Hello, Can anyone please help me with the solutions to the set of questions. I want it digitally created with turnitin report. Even the diagrams should be created digitally.
Dissertation
Below qustions need to be covered in the assigment:
1)What is the goal of your research? / What are your research goals?
2)Do you feel you will be able to gather the data for this research? If so, where? Though we are not to that point in your research it is important that you are considering this.
3)What question are you asking in your research?
4)What research question are you trying to answer with this research?
5)Your dissertation MUST relate to your work. Does this dissertation relate to your work? (FYI, currently I work for a Telecom project as a software engineer)
600 words: Watch the following video, and Provide a critique. Also, think of other possible scenarios where mobile technology can be used to address humanitarian efforts.
Watch the following video, and Provide a critique. Also, think of other possible scenarios where mobile technology can be used to address humanitarian efforts.
https://youtu.be/L9_c1j9VRwE
SQL
Exercise 1: Histogram
Exercise 1 in the text: You may use any spreadsheet program. Submit a Word document with a screenshot from your computer showing the histogram. Comment your images with a sentence or so of description in your own words of what you are doing. Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.
Execise 2: Calculating Quartiles
Exercise 2 from the text: Use any spreadsheet program. Submit a Word document showing a screen shot from your computer with the quartiles underlined or highlighted. Comment your images with a sentence or so of description in your own words of what you are doing. Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.
Exercise 3: Central Tendency
Exercise 3: Use any spreadsheet program. Submit a Word document with a screen shot from your computer showing the highlighted median. Comment your images with a sentence or so of description in your own words of what you are doing. Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.
Exercise 4: Dispersion
Exercise 4: Use any spreadsheet program. Using the data provided in the text, submit a Word document with a screen shot from your computer highlighting the range, standard deviation, IQR, and outliers of Add-on Sales. Comment your images so the viewer knows what you are doing. Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results
Exercise 5: Pearson Correlation
Exercise 5: Use any spreadsheet program. Using the data provided in the text, create a scatter plot and calculate the Pearson Correlation Coefficient. Comment your images with a sentence or so of description in your own words of what you are doing. Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.
Activity 2: Exploring Sales Data
There is no activity 1.
Activity 2: Use the attached dealerships.csv file and any spreadsheet program. Submit a Word document with a screen shot from your computer of your solutions to questions 2 – 7 in the text. Highlight your results. Comment your images with a sentence or so of description in your own words of what you are doing. Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results
IT Software for Business
1st question
Contextual Information:
· There are two wide used methodologies to manage a software development life cycle: Agile and Scrum. Create a Word Document briefly describing their differences. (word count 500 words).
2nd question
The table below shows the historical data of the Average Closing Price (2005-2020.) Estimate the annual variation of crude oil prices (in %). Use the equation be-low. Draw a line chart showing the evolution of the annual variation and add a trend line and describe its type (positive, negative, neutral). There are 2 historical minimum values reached in 2008 and 2020; relate those minimum values to socio-economic events and include them as labels in the chart. Also read: Software Engineering Methodologies
Year
Average
Closing
Price
2020
38.78
2019
56.99
2018
65.23
2017
50.80
2016
43.29
2015
48.66
2014
93.17
2013
97.98
2012
94.05
2011
94.88
2010
79.48
2009
61.95
2008
99.67
2007
72.34
2006
66.05
2005
56.64
· You should submit the spreadsheet used to estimate the annual Change (%)
3rd question
Calculate the annual payment for a loan with an annual constant interest rate of 2%, 35-year duration, a present value of €145,000 and a future value of 0. You should submit the spreadsheet used to estimate the annual payment.
social engineering
Conduct your own social engineering experiments.
1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?
Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.
Write your findings in either a list or in paragraph form.
Security Risk Assessment
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format double space and have to include at least two references and 400 words.
- When should the architect begin the analysis?
- What are the activities the architect must execute?
- What is the set of knowledge domains applied to the analysis?
- What are the tips and tricks that make security architecture risk assessment easier?
A6
Attached is the document contains the question. Include at least 4 APA formatted references (and APA in-text citations). The assignment is 4 pages in length. Go through the word document for further details.
Discussion Emerging threats
There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Make an argument concerning the topic.
At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources Use proper citations and references in your post.
Ethical Hacking_Week15
Securing IoT Devices: What are the Challenges?
Security practitioners suggest that key IoT security steps include:
1) Make people aware that there is a threat to security;
2) Design a technical solution to reduce security vulnerabilities;
3) Align the legal and regulatory frameworks; and
4) Develop a workforce with the skills to handle IoT security.
Final Assignment – Project Plan (Deliverables):
Address each of the FOUR IoT security steps listed above in terms of IoT devices.
Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.