Analyzing and visualizing data

Kirk (2016) states composition is reviewing every visual property of the design.  The final layer of design thinking concerned composition: how to position, arrange and size all the chart elements, interactive controls and annotated components across the entire project and the construction decisions within each chart. Meeting the optimum readability and meeting the intent of the project is the objective. Dividing composition into project-level and chart-level composition options can help review and address areas of opportunities.

Pretend you are now the designer developing new composition choices in the face of having to accommodate new contextual factors listed below.  Provide two project-level and two chart-level composition options to address each of the three listed below and provide the reasoning for each option.

1.           You had to demonstrate the worst possible data visualization composition practices (in the same space)

2.           You had to force yourself to use as small a space as reasonably possible

3.           You have to transpose the work from landscape > portrait or vice-versa

4.           The initial data provided includes scales that will not fit onto one page, but a refresh of the data is indicating a change is needed

5.           The trustworthiness of the entire project is being questioned by upper management

Your research paper should be at least 3 pages (800 words), double-spaced, have at least 4 APA references, and typed in an easy-to-read font in MS Word (other word processors are fine to use but save it in MS Word format). Your cover page should contain the following: Title, Student’s name, University’s name, Course name, Course number, Professor’s name, and Date.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Case 2 The Movie Theater Releases

 

Have to answer the questions using the excel data file.

I’m attaching excel data file(Data – Case – Week – 1

====Question

  

The movie industry is a competitive business. More than 50 studios produce hundreds of new movies for theater release each year, and the financial success of each movie varies considerably. The opening weekend gross sales ($ millions), the total gross sales ($ millions), the number of theaters the movie was shown in, and the number of weeks the movie was in release are common variables used to measure the success of a movie. Data on the top 100 grossing movies released in 2016 (Box Office Mojo website) are contained in the file Movies2016. Use data as posted.

Managerial Report

Use the numerical methods of descriptive statistics to learn how these variables contribute to the success of a movie. Include the following in your report:

1. Descriptive statistics for each of the four variables along with a discussion of what the descriptive statistics tell us about the movie industry.

2. What movies, if any, should be considered high-performance outliers? Explain.

3. Descriptive statistics showing the relationship between total gross sales and each of the other variables.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CMGT 582 wk2 Cruisin’ fusion, Part 1

 

Part A: Ch. 6 Role Playing Sim: Cruisin’ Fusion

In this simulation, you will understand how to develop a website for a chain of concession stands you inherited from Uncle Al. You’re not sure what to do with the concession truck, but a couple of your friends think Al was onto something with his unusual taco food truck. They want to partner with you to expand, targeting sports events, outdoor concerts, political rallies, holiday marches, and other events where customers might pay a little more for a very distinctive and healthier meal. With the right marketing, this could be a promising business venture.

Using the Cruisin’ Fusion Simulation Access link, complete the interactive before moving to Part B.

Part B: Cruisin’ Fusion Contest

Now that the Cruisin’ Fusion website is up-and-running, you and your team have decided to run a contest on the blog asking customers to name the latest fusion recipe. In order to participate, the customer will need to enter first and last name, phone number, and an email address, as well as the suggested fusion name. The winner of the contest will receive a $20 gift card.

Kiran supports this idea but has concerns she wants the team to consider before moving forward. She has asked that you prepare a 6- to 10-slide presentation with speaker notes for the next web meeting to address the following:

  • Research and assess the ethical issues related to data customer collection and information management. How will customer information be protected?
  • Research and examine the need to protect the intellectual property of the customers who submit name suggestions. What protection will Cruisin’ Fusion need in order to use the name suggested by the winner? What protection or disclaimer does the customer require?
  • Include a 1/2-page disclaimer to add to the blog for customers outlining the contest rules, explaining how their personal information will be used and stored, and discussing the use of all intellectual property submitted as part of the contest.
  • Simulation link:  https://www.mathxl.com/Student/OverviewHomework.aspx?homeworkId=561186935 

Submit your assignment.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Effect of Sarbanes-Oxley to the Organizations.

create a 3-4 page paper that discusses how Sarbanes-Oxley affects those organizations with a cloud presence and what areas they need to be cognizant of to ensure compliance with the law.

