CSS 300 Module 5 Activity Worksheet

 CSS 300 Module 5 Activity Worksheet
Use this worksheet to complete your lab activity. Submit it to the applicable assignment
submission folder when complete.
Deliverable:
– A word document answering the following questions
Using the Weather.csv dataset from Module 4
Part 1: Metrics for Evaluation
1. Calculate the following metrics: mean absolute error, mean squared error, root mean
squared error, and the R2 score. Use the following code samples:
print(‘Mean Absolute Error:’, metrics.mean_absolute_error(y_test,
y_pred))  
print(‘Mean Squared Error:’, metrics.mean_squared_error(y_test,
y_pred))  
print(‘Root Mean Squared Error:’,
np.sqrt(metrics.mean_squared_error(y_test, y_pred)))
print(‘R-squared Score:’, regressor.score(X, y))
Part 2: Model Refinement
1. Rerun the linear regression model from Module 4, but change the percentage of records
that are used for testing. Try using 0.25 and 0.3.
2. Calculate the same metrics from above.
3. Use a scatter plot to visualize all three models.
4. Evaluate the three models. Are any of them underfit or overfit? Which % of testing data
performed best? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Risks of overly privileged users

Risks of overly privileged users. Discuss in 750 words or more the topic you have chosen for your final project. These topics should be focused and interesting not generic. Find something that intrigues you and that may help you in your current or future work and three quotes set off by quotation marks and in-line citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

week 7- info

 

Chapter 7 presents a comparative analysis of various tools useful in policymaking. Select two tools described in chapter 7 from different categories, and describe how these tools could be used to develop a policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a SmartCity environment.  

To complete this assignment, you must do the following:

A) Create a new thread. As indicated above, select two tools described in chapter 7 from different categories, and describe how these tools could be used to develop a policy for optimizing bus and local train schedules to minimize energy use and passenger wait times in a SmartCity environment. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Course Reflections

Reflect on the connection between knowledge or concepts from these courses(Listed Below) and how those have been, or could be, applied in the work place(My role: Software Engineer and Application Developer)

Courses:

Operational Excellence (ITS-631-01) – First Bi-Term

Enterprise Risk Management (ITS-835-21) – Full Term

Requirements:

250 words per course reflection

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

“The Reluctant General Counsel”

Your case study should be in your own words; quote very sparingly. Be concise. This should be a 5-7 page APA paper. 

  • SUMMARY: Summarize the case. Identify the main point (as in “What’s your point?”), thesis, or conclusion of this case. (5 points)
  • SUPPORT: Do significant research outside of the book and demonstrate that you have in a very obvious way. This refers to research beyond the article itself. This involves something about the company/organization/individual or other interesting related area. Show something you have discovered from your own research. Be sure this is obvious and adds value beyond what is contained in the case itself. (10 points)
  • EVALUATION: Apply the concepts from the appropriate chapter. Hint: The appropriate chapter is the same number as your case. Be sure to use specific terms and models directly from the textbook in analyzing this case and include the page in the citation. (15 points)
  • QUESTIONS: Address all the case questions. Be sure to answer each question fully. (15 points). PLEASE ONLY ANSWER QUESTIONS PRESENTED IN PART 1, FOR A TOTAL OF 11 QUESTIONS. 
  • SOURCES: Include citations on the slides and a reference slide with your sources. Use APA style citations and references. (5 points) 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Signature Assignment: Security Audit

 

You are part of a team selected by the Chief Information Officer (CIO) to perform a security audit for one of the companies explored in this course. 

  • Vampire Legends (Week 1)
  • Cruisin’ Fusion (Weeks 2- 3)
  • Devil’s Canyon (Weeks 4 – 5)

Create a 10- to 12-slide presentation (not including the title and reference slides) that shows the results of your security audit based on the following audit process:

