IT217 week 8

JustBasic Software allows you to use file from your computer to load into your program.  Use some specific examples to explain the advantages of importing files from your computer into your program.

Assignment – Discussion

1.Read the below article about using text to predict stock prices. Write at least 500 words discussing why you will or won’t get rich using text analysis to pick stocks.  Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.

Article:https://towardsdatascience.com/heres-how-i-predicted-apple-s-stock-price-using-natural-language-processing-13a578c41b8e

2.Write at least 500 words discussing why NoSQL databases are more effective for storing big data than RDMS like SQL Server. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.

Wk 7

Assignment 1

Multilayer User Access Control

Learning Objectives and Outcomes

Ø Identify what implementation method(s) can be used to incorporate multilayer access control

Ø Describe and how each method benefits multilayered access control.

Assignment Requirements

Read the worksheet named “Multilayer User Access Control” and address the following:

Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

  

Assignment 2

Please refer to the “Access Control.zip” file (includes previously done homework) to complete this assignment.

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment.

You can use Access Control topics. 

Requirements:

o ****Separate word document for each assignment****

o Provide a 500-word minimum reflection.

o Use of proper APA formatting and citations. 

o Share a personal connection that identifies specific knowledge and theories from this course. 

o Demonstrate a connection to your current work environment. 

o You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.  

o No plagiarized content please! Attach a plagiarized report.

o Check for spelling and grammar mistakes!

o $8 max. Please bid if you agree.

  

Assignment 3

From Chapter 8 – textbook attached “Introduction-to-Data-Mining-2nd-Edition-by-Pang-Ning-Tan.pdf”

Answer the following question – 

Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

Requirements:

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

  

Assignment 4

Refer to chapter 8 and 9. Textbook attached – “Introduction-to-Data-Mining-2nd-Edition-by-Pang-Ning-Tan.pdf”

Answer the following questions. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment. 

1. For sparse data, discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values. When would such an approach not be desirable?

2. Describe the change in the time complexity of K-means as the number of clusters to be found increases.

3. Discuss the advantages and disadvantages of treating clustering as an optimization problem. Among other factors, consider efficiency, non-determinism, and whether an optimization-based approach captures all types of clusterings that are of interest.

4. What is the time and space complexity of fuzzy c-means? Of SOM? How do these complexities compare to those of K-means?

5. Explain the difference between likelihood and probability.

6. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of the connection (interconnectedness) of clusters.

Requirements:

· ****Separate word document for each assignment****

· Answer all 6 questions. Cover sheet, abstract, graphs, and references do not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. Length – 2 to 3 paragraphs. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $8 max. Please bid if you agree.

Some things to notice

Area and Circumference of a Circle 

Study the program below, which uses both variables and constants:

// ************************************************************

//  Circle.java

//

//  Print the area of a circle with two different radii

// ************************************************************

public class Circle

{

public static void main(String[] args)

{

final double PI = 3.14159;

int radius = 10;

double area = PI * radius * radius;

System.out.println(“The area of a circle with radius ” + radius +

” is ” + area);

radius = 2 0;

area = PI * radius * radius;

System.out.println(“The area of a circle with radius ” + radius +

” is ” + area);

}

}

Some things to notice:

  The first three lines inside main are declarations for PI, radius, and area. Note that the type for each is given in these

lines: final double for PI, since it is a floating point constant; int for radius, since it is an integer variable, and double for

area, since it will hold the product of the radius and PI, resulting in a floating point value.

  These first three lines also hold initializations for PI, radius, and area. These could have been done separately, but it is

often convenient to assign an initial value when a variable is declared.

  The next line is simply a print statement that shows the area for a circle of a given radius. 

  The next line is an assignment statement, giving variable radius the value 20. Note that this is not a declaration, so the int

that was in the previous radius line does not appear here. The same memory location that used to hold the value 10 now

holds the value 20—we are not setting up a new memory location.

  Similar for the next line—no double because area was already declared.

  The final print statement prints the newly computed area of the circle with the new radius. 

Save this program, which is in file Circle.java, into your directory and modify it as follows: 

1. The circumference of a circle is two times the product of Pi and the radius. Add statements to this program so that it

computes the circumference in addition to the area for both circles. You will need to do the following:

  Declare a new variable to store the circumference.

  Store the circumference in that variable each time you compute it.

  Add two additional print statements to print your results.

Be sure your results are clearly labeled. 

2. When the radius of a circle doubles, what happens to its circumference and area? Do they double as well? You can 

determine this by dividing the second area by the first area. Unfortunately, as it is now the program overwrites the first 

Chapter 2: Data and Expressions 

16

 

 

area with the second area (same for the circumference). You need to save the first area and circumference you compute

instead of overwriting them with the second set of computations. So you’ll need two area variables and two

circumference variables, which means they’ll have to have different names (e.g., area1 and area2). Remember that each

variable will have to be declared. Modify the program as follows:

  Change the names of the area and circumference variables so that they are different in the first and second

calculations. Be sure that you print out whatever you just computed.

  At the end of the program, compute the area change by dividing the second area by the first area. This gives you the

factor by which the area grew. Store this value in an appropriately named variable (which you will have to declare).

  Add a println statement to print the change in area that you just computed.

  Now repeat the last two steps for the circumference. 

Look at the results. Is this what you expected? 

3. In the program above, you showed what happened to the circumference and area of a circle when the radius went from

10 to 20. Does the same thing happen whenever the radius doubles, or were those answers just for those particular

values? To figure this out, you can write a program that reads in values for the radius from the user instead of having it

written into the program (“hardcoded”). Modify your program as follows:

  At the very top of the file, add the line 

import java.util.Scanner; 

This tells the compiler that you will be using methods from the Scanner class. In the main method create a Scanner

object called scan to read from System.in.

  Instead of initializing the radius in the declaration, just declare it without giving it a value. Now add two statements

to read in the radius from the user:

  A prompt, that is, a print statement that tells the user what they are supposed to do (e.g., “Please enter a value

for the radius.”);

  A read statement that actually reads in the value. Since we are assuming that the radius is an integer, this will

use the nextInt() method of the Scanner class.

  When the radius gets it second value, make it be twice the original value.

  Compile and run your program. Does your result from above hold? 

Chapter 2: Data and Expressions 

17

 

CBSC630: Midterm 2

 

  • Write a 3 to 4-page paper where you discuss the uses of Python in hacking. This will require you to find an article on the use of Python in Hacking and explain how the article covers the use of Python in the hacking process.       
  • Build a PowerPoint presentation on the uses of Python in hacking. You will use the information from your individual midterm papers and build a PowerPoint presentation. This will require you to put together the presentation based on the work from your research papers.

Writing Requirements: 

  • PowerPoint presentation 10-20 slides
  • Use APA V& formatted citations and references

Presentation – (PPT) for Covid Tracking App for System Analysis Subject

 Create Power Point Presentation (PPT) for Project for “COVID Tracking digital app”

Subject: System Analysis Project 

Details: 

Plan and build digital system to capture and track COVID vaccinations.

This App can share its data with different state and each state has unique ID system. 

Incorporate that into the various state Id systems.

This app will be completely digitalized and avoid manipulation or duplication or forging etc possible with paper Vaccination records.

Assumption:

1. Each state has unique ID system.

discussion question

 

Hi,

please am looking for someone to help me with my discussion question. please read the question and instruction carefully. thanks