Python Project

 Task 1 (50 points): (Intro to Data Science: Survey Response Statistics) Twenty students were asked to rate on a scale of 1 to 5 the quality of the food in the student cafeteria, with 1 being “awful” and 5 being “excellent”. Place the 20 responses in a list. 1, 2, 5, 4, 3, 5, 2, 1, 3, 3, 1, 4, 3, 3, 3, 2, 3, 3, 2, 5 Write a program that does the following: (a) Determine and display the frequency of each rating. (b) Use the built-in functions, statistics module functions and NumPy or Panda functions covered in the course materials to display the following response statistics: minimum, maximum, range, mean, median, variance and standard deviation. (c) Display a bar chart showing the response frequencies and their percentages of the total responses. Grading Rubric – 10 points for defining functions. – 15 points for finishing Task1(a)-(c). – 5 points for appropriate comments. – 10 points for a runnable python program with correct data visualization. – 10 points for screenshots of the program. Task 2 (50 points): (Classification with k-Nearest Neighbors and the Digits Dataset) Read the file “09-02-MachineLearning.pdf” and the python program “CaseStudy1.py” to learn the algorithm of k-Nearest Neighbors with the Digits dataset for recognizing handwritten digits. Re-write the python program by doing the following subtasks: (a) Write code to display the two-dimensional array representing the sample image at index 24 and numeric value of the digit the image represents. (b) Write code to display the image for the sample image at index 24 of the Digits dataset. (c) For the Digits dataset, what numbers of samples would the following statement reserve for training and testing purposes? X train, X test, y train, y test = 1 train test split(digits.data, digits.target, random state=11, test size=0.60) 2 (d) Write code to get and display these numbers. (e) Rewrite the list comprehension in snippet [50] using a for loop. Hint: create an empty list and then use the built-in function “append”. Grading Rubric – 15 points for finishing Task2(a)-(e). – 5 points for appropriate comments. – 20 points for a runnable rewritten python program – 10 points for screenshots of the program. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Part 1: Risk Management Plan Outline and Research

 Please read the following outline and the attached file carefully.

Project Part 1: Risk Management Plan Outline and Research

For the first part of the assigned project, you will create a partial draft of the risk management plan. To do so, follow these steps:

  1. Research risk management plans.
  2. Create an outline for a basic risk management plan with anticipated section headings (as indicated in this numbered list). This plan will include a qualitative risk assessment, which is addressed later in the project.
  3. Write an introduction to the plan by explaining its purpose and importance.
  4. Define the scope and boundaries of the plan.
  5. Research and summarize compliance laws and regulations that pertain to the organization. Keep track of sources you use for citation purposes.
  6. Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.
  7. Develop a proposed schedule for the risk management planning process.
  8. Create a draft risk management plan detailing the information above. Format the plan similar to a professional business report and cite any sources you used.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

dv wk3

Kirk (2019) notes the importance of formulating your brief.  What does he mean by this?  Please expand this thought by noting how you would create a vision for your work.  Note any real-world examples to expand upon this thought.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

visualiation

 This week we focus on establishing your editorial thinking.  What does the author mean by editorial thinking?  Also, this week there was a  video of Andy Kirk (2015) noting the key concepts of data visualization thinking.  Please pick one major concept from the video and note what was said and your thoughts about the topic.  

 When thinking about data visualization, it is important to understand regular expressions in data analytics.  Therefore, note the importance of data visualizations and choose two types of expressions (* –  wildcards for example) and discuss the difference between the two types of expressions. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Association Rule Analysis

 

Excel worksheets contain a set of receipt data for a bakery where each row represents a different customer’s purchase. For each row, a 1 indicates they purchased that product and a 0 means they did not. In total, there are 50 different products the bakery sells, and the owner is interested in determining any association rules in the purchase patterns of their customers.

Complete an Association Rule analysis on the following data using a minimum confidence percentage of 70% and a minimum support of 10.

