professional practice and the larger body of research.
    4. Review of the Literature summarized in your own words. Note that this should not be a “copy and paste” of literature content, nor should this section be substantially filled with direct quotes from the article. A literature review is a summary of the major points and findings of each of the selected articles (with appropriate citations). Direct quotations should be used sparingly. Normally, this will be the largest section of your paper (this is not a requirement; just a general observation).
    5. Practical Application of the literature. Describe how your findings from the relevant research literature can shape, inform, and improve current business and professional practice related to your chosen topic.
    6. Conclusion in your own words
    7. References formatted according to APA style requirements