Create a professional look logo animation using Blender.

 

Create a professional look logo animation using Blender.

The topic of the logo animation should be something about Computer Science.

  • Your video must contain 10-20 seconds of animation (10 points);
    • Note: Credits, lead footage, and other components will not be counted toward the run time. 
  • A professional look that is appropriate for marketing purpose with a cohesive theme throughout (50 points);
    • Included content requires 3D objects with applied textures
    • Use of Color (projects submitted solely in Grey scales will receive 50%)
  • You must include your name’s initial (first and last) in the animation (10 points);
  • Create a Word file to include steps used in creating the logo animation (20 points).
  • Save the animation as a video. Upload the video to your TWU YouTube account. Include the link to the video in the Word file. (10 points)
    • Be sure that the YouTube Privacy settings are set to “Unlisted” or “Public”

Submission instructions:

Include all files in Final Project as a ZIP file and then submit through the link under the Submissions tab. The files should include:

  • .blend file for the animation (missing .blend file will lose 60 points for this project);
  • The Word file.
  • YouTube URL 

If you work in a team, only 1 submission is needed. You must include both members’ name initials in the animation.

Note: By default, Blender does not save images as part of the .blend file (this applies to background images or textures used as part of the scene).

To make those images part of the file they have to be packed.

You can pack all external files into the .blend file by going to File -> External Data -> Pack all into .blend.

After doing this you have to re-save the file.

PowerPoint presentation

For this assignment, you will identify any dataset in the course (see: ~content –> ~datasets) and prepare a PowerPoint presentation with data visualizations and graphics from RStudio. Using (6-8 slides) in PowerPoint describe a potential problem related to your chosen dataset. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential issues.

Suggestions:

  • Begin with a description of your chosen dataset and describe its significance to the reader
  • Where necessary, you may make assumptions about any specifics. 
  • You are required to add comments about your content in your presentation notes.
    • Only exception is if you create a video. 
    • This is always needed if you are not presenting content live
  • Draw from the assigned readings (and independent research) to identify what additional topics should be included.
    • If you feel that slide information is not self-explanatory, add additional details in the presentation notes.
  • Your slides should contain minimal text (one or two lines maximum) that briefly reinforce your data visualizations.

Reply Post

Reply to 2 – 3 posts on your classmates’ posting, providing your thoughts on the issues presented.

Provide your response on whether you (as a manager) would approve/disapprove of the project based on the results of the presentation.

Cyber Security

The number of computer based forensic tools have been on the rise   over the last 10 years. It is extremely difficult to select the right   tool for the job. Cost is an additional factor as many of these tools   are expensive and can break a budget. Research four computer forensic   based tools. List each tool and the type of data that it searches for,   its features, and costs. Which would you recommend? If you could only   select one of these tools, which one would it be? Why? (50-70 words)

Compare and contrast the differences between the concepts of cyber   security, information assurance, and risk management. Where in the   security industry would each concept apply? What are the pros and cons   of each? If your school or organization were to adopt one concept,   which would it be?  Why? (50-70 words)

PLEC Quiz

 

Please answer the questions in paragraphs containing at least five sentences. Include the question and number your answers accordingly.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

MYSQL & DATABASE

Show the results (using screenshots) of executing each SQL statement against the database you created. Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output). For the VIEWs create in exercise-3, also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.

C programming

 

0) Random number generation. (50 pts)

Often, computer scientists, statisticians, physicists, social scientists, and mathematicians need a list of random numbers. Political pundits also find lists of random numbers useful to provide ‘statistical’ evidence of their arguments.

Implement a tool to generate and print a sequence of 10 random numbers.  Each random number should be an integer in the range from

0 to 100, inclusive (that means both 0 and 100 should have a chance of appearing). I do not expect you to implement your own random number generator. I expect you to use the standard way of obtaining randomness in a secure fashion.

$ ./grand

56 77 91 2 33 40 72 100 6 2

Augment your program to take a command line parameter specifying how many random numbers to generate. That is, if grand is invoked by:

$ ./grand 4

it will output 4 random numbers from 0 to 100, inclusive. Make sure your program does something sensible if the supplied argument is not a valid integer. There should not be an arbitrarily imposed upper limit to this number (in other words, do not have an artificial cap on the value of the argument).

Since it is easy to forget how to use programs, it is often useful to provide a well-known command line switch (or parameter) that tells the user how to invoke the program. Augment your program to recognize two more command line arguments, ‘-h’ and ‘–help’ that prints out the usage information for the program. For example,

$ grand -h

and

$ grand –help

should output the following usage information:

grand [-h | –help]       : output this usage message.

grand [n]                 : print out n random integers in [0,100]

Finally, augment your program to print out its version. Don’t forget to add this usage case to your help dialog.

$ grand –version OR -v

grand-0.0.3

1) Functions and Recursion (50 pts)

Experiment with recursion. The Fibannaci sequence is a famous naturally recursive series of numbers whose ratio approaches the Golden Ratio.

f(n) = f(n-1) + f(n-2)

Implement a program named ‘fib’ that uses recursion to calculate and print the first n Fibannaci numbers, where ‘n’ is less than or equal to 30.

Usage:

fib [n]

For example, ‘fib 4’ should output:

fib(0) = 1

fib(1) = 1

fib(2) = 2

fib(3) = 3

fib(4) = 5

Modify your program so that providing the –target or -t option will print only the nth Fibannaci number.

$ ./fib –target 3

fib(3) = 3

Add the ability for your program to calculate the Fibannaci sequence iteratively rather than recursively. Output should not change. If you execute your program with the name ‘ifib’ then it performs the iterative calculation.  If it is executed via ‘rfib’ or ‘fib’ it performs the recursive method of calculating.

$ ./fib –target 3

fib(3) = 3

$ ./ifib –target 3

fib(3) = 3

$ ./rfib –target 3

fib(3) = 3

There is an example of how to accomplish this sort of test of the program name in “C Programming Language, 2nd Edition, by Brian W. Kernighan, Dennis M. Ritchie” textbook. You can search Google for an iterative version of Fibannaci, but be sure to cite where you found it in your README.

Note:

You may want to consider using GNU getopt library for processing command line options.

Analyzing and visualization data – Research paper

Research: Quantitative vs Qualitative

Background: Quantitative data can be measured and documented with numbers. Additionally, quantitative data can be represented as quantities. On the other hand, qualitative data is not measured with numbers, but it is represented by qualities. For example, I use quantitative methods to conduct my PhD research because I like working with counts and measures.

Assignment: Write a research paper the contains the following:

  • Discuss Quantitative Methodology
  • Discuss Qualitative Methodology
  • Compare and contrast qualitative data vs quantitative data

Your research paper should be at least 2 pages (600 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

PLE 10

Please answer each below in 2-3 lines 

 

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

For this assignment, you are required to research the benefits as well as the challenges associated with Big Data Analytics for Manufacturing Internet of Things.

 

The  recent advances in information and communication technology (ICT) has  promoted the evolution of conventional computer-aided manufacturing  industry to smart data-driven manufacturing. Data analytics in massive  manufacturing data can extract huge business values while it can also  result in research challenges due to the heterogeneous data types,  enormous volume and real-time velocity of manufacturing data.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations. 
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Discussion – Block chain

There is still much confusion regarding what Blockchain is and what it is not.Discuss the following:

1.  Your explanation of Blockchain to include why it has been gaining so much popularity.  In your own words please.

2.  Using a blockchain as a data source, what data science project do you think would be interesting?

500 words

At least two scholarly source should be used.

Use proper citations and references