 Answer the following questions:

  1. How many rules did Association Rule analysis found?
  2. Pick any one of the resultant rules developed by your analysis and explain each of the columns in the output using that rule as an example.
  3. Select the 5 rules you would recommend to the bakery owner and explain your reasoning.

Please upload the completed workbook which shows your association rule analysis and answers to the questions.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Project Time and Cost Management: Running Case

 

Project Time and Cost Management: Running Case

Complete the two tasks associated with project time management and the three tasks associated with project cost management. (…total of five tasks) Put all your work on one word document. Separate your tasks by headings and/or page inserts. Remember… turn your work in on a word document as ONE attachment for grading.

***Note: This is a continuation of the running case started in week three and continues through the rest of the course. Tasks based on this case are explained following the case study. These tasks will build on work done in previous weeks.

Project Time Management: Case Study

Tony Prince is the project manager for the Recreation and Wellness Intranet Project. Team members include you, a programmer/analyst and aspiring project manager; Patrick, a network specialist; Nancy, a business analyst; and Bonnie, another programmer/analyst. Other people are supporting the project from other departments, including Yusaff from human resources and Cassandra from finance. Assume that these are the only people who can be assigned and charged to work on project activities. Recall that your schedule and cost goals are to complete the project in six months for under $200,000.

Project Time Management: Assignment (2 Tasks)

Review the WBS and Gantt chart you created previously. Propose three to five additional activities that would help you estimate resources and durations. Now, identify at least eight milestones for the Recreation and Wellness Intranet Project. Remember that milestones normally have no duration, so you must have tasks that will lead to completing the milestone. Add your activities and milestones to your Gantt chart, creating a new Gantt chart. Estimate the task durations and enter dependencies as appropriate. Remember that your schedule goal for the project is six months. Copy the Gantt chart and network diagram to a word document.

After your Gantt chart and network diagram, summarize how you would assign people to each activity. Include a table or matrix listing how many hours each person would work on each task. These resource assignments should make sense given the duration estimates you made. Remember that duration estimates are not the same as effort estimates because they include elapsed time.

Project Cost Management: Case Study

Tony Prince and his team are working on the Recreation and Wellness Intranet Project. They have been asked to refine the existing cost estimate for the project so they can evaluate supplier bids and have a solid cost baseline for evaluating project performance. Recall that your schedule and cost goals are to complete the project in six months for under $200,000.

Project Cost Management: Assignment (3 Tasks)

Prepare a one-page cost model for the project described in the Running Case, similar to the model below:

Types of Cost Estimates

Type of Estimate

When Done

Why Done

How Accurate

Rought order of magnitude (ROM)

Very early in the projec tlife cycle, often 3–5 years before project completion

Provides estimate of cost for selection decisions

−50% to +100%

Budgetary

Early, 1–2 years out

Puts dollars in the budget plans

−10% to +25%

Definitive

Later in the project, less than 1 year out

Provides details for purchases, estimates actual costs

−5% to +10%

Source: TABLE 7-2 Types of cost estimates © Cengage Learning 2014

Use the following WBS, and be sure to document your assumptions in preparing the cost model. Assume a labor rate of $100/hour for the project manager and $60/hour for other project team members. Assume that none of the work is outsourced, labor costs for users are not included, and there are no additional hardware costs. The total estimate should be $200,000.

a.  Project management

b.  Requirements definition

c.  Web site design

o  Registration for recreational programs

o  Registration for classes and programs

o  Tracking system

o  Incentive system

d.  Web site development

o  Registration for recreational programs

o  Registration for classes and programs

o  Tracking system

o  Incentive system

e.  Testing

f.  Training, rollout, and support

Using this cost model you created, prepare a cost baseline by allocating the costs by WBS for each month of the project.

