JSON object with five elements

Create a JSON object with five elements. Explain the definitions of object serialization and deserialization. Write and explain the Python code to apply these concepts to the created JSON object.

Demonstrate how to explain these concepts to the created JSON object.

In developing your initial response, be sure to draw from, explore, and cite credible reference materials, including at least one scholarly peer-reviewed reference. In responding to your classmates’ posts, you are encouraged to examine their opinions, offering supporting and/or opposing views.

You are required to reply to at least two peer responses to this week’s discussion question and/or your instructor’s response to your posting. Your replies need to be substantial and constructive in nature. They should add to and evaluate/analyze the content of the post answer. Normal course dialogue doesn’t fulfill these two peer replies but is expected throughout the course. Answering all course questions is also required.

EH week10 DB

 

Hello,

i need this paper by 10/28 afternoon.

Strictly No plagiarism please use your own words.

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation  been avoided? 300-350 words.

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

portfolio project

Portfolio Project

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.

  • Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
  • Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements: The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates

connection assignment

Provide a reflection of at least 500-800 words of how the knowledge, skills, or theories of “ Data Mining ” have been applied or could be applied, in a practical manner to your current work environment(software developer). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide an 500-800 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Discrete structures

 

Chapter 1

1.1 (1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)

1.2 (1, 2, 3, 4, 5, 8, 9, 10, 11, 12)

1.3 (1, 2, 3, 13, 14)

Chapter 2

2.1 (1, 2, 3, 5, 6, 7, 8, 12, 13, 14, 15, 16, 17, 25, 26)

2.2 (1, 2, 3, 4, 5, 6, 9, 10)

2.3 (1, 2, 3, 4, 5, 6, 7, 8, 12)

parsing tree programing assignment

Similar to the parsing tree example in class, there is not much usefulness in parsing and evaluating statements without an operator. Therefore, it is safe to assume that any input to your parsing tree will contain an operator.

Examples of valid inputs are: 

  • ( T AND F )
  • ( ( T OR M_0.3 ) AND P_0.8 )
  • ( P_0.9 OR M_0.4 )

Example of inputs that are not expected (and that you don’t need to account for):

  • ( T )
  • ( P_0.85 )
  • ( F )

Also, if you haven’t started, and want a clean slate to start with, use this skeleton code in MS Teams: mp_parse.py (Links to an external site.)

What is the assignment?

  • To implement functions to build, evaluate, and print expressions using our (made-up) maybe-probably logic

What to hand in? 

  • One (and only one) *.py file should be handed in. All your checks, unit tests should be inside of this file (similar to last assignment).
  • Note that your program should be able to be run at console/terminal (e.g. $ python your_file.py). If it does not, then the execution portion of the assignment will be 0. 
  • Also note that you do not need to hand in binarytree.py nor stack.py; and you do *not* need to copy them into your file. Just import them. (For Peer Reviewers, ensure you put the code you will review in the same directory as 

What needs to be done? 

The primary tasks in this fourth assignment are to implement the following three functions.

1. buildMPLogicParseTree(s) – this function should take a string as input (e.g. s = ‘( T OR P_0.9 )’) and should return the binary tree representing the parse tree as described in class

2. evaluateMPLogicParseTree(t) – this function should take a binary tree as input and should return a T or an F that is based on the on the input statement

3. printMPLogicExpression(t) – this function should take a binary tree as input and should return the string that looks like the original string (perhaps with extra parentheses)

4. create some examples of how your functions work (inside of def main()), and test that each of the functions works correctly (using unittest)

Note: Those exact function names above should be used. If those name are not used 10pts will be automatically deducted.

Also:

  • you should use the file parsetree.py for inspiration (located in MS Teams -> General -> Files -> Code); note: that file is for building entirely different types of parse trees so only parts of it will be relevant to this assignment
  • you will also want to download the files binarytree.py and stack.py, and import them from your *.py file (all three files will need to exist in the same directory/folder)
  • as with the last assignment, your *.py file will be run through a test script 

When you submit your assignment, it will be graded in large part based on whether it successfully runs when using different input strings. The tests will roughy look like the following:

pt = buildMPLogicParseTree('( ( T AND F ) OR M_0.3 )')
ans = evaluateMPLogicParseTree(pt)
exp = printMPLogicExpression(pt)
# pt, ans, and exp will all be checked to ensure they are correct

Again, several different input strings will be also be tested.

When an M_x or P_x is present then the test will confirm that your tree evaluates to the correct average.

For example, the above input string will evaluate to T roughly 30% of the time. 

What does maybe-probably logic look like again, exactly? 

The symbols of our maybe-probably Boolean logic are:

  • T – denotes True
  • F – denotes False
  • M_x is a maybe symboled that evaluates to true with probability x, 0.0 <= x <= 0.75 Ø
  • P_x is a probably symbol that evaluates to true w/ probability x, 0.75 <= x < 1.0 Ø
  • AND, OR – the two operators (note, these are binary operators)
  • (, ) – parentheses are to be used in the same way as with the parse tree.py example we saw in class

Some additional examples of statements in this language are:

  • ( T AND F ) a should evaluate to F for False
  • ( T OR F ) a should evaluate to T for False
  • ( M_0.7 ) a should evaluate to T for True 70% of the time
  • ( M_0.9 ) invalid since parameter x is greater than 0.75!!
  • ( ( P_0.8 AND T ) OR ( M_0.25 ) ) a should evaluate to true 85% of the time

As with other assignments, the final code should be your own work. However, discussing the general approach, or specific Python issues/functions, with others (e.g. on MSU Discord server), is acceptable, and encouraged! Of course, don’t hesitate to ask questions in MS Teams, by email, and in class. Again, note that the tree should include x, and that M_x or P_x terms should evaluate only inside of the evaluate function.

Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).

Please write 350 words essay with references.

With an idea as to how to conduct a digital investigative project  ; you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).