Analyzing and visualization data – Research paper

Research: Annotation and Color

Background: According to Kirk (2016), typography will have a significant role in your visualizations. You have to be careful with your text, but you must also be concerned with how the text looks. This then leads to color and functional harmony. You must provide the balance of colors in your visualizations (Kirk, 2016).  The harmony of colors you select during design will impact many aspects of the overall visualization.

Assignment: Write a research paper that contains the following:

  • Discuss Typography and the importance of appearance of text
  • Discuss the following color harmonies: (Usage, Pros, and Cons)
  • Complementary colors
  • Analogous colors
  • Triadic colors

Your research paper should be at least 2 pages (600 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

3 Assignments

Question 1:

Topic: Select a major organization that was located in the Hurricane Katrina disaster area.  Research their experiences and prepare a report detailing the unexpected challenges the organization encountered in returning their operations to normal. Give suggestions on what might be added to the organization’s contingency plan to mitigate those unexpected challenges.

Assignment should follow all APA rules and include a min. of (1) citation/reference.
2 Pages(excluding intro and references).

Question 2:

Scenario

Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.

After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:

“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”

Consider the following questions:

1. What does “malware free” mean?

2. How can a user demonstrate that their computer or device is malware free?

3. What are the steps necessary to establish a malware-free computer or device?

4. How should Always Fresh verify that a client computer or device is compliant?

Tasks

Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages(excluding references and intro)

Self-Assessment Checklist

§ I created a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.

§ I created a well-developed and formatted procedure guide with proper grammar, spelling, and punctuation.

I followed the submission guidelines 

Question 3:  

Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows authentication, networking, and data access are hardened. This will help to provide a high level of security.

The following are issues to be addressed through hardening techniques:

§ Previous attempts to protect user accounts have resulted in users writing long passwords down and placing them near their workstations. Users should not write down passwords or create passwords that attackers could easily guess, such as words founds in the dictionary.

§ Every user, regardless of role, must have at least one unique user account. A user who operates in multiple roles may have multiple unique user accounts. Users should use the account for its intended role only.

§ Anonymous users of the web server applications should only be able to access servers located in the demilitarized zone (DMZ). No anonymous web application users should be able to access any protected resources in the Always Fresh IT infrastructure.

§ To protect servers from attack, each server should authenticate connections based on the source computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each issue listed above. Provide rationale for each selection.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 pages (Excluding intro and References)

Self-Assessment Checklist

§ I addressed all issues required for the summary report.

§ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

§ I followed the submission guidelines.

analyze asymmetric and symmetric encryption

 You will need to analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

Please read the above description carefully. Thank you.

Access control discussion 10

What are authentication factors and what are the risks associated with them?

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

Louis Vuitton Malletier S.A. v. Haute Diggity Dog, LLC

In 2007, the high-end signature handbag and luggage maker, Louis Vuitton Malletier, lost an outrageous copyright infringement case against comedy fashion company Haute Diggity Dog.

  1. What was the principle issue in the legal dispute? This should surround the legal issue at the heart of the lawsuit and may include the essential facts of the matter.
  2. What was the rule or set of rules that the court analyzed to frame the legal dispute? Maybe they are federal laws or regulations, or it could be at the state level, or a combination.?
  3. How did the court apply the rules to the set of facts posed by each side? Here, we want your summary of the logic, the critical thinking, and the rationale that the court built its conclusion upon.
  4. What did the court conclude? Who won, who lost, what’s left unanswered for the next phase of litigation if there is one to follow?

· No Plagiarism 

· Should be 400 words without References.

· APA Format Required

  

References: 

https://www.casebriefs.com/blog/law/intellectual-property-law/intellectual-property-keyed-to-merges/trademark-law/louis-vuitton-malletier-s-a-v-haute-diggity-dog-llc/

Louis Vuitton’s Other Lawsuit Was a Winner, but Loses to a Parody Defense – Again.

https://www.law.berkeley.edu/files/louisvuitton.pdf

Python project

Objective: Web scraping with Python

Due: December 7 (11:59pm). 10 pts will be deduced for each late day (24hr). No submission will be accepted after Dec 10 (11:59pm). Total grade for the project is 100.

Grading Procedures: All submission will be checked with a plagiarism software. Submission having more than 70% similarity to any other student submission and/or internet resources will share total points the assignment. For example, 4 submissions having more than 70% similarity will be graded as 100/4 = 25pts, assuming that the program is worth of 100 pts.

Description: The university maintains course schedules at http://appsprod.tamuc.edu/Schedule/Schedule.aspx for different semesters (spring, fall, winter, etc ). You will develop a Python program to dynamically complete certain tasks, such as list, find, sort, and save, in course listings from schedule portal. You will mainly use “request” and “BeautifulSoup” libraries (or similar, see exercise 12.1). The program will operate at different level: Semester and Department.  Your program will be a menu based application. Assume that you project file is myproject.py. Once you run, it will show last 5 semester (fall, spring, summer only, (not winter, may mini))

> python myproject.py
Choose a semester: 1) Sprint 2021   2)Fall 2020  3)Summer II  4)Summer I 5)Spring 2020 
Selection: 2

Here, your program will parse the data from website and show only last (most recent) 5 semesters. User will make selection, then, you will show departments for the selected semester (Fall 2020). Note that selected semester is visible before a “>” sign.