Assume that you have completed three months of the project. The BAC was $200,000 for this six-month project. You can also make the following assumptions:

PV = $120,000
EV = $100,000
AC = $90,000

a.  What is the cost variance, schedule variance, cost performance index (CPI), and schedule performance index (SPI) for the project?

b.  How is the project doing? Is it ahead of schedule or behind schedule? Is it under budget or over budget?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

midterm

  

1.Which of the following are the CIA properties? (Select the three correct properties.)

Authentication

Confidentiality

Integrity

Availability

Identity

Implementation

2. Which of the following is an example of a rule-based security decision?

Locking a car’s ignition

Performing a step-by-step security analysis

Applying “security theater”

Trying to outdo a neighbor’s security measures

3. We are estimating the impact of an individual attack. Which of the following has the greatest estimated impact?

An attack with a $100 loss that could happen once a week

An attack with a $400 loss that could happen once a month

An attack with a $2000 loss that could happen twice a year

An attack with a $5000 loss that could happen once a year

4. Risk Management Framework is a way to assess _______________ risks when developing large-scale computer systems.

5. What is a worm?

Malware

Sends spam

Blocks flow of computer traffic

Denial of service

6. True or False? Once we have filled in the attack likelihoods and impacts, we compute the significance by multiplying these values together.

Group of answer choices

True

False

7. An attempt by a threat agent to exploit assets without permission is referred to as

Group of answer choices

An attack

A vulnerability

A safeguard

A trade-off

8. The primary element on a computer motherboard that runs programs and makes the computer work is

Group of answer choices

Random access memory (RAM)

An input/output (I/O) circuit

The central processing unit (CPU)

Firmware

9. ____________ flaws in the software, such as finger service, are often exploited.

Group of answer choices

Buffer overflow

Blue screen of death

Shell shock

Windows

10. What is the name of the worm that was written in 1988 that could replicate itself across computers on the internet?

Group of answer choices

Gates

Jobs

Moore

Morris

11. True or False? Not all data is strictly numerical.

Group of answer choices

True

False

12. The __________ board contains slots or sockets for random access memory (RAM).

Group of answer choices

Mother

Father

Daughter

Son

13. True or False? A computer’s basic input/output system (BIOS) is a computer program stored in read-only memory (ROM).

Group of answer choices

True

False

14. True or False? By the late 1980s, some virus writers were inclined toward destruction. The Jerusalem virus, which appeared in 1987 in the city of Jerusalem, contained a “destructive payload” that would delete all executable files on the system on Friday the 13th, starting in 1988.

Group of answer choices

True

False

15. The term _________ was used in operating systems research to describe the access rights a particular subject or process had for a particular object or resource.

Group of answer choices

Cluster

Permission

Capability

Objects

16. The “X” permission on the file indicates that the user has _________ right.

17. True or False? Every executable file begins with a “file header” that describes the structure and format of the program.

Group of answer choices

True

False

18. An interpreter is a program that interprets the text of a program in a symbolic form and performs the actions specified in the text. The following are examples of interpreters, except

Group of answer choices

C++

PHP

Javascript

Lisp

19. True or False? In a default permit, everything is allowed except sites on the prohibited list.

Group of answer choices

True

False

20. An authentication system that requires the user to provide two different passwords and a fingerprint scan is an example of

Group of answer choices

Single-factor authentication

Two-factor authentication

Three-factor authentication

None of these is correct

21. True or False? Authentication associates an individual with an identity.

Group of answer choices

True

False

22. True or False? Two-factor authentication is using two passwords.

Group of answer choices

True

False

23. True or False? Dictionary attacks differ from trial and error attacks because dictionary attacks focus on likely passwords.

Group of answer choices

True

False

24. The following are fundamental strategies for authenticating people on computer systems, except

Group of answer choices

Something you know

Something you have

Something you are

Something you make

25. We need to create a three-factor authentication system. The system already uses a USB device that is unlocked with the user’s fingerprint. Which of the following can we add to implement three separate factors?

