Cloud Computing technologies

 

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. Once you have chosen an organization, this will be the organization you use throughout the remainder of the course. This paper should be written in third-person. The third-person point of view belongs to the person (or people) being talked about. The third-person pronouns include he, him, his, himself, she, her, hers, herself, it, its, itself, they, them, their, theirs, and themselves (Not I, we, us, our).

Write a one-page organizational overview using APA (7th Edition) formatting.  The Title and Reference pages do not count towards the page count requirements. The organizational overview should include:

  • A brief history
  • Mission (If you quote the mission directly, be sure to follow APA for direct quotes)
  • Goals
  • Achievements

The paper must adhere to APA guidelines including Title and Reference pages (no abstract).  There should be at least one scholarly source listed on the reference page.  Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in the text. APA requirements for this class include:

12-point Time New Roman font

Your paper should be typed and double-spaced with 1″ margins on all sides

The first sentence of each paragraph should be indented one tab space

All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.

Computer Security Assignment

 

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s aftermath. Comment on ways the attack could have been prevented.

Post between 200 and 300 words.

 Must have – critical thinking , scholarly Articles/References required. APAformat in-text citations with page number required.

Deliverable Length: SPSS 0utputs and 500–1,000-word analysis

 

Use the Explore command to compare the income levels (rincdol) for both genders (sex). Go to the Resources area of the class to download the files that you will need to complete your assignments each week. Open gss.sav in SPSS, and complete the following calculations to determine the differences in the income level between males and females.

Compute the following for each group:

  1. Mean
  2. Median
  3. Quartiles
  4. Range
  5. Variance
  6. Standard deviation
  7. Skewness
  8. Kurtosis

The Explore command will also produce several different types of plots. Click on the Plots button, and create the following plots for each group:

  1. Histograms (include the normal curve on the histogram)
  2. Box plots
  3. Stem-and-leaf plots

Use the calculations and plots to answer the following questions. When discussing a calculation, include the value in the text to bolster your analysis.

  1. What can you determine from the measures of skewness and kurtosis relative to a normal curve?
  2. What are the mean and median?
  3. Does the mean or median seem better to represent the scores? How have extreme scores impacted these values?

Submit your output from all SPSS analysis as an SPSS output file and your Word document.

quiz

2. Name and explain the eight hats/roles of data visualization.

4. Summarize/discuss at least 6 key things discussed in this course that influence one’s Design Choices.

5.What is the importance of RegEx or Regular Expressions in data analytics? Discuss the differences between the types of regular expressions. Choose two types of regular expressions and discuss the differences between the two. Please be sure to include two or three differences for each. Include how they help manipulate data.

6.Excel provides many features that make it useful for data visualization. It is a tool still widely used despite its limitations. Newer versions of Excel have addressed some of the limitations. What are 3 or 4 cons (limitations) to using Microsoft Excel for data visualization?

10. Three storytelling techniques are discussed in the text (pages 161-209) in which data is presented and stories are being interpreted. The techniques are described as inheritant characteristics of some charts and graphics. What is the importance and the advantages of using these techniques? Provide an example of each technique.

14. List and Describe 3 or 4 myths that are described in chapter 11 of Andy Kirk’s book. Then state what is Kirks response to these myths.

week 6

s

Part 1: Beta

Visit the following web site or other websites:

Yahoo Finance : https://finance.yahoo.com/

1.  Search for the beta of “Carnival Corporation & plc”

2.  In addition, find the beta of 3 different companies within the same industry as Carnival Corporation & plc 3.  Explain to your classmates what beta means and how it can be used for managerial and/or investment decision

4.  Why do you think the beta of Carnival Corporation & plc and those of the 3 companies you found are different from each other? Provide as much information as you can and be specific.

Part 2: Capital Budgeting

Before you respond to Part 2 review the following information on Capital Budgeting Techniques

Capital Budgeting Decision Methods (LINK) —– https://www.youtube.com/watch?v=hfZ6lznPf2U&ab_channel=MichaelNugent

To avoid damaging its market value, each company must use the correct discount rate to evaluate its projects. Review and discuss the following:

• Compare and contrast the internal rate of return approach to the net present value approach. Which is better? Support your answer with well-reasoned arguments and examples.

• Is the ultimate goal of most companies–maximizing the wealth of the owners for whom the firm is being operated–ethical? Why or why not?

• Why might ethical companies benefit from a lower cost of capital than less ethical companies?

CAPITAL BUDGETING (PRINCIPLES & TECHNIQUES) —- https://www.scribd.com/doc/37253036/Capital-Budgeting-Principles-Techniques

Problem 1: Costco Stock SMA

  

Objective 

● list and string handling: split, indexing, len() 

● list comprehension, with if and else 

● if statement 

● file reading, csv file handling (csv: comma separated values) 

● nan: not a number. matplotlib will auto ignore all ‘nan’ entries. 

● matplotlib: make line plots, line/dot style, label, saving figure 

● self learning. (google and follow example)

Research Paper – Organization leader and Decision making

 Please write research paper APA 7 format:

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World.  Complexity is increasing as new technologies are emerging every day.  This complexity impacts human experiences.  Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article.  Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Articles for references :

 

 

Chapter 1 Journal articles

web browser forensics_4.1

Question:

Last week you research potential free and paid tools used for forensic analysis. This week I want you to narrow down your choice of free, or paid if you are willing to pay the cost, forensic tool(s) you will be using to analyze a web browser. Please post a discussion on what you plan to use and why you plan to use it. Also include any familiarity you have with the tool. In addition, you should be downloading and installing the tool you decide to use so that you can become familiar with it. 

cmsc 335 final project

 In addition, a zip file is included that includes several Oracle Java files that use different types of Swing components as well as threads. I recommend going through the reading and the examples to become familiar before attempting the final project. Assignment Details As a new engineer for a traffic congestion mitigation company, you have been tasked with developing a Java Swing GUI that displays time, traffic signals and other information for traffic analysts. The final GUI design is up to you but should include viewing ports/panels to display the following components of the simulation: 

Ghostware

It is essential to determine how unintended software is installed on user systems with only marginal adherence to policies. By understanding the process, a security professional can better ensure that only software built to acceptable standards is installed and maintained on systems under their purview.

Using an Internet search engine, identify three sources of unintended software that could be installed on a user’s machine.

In a 500- to 750-word essay, describe the type and risks of the executable programs and adware to the user. Explain why this is legal. Then, share your personal experience related to what happens when software has negative, unintended side effects from unanticipated installation. Who is to blame, the software developer or user? It might be perfectly okay legally when there is no malice aforethought, but how would you explain this when humans are considered as God’s image bearer? How would you relate it to human value and dignity?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.