Assignments should be clear and detailed with a minimum of 500 words, sources must be cited in APA format and must have clear organization and flow.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database auditing and monitoring fit within a SOX compliance framework.

 

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

Write in essay format not in outline, bulleted, numbered or other list formats.  

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

forensics

 Task 03

You have been assigned a digital forensics case to investigate involving a potential monetary fraud in an organisation. The CTO of the organisation has given you access to the workstation and other necessary hardware, e.g. USB, of one of his employees who she thinks is potentially involved in this fraud. Your job as a digital forensics examiner is to conduct this investigation. You are required to create a (investigation) plan and describe the standard practice procedure that is used in such investigations. Your plan must include the procedures for collecting the digital data, securing the evidence that you may collect and then describing the method to validate the collected data, e.g. calculating hash values and specifying the hash algorithm that you intend to use, e.g. SHA-3, MD5 etc. You can make some reasonable assumptions if required when describing your plan / procedures.

Deliverable: Write a 500-1000 word report that outlines the investigation plan, procedures to secure the digital evidence, and data validation methods.

Marking criteria:

 Standard practice for potential fraud case(s) investigation, detailed investigation plan, securing digital evidence and data validation methods. Excellent explanation, justification with examples of MS Word and Excel hashes snapshots provided, explained and references are provided. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

traditional software processing models used by developers to create a successful system

 This discussion forum focuses on traditional software processing models used by developers to create a successful system. Discuss at least three of the models. Identify each of their respective advantages and disadvantages. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

wireshark

You always want to make sure that when you go to a website where you purchase something and checkout, or you put some personal data into the web browser, that the website is secure. Meaning that it is encrypting the data you are putting in. What is actually being encrypted?

In this lab you will observe the traffic on your computer using Wireshark. Answer the questions below as you progress through the procedure.  Your computer should be connected to the Internet.

Ÿ 1. Open Wireshark and start a capture on the network card you are using. Go to Google.com in your web browser. Is this an HTTP or HTTPS connection? ____________________________________

Ÿ 2. Observe the traffic you see when going to google.com. What TCP port is being used by google for this connection? ___________________

Ÿ 3. When you determine the port number, put in the following filter in Wireshark: tcp.port==<port number>. This will only see the HTTPS connection in Wireshark and filter everything else out.

Ÿ 4. What protocol is the connection using when you go to google? ______________________

Ÿ 5. Look for the words “Application Data” under the Info column. Double-click this packet to open up the details for this packet.

Ÿ 6. There will be a layer that says Transport Layer Security. Open up the line by clicking the arrow next to the line. Are you able to read the data that is being carried within this packet? ________ Why? _________________________________________

Ÿ 7. Restart your Wireshark trace. Go to www.stealmylogin.com. 

Ÿ 8. You should now see packets being displayed on the Wireshark window. Stop the trace

Ÿ 9. Open the first HTTP packet that represents the GET message under the info column by double clicking on it. How many lines are displayed at the top of the page? ____________

Ÿ 10. Expand all of the header lines to display the packet details by clicking on the arrows next to them. From the trace, answer the following questions:

What is the destination port number? __________

Do you see www.stealmylogin.com anywhere? __________ If so which layer is it? _______________

Explain the differences you saw between the two websites you observed in Wireshark. What were the differences you noticed when you did the trace? You should write about 250 words or more to get full credit for this lab.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Java programming assignment

marking guide.

Purpose of the system

Not attempted
0pointsHas little explanation of classes and system
1pointsExplanation has information about all the classes and their relatio ship. Has explanation about what system can accomplish after implementation
2points

Class Diagram 

Not attempted
0pointsClasses are designed but there is no relationship between them
2pointsClasses and relationships are created but have minor issues
3pointsClasses and relationshisps are perfectly done
4points

Person Class

Not attempted
0pointsMajor issues or misisng more than one from constructor, getter, setter and toString()
2.5pointsAny one of constructor, getter, setter, toString() is missing or have some issues or incorrect
4pointsHave appropriate constructors, getter, setter and toString() method
5points

Customer Class

Not attempted
0pointsMajor issues or misisng more than one from constructor, getter, setter and overridden toString()
2.5pointsAny one of constructor, getter, setter, overrideen toString() is missing or have some issues or incorrect
4pointsHave appropriate constructors, getter, setter (overridden SetDiscount() as per requirement) and overridden toString() method
5points

