The attached file has all instructions. No need to rush, the deadline is the first of February. Do not forget to send the program code at the end. Need 100%.
Research Paper
1.
Submit a group research proposal and topic in the area of Access Control.
Proposal Requirements: #######################################################################################
Make sure to follow APA style. Please be certain that your submission is 1 page in length and meet the minimum APA formatting guidelines:
• 12-pt, Times New Roman font
• Double-spaced
• 1” margins on all sides
• Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
• Paraphrasing of content – Demonstrate that you understand the topic by summarizing the issues in your own words. Direct quotes should be used minimally.
• Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10/ (link is external) Be sure to include at least three reference sources.
• In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02/ (link is external)
2. Research Paper: Please check requirements in the below document
3. Paper Presentation.
Assignment; Data: Simple Graphs in RStudio
Background: As we have learned, a lot of thought goes into the design of a visualization. This week we review how the data types influence the graphing types.
*****NOTE THIS IS A NEW DATASET AND HAS NEVER BEEN USED IN ANY CLASS*****
**You must use this dataset – there will be no option to resubmit if you do not use this dataset**
**You must include all the required screen shots displaying all the required information including the dataset name – there will be no option to resubmit if you do not include all the required screen shots with the required information***
Assignment:
- Use RStudio to generate the list of simple graphs below using the dataset: dataset_price_personal_computers_Chapt6.csv
The submission MUST include the screen captures of the multiple windows for each graph listed or 0 points will be earned
- The windows are Code/or file contents, Console, Environment/Files (num observations and variables), Plots/Graphs
Graphs to Produce:
Pie Chart:
- Create a pie chart of the computer ram
- Label the RAM sizes for each amount of RAM discovered in the dataset formatted as 2GB, or 4GB, or 16GB, as examples
- Title the pie chart as “Computer Ram”
- Color the pie chart using the rainbow option
Bar Plot:
- Create a barplot of the computer screen sizes
- Label the x axis as “Screen Sizes”
- Label the y axis as “Frequency”
- Title the barplot as “Computer Screen Sizes”
- Color the bars in the barplot any color you wish.
Histogram:
- Create a histogram of the computer prices
- Label the x axis as “Prices”
- Title the histogram as “Computer Prices”
- Give the histogram any color you wish.
Box Plot:
- Create a boxplot of the comparing the computer price and premium category
- Label the y axis as “Price”
- Label the x axis as “Premium”
- Title the boxplot as “Premium Computer Prices Distribution”
- Color the boxplot any color you wish.
Scatter Plot:
- Create a scatter plot of computer price and hard drive size
- Label the x axis as “Hard Drive Size”
- Label the y axis as “Price”
- Title the scatter plot as “Computer Price vs Hard Drive Size”
- Color the scatter any color you wish.
Your document should be an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Each graph created must be submitted as a screen capture in the Word document showing all windows as previously listed. If all windows are not displayed 0 points will be earned.
Homework 55
Instructions are in the attached file Week 5 Lab Assignment
Attached below .
Please follow APA and NO PLAGARISM Thanks
Also attached Power Point Presentations 3 copies , they are Chapters 12, 13 and 15
Dis 7 ITM
Provide a real-world example or describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.
Research
Write a 7-page research paper (cover and reference page inclusive) on the topic “Impact of Big Data on Simulation Modelling in the Era of Informatics.”
Research Paper Requirements:
1. Seven pages long. The cover page and reference page included.
2. Use Times New Roman font, size 12 and double-spaced.
3. Include a cover page and a reference page.
4. Use section headers for good readership.
5. Use figures and tables if needed (not mandatory).
Web Programming Assignment
This is a computer assignment and requires knowledge in programming
Cyber in Internet of things
Need question in APA format without plagiarism.
homework computer
File submission: MS Word 2016 practical exam: Word processing document creation
Objective of the activity
Typing in a word processor is not enough. Knowing the functions of the word processor and the proper use of them, result in a document with a professional appearance, which invites and facilitates its reading. In this activity, each student will develop a document in a word processor using the functions that are requested.
Instructions
The academic goal of this task is to meet three of the most important contemporary personalities in the evolution of computers. The names that you will see below may be known:
Steve Jobs
Michael Dell
Bill gates
Additionally, it will include a fourth person, whose career makes him worthy of being on a par with the characters mentioned above.
