Dissertation

Below qustions need to be covered in the assigment:

1)What is the goal of your research? / What are your research goals?  

2)Do you feel you will be able to gather the data for this research? If so, where? Though we are not to that point in your research it is important that you are considering this.

3)What question are you asking in your research? 

4)What research question are you trying to answer with this research?

5)Your dissertation MUST relate to your work. Does this dissertation relate to your work? (FYI, currently I work for a Telecom  project as a software engineer)

SQL

 

Exercise 1: Histogram

Exercise 1 in the text: You may use any spreadsheet program. Submit a Word document with a screenshot from your computer showing the histogram. Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 

 

Execise 2: Calculating Quartiles

Exercise 2 from the text: Use any spreadsheet program. Submit a Word document showing a screen shot from your computer with the quartiles underlined or highlighted.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.

 

Exercise 3: Central Tendency

Exercise 3: Use any spreadsheet program. Submit a Word document with a screen shot from your computer showing the highlighted median.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 

 

Exercise 4: Dispersion

Exercise 4: Use any spreadsheet program. Using the data provided in the text, submit a Word document with a screen shot from your computer highlighting the range, standard deviation, IQR, and outliers of Add-on Sales.  Comment your images so the viewer knows what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results

 

Exercise 5: Pearson Correlation

Exercise 5: Use any spreadsheet program. Using the data provided in the text, create a scatter plot and calculate the Pearson Correlation Coefficient. Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 

 

Activity 2: Exploring Sales Data

There is no activity 1.

Activity 2: Use the attached dealerships.csv file and any spreadsheet program. Submit a Word document with a screen shot from your computer of your solutions to questions 2 – 7 in the text. Highlight your results.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results

IT Software for Business

1st question

Contextual Information:

· There are two wide used methodologies to manage a software development life cycle: Agile and Scrum. Create a Word Document briefly describing their differences. (word count 500 words).

2nd question

The table below shows the historical data of the Average Closing Price (2005-2020.) Estimate the annual variation of crude oil prices (in %). Use the equation be-low. Draw a line chart showing the evolution of the annual variation and add a trend line and describe its type (positive, negative, neutral). There are 2 historical minimum values reached in 2008 and 2020; relate those minimum values to socio-economic events and include them as labels in the chart. Also read: Software Engineering Methodologies

image1.jpg

  

Year

Average

  

Closing

  

Price

 

2020

38.78

 

2019

56.99

 

2018

65.23

 

2017

50.80

 

2016

43.29

 

2015

48.66

 

2014

93.17

 

2013

97.98

 

2012

94.05

 

2011

94.88

 

2010

79.48

 

2009

61.95

 

2008

99.67

 

2007

72.34

 

2006

66.05

 

2005

56.64

    

· You should submit the spreadsheet used to estimate the annual Change (%)

3rd question

Calculate the annual payment for a loan with an annual constant interest rate of 2%, 35-year duration, a present value of €145,000 and a future value of 0. You should submit the spreadsheet used to estimate the annual payment.

social engineering

Conduct your own social engineering experiments.

1) While at a restaurant, convenience store, bank, place of business, or any shopping location, ask you waiter or waitress, bartender, server, sales clerk, or cashier personal questions about their family or their interests.How much information are you able to obtain about this person you do not know?

Name, address, age, religion, political beliefs, place of birth, pets, hobbies, number of children, type of car they drive, or any other information you think you can obtain.

Write your findings in either a list or in paragraph form.

Security Risk Assessment

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format double space and have to include at least two references and 400 words. 

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier?

A6

Attached is the document contains the question. Include at least 4 APA formatted references (and APA in-text citations). The assignment is 4 pages in length. Go through the word document for further details.

Discussion Emerging threats

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources Use proper citations and references in your post.

Ethical Hacking_Week15

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.