Basic python

 

ython is a great language for doing data analysis, primarily because of the fantastic ecosystem of data-centric Python packages. Pandas is one of those packages, and makes importing and analyzing data much easier. Pandas builds on packages like NumPy and matplotlib to give you a single, convenient, place to do most of your data analysis and visualization work. In this python data science tutorial, you’ll use Pandas to analyze data on video game reviews from IGN, a popular video game review site. The data was scraped by Eric Grinstein, and can be found here. As you analyze the video game reviews, you’ll learn key Pandas concepts like indexing.

Exercise 1 Link: https://www.dataquest.io/blog/pandas-python-tutorial/

You need basic Python knowledge for this tutorial. If you understand if-else statements, while and for loops, lists, and dictionaries, you’re set to make the most out of this tutorial. You also need a code editor like Visual Code Studio, PyCharm, or Atom. In addition, while we walk through every line of code so you never feel lost, knowing basic pandas would help. Check out our pandas tutorial if you need a refresher.

Exercise 2 Link: https://www.dataquest.io/blog/regular-expressions-data-scientists/

Please screenshot your results and upload them to this Assignment Link.

week 3 assignment digital forensica

Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.

Write a short paper, 200-300 words, using WORD and submit here.

Organ Leader & Decision Making

After completing the reading this week, we reflect on a few key concepts this week:

  1. Discuss what ethical leadership is and how it impacts the organizational culture.
  2. What are the various dimensions of ethical leadership?
  3. Note some failures in ethical leadership, please find an example, explain the failure and note possible solutions to fix the issue with leadership.

 

Text Book : 

https://books.google.com/books?id=Pkm3DwAAQBAJ&pg=PT105&source=gbs_selected_pages&cad=2#v=onepage&q&f=true 

Please be sure to answer all the questions above in the initial post.

Please ensure the initial post and two response posts are substantive.  Substantive posts will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Expand on the topic, by adding additional thoughtful information
  • Answer a question posted by another student in detail
  • Share an applicable personal experience
  • Provide an outside source
  • Make an argument

At least one scholarly (peer-reviewed) resource should be used in the initial discussion thread.  Please ensure to use information from your readings and other sources from the UC Library.  Use APA references and in-text citations.

Big Data Research Paper

While this weeks topic highlighted the uncertainty of Big Data, the author identified the following as areas for future research.  Pick one of the following for your Research paper:

Additional study must be performed on the interactions between each big data characteristic, as they do not exist separately but naturally interact in the real world.

The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.

New techniques and algorithms must be developed in ML and NLP to handle the real-time needs for decisions made based on enormous amounts of data.

More work is necessary on how to efficiently model uncertainty in ML and NLP, as well as how to represent uncertainty resulting from big data analytics.

Since the CI algorithms are able to find an approximate solution within a reasonable time, they have been used to tackle ML problems and uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

research software testing

 

 identify at least 1 relevant research paper (from http://dl.acm.org/ OR http://ieeexplore.ieee.org/Xplore/home.jsp OR Other online sources) approved by the majority of the team members covering similar area/topic/technique based on your instructor approved paper/topic. You’ll then summarize each of the selected papers, and describe “why and how” those papers/techniques are relevant – this description must be coherent.

topic:

 Generation of Automatic Test Cases with Mutation Analysis and Genetic Algorithm.

OPERATING SYSTEM

 

  • Explain the purpose of an operating system for a personal computer.
  • Give a brief description of the hardware components of a computer that the OS interfaces with. Motherboard, CPU, RAM, hard drive, sound controller, power supply, input and output devices, etc.

Operation Security

 Many types of systems are networked together, and the number of devices that are added to this network increases every year. With this explosive growth of networked systems, companies are now working harder to bring more sophisticated security systems online for greater protection from outside attacks.  For this Discussion, you will analyze a security breach caused by an employee or third party from inside an organization. Search the web or the University of the Cumberlands library for a news article concerning a security breach that occurred inside an organization.

  • Could the security breach have been prevented?  Explain
  • What business drivers were impacted from the breach

    TextBook:  Security Policies and Implementation Issues, Authors: Robert Johnson, Publisher: Jones & Bartlett Publishers, Publication Date: 2014-07-03 

Practical Connection between Pega developer and Application security

I am working as a pega developer, would like to know the practical connection between my role and Application security

Students should;

  • Be able to apply knowledge and theory gained in their courses of study within current workplace or in their future employment.
  • Be able demonstrate the application of theory to workplace in written form.
  • Be able to identify the benefits of incorporating real-world experience into an academic program.

Need it in APA format with 500 words

information technology

 

From the topics covered in the course to this point, pick one of the topics listed below, write a 4-page paper describing the topic and recent developments (past 3 years).

Big Data, Analytics, Cybersecurity, Risk Management, Social Media, Search Technology

 Provide a minimum of three scholarly reference in your paper (cited and referenced in APA format).

– Double space your paper
– The paper must use APA format (6th edition)
– Minimum of 4 pages, plus 1 cover (title) page, plus 1 page for references.
– Work must be original, no cut and paste.
– No word changing software such as Spinbot, Rephraser, etc. allowed