vpython programming

I have the code already developed. Can anyone add the code for taking inputs from user 

for any values in the code . 

Also, Can you please describe about the code written in details (You can add comments )

This is using vpython and numpy only.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Descriptive Statistics

 

Instructions

You are to design an app for diversity awareness.

In order to analyze what to put in it, as well as to launch a marketing/sales plan you got a hold of a data set that indicates racial composition and diversity index for all counties in the US and their states. The dataset you need to work with it for this homework is attached (csv file).

  1.  Obtain the descriptive statistics (quartiles) and the average diversity index for CA and for IL.
  2. Also, obtain the descriptive statistics (quartiles) and mean of the Mixed Race population in NY and CA
  3. Using a histogram, show the distribution of diversity index in IL and in CA (Show the histogram)
  4. Based on your observations, what can you infer is different between the two states? Look at Cook County and other counties downstate. Does that help explain the different histograms? 
  5. In which states are the top counties with the largest Hispanic population? and the counties with the largest White alone population? Where are the counties with the largest mixed population?. This question asks you to look at the country as a whole, not at a state by state level. Respond by looking at the top 10 counties and show the state with the most counties in that list.
  6. Do CA and AK have a different diversity index? (i.e. does one have a significantly greater diversity index than the other?) Hint: look at the p-values
  7. Do CA and IL have a different diversity index? Hint: same as above
  8. Do IL and WY have a different diversity index? Hint: same as above.
  9. Are these results intuitive? Explain them using histograms and/or boxplots

Your work must comply with the following:

  • All questions answered in order. Please put the question number next to the answer
  • Answer the questions sequentially.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Country Analysis:

 .Country Analysis: Write a briefing paper on the cyber threats facing a particular nation. The analysis will need to take into account historical and current enemies, the nation’s dependence on cyber, the level of sophistication of its cyber defense, and the level of sophistication of its adversaries. The discussion must be fact-based, logical, and analytical. 

need 3 page

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

web 13

 Half Page—- 3 hours

Some classify cookies as spyware. Conduct some research to learn more about cookies. Do you think they should be classified as spyware?  How can cookies be misused? Do they provide value in some instances?  Be prepared to discuss your findings.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

microsoft SDL

 Due Date: 11:59 pm EST Sunday of Unit 7 Points: 100 Overview: There are several common practices used to secure software development in Microsoft’s SDL as well as in all Secure Software Development Lifecycles (SSDLCs).  List and describe these practices.  Instructions: From our readings of Microsoft’s SDL and SafeCode’s “Fundamental Practices for  Secure Software Development” (3rd Edition, March 2018) list and describe the practices  added for security and commonly found in an SDL or SSDLC that are not found in the  standard SDLC approaches. Requirements: • Should target your organization’s senior leadership • 2–3 page APA paper excluding title and reference pages  • Provide at least two references and in-text citations in APA format (these will  preferably be in addition to the main text)  • College level writing  • Should be your own work in your own words 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DBMS implementation

 

create the database and load the data. The initial data could be either new data or existing data imported from your SQL scripts. You also establish database objects this week and give the users that you’ve identified access applicable to the database 

The following are steps for the implementation 

  1. Install the DBMS.
  2. Tune the setup variables according to the hardware, software and usage conditions.
  3. Create the database and the tables. (Every table must have a primary key, which uniquely identifies rows in the table and validation rule).
  4. Establish relationships between tables.
  5. Load the data into the tables.
  6. Create at least three forms (splash screen and Main switchboard are optional).
  7. Create at least four transaction requirement Queries
  8. Create data views and reports.

 Attach are references

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer Security Project

 

Part 1: Current Security Threats 

Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.

Scenario
It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College.
The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.

Tasks
You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis:
 Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)
 Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html)
 Security organizations, such as Secunia (http://secunia.com/)

Your supervisor has also asked you to consider the following questions as you shortlist the threats:
 What threats are new this year, and which have become more prevalent?
 Why are these threats more common and why are they important?
 What threats remain constant from year to year? Why?
 What threats do you believe will become more critical in the next 12 months? Why?
 What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s) does it target?

With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.

Part 2: Identify Vulnerabilities in IT Security  

Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.

Scenario
Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.

Required Resources
 Access to the Internet
 Text sheet: Zenmap Intense Scan Results pdf file (hacking_ts_zenmapscan.pdf Download hacking_ts_zenmapscan.pdf)

Tasks

1. Analyze the results of the Zenmap scan. Your report must answer the following questions:
 What are the first five open ports as identified by the Zenmap scan?
 Include the port number
 Include the service name
 Include a brief description of how each is used

2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.
 Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database .
 Include the name and a brief description of each vulnerability.