Fall 2020> Select a department:
1) Undeclared
2) Accounting and Finance
3) Art
4) Ag Science & Natural Resources


30) Social Work
31) Theatre
Q)Go back

Selection: 3

Fall 2020> Art > Select an option:
1) List courses by instruction name
2) List courses by capacity
3) List courses by enrollment size
4) List courses by course prefix
5) Save courses in a csv file
6) Search course by instruction name
7) Search courses by course prefix
Q)Go back
Selection: ??

Here, your program will parse the data from website and show all available department then list of tasks. Q (go back) option will take user to previous level. 

Course listing output should show the following fields. For instance for course listing for “Fall 2020> Computer Science & Info Sys> List the course by prefix ” should show

PrefixIDSecNameInstructorHoursSeatsEnroll.COSC130101WIntro to CompuLee, Kwang33510COSC143601EIntro to Comp Sci & ProgBrown, Thomas44036COSC143601LIntro to Comp Sci & ProgBrown, Thomas4036COSC143601WIntro to Comp Sci & ProgHu, Kaoning44543COSC143602EIntro to Comp Sci & ProgHu, Kaoning43532

as first 5 rows.

You will follow above headers and order (prefix (col. width 6), ID (5), Sec (5) ,Name (25), Inst (20), Hours (5), Seats (5), Enroll. (7) ) for other listing selections too. Data cell should be aligned with column header and left justified. A course name should not have a word more than 5 chars. For instance Algorithms should be abbreviated as “Algor”. The length of course name will not exceed 25 chars. In option 5, the above format should be used to save a listing to a file as .csv format. User will be able to provide a filename for csv file.

For this program you need to develop at least one class (chapter 10) with (possible) many methods.

Data Security Principles

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Post between 100-300. Use your own words. Do not copy the work of another students.

Data Science

 Classification: Basic Concepts

Decision Tree Induction

Bayes Classification Methods

Rule-Based Classification   

Assignment 4

1- Consider the data in the following table: 

  

TID 

Home Owner

Marital Status

Annual Income

Defaulted   Borrower

 

1

Yes

Single

[120 – < 150K]

No

 

2

No

Married

[90 – < 120K]

No

 

3

No

Single

[60 – < 90K]

No

 

4

Yes

Married

[120 – < 150K]

No

 

5

No

Divorced

[90 – < 120K]

Yes

 

6

No

Married

[60 – < 90K]

No

 

7

Yes

Divorced

[120 – < 150K]

No

 

8

No

Single

[90 – < 120K]

Yes

 

9

No

Married

[60 – < 90K]

No

 

10

No

Single

[90 – < 120K]

Yes

Let Defaulted Borrower be the class label attribute. 

a) Given a data tuple X = (Home Owner= No, Marital Status= Married, Income= $120K). What would a naive Bayesian classification of the Defaulted Borrower for the tuple be?

2- Consider the training example in the following table for a binary classification problem.

  

Customer ID

Gender

Car Type

Shirt Size

Class

 

1

M

Family

S

C0

 

2

M

Sports

M

C0

 

3

M

Sports

M

C0

 

4

M

Sports

L

C0

 

5

M

Sports

XL

C0

 

6

M

Sports

XL

C0

 

7

F

Sports

S

C0

 

8

F

Sports

S

C0

 

9

F

Sports

M

C0

 

10

F

Luxury

L

C0

 

11

M

Family

L

C1

 

12

M

Family

XL

C1

 

13

M

Family

M

C1

 

14

M

Luxury

XL

C1

 

15

F

Luxury

S

C1

 

16

F

Luxury

S

C1

 

17

F

Luxury

M

C1

 

18

F

Luxury

M

C1

 

19

F

Luxury

M

C1

 

20

F

Luxury

L

C1

a) Find the gain for Gender, Car Type, and Shirt Size.

b) Which attribute will be selected as the splitting attribute? 

CLA2 – CLO 1, CLO 2, CLO 3, CLO 4, CLO 5

 Summary:

CLA2 – CLO 1, CLO 2, CLO 3, CLO 4, CLO 5

In a 4 – 6 page paper based on your internship course experience and the learning objectives achieved during the course, review your internship experience successes and challenges leading to growth. You should demonstrate in your paper a description of your professional portfolio and include any evidence of accomplishment and skill development or recognition that you have acquired this session and how it will contribute to your portfolio.

Provide at least two (2) peer-reviewed sources. If you have completed this CLA2 assignment in an internship course prior to this class, select new examples and sources to support your response. For questions, contact your instructor.