Employee Class

Not attempted
0pointsMajor issues or misisng more than one from constructor, getter, setter and overridden toString()
2.5pointsAny one of constructor, getter, setter, overridden toString() is missing or have some issues or incorrect
4pointsHave appropriate constructors, getter, setter (overridden SetDiscount() as per requirement) and overridden toString() method
5points

Supplier

Not attempted
0pointsMajor issues or misisng more than one from constructor, getter, setter and overridden toString()
2.5pointsAny one of constructor, getter, setter, overridden toString() is missing or have some issues or incorrect
4pointsHave appropriate constructors, getter, setter (overridden SetDiscount() as per requirement) and overridden toString() method
5points

LollyShopDriver

Not attempted
0pointsMore than 3 objects are missing and output is not properly displayed
1.5pointsMissing more than one object or objects are not created as per requirements or output is not displayed in given format
2.5pointsCreation of two objects of Employee, Customer and Suppleir classes as per requirements and Display the details and discount in format specified
4points

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

R peogramming question with paper

 

Topic: Problem: 

Question 1: 

Question 2: 

The Center for Disease Control and Prevention (CDC) uses the social vulnerability index (SVI) to evaluate the impact of disasters on communities, weighting the damage with social factors in the states of South Dakota and Indiana (CDC, 2018a; CDC 2018b).
Each community requires independent evaluation to identify the vulnerability of the area. Two of the contributing factors for this analysis are minority status and language limitations. The data may lack credibility due to the fear of reprisal for persons that fall into these categories. Exploring the social and physical characteristics, excluding these metrics can provide insight on the overall impact on the SVI. 

What impact does the exclusion of the metrics that represent minorities and language limited individuals have on the predictability of the CDC’s SVI, based on the 2018 data (CDC, 2018a; CDC, 2018b)?
Does the CDC’s SVI have key characteristics that impact the preclude potential exclusion without limiting the overall predictability of the SVI, based on the 2018 data (CDC, 2018a; CDC, 2018b)? 

 

Data: 

• 

• 

The data and data dictionaries are online.
o Center for Disease Control and Prevention. (2018a). Social Vulnerability Index [data set]. 

https://svi.cdc.gov/Documents/Data/2018_SVI_Data/CSV/SVI2018_US.csv 

o Center for Disease Control and Prevention. (2018b). Social Vulnerability Index [code book]. https://svi.cdc.gov/Documents/Data/2018_SVI_Data/SVI2018Documentation.pdf 

o Note: Your raw data must be this report in its original form. Use the data dictionary to understand the data. 

Create a subset of the data. Consider the metrics that are used in creating the SVI. Use the data dictionary to identify the state variable field, along with the appropriate fields that represent the SVI metrics, considering the research questions. The SVI index’s variable name is RPL_THEMES, in column 99. 

 

4/24/20 

Assignment 1 SD IN.docx 

P a g e |

 

o o 

Socioeconomic
▪ Persons below the poverty estimate ▪ Civilian unemployed estimate
▪ Per capita income estimate
▪ Persons with no high school diploma 

Household and composition disability features
▪ Ages 65 and older
▪ Ages 17 and under
▪ Persons with a disability, over the age of 5 ▪ Single-parent households 

Minority status and language limitations
▪ Persons with minority status
▪ Persons with no or minimal use of the English language 

Housingtypesandtransportation
▪ Multi-unit dwellings (10 or more units) 

  

▪ Mobile homes
▪ Homes with more residents than a home is designed for ▪ Homes with no vehicle
▪ Group quarters or institutionalized quarters 

Note: Do not use the columns that are follow-on calculations of these columns. Variable names preceded with “E_” are actual measures, while “M_” represents the margin of error estimates. Do not include the margin of error estimates at this time. Considering the research questions, after subsetting and excluding the variable that houses the STATE field, there will be 13 columns with relevant information for analysis. The state field can be utilized in data exploration. 

Data Cleaning: 

  • Only clean the elements of the data that are inaccurately represented, such as missing values and data types.
     
  • Do not remove missing values during cleaning. If missing values need to be removed for analysis method, do it during the preparation for analysis.
     
