Forensic design assessments

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the colour choices:

  1. Start by identifying all the applications of colour deployed, listing them under the headers of 1) data legibility, 2) editorial salience, and 3) functional harmony.
  2. How suitable are the choices and deployment of these colours? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential applications of colour, what would you do differently or additionally?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Programming Logic

   

This week is about logic in computer programing.  Ultimately, everything that a computer does is based on Boolean Logic —  a system of binary mathematics based on the values true and false — as first defined by George Boole in his book An Investigation of the Laws of Thought on Which are Founded the Mathematical Theories of Logic and Probabilities, published in 1854.  Each bit can be thought of as a true or false value manipulated by computer systems according to the laws described by Boole.

On a larger scale, we deal with Boolean logic in true or false conditions that determine which parts of an algorithm are executed.  In most computer programming languages, including Python, if statements and if … else … statements  are used for this when the algorithm divides into different branches.

This week you will read about if statements and variations of if statements in Python; Boolean logic; and the nature of algorithms, which lie at the heart of all computing and computer programming.

Remember, this is an introductory Computer Science course, not just a course in Python and Java programming.  Some of the material in the section that you will read about algorithms is fundamentally important in Computer Science (and in modern mathematics as,  well).

Your tasks are to :

1- Complete Exercise 10 at the end of the chapter as a programming assignment.  This involves the use of the hypotenuse function to determine a point’s distance from the origin in a Cartesian coordinate system, and branching to determine which quadrant a point is in.   

Note: If a point is on the x-axis or the y-axis, which coordinate is it in?  The specifications answer this question. Read the conditions in the problem carefully and make sure the logic in your software matches what it says.

2-  Writing assignments the nature of algorithm. read Lesson 3.2 about the nature of algorithms in chapter 3 from An Introduction to Computer Science with Java, Python and C++ and answer the five checkpoint questions at the end of the section.  Lessons 3.1 and  3.3 and Lab 3 A are not required, but they will help you to better understand Boolean logic, branching, and if statements in Python,  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

574 unit #8

  Create a metrics subsection to your paper.  In this section create a “Metrics Dashboard” and document your work’s major workflow with perceived WIP limits.  Also calculate your AAR and ADR to determine what WIP optimizations you could realize.  Further, calculate the cycle time and lead time for a given work flow.  Write 750-1000 words about your findings and recommendations to remediate issues.  Be prepared to discuss. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

510 unit#12

 

Project Quality Management (100 points)

Suburban Homes Construction Project Quality Management Plan (QMP) 

Prepare a quality management plan using the elements described in the PMBOK 6e (Section 8.1.3.1) for the Suburban Homes Construction Project.

Content (90 points) Over the course the semester you’ve become familiar with the project and as part of the overall project management plan, a quality management plan is needed to communicate how quality will be met to the satisfaction of each stakeholder involved in a typical residential construction project.

You should perform research on quality standards associated with residential construction to determine applicable standards.  At least four (4) quality objectives associated with the project should be defined.

As part of the section on quality tools, include a separate appendix with at least three (3) quality tools that will be used as a part of the project.  These can be drawn from: 1) flow charts, 2) check sheets, 3) Pareto diagrams, 4) histograms, 5) control charts, 6) scatter diagrams, 7) affinity diagrams, 8) process decision programs charts, 9) interrelationship digraphs, 10) tree diagrams, 11) prioritization matrices, 12) activity network diagrams, 13) matrix diagrams, 14) inspections, and 15) statistical sampling.

Last, about 1/3 of the plan should be devoted to major procedures relevant for the project for dealing with non-conformance, corrective actions procedures, and continuous improvement procedures.

If information needed to complete a QMP is not explicitly stated in the scenario description or other project artifacts you’ve created or collected for this scenario in the past units, then develop (make-up) the information you need to complete the plan.  Use tables and illustrations as needed to convey information.

The plan (excluding the separate appendix) should be approximately 4 to 5 pages. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Write a Ruby Program

 

Assignment Content

  1. The college IT department manager no longer wants to use spreadsheets to calculate grades. The manager has asked you to create a program that will input the teachers’ files and output the students’ grades. 
    Write a Ruby program named format file.rb, which can be run by typing ruby widgets.rb. 
    In your Ruby environment, the program must read an input file formatted in CSV format, named input.csv. Each record contains data about a student and their corresponding grades. 
    The data will look similar to the following: 
    Student Name, assignment 1, assignment 2, assignment 3, assignment 4 
    John Adams, 90, 91, 99, 98
    Paul Newman, 90, 92, 93, 94
    Mary Smith, 95, 96, 99
    Be careful to follow the output format exactly, including spacing. The output of your program must look like the following: 
    Student Assignment Average
    John Adams    94.5
    Compress your files into a ZIP folder. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

UDP File Transfer Using Java

You will implement a reliable FTP client-server system.

