Arduino Calculator / computer design

Description:

Implement a basic Calculator using an Arduino, push buttons/keypad and LEDs

The submission requirements are a report, source code (INO file) for the Arduino and link to the tinkercad design.

https://www.tinkercad.com

follow these instructions :

The calculator must perform at least the basic arithmetic operations ADD, MULTIPLY, SUBTRACT and DIVIDE

the result may be displayed on the serial monitor, although using an LCD component is preferable (LCD will be required for the next project). Bonus points (up to 30%) will be awarded for use of LCD, use of the additional functions FACTORIAL, ODD or EVEN, MODULUS and PRIME FACTORS.

700words: Leadership

1. Discuss what performance management is and how it influences effective teams.

2. Review table 11.1, define leadership behaviors (in your own words) and note which behaviors are beneficial at specific organizational activities (example: project planning, leading coworkers, etc…).  Please note at least five organizational activities and be specific when responding.

3. Note at least two organizational capabilities and compare and contrast each.

VPNs

  • Explain some of the security risks associated with VPNs.
  • Describe how organizations can mitigate these risks.
  • Determine the effect of penetration testing and any applicable laws on VPNs.

Data Analytics Lab Work – In Full APA format

Hi, 

Please solve below mentioned 2 problems and answer all the questions asked in each. Use the attached excel files to solve each question.

1. Question 38 – Use P02_35.xlsx

2. Question 40 – Use P02_30.xlsx

Note: Below attached are 2 questions and required 2 excel files to be used in solving those questions.

Writing Requirements:

– Provide the excel file with calculations performed

– Provide detailed explanation to each question in a word document with screenshot

– Full APA Format

– NO PLAGIARISM

Analyzing and Visualizing data

 

Assignment:

Use RStudio to generate advanced graphs (using the ggplot2 package) using the dataset below.

Use the following videos to learn the commands to produce advanced graphs in RStudio:  RStudio – Advanced Graphs – Part1.mp4

 |  RStudio – Advanced Graphs – Part2.mp4  

Graphs to Produce:

ggplot2 – Bar Plot: (Use dataset_student_survey_data.csv)

  • x=Smoke
  • fill=Exer
  • position=dodge
  • facet=Sex
  • x-label=Smoker
  • y-label=Counts
  • title=The Exercise habits of Male and Female students that smoke

ggplot2 – Histogram: (Use dataset_us_car_price_data.csv)

  • x=Price
  • fill=Type
  • facet=Type
  • x-label=Price
  • y-label=Freq
  • title=Car Price Distribution based on Car Type

ggplot2 – Box Plot: (Use dataset_production_of_rice_in_india.csv)

  • x=varieties
  • y=price
  • fill=bimas
  • facet=status
  • x-label=Rice Varieties
  • x-label=Price
  • title=India Rice Prices based on Varieties, Land Status, and Bimas Program

ggplot2 – Scatter Plot: (Use dataset_production_of_rice_in_india.csv)

  • x=price
  • y=wage
  • shape=bimas
  • col=bimas
  • facet=status
  • method=lm
  • se=F
  • x-label=Rice Price
  • y=Wage
  • title=India Rice Prices vs Wage broken down by Land Status and Bimas Program

Please put all screen shots in a MS Word (other word processors are fine to use but save it in MS Word format). 

NETWORKING PROJECT

Attach is the course project. THESE HAS 3 parts of the project and budget would be 20/ project. I will buy the project by week. So this would be the first one. NAME WEEK3 part.

project

  

Scenario

Always Fresh wants to ensure its computers comply with a standard security baseline and are regularly scanned for vulnerabilities. You choose to use the Microsoft Security Compliance Toolkit to assess the basic security for all of your Windows computers and use OpenVAS to perform vulnerability scans.

Project1:

Develop a procedure guide to ensure that a computer adheres to a standard security baseline and has no known vulnerabilities.

For each application, fill in details for the following general steps:

1. Acquire and install the application.

2. Scan computers.

3. Review scan results.

4. Identify issues you need to address.

5. Document the steps to address each issue.

Scenario

One of the security improvements at Always Fresh is setting up a system recovery procedure for each type of computer. These procedures will guide administrators in recovering a failed computer to a condition as near to the point of failure as possible. The goal is to minimize both downtime and data loss.

You have already implemented the following backup strategies for workstation computers:

§ All desktop workstations were originally installed from a single image for Always Fresh standard workstations. The base image is updated with all patches and new software installed on live workstations.

§ Desktop workstation computers execute a cloud backup every night at 1:00 a.m.

Consider the following for a computer that encounters a disk drive failure or some other error that requires restoration:

1. How much data has been modified between the last backup and the time of failure?

2. What images are necessary to recover the workstation?

3. What are the steps necessary to fix the problem that cause the data loss?

4. What steps should Always Fresh take to avoid a reoccurrence of this issue in the future?

Project2:

Create a procedure guide that describes the necessary steps for recovering a desktop workstation computer. Fill in details for each of the following steps:

1. Describe the processes of:

a. Fixing the problem that caused the failure in the first place. Keep the description of this process general. Just address the problem and ensure the recovery process starts with a functional computer.

b. Restoring the newly repaired computer to a base workstation.

c. Restoring local data for the specific workstation that failed.

2. Provide the steps to follow for each of the restore operations. Assume you will be using the Windows Backup and Restore utility.

Project3:

What is Cloud Computing Risks & Challenges Corporate businesses are facing today? What solutions would you develop to address each of these problems? 

st lukes

Write a fully developed paper in which you:

  1. Assess the probable difficulties of the St. Luke’s IT executives’ view of wireless networking as a key lever in their quest to increase clinician productivity and improved patient care. 
  2. Analyze how the Mobility XE enables the IT department to centrally manage all wireless devices used by clinicians. 
  3. Critique the Mobility works solution and recommend one change to the solution to provide better productivity and improved patient care. 
  4. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Information Goverance

  

  

  

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company. 

Requirements:

The paper should include at a minimum of the following sections:

a. Title page

b. Executive Summary (Abstract)

c. Body

i. Introduction (including industry discussion – 1-2 pages)

ii. Annotated Bibliography (2-3 pages)

iii. Literature review (2-3 pages)

iv. Program and technology recommendations, including:

1. Metrics

2. Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.

3. Regulatory, security, and privacy compliance expectations for your company

4. Email and social media strategy

5. Cloud Computing strategy

d. Conclusion

e. References

2. You must include at least two figures or tables. These must be of your own creation. Do not copy from other sources.

3. Must cite at least 10 references and 5 must be from peer reviewed scholarly journals (accessible from the UC Library).

4. This paper should be in proper APA format and avoid plagiarism when paraphrasing content. It should be a minimum of 8 pages in length (double-spaced), excluding the title page and references.

Milestones:

· Week 3 – Introduction Section – A 1-2 page paper describing the industry chosen and potential resources to be used. 25 pts.

· Week 6 – Develop a full annotated bibliography (2-3 pages).  25 pts.

· Week 12 – Develop the literature review (2-3 pages). 25 pts.

· Week 15 – Completed final research paper (all milestones combined together and include the last sections as discussed in the list above). 50 pts.

P.S: I have completed all the sections, last section is pending Final research paper ( I will pass all the necessary documents introduction, Bibliography and Literature review)