Look at the file for complete instructions. You are basically making 3 java programs to get an intended outcome. Each program has instructions.
Data visualization
Data: Basic Data Analysis in RStudio
Background: This course is all about data visualization. However, we must first have some understanding about the dataset that we are using to create the visualizations. A resource is provided to you to learn the simple commands in RStudio. You are also expected to locate appropriate available resources to learn the functionalities of RStudio.
Assignment:
- Use RStudio to generate a word document with basic data analysis of the following dataset: dataset_price_personal_computers.csv
- Use the following video from Dr. Francis to learn the simple commands to conduct basic data analysis with RStudio: Basic Data Analysis in RStudio.mp4
- Questions/Requests:
- Create a summary of stats for the dataset. (provide a screen shot)
- Create a correlation of stats for the dataset. (provide a screen shot) (Hint: Transform may be needed)
- What is the Min, Max, Median, and Mean of the Price? (provide a screen shot)
- What is the correlation values between Price, Ram, and Ads? (provide a screen shot)
- Create a subset of the dataset with only Price, CD, and Premium. (provide a screen shot)
- Create a subset of the dataset with only Price, HD, and Ram where Price is greater than or equal to $1750. (provide a screen shot)
- What percentage of Premium computers were sold? (provide a screen shot)(Hint: Categorical analysis)
- How many Premium computers with CDs were sold? (provide a screen shot)(Hint: Contingency table analysis)
- How many Premium computers with CDs priced over $2000 were sold? (provide a screen shot)(Hint: Conditional table analysis)
Your document should be an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.
Submit your assignment on or before the due date.
final project objective alignment
attached –
Because this project is a demonstration of the skills that you have learned throughout your time here at Herzing University, your project should have addressed each of the program outcomes. Describe, in detail, how your completed project meets each of these specific course outcomes. Each objective should be addressed in one or two complete paragraphs.
1. Apply industry standards to the implementation and support of network systems and computer devices.
2. Demonstrate the principles of information technology security.
3. Express relevant information to technical and nontechnical audiences
4. Design secure network infrastructures for physical and virtual environments
5. Create information technology solutions based on business needs or requirements.
Test and Validation Scheme
Cybersecurity is a daily process. As an organization continues to evolve, making sure the security is continuously protected effectively against the latest threats is important.
Create a matrix of requirements with pass/fail criteria based on the organizations framework controls. Make sure to include:
Refer to “Cybersecurity Test and Validation Scheme Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion and please use your previous work to build off of for the following.
- Five technical controls specified within your guiding framework. If your guiding framework does not have technical controls enumerated, use NIST Special publication 800-53 and select technical controls appropriate for your organization.
- Using your design/architecture, create test cases for each of the five technical controls that are appropriate for your design.
cc
Write at least 500 words analyzing a subject you find in this article. Why is the future of computing in the cloud? Consider the concept of fractional ownership.
Please use the article mentioned: https://blog.turbonomic.com/blog/on-technology/cloud-elasticity-vs-cloud-scalability
Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format.
Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.
Network Security
Research Paper Assignment:
Research paper topic – Network Security
Research papers must demonstrate graduate-level work, including writing ability. The test of a good paper is, “Are its conclusions compelling as judged by their significance and supporting arguments?”
Basic indicators of competency include:
Understanding the full range of basic concepts covered in the course and how they apply to specific situations responding to the essential points of all course assignments presenting clear, reasoned, and well-organized responses using correct grammar, spelling, and so on for all written assignments, and especially for out-of-class writing as relevant, making professional-quality oral presentations, using graphics effectively, and making substantial use of databases, or other presentation materials meeting deadlines for assignments following the style set forth in the Publications Manual of the American Psychological Association. You could lose up to 2 letter grades for non-APA compliant formats.
The grade of “A” is given only when a substantial original contribution to the subject matter is demonstrated. Only students who fully meet this standard and demonstrate exceptional comprehension and application of the course subject matter merit an “A.” Students who earn an “A” clearly have mastered and are fluent in the subject matter. Indicators of exceptional performance include:
• Analysis that follows a cogent line of reasoning
• Analysis that evaluates alternative solutions or reasoning
• Consistently apply application of concepts and reasoning to data and situations;
• Analysis that recognizes connections across a range of concepts that draws appropriate implications and conclusions, and exhibits novelty and creativity of ideas or represents conceptual advances on what is taught.
Type of Paper: The paper should examine a topical area relating to some area of Telecommunication/Internet. Purely technical papers are unacceptable and will be downgraded accordingly. The paper should address technical, economic, regulatory, policy and operational use of the Internet/Telecommunication topic that you are researching.
1. At a minimum the paper should include one case study / practical example and more of these are helpful.
2. The paper must state a thesis and, based on the research, undertake to prove or disprove that thesis.
3. The paper should review the recent literature (e.g., the last five years), distill the fundamental issues, discuss various solutions to the issues raised, identify trends, and formulate the student’s own position. An adequate literature search is based primarily on academic journals (e.g., Federal Communications Law Journal, IEEE Journals), secondarily on professional journals (e.g., Journal of Systems Management), and lastly on books and textbooks and online sources.
4. At least eight (8) or more recent references (2009 or later, no exception) should be cited. In-text citations (APA Style) are also required for any referenced material.
Length and Style. The paper should have a body of 16 to 24 pages. Cover pages, table –of -contents, abstract/executive summary, charts, graphics, tables, appendices and references do not count toward length minimum. The paper must be prepared in accordance with Appendix A of APA 6th edition. ISBN 9781433805615 2nd edition.
The paper must include an abstract or an executive summary, which will be posted for all students to read.
Looking for help on writing assignment
Create a Gmail account to be used for encryption. Download and configure Thunderbird, GnuPG, and Enigmail to work with your new Gmail account. Document your findings and observations in a 1200-1500 words with references and following APA writing standards.
Telecommunications
This is a two-part assignment.
Case Assignment (part A )
Identify a network in which you are familiar. What topology is used? What, if any, penetration testing is done? What is considered best practice? In this paper, you should compare best practice of testing and topologies to the network you have identified and contrast the two. Your paper should be two pages in length with at least one reference in APA format (and accompanying citation) to back up your opinion. Remember do not just submit opinion – reference academic peer reviewed work.
Part B
This assignment is a written assignment where students will demonstrate how Telecommunications research has connected and put into practice within their own career.
Assignment:
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of Telecommunications have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
Provide a 500 word (or 2 pages double spaced) minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
qualitative v quantitative risk assessment.
Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.
Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Stand-alone quotes will not count toward the 3 required quotes. Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format, not in bulleted, numbered, or other list formats.
Do not use attachments as a submission.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding the length of your post, and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proofread your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Organization
select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.
• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
Requirements:
The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.