ANOVA

 

An ANOVA is when we want to run a means test on more than 2 groups. However, the same basic structure of the hypothesis testing that we have done remains.

Using the hockey data, test if there is a difference between the true average number of goals scored by the different divisions. Second, test if there is a difference between the actual mean number of goals allowed by teams of different quality (where teams with at least 100 points is the top tier, those with 90-99 are the middle tier, and those with less than 90 make up the bottom tier).

If either of these tests show significance, run a multiple comparisons test among the groups. (Note that this is essentially the two sample testing we just did but with an adjustment to ensure that we don’t have inflated error probabilities.) Use a 0.05 significance level for all tests.

As you do this for your own data set, ensure that at least one of the two problems shows significance and requires pairwise comparisons. Unless impossible to avoid, do not use more than 4 groups — there’s nothing that says you can’t, but it’ll make your report much more tedious. Also note that if you only have 2 groups, that’s a two sample independent mean test and not an ANOVA; we did that last assignment, so ensure that you have at least 3 groups in your analysis.

Computer and Information Networking

Assigment : 2 pages

(1) Suggest how a development team might avoid feature creep when “it is” to be in agreement with “a team” faced with many different suggestions for new features to be added to a product.

(2) Explain why domain knowledge is important when identifying and designing product features.

(3) What do you think are the weaknesses of user stories when used to identify system features and how they work?

Requirements for Phase 2, Design with Test Cases Requirements

  

Requirements for Phase 2, Design with Test Cases Requirements

Repeat the information from your plan, edited to address issues identified in your instructor’s review of your plan. You may make other changes to your plan at this time, such as additional variables that were not identified in Phase 1. Your design should be consistent with your revised plan.

Provide a flowchart for the data acquisition module.

Provide complete pseudocode, with appropriate and adequate comments. Your pseudocode must be structurally sound (that is, pass all the tests in the Pseudocode Checklist. Your pseudocode must also be correct; that is, if it were to be translated into some appropriate programming language and compiled and run, it would likely work correctly.

Provide at least three complete test cases, including both inputs and expected outputs.

Computer Programing

In 250 words or more, respond to the following.

Now that we know computers execute the programming statements one line after another, let’s learn about programming variables. What does it mean to declare a variable?  What is a data type? How do you assign a value to a variable?  Are there any special rules you need to follow when coming up with a name for a variable?

BI wk 3

Understanding that you cannot simply overwrite previously deployed smart contracts, contrast approaches to deploying traditional applications and blockchain apps. Does blockchain make deployments easier or harder? Are there any potential risks when deploying blockchain apps that either don’t exist in traditional environments or aren’t as prominent? What should a development organization do differently to mitigate these risks?

  • Contrast approaches to deploying traditional applications and blockchain apps.
  • Explain whether blockchain make deployments easier or harder.
  • Identify any potential risks when deploying blockchain apps that either don’t exist in traditional environments or aren’t as prominent.
  • Describe what a development organization should do differently to mitigate these risks.

Prompt 1

“Data Warehouse Architecture” : Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Cyber Weapons Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

This week we are tasked with researching different malware attacks that are notorious and talk about one. I have chosen to talk about the Zeus trojan virus that was first seen in 2007. Zeus is a malware that is a trojan virus and is also known as ZBOT. Zeus targets Microsoft windows operating systems. Since 2007 Zeus has infected more than 3.6 million computers in the United States alone not including other countries. There are two main ways Zeus targets a computer one is through spam messages. The other way that Zeus targets computers is trough drive-by downloads. While Zeus can do many things if it is infecting a computer there are two major functions that most hackers use it for. One is to setup botnets and the other is to steal financial information form infected devices. The way it steals financial information is by keystroke logging and monitoring bank websites for credentials. Botnets are used to control a huge amount of computers in order to carry out large attacks. One attack I can think of that a Botnet would be useful for is a DDOS (Distributed Denial of Service Attack) attack. A man named Hamza Bendelladj was responsible for creating Zeus and he was arrested in 2013 and charged with 15 years of prison time. This also include millions of dollars in fines that he was also given for his many accounts of cyber crimes he committed.

Jackson Propst 

Kaspersky, (n.d.). Zeus Virus. Retrieved From https://www.kaspersky.com/resource-center/threats/zeus-virus

RESPONSE 2:

The malware I found most interesting made its appearance in 2017 as a self-replicating encryptor. The creators of this malware took advantage of a vulnerability in the Microsoft security before a later update. By utilizing this exploit, WannaCry could easily gain remote access to computers in order to install the encryption. Traditionally, encryptors gain access to and infect computers by part of the user who clicks on the suspicious link or downloads some type of attachment from an email that might not even appear suspicious at first glance because it’s using something known to the user to disguise itself. However, WannaCry was able to affect over 45,000 computers in just one day becauase of the fact that the user doesn’t need to do anything to allow the infection to occur. WannaCry detects the hole in the security and forces entry onto the machine. It then attempts to spread throughout the local network like a computer worm by scanning computers on the network to detect the same vulnerability. This was extremely damaging for any large networks because of the amount of machines that were compromised almost in an instant. WannaCry encrypts different types of files like documents, photos, videos, etc. that could potentially be of importance to the user and then renames those files to .WCRY, making them inaccessible to the user. Then the desktop wallpaper is changed to a picture that contains information about the malware and what the user must do in order to gain access to their files and computer again. This will typically include a demand for money to be transferred to the perpetrator in the form of bitcoin which cannot be traced to them, with an expiration date or time limit. In total, Wanna Cry has infect3ed more than 200,000 computers in 74 different countries. It was found in those 74 different countries within the first day. The malware author of WannaCry was never discovered. However, the malware can only effect computers which have not been updated unless a user takes some action to allow for the infection to occur like opening a link or downloading an attachment which would override the patch to fix the security.
¹ WannaCry: Are you safe? Kaspersky. Alex Perekalin. May 13, 2017. 