Group of answer choices

A file of secret information stored on the user’s authorized computers

A PIN entered via a built-in PIN pad

Signature recognition

A process that requires the user’s cell phone

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussions and Research paper

Discussion 1:

 Support services is a broad category  that refers to any team that supports an organization’s IT and business  processes. The help desk, for example, is a support services team.  Support services are vital when an incident impacts the operational  performance of an organization. Answer the following question(s): 

  1. What are five types of support services in a typical large organization?
  2. Should the same or different  support services be available when an incident impacts the operational  performance of an organization? Explain your answer.

Fully address the questions in this  discussion; provide valid rationale for your choices, where applicable;  and respond to at least two other students’ views. 

Discussion 2 :

  A  simulated disaster and comprehensive recovery test may involve many of  an organization’s key personnel for several days: is this a reasonable  burden to place on a busy, competitive company? How would you argue  against the inevitable tendency to shortcut the procedure?   ***Standard for all discussion posts:   Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:    

  • Ask an interesting, thoughtful question pertaining to the topic 
  • Answer a question (in detail) posted by another student or the instructor 
  • Provide extensive additional information on the topic 
  • Explain, define, or analyze the topic in detail 
  • Share an applicable personal experience 
  • Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA 7) 
  • Make an argument concerning the topic 

At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT Assignment

(Do not use PowerPoint):

In your research, you will thoroughly address each topic .

1. Explain computer literacy.
2. Explain computer algorithm and its significance.
3. Explain some of the technologies that have contributed to the exponential growth of the Internet and the World Wide Web (WWW.)
4. Describe software development in respect to the Systems Development Life Cycle (SDLC) using applicable model.
5. Diagram major hardware components of a computing system.
6. Build a table of the Open System Interconnection (OSI) seven layers.
7. Summarize some security concerns of the Internet and computer use.

Grading:

 

1. Explain computer literacy.

2. Explain computer algorithm and its significance.

3. Explain some of the technologies that have contributed to the exponential growth of the Internet and the World Wide Web (WWW).

4. Describe software development in respect to the Systems Development Life Cycle (SDLC) using applicable model (such as a Table, Images, Diagram, or SmartArt).

5. Diagram major hardware components of a computing system.

6. Build a table of the Open System Interconnection (OSI) seven layers explaining each layer.

7. Summarize some security concerns of the Internet and computer us.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Create a Public Marketing Website

  

Synopsis: A aerospace company has decided to update their customer-facing website with a more modern, responsive design.

Description: An aerospace company, called AAC, is restructuring its external website. AAC is a large corporation that develops and assembles airplanes and cutting-edge craft for several markets, including commercial and defense. These craft include large passenger jets, attack aircraft, as well as spaceflight technologies.

The company has chosen to create a new website to explain its aircraft and technologies to potential new customers. 

You work as a web developer for an international corporation, known as IBN, that has received the contract to create the website. You are the primary developer and business interface between IBN and AAC.

As the web developer, this initial stage should provide a clean, responsive, modern design. There is no requirement for a database to operate the site for this submission. The website should consist of HTML5, JavaScript, CSS3, folders and images. The content of each page must be 100% your own. You are encouraged, however, to research other sites for ideas about what types of content to include oon each page. You must submit a supplementary Word document that is a references page that provides credit for the concepts, ideas, and facts that you glean from these other examples and/or expert sources.

Deliverables:

1. The site will consist of the following, minimum pages:

a. Home Page

i. Include navigation to other pages

b. Five services pages, explaining offerings for each

i. Commercial Aircraft

ii. Business-class Aircraft

iii. Space Technology

iv. Advanced Technology

v. Defensive Technologies

c. Contact Us

i. This page will allow the user to complete a form which will open the default email client on the system, fill in the To, Subject, and Body, based upon the entries of the form.

2. References page in Word/APA format.

Please submit all files as a compressed (*.zip) file via the designated Unit 6 assignment in Blackboard.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now