  • Potential Risk to be Reviewed:Describe the risk.
  • Example: Viruses and malware can negatively impact the confidentiality, integrity, and availability of organizational data.
  • Regulation and Compliance Issues:Analyze how regulations and compliance issues could impact the organization.
  • Provide a detailed analysis of regulations and compliance issues, beyond the simple explanation in score point two.
  • Regulation and Compliance Resources and Tools: Analyze what resources and/or tools are available to address regulations and compliance issues.
  • Describe the control objective and the specific controls you will evaluate to determine potential risk is mitigated. Please note that typically, there will be more than one control that should be reviewed for a potential risk.
  • Example: Determine whether anti-virus software is in use.
  • Example: Determine whether virus signatures are periodically updated.
  • Example: Determine whether periodic virus scans are performed.
  • Provide a detailed analysis of the resources and/or tools available, beyond the simple explanation in score point two.
  • IT Security – Processes and Methods: Differentiate between the various processes and methods involved in management of IT security resources.
  • Review the various options available to address those processes and methods previously explained, and which ones might be feasible.
  • IT Security – Measures: Analyze the various security measures that could be taken within the organization.
  • Demonstrate a detailed understanding of what the alternatives are to approach security, how much security is needed, different methods to employ, etc.
  • Describe the criteria/measures that you will use to evaluate the adequacy of each area/review step that you review (i.e., what criteria will you use to perform your evaluation/how will you determine that the risk has been mitigated to an acceptable level).
  • Example: 100% of servers and PCs have virus software installed.
  • Example: 100% of the virus software installed is set to automatically update, including virus signatures.
  • Example: 100% of the virus software installed is set to automatically perform a scan at least weekly.

Include a 1/2- to 1-page executive summary to support your presentation. Include appropriate references.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database Security – Introductions and the CIA Triad

 

Write at least 600 words analyzing a subject you find in this attached document related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Pyhton Programming

 

remise:

Adam is so good at playing arcade games that he will win at every game he plays. One fine day as he was walking on the street, he discovers an arcade store that pays real cash for every game that the player wins – however, the store will only pay out once per game. The store has some games for which they will pay winners, and each game has its own completion time and payout rate. Thrilled at the prospect of earning money for his talent, Adam walked into the store only to realize that the store closes in 2 hours (exactly 120 minutes). Knowing that he cannot play all the games in that time, he decides to pick the games that maximize his earnings 

Sample game board at the arcadeGAMECOMPLETION_TIME
(in minutes)PAYOUT_RATEPac-man90400Mortal Kombat1030Super Tetris25100Pump it Up1040Street Fighter II90450Speed Racer1040

An acceptable solution is the one where it still picks the best earnings even when the list of games or completion times or payout rates change. 

Question:
Write code in Java/Scala/Python to help Adam pick the sequence(s) of games that earn him the most money?.

Then, assume you have a variable list of games and their payout rates. What is the best way to pick the games that earn you the most?

Input Explanation

The first line of input is always an integer denoting many lines to read after the first line. In our sample test case, we have 6 in the first line and 6 lines after the first line, each having a game, completion_time and payout_rate. 

In each data line, the game, completion_time and payout_rate are separated by a ‘,'(comma).

The games board may change but the store still closes in 120 minutes. 

Input

6
Pac-man,80,400
Mortal Kombat,10,30
Super Tetris,25,100
Pump it Up,10,40
Street Fighter II,90,450
Speed Racer,10,40

Output Explanation

Print the game names that earn him the most into the standard output in alphabetical order

Output

Mortal Kombat
Pump it Up
Speed Racer
Street Fighter II

Python:

import sys

line = sys.stdin.readline()

print(line)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

OE- paper 1

 

Text book References:

-Bourgeois, D., Smith, J., Wang, S., Mortati, J. (2019). Information Systems for Business and Beyond. https://opentextbook.site/informationsystems2019/

-Langer, A.M. (2018). Information Technology and Organizational Learning. 3rd edition. Taylor & Francis Group, LLC. ISBN: 978-1-138-23858-9.

Readings required 1 to chapter 5

Questions :

  

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2010 to present day.

Review the rubric that will be used to evaluate this paper. All work must be completed individually.

1. Explain the Internet of Things. Use at least three unique references. Length: 4-5 paragraphs. 

2. Identify three security risks of open source software. Use at least three unique references. Length: 4-5 paragraphs.

3. What are the advantages of using a data warehouse? Use at least three unique references. Length: 4-5 paragraphs. 

4. Explain VoIP.  Use at least three unique references. Length: 4-5 paragraphs. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Social Marketing Process

 

Instructions

Visit two e-commerce websites of your choice, and apply the social marketing process model (outlined on pp. 431–432) to both. Critically compare and contrast the effectiveness of these sites in terms of the dimensions of the social marketing process. Address the questions below in your paper.

  1. How well do these sites acquire fans, generate engagement, amplify responses, create a community, and strengthen their brands?
  2. What recommendations can you make for these sites to improve their effectiveness at a global and local level?

Your paper must be at least three pages in length; the title and reference pages do not count toward meeting the minimum length requirement. Make sure your essay follows APA format. You must use a minimum of two external sources, which can include the two websites that you choose to review. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now