Capstone research paper and Power Point Presentation for the Project: Handwriting Recognition. Python Language basics needed.

Project: Handwriting Recognition.

Total 20 Pages

Cover page 

Reference list page (Total 10 References)

Literature review page (10 Pages)

Eight pages about the project. (This can include the screen print, figures/tables, code, etc.)

Total cover page + Literature review + project details + Reference list (1 + 10 + 8 + 1): Total 20 Pages 

APA format: 12-point font: Time New Roman: Double spaced: in-text citations required. 

Project Presentation PPT:

15 Slides are needed.

DEADLINES:

Research paper due- 10th April 2023 by 10 PM CST

PPT due on 13th April 2023 by 10 PM CST

Note:

I am attaching the two sample research papers in APA format and also the proposal of the project for your reference.

Discussion

 1- What are the advantage and disadvantage on File System FAT32, NTFS, UFS, and APFS?

2- On Windows 10 file system what is the differences Between Share permission and NTFS (APFS for MAC) Permissions?

3- For the NTFS file system, what are the default cluster sizes, using table layout?

4- Describe the most common used four types of File Access Method and 6 types of File Access permission.

***Please answer in order***

os

  

explain the key advantages of a UNIX operating system as if you were explaining it to a high school student who is unfamiliar with computer-specific terminology.

Week 10 Assignment – Contingency Plan

Scenario

KION Group is a global material handling Equipment Company based  in Germany. Forklift trucks and warehouse automation equipment are the  company’s main products. KION Group needs to prepare for the prevailing  computer incidents of today and tomorrow. An organization can assist in  developing a computer incident response team (CIRT) plan for a number of  computer-based safety incidents.

This assignment will discuss a CIRT plan, which is often used as a  contingency plan for the KION Group. A system administrator noticed  yesterday that several of the file servers at HQ were responding very  slowly. The KION Group headquarters (HQ) handles all incidents so that  the plan will have its roots at HQ.

Like the latest IBM Threat Intelligence Index, read a recent  article to gather information on current threats and remember to  leverage the BCP and DRP you generated for the organization last week.

Instructions

Write a 5–6 page paper in which you:

  1. Describe the purpose and primary elements of a CIRT plan.
  2. Discuss the relationship between a CIRT plan and risk management.
  3. Discuss the five Ws (who, what, where, when, and why) found in a  CIRT plan in regard to the incident given in the above scenario.
  4. Explain how KION Group can leverage its BCP and DRP to develop and support its CIRT plan.
  5. Explain how you think threats will evolve to impact KION Group  in the future and how the CIRT plan should be updated to combat them.
  6. Discuss at least five best practices to follow when creating a CIRT plan.
  7. Use at least two quality resources in this assignment. 

The specific course learning outcome associated with this assignment is:

  • Develop a contingency plan for the sample organizations to include: business continuity, disaster recovery, and incident response.

building secure web applications week 2

 

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Create a policy that will ensure all external computers that connect to Always Fresh environment are malware free

  Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:

1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.

2. Describe the process of:

a. Ensuring anti-malware software and data is up to date. Mandate daily updates.

b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.

3. Provide steps to follow any time malware is detected.

a. Immediate reaction—what to do with current work, leave the computer on or turn it off

b. Who to contact

c. What information to collect

Extra -6

 

DISCUSSION

Bringing IoT Into Your Organization—Change Management

IoT has emerged as both an agent of dramatic change and the result of global forces that drive change. 

TripleX Inc. has posted its request for proposals to implement Internet of Things solutions to their organization. Your company Solutions Inc. has won the bid, and now you are in charge of executing this contract. Explain your approach to implementing this contract and where do you start. Feel free to use real-life examples scenarios or use cases in supporting your responses.

Exp19_Excel_Ch08_ML2_Reading_Scores

Exp19_Excel_Ch08_ML2_Reading_Scores 

Exp19 Excel Ch08 ML2 Reading Scores 

Excel Chapter 8 Mid-Level 2 – Reading Scores

Project Description:

As an elementary school principal, you are concerned about students’ reading comprehension. After conducting a study, you want to calculate some general statistics and then conduct a one-way analysis of variance (ANOVA). Doing so will enable you to compare three sample group means and evaluate the variances within each group compared to the variances among the three groups.

     

Start Excel. Download and open   the file named Exp19_Excel_Ch08_ML2_HW_ReadingScores.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

In the range F2:H2, insert   functions that will calculate the average for each of the groups (Control,   CBT Only, Hybrid).

 

In the range F3:H3, insert   functions that will calculate the median for each of the groups.

 

In the range F4:H4, insert   functions that will calculate the most repetitive value for each of the   groups.

 

In the range F5:H5, insert   functions that will calculate the highest value for each of the groups.

 

In the range F6:H6, insert   functions that will calculate the lowest value for each of the groups.

 

In the range F7:H7, insert   functions that will calculate the variance for each of the groups. Use the   function that includes the .S descriptor.

 

In the range F8:H8, insert   functions that will calculate the standard deviation for each of the groups.   Use the function that includes the .S descriptor.

 

Format the values in the range   F2:H8 with the Comma Style with three decimal places.

 

Use the Data Analysis tools to   perform an analysis of variance using the range A2:C25 as the input range and   E11 as the output range.

 

Format the averages and   variances in the SUMMARY table with the Comma Style with three decimal   places.

 

Save and close   EXP19_Excel_CH08_ML2_HW _ReadingScores.xlsx. Exit Excel. Submit the file as   directed.

You have been asked to develop UML

  

Draw a UML diagram showing the relationships among the classed involved in the linked list implementation of a set. 

  

You have been asked to develop UML diagrams to graphically depict and describe the architecture of two (2) unrelated software systems. The first system is for an automated ticket-issuing system used by passengers at a railway station. The second system is for a computer-controlled video conferencing system, located in a corporate office and accessible to senior management that allows video, audio, and computer data to be visible to several participants at the same time.
Write a three to five (3-5) page paper in which you:
1. Create two (2) UML diagrams, one (1) showing a conceptual view and one (1) showing a process view of the architectures for each of the two (2) following systems (for a total of four [4] diagrams) through the use of Microsoft Visio or its open source alternative, Dia. Note: The graphically depicted solution is not included in the required page length.
1. An automated ticket-issuing system used by passengers at a railway station.
2. A computer-controlled, video-conferencing system that allows video, audio, and computer data to be visible to several participants at the same time.
2. Describe how you created the conceptual and process view for all four (4) diagrams. In the description, be sure to provide a justification for each key decision in the design.
3. Explain how you arrived at your final solution for the four (4) conceptual and process view diagrams that you have created.