  • When changing data values or types, ensure that you validate that the change occurred and the change is what was expected.
    Analyze:
     
  • Conduct two types of analysis: exploratory data analysis and a random forest model. You will move through the sub-stages of Analyze two times; profile, prepare, and apply is required for each method of analysis in your program. It is consolidated in your research paper. Make sure that your analyses align with the research questions.**
     
  • During exploratory data analysis, exclude visualizations in your final program or research paper that do not serve a purpose toward the objective of the research or represent meaningful information. Just remember, the relationships that do not exist in the data are sometimes as significant as the relationships that do exist.
     
  • Profile
     

o Define your plan for all analyses.
o Yourplanfortherandomforestmodelwillincludesplittingthedataafterseedingitsothat 

training and testing evaluations can be conducted; additionally, you will exclude missing values 

from the model. • Prepare 

o Carry out actions on the data that are necessary to prepare the data for the analyses. • Apply (or Analyze) 

o When carrying out the random forest modeling, it may be imperative to understand how much time your analyses may take. 

o Ensure that you analyze the results and understand what the different outcomes of the model represent. Provide interpretations of the overall model that is trained, how the trained model performs with the test data, and what features are most important for the explained variance. 

Results, Impact of the Results: 

  • Ensure that all analyses, visual or otherwise included in the final version of the program, include interpretations of what these analyses indicate.
     
  • Make sure that you do not speculate! Use evidence to support any assertions that you make. Future Recommendations:
    • You must also include recommendations for future analysis. An example might look something like this: o An opportunity for further research, based on gaps found in the random forest modeling, is to
    look at the ability to tune the parameters further, to improve the outcome.
     

 

4/24/20 Assignment 1 SD IN.docx P a g e |

  

o Additionally,anopportunityforfutureresearchisexplorationmodelingtodeterminewhatother variables, when eliminated, have little or no impact on the ability to predict the SVI based on the supporting characteristics in the data. 

• You will base your recommendations on your findings in the analysis you conduct. 

Bonus challenge:
Create a random forest model for each state you were assigned. Is there a difference in the models’ results? What does that result mean in terms of the data? Make sure that you do not speculate! Use evidence to support any assertions that you make. 

Required files to submit: 

  1. 1)  Research paper in APA 7 format; MS Word document file type
     
  2. 2)  R Script; final version
     

Good to know: 

  • When submitting in Blackboard, you may receive an error, because the R file type is not recognized.
    That is okay. It is only indicating that SafeAssign cannot evaluate that part of your submission.
    o The research paper will be written in a professional writing style, following APA 7 student paper
    format; you can use the student paper template.
    o The document shall be 3-5 pages or at least 800 words. The page count does include the cover
    page or reference page.
    o Ensure that every reference in your reference list is also cited in the text. Do not forget to cite
    and reference the source of the data.
     
  • When developing your research paper, you may modify the topic, problem, and research questions.
    However, the minimum requirements for the method of analysis cannot be altered.
     
  • Ensure that you make the research yours and complete this assignment independently.
     
  • There are several different versions of this assignment. If you complete a version of this assignment
    that is not available to you in Blackboard, you will violate your pledge.
     
  • If you are concerned about how long the model is taking to run, you have a few options.
    o WiththelibraryGuessCompx,youcanusethefunctionCompEst()toevaluatethecomplexity and time it will take to process the function. Some things have to be done to the setup to use this methodology, though.
    ▪ Example:
    If the original model is called
    model <- train(outcome~.,data=d,subset=trainer,importance=T,method=”rf”)
    You would rewrite this as
    f <- function(d) train(outcome~.,data=d,subset=trainer,importance=F,method=”rf”) CompEst(d=d,f=f,random.sample=F)
    o WiththelibrarydoParallel,youcanusethefunctionsmakePSOCKcluster()and registerDoParallel() you can run models in parallel, to improve performance.
    ▪ Prior to processing the model, use the following as an example, use help or Google to learn more. This will maximize the processor power.
    cl <- makePSOCKcluster(4) # the value is the number of processor cores in your device registerDoParallel(cl)
    model <- train(outcome~.,data=d,subset=trainer,importance=T,method=”rf”,allowParallel=T)
    stopImplicitCluster() registerDoSEQ()
     

 

4/24/20 Assignment 1 SD IN.docx P a g e |

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now