Provide a simple menu to the user, e.g.
1. GET
2. PUT
3. CD
4. QUIT
Your code must be robust and handle any incorrect user input. Since there
can be
multiple clients querying the server at the same time with each client
being serviced by a
different thread on the server, the server must ensure concurrency
control on the data file
while it is being updated. Thus, only one thread must gain access to the
data file during
writes (hint: use synchronized keyword for the write method in your
code).
Be sure to terminate each thread cleanly after each client request has
been serviced.
Implement the project as described using Java Datagrams (UDP). This will
be a
connectionless client-server system since UDP is connectionless. However,
you will need
to provide reliability in your client-side application code since UDP
does not guarantee
delivery. You may use the CRC32 checksum class available in the
java.util.zip package
in the JDK for this purpose. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Objective Summary on Securing Social Network Data from Privacy Threats

Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Final Paper on Securing Social Network Data from Privacy Threats

Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template

My final research question : What have researchers learned about how best to secure social network data from privacy threats?

1 Objective summary for the article below 

Reference

Garside, D., Ponnusamy, A., Chan, S., & Picking, R. (2021). Secure military social networking andrapid sensemaking in domain specific concept systems: Research issues and future solutions. Future Internet, 4(1), 253-264. https://doi.og/10.3390/fi4010253

2.Literature Review 

Please fill out this form (also available in this week’s folder) to compare and contrast your three research articles (do not include your news article). 

Compare and contrast articles – Form to fill out

  Please write part 2 of your literature review. You will be essentially cutting and pasting your three objective summaries under Level II headings (see p 13 in your manuals)

Put them in an order that makes sense given how you compared and contrasted them.

Use your transition compare and contrast words (similiar to…etc) !!! (this is also available in this week’s folder)

compare and contrast words.

Submit BOTH assignments here.

3. Complete Literature review 

Assignment Content

Put it all together in 1, 2, 3 order! Write your Literature review!

Use the checklist to be sure you have everything by checking off each item and fixing your draft as you go.

Submit the marked-up checklist and your literature review here, with a title and references page.

4. Discussion 3 paragraphs 

Your hard work has paid off (!!!), You will use the following workshop activities completed in class to help you write your complete draft of your discussion section:

  • Activity: Discussion, Para. 1
  • Activity: Discussion, Para. 2
  • Activity: Discussion, Para. 3

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Module 02 Course Project

  

Module 02 Course Project – Part I: Teamwork Skills

For this week, you will take the security controls that you picked last week from the Plan of Actions and Milestones (POAM) and review the controls along with any notes you made last week.

This week, your project consists of two parts. For Part I, you will address the skills and methodologies that your audit team needs to be successful. In preparation for filling out the Security Assessment Plan (SAP), put yourself in the position of a team lead. Assume you are going to form a 3-person team for auditing these controls. Once you consider the needed skills and team members, address the following in a brief report:

  • Assume, for this project, that you are working with a multinational team. How would you go about ensuring that you have appropriate awareness and empathy while working collaboratively with people of diverse backgrounds and perspectives?
  • Discuss what skills would you expect out of each person on your team and how your team presents a good mix of skills that can address your security control audit
  • Discuss two methodologies (this includes both tools, and investigative actions like an interview) you would use to perform this SAP.

Submit your completed assignment by following the directions linked below. Please check the Course Calendar for specific due dates.

 

Module 02 Course Project – Part II: Begin the SAP

Module 02 Content

For this week, you will take the security controls that you picked last week from the Plan of Actions and Milestones (POAM) and review the controls along with any notes you made last week.

This week, your project consists of two parts. For Part II, you will begin developing your Security Assessment Plan (SAP).

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Software Engineering

1)  In version control, there has been some debate on how to implement the internal storage of the different versions of an artifact. One argument is to keep the complete copy of each version. Another is to keep only the delta changes from version to version, with the first version being the only complete copy.

a. Give one reason why you may want to keep a complete copy of each version.

b. Give one reason why you may want to keep only the delta. 

c. What would be the drawback of each of these approaches?

2)  Visit the online customer support site of a software product company and compare the list of support functions it offers against your list from Review Question 1.

List three customer support functions that a customer support/service organization performs.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now