Discussion

There are four types of VPN. Name them and give an example of when I should use that type. Do you think there will be the need for more types of VPN? Why?

Your discussion should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

The Nature of Technology in the 21st Century

 Part 1:

Choose a technological innovation that has arisen since the Internet Age (2000 – Present) and its artifact or tool. Then, discuss why it has been beneficial or detrimental to humanity. Support your discussion with examples or actual cases.

Part 2:

Research a company that uses the technological innovation that you identified in Part 1.   What are the ethical policies of this company with respect to the positions offered and education levels of the employees?  List a few positions that can be found on the organization’s website.  From an ethical perspective, do the positions listed appeal to your career objectives?

PowerPoint Data Analysis

 

Module 6: Applied Data Analytics Capstone

Project Presentation Instructions

The narrated presentation should include slides on the following:

  • Introduction (one slide)
  • Data (two slides)
  • Methods (one slide)
  • Analysis (two to three slides)
  • Conclusion (one slide)

INTRODUCTION

First summarize the purpose of the presentation and the data being analyzed. Then summarize the questions posed in the analysis of the data and the conclusions formed from the analysis. Finally, briefly outline what is contained in the rest of the presentation.

DATA

Give a description of the most important data used for analysis in this section. This should include outlining the types of data, count, any pre-processing needed, if there were missing values and steps taken, any need for formatting, normalizing, or transforming categorical values to quantitative variables.

METHODS

Give the methods you used to gather the data and the set up used for analysis.

ANALYSIS AND RESULTS

Include in this section what was analyzed and the conclusions you made from the analysis. Insert any charts you created from the data in this section. Should be based on analysis techniques that have been covered in class including: descriptive statistics, correlations, ANOVA, linear regression, and multiple linear regression.

CONCLUSION

Restate the questions you raised in the Introduction, as well as the most relevant results from the analysis. If your presentation contains more than one set of data or analysis, this is the place to compare the different results as needed. Include any questions or recommendations for additional data as needed.

I have attached the files and you have to make slides from these files according to the instructions. You will not need anything else as I already attached the files

Intro to data mining

Discussion:

 

Part 1. Describe in your own words two (2) differences between “shallow” neural networks and deep neural networks discussed in this section. (20 Points). Only support from your the required textbook is needed.

Part 2. List and discuss  two (2) characteristics of Deep Learning. (20 points)  Only support from your the required textbook is needed.

Assignement:

 

Regression and classification are categorized under the same umbrella of supervised machine learning. For your assignment this week

 1) Write a short paper  on the comparison and contrast between regression and classification methods.  Provide a formal definition for Regression and one for classification (20 point).

 2) Using the require text Only, write an essay that discussed Two similarities and Two differences between Regression and Classification. (40 Points)

(3) Provide one example to illustrate each similarity and differences discussed (40 points)

Notes Same Principles

  

Notes Same Principles as Before

In this lab we will be combining our efforts in top-down programming, where we deliberately organize and structure our code with main functions and sub functions, but will also add in our skills in Graphic User Interface (GUI). We continue to build abstraction – where a few small, simple and concrete tasks are packaged together to perform a more general task. The top-down approach helps us organize our code like an outline organizes our writing. Again, we start with an algorithm (chart), then translate it into pseudocode of comments and function name definitions.

In the last lab you created code to play Rock-Paper-Scissors. You will be working with the same code (modify to resolve comments from your last lab), but rather than using input() you will now collect input using the GUI. Be creative about displaying messages to the player.

Submittal to Turnitin.com

Because plagiarism in coding is dishonest, unethical, and is against the Miramonte Honesty Policy, you are required to submit your code to Turnitin.com. Make a Google Doc with your final code for Rock-Paper-Scissors and Word Jumble, and submit it to turnitin.com, Lab #8.

Problem #1 – Rock-Paper-Scissors Reprise (with GUI)

Game Requirements

1. Display messages on the canvas that explain to the user how to choose Rock, Scissors, or Paper. They may not input their choice with any text input box.

2. Once the player makes their selection, have the computer make a selection. Display both the player’s and computer’s selection on the Canvas (it is good programming practice to also display on the console to help you debug).

3. Display the outcome (“You win!” or “Computer wins!”)

4. Tally and update the score after each iteration of the game.

5. You do not have to ask the user to play again… you can assume they will, but do give them some method to Quit when they are ready.