3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.

4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.

  

Submission Requirements for both parts of the project:

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double-Space
  • Citation Style: APA
  • Length: Each part should have a minimum of 3 pages. So overall report size should be a minimum of 6 pages (excluding title page and bibliography).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week 4 Assignment – Risk Methodologies and Analysis

 

Overview

In order to successfully manage risk,  one must understand risk itself and the assets at risk. The way one goes  about managing risk will depend on what needs to be protected, and from  what to protect it. 

Instructions

Write a 3–4 page paper in which you: 

  1. Discuss at least three rationales for performing an information systems security risk assessment.
  2. Explain the differences in quantitative, qualitative, and hybrid  information systems risk assessment and illustrate the conditions under  which each type is most applicable.
  3. Describe the type of information that is collected to perform an  effective information systems security risk assessment. Include at least  three different types. Fully describe each and justify why you made  your selections.
  4. Describe at least five common tasks that should be performed in an information systems security risk assessment.
  5. Use at least two quality resources in this assignment. Note:  Wikipedia and similar websites do not qualify as quality resources. The  Strayer University Library is a good source for resources.

The specific course learning outcome associated with this assignment is: 

  • Evaluate risk analysis methodologies to determine the optimal methodology based on needs, advantages, and disadvantages.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Repost Project management

 

Assignment: Prepare a Scope Management Plan

Base the assignment on a fictional business that has its own in-house development staff. Pick an IT-related project that is sufficiently large/complex that will take between 9-12 months to complete. One of the purposes of the plan is how you will deal with scope creep. There is no required format, but it should be well organized, easy to understand. You will be graded on both the content and your level of understanding of the topic.

Purpose: To demonstrate your understanding of managing project scope.

Content: Your plan must have the following sections:

  • Introduction
  • Management Approach
  • Roles and Responsibilities
  • Scope Definition
  • Project Scope Statement
  • Gathering Requirements
  • WBS
  • Scope Verification
  • Scope Control

Normally, the plan should have the following:

  • The management approach would include the type of “model” (like waterfall)
  • You’d have a listing of the WBSs
  • You’d have how often the workers report their status
  • You’d have how you plan to control scope creep
  • The verification would include how you know you met the requirements

Requirements:

  • At least 3 pages (single spaced) long.
  • No more than 35% of the content is copied

Expectations: A single Microsoft Word document

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

RStudio and Big Data Assignment

 

Project Description:

The goal of this project is to perform data analysis using R. The techniques and
skills we have introduced in class will help you along the way.  

Datasets: Dataframes flights, airlines in the nycflights13 package. Other
data can be integrated when needed. 

In this project, you will need to read in the given dataset in RStudio and then
perform the following data analysis using R.
Part I. Reading in the dataset and basic analysis
Pat II. Visualizing relationships between pairs of variables
Part III. Manipulating/ joining/ transforming Data
Part IV. Summarizing data 

For each of the above four topics, please design 5 interesting questions/tasks,
run R commands to get the answers or complete the tasks.  
Sample Questions: Q1. What are the subjects of this dataset? Q2. How
many subjects are there? Q3. What type of variable is origin?Q4. What is
the most common origin? Q5. What is the minimum distance?  

Sample Tasks: T1. Produce a table to summarize the origin variable. T2.
Produce a bar chart of the origin variable. T3. Calculate the mean and standard
deviation of the distance variable. T4. Produce a histogram of the distance
variable. T5. Visualize the relationship between arr_time and sched_arr_time
using scatterplot.

Project Report  
The report should include but not limited to the following components.
1. Title and author(s).  
2. Project Description:

        -Give a brief introduction of the project goal.
       -Describe the basic information of the dataset.
3. Data Analysis and Results:

        -In this section, please document all the data
         analysis in the following four parts. For each part, document the
          following: specific questions/tasks; R commands you used to solve the
          problems/tasks; answers/results to the questions/ Running results of the
          commands (tables, figures, or values).
o Part I. Reading in the dataset and basic analysis
             §   Question/Task…
             § Commands…
             § Results…
o Part II. Visualizing relationships between pairs of variables
            § Question/Task…
             § Commands…
             § Results…
o Part III. Manipulating/ joining/ transforming Data
            § Question/Task…
             § Commands…
             § Results…
o Part IV. Summarizing data
              § Question/Task…
             § Commands…
             § Results…
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now