Felicia 

data management

 

Background

In March of 2000, a local mountain-biking club (Mountain-Bikers for Life) was organized for recreational purposes in West Virginia. Through the years the club had many members come and go, but the club continued to grow in popularity. As some members moved to other parts of the country, they began to form their own “Mountain-Bikes for Life” Club. The various clubs would even have events once or twice a year with one another. This sport has become so popular that, The Extreme Mountain Bike Racing League (EMBRL) was birthed.  The headquarter for the EMBRL is in West Virginia, but they have racing locations in Colorado, Maui, New England, Tennessee, Wisconsin, and Minnesota.

You went to college with the Mike “Mountain Man” Miller, who is the founder and CEO of the EMBRL. He has contacted you to see if you would be interested in creating a database application for his newly formed league. You have been doing contract work for an IT consultant form and have recently left to start your own business and this may just be the opportunity that you have been looking for to jumpstart your business.

After jumping at the opportunity, you scheduled a meeting with Mike to discuss his data needs.  After your initial interview with Mike and after having subsequent meetings, Mike has provided you with the Logical Design Criteria listed below.

Logical Design Criteria

The logical and relational requirements for the database that you are designing for the EMBRL are as follows:

  1. The database must keep track of all of the riders who are part of the league. They need to have easy access to their personal address information, contact information, the date they joined the EMBRL and who their agent is.
     
  2. Each rider is part of a given team. Each team consist of 4 riders. We need to keep track of the team name, the riders on that team.
     
  3. Many riders have pushed the limit of their bikes by tinkering with them by adding to and/or taking away from the original design of the bikes.  This often gives some riders an unfair advantage over the other riders. It is important that the database keeps track of the approved mountain bikes, along with their name, description, weight and a picture. Also, it is important to know which bike a rider is using in a given race.
     
  4. Since the potential is there for the riders to now get paid quite a bit of money for winning races and even participating in races or outside engagements, the riders thought it necessary that each of them have their own agent. Often, a single agent will represent one or more riders. We need to know the agent’s name, address information, contact info and which riders they represent.
     
  5. The EMBRL even has corporate sponsors. These sponsors give financial support to the various events (which consist of 1 or more races) and even directly sponsor individual riders. A rider may have 0, 1  or many sponsors and a company may also sponsor 1 or more events.  We need to know the name of the sponsor, address information, contact information, which riders they sponsor (if any) and which events (if any) they sponsor. Also, a given company can very well sponsor riders, or events or both, but they will sponsor at least one of them. You cannot be a sponsor and not sponsor anybody.
     
  6. All advertising is first done at the Event level.  The Events may consist of 1 or more races. The races that make up a given event may be in the same location or different locations or even different levels of rider expertise.  The event information that we need to track is the name of the event, event location, address information, the beginning and ending dates and who the corporate sponsor of that event is.  Again, each Event may consist of one or more races. For example, you may have 4 races spread out over a given weekend that makes up one particular Event.  The race(s) that make up a given event keeps track of information about the location of the particular race, the rider’s level of experience, the date of the race, the distance of the race and the start and ending times of the race in question.
     
  7. Each rider can participate in one or more races. We need to know which riders are riding in which races and what approved bike they are using for that particular race.  Lastly, we will need to keep track which place the rider finished in the respective race that they are riding in. We will track all riders placements at the end of each race.  Each of these places has bearing on which team wins the overall season’s title and prizes will be dispersed accordingly based on which team has the lowest points of the season.
     

 

Deliverables and Grading Rubrics

  1. Entity Relationship Logical Data Model: A visual model which represents each table (entity) and the relationships between the tables.  Refer to the Power Point Presentations that cover “Entity Relationship Diagrams” – on the Canvas Schedule page. This diagram can be completed with MS. Word, Visio, Smartdraw, lucid charts or some other graphics program of your choice. However, copy and paste your diagram back into Word along with the other two deliverables or submit it in a PDF format.
     
  2. Field List: Shows the fields (attributes) for each table (entity) and identify the primary key (by underlining it). Identify any Alternate Keys, Secondary Keys and all Foreign Keys. The field list should include all fields which are found in the problem. We will use the Relational Database Shorthand from the Power Power Point Presentation “Database Design – Using ER Diagrams”   on the Canvas Schedule Page.
     
  3. Technical Summary: The technical summary provides verbal support for the relational data model. The technical summary should answer the question, “Why this logical data design and not some other?”  or “Why are these relationships one-to-many or many-to-many?” This is the portion where you get to talk the database language and explain/support your Entity Relationship Logical Data Model. At Least 1 page 12 pt font double-spaced.

IMPACT OF IT

 

Q1) Select one of the topics listed below and find a recent article that relates to this topic and post a summary of that article and express your views as well.

Listed Topics:

  • What is disruptive technology? Cite one example of a technology that has emerged in the last decade and what impact it has had. Who/what was affected?
  • What are some concerns that a typical cell phone user should have regarding privacy and how can they mitigate those concerns?
  • In your opinion, how was Facebook able to dethrone MySpace as the most popular social media site? What did Facebook offer that MySpace did not?
  • What technological improvement/invention has had the most impact on modern day business? Why?