Matplotlib Challenge

  • Using Matplotlib, generate a box and whisker plot of the final tumor volume for all four treatment regimens and highlight any potential outliers in the plot by changing their color and style.
    Hint: All four box plots should be within the same figure. Use this Matplotlib documentation page for help with changing the style of the outliers.
  • Select a mouse that was treated with Capomulin and generate a line plot of time point versus tumor volume for that mouse.
  • Generate a scatter plot of mouse weight versus average tumor volume for the Capomulin treatment regimen.
  • Calculate the correlation coefficient and linear regression model between mouse weight and average tumor volume for the Capomulin treatment. Plot the linear regression model on top of the previous scatter plot.
  • Look across all previously generated figures and tables and write at least three observations or inferences that can be made from the data. Include these observations at the top of notebook.

Here are some final considerations:

  • You must use proper labeling of your plots, to include properties such as: plot titles, axis labels, legend labels, x-axis and y-axis limits, etc.
  • See the starter workbook for help on what modules to import and expected format of the notebook.

APA Format And Intext Citations With Minimum 300 Words And References

This week’s discussion centers around the concept of Blockchain.  There is still much confusion regarding what Blockchain is and what it is not.  Please discuss your explanation of Blockchain to include why it has been gaining so much popularity.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Discussion 3- Access control

Cost benefit analysis hypothetical situation.  Select an access control based on a hypothetical situation and justify the cost based on the risk .  Some example situations could be implementing multi-factor authentication for an email system or a badge reader for a data center (feel free to get creative).  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

Final

In the last week of class, we are going to complete a reflection activity. This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the book. Items to include in the initial thread:

  • “Interesting Assignments” – What were some of the more interesting assignments to you?
  • “Interesting Readings” – What reading or readings did you find the most interesting and why?
  • “Interesting Readings”“Perspective” – How has this course changed your perspective?
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than   others? 

week 2 finance

 In 3 pages, discuss the article and explain how blockchain has impacted the financial world. What immediate changes have been made? What is yet to come? Is this change a good thing for the profession? Explain.

Computer Forensics

 Assignment: Denial of Service ToolsLearning Objectives and OutcomesDifferentiate between tools that are used to create a denial of service (DoS) attack.Assignment Requirements
You have recently been hired by the DigiFirm Investigation Company. The company has clients nationwide. DigiFirm specializes in conducting computer forensics investigations as well as offering preventive services for clients to avoid digital crimes.You are now a member of a team of computer forensics experts who investigate and solve digital crimes and develop digital solutions for clients. A long-running client has just experienced a denial of service attack to its company website. This is serious because they can’t accept orders from their customers. DigiFirm needs you to find out more about what may have happened.Criminals use various tools to create a denial of service attack, including:

  • Tribe Flood Network
  • TFN2K
  • Trin00

For this assignment:

  1. Search the Internet for information about these three tools.
  2. Provide a description of each of the three tools.
  3. Describe the damage or impact of denial of service attacks.
  4. Summarize the efforts used and solutions found to combat these attacks.

Required Resources

  • Course textbook
  • Internet

Submission RequirementsFormat:Microsoft WordFont:Arial, Size 12, Double-SpaceCitation Style:Your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist

  • I researched the Tribe Flood Network, TFN2K, and Trin00 tools.
  • I described each of the three tools.
  • I described the damage or impact of denial of service attacks.
  • I summarized the efforts and solutions found to combat these attacks.

Dis13

Describe the current trends in information systems as well as how technology changes impact society and culture. 

Case Study help (300+ words)

Read the case study “Communication Failures” starting on page 329-331 and answer the below questions.

Questions

1. How important are communication skills in project management?

2. Was Herb the right person to be assigned as the project manager?

3. There were communications issues with Alice, Bob, Betty, and Frank. For each communication issue, where was the breakdown in communications: decoding, feedback, and so on?

Book pages 329,330,331 screen shots attached here.

Book Author: Harold R. Kerzner

Book Title:  Project Management: A Systems Approach to Planning, Scheduling, and Controlling, 11th Edition, ISBN:  9781118022276

CSIA 459

The technology acceptance model (TAM) is a two-factor model that describes user acceptance of new or replacement technology solutions (Davis, 1989). This evaluation model has withstood the test of time and is widely used. The model is based upon perceptions and beliefs of individuals and measures two types of factors: (a) perceived ease of use and (b) perceived usefulness.

Prepare an analysis (briefing paper) (5 to 7 strong paragraphs) in which you explain how cybersecurity researchers could use the TAM model to explore the factors which affect employee acceptance of biometrics used for access to facilities and/or computing systems. What research questions might they ask? What measurements would be needed?

Post your briefing paper as a reply to this topic. Remember to cite your sources (3 minimum) and include a reference list at the end of your posting.

Reference

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340. https://ezproxy.umgc.edu/login?url=https://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=4679168&site=ehost-live&scope=site