To carry out this activity, you must carry out research using resources such as databases or the Internet. The sources of information consulted must be reliable sources (not monographs.com, Wikipedia.org, good homework, lazy corner… among others).
You will deliver an electronic document correctly written in your own words in which you will summarize the most important aspects of these personalities: origin, something from their childhood; education, his foray into the world of computers and his most important contribution or contributions. The document should not be as short as half a page, but it is not intended to be long either. One page is expected for each individual investigated.
Download the document for the activity:
What are we going to do?
After having collected, analyzed and paraphrased the information, you will deliver one (1) document created with a word processor, following the outline for the written work. The work must have:
Cover page
Table of Contents (using the Table of Contents function of the Reference tab)
Introduction
Personalities in the Evolution of Computers (present in alphabetical order by last name)
Michael Dell
Bill gates
Steve Jobs
_________________ (Name of the character identified by the student)
conclusion
References
Index
Appendix (Each appendix on one page, arranged alphabetically by last name). In this section you can include a photo of the character
Appendix A – Michael Dell
Appendix B – Bill Gates
Appendix C – Steve Jobs
Appendix D – Character name identified by the student.
Through their work, the student will be able to practice the following skills:
Create and save documents in word
give attributes such as:
Blacken and italic
Align vertically
Align horizontally
Applying the styles (Style)
do
“Page break (page breaks)
Page numbering
“Header (headers) & footer” (footer)
Spacing (line spacing)
single and double
“Before & after”
Table of Contents (using the Table of Contents function)
Index (using the Index function)
How are we going to do the job?
Study the resources in the unit.
Search for information from reliable sources.
In a word processor document, write your work. It is important that you summarize and use paraphrasing techniques when writing your work.
Structure your work so that it complies with the parts to be developed. See the Outline document for written work.
Perform the required functions and apply the required attributes.
Save the document as Personalities in the Evolution of Computers_your name. For example, Personalities in the evolution of computers_Maria Olivero
Upload your work to the platform. The activity allows you to upload only one file.
If in doubt about how to do the job, review the tutorials and simulations
The activity is individual. The works will be submitted to the tool to detect similarity of content (now Urkund).
Deliverable
Each student must submit a document written in a word processor. The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of contents (now Urkund)
The work must have the following parts:
Cover page
Table of Contents
Introduction (at least three paragraphs of five sentences each)
Personalities in the Evolution of Computers (present in alphabetical order by last name)
Michael Dell
Bill gates
Steve Jobs
_________________ (Name of the character identified by the student)
Conclusion (at least three paragraphs of five sentences each)
References
Index
Appendix (Appendix divider page)
Each appendix on one page, arranged alphabetically by last name). In this section you can include a photo of the character
Appendix A – Steve Jobs
Appendix B – Michael Dell
Appendix C – Bill Gates
Appendix D – Character name identified by the student.
Basic review resources
Beskeen / Cram Duffy / Friedrichsen / Reding. (2017). Microsoft Office 365: Office 2016. Boston: Cengage Learning.
Microsoft. (2018). Word for Windows Training. Retrieved from https://support.office.com/es-es/article/word-for-windows-training-7bcd85e6-2c3d-4c3c-a2a5-5ed8847eae73 (Links to an external site.)
Shelly Cashman Series (2017). Microsoft Office 365: Office 2016 Advanced. Boston: Cengage Learning.
Ortiz, I. (2019). Outline for written work.
Did Mr. Boucher’s immunity in the case relate to his preoccupation with child pornography?
Question 1:1. Did Mr. Boucher’s immunity in the case relate to his preoccupation with child pornography?
Question 1:2. Did Mr. Boucher immunity, in your opinion, discount his absorption and obsession with child pornography?
Question1:3. Did Mr. Boucher quash the subpoena to avoid self-incrimination testimony?
Scenario:
Mr. Boucher immunity prohibited the United States government’s access
to the password, contents of encrypted files on the laptop.
Question1:4 What will be your line of response as a government district attorney in Vermont?
Casey, Eoghan (2011). Digital Evidence and Computer Crime. Elsevier
Science. Kindle Edition; San Diego: CA