6. When they quit, display a parting message and the final score.

RPS starter code

  

Rock-Paper-Scissors GUI starter code –   copy/paste into Codeskulptor and build code.

 

import simplegui
import random
 

“””Overview   of Game Logic:
 1. Screen is drawn with blank values, input method for player RPS
 is explained/presented
 2. Player selects R, P, or S using some form of
 GUI input (no input box).
 3. Computer randomly selects option R, P or S
 4. Winner is identified, results shared, score updated and posted
 5. Repeats #2-4 each time a button, key-stroke, or mouse-click
 is initiated.
 4. Stops when quit is pressed/clicked.
  “””
###### INITIALIZATION   CODE ##################
 

#Global variables,   changed within functions below
 

# Canvas Dimensions
  canvas_width =
  canvas_height =
 

####### RPS algorithm   helper functions ########
 

#Computer Generator
def comp_choice():
 pass
 “””Will randomly select Rock, Paper, or   Scissors. “””
 #global variables here.
 #pick a random R, P, or S….
 #Update computer choice message for draw handler
 #call winner() to determine outcome
 

#Determine Winner
def winner():
 pass
 “””Determine the winner then updates the   score”””
 #global variables here
 #determines the winner
 #updates the necessary draw(canvas) variables to show   messages
 

########### EVENT   HANDLERS #####################
#define event handlers   for mouse click, buttons, input box, key_strokes, draw
 

# Player Choice Selection   (not input box).
 

def button_quit_handler():
 pass
 #global variable here
 #updates the necessary draw(canvas) variables
 

# Handler to draw on   canvas
def draw(canvas):
 pass
 #Player choice: use canvas.draw_text(parameters), pass   in message as variable
 #Computer choice
 #Winner text and score update
 #Any additional messaging
 

# Create a frame and   assign callbacks to event handlers
  frame = simplegui.create_frame(“Rock, Paper, Scissors”, canvas_width, canvas_height)
  frame.add_label(‘Player   Choice: Select One’)
  frame.add_button(#add parameters)
  frame.set_draw_handler(#add parameter)
#add more frame.set for   key handler, buttons, mouse click, etc.
 
# Start the frame   animation
  frame.start()

  

Insert Final, working Rock-Paper-Scissors with GUI code – include   detailed comments

 

<> – please format with Code Blocks   add-on – Python, github-gist

Problem 2: Word Jumble 

As you solve a problem or write a computer program, the process should be:

1. Understand the task/purpose of code

2. Organize main task into sub-tasks and consider task flow (sequencing)

a. Create flow structure with an algorithm flow chart (whiteboard!). Consider collaborating with a programming partner as you plan.

b. Create pseudocode outline with comments, naming key flow functions.

3. Build, code and test sub-functions first. Debug as you go. Revise plan/structure as necessary.

4. Combine sub-functions into larger program and test, test, test! Revise plan as necessary.

5. Consider extensions or improvements to original design.

Keep your words to 5 and 6 letters each. This is like the Jumble in the newspaper and online games and will make the GUI display easier and more aesthetically pleasing.

Overview

Submission:

Development Process

Part 1: Backend Development

Part 2: Frontend Development

Overview

You need to create a program that allows a user to guess a word that has been jumbled together. This project focuses on Strings and String manipulation, as well as presenting output with the GUI.

Submission:

Note, this is modeled after the Create Performance Task that you will submit as part of your AP Portfolio. You will submit your code write up via Google Classroom and TurnItIn.com 

Support Materials:

1. Video of Frontend and Backend

2. String randomizer

Development Process

Part 1: Backend Development

You will create a word jumble game. You should use functions to help you both pick a word from a list, scramble it and then prompt the user for guesses. Below is a rough outline of the pseudocode. You do NOT need to use this structure, but you SHOULD have some structure in place before you start writing code. Think of this as the outline. 

Your first working version of the game will rely on input() and printing to the Console. We call this “Backend Development,” where we get the algorithm and flow working correctly.

Note, you may find the method, random.shuffle(some_list), to be helpful when scrambling the word. You will find the documentation in the Random Module

Optional Extension

Add a timer to your game. Give the user 30 seconds to guess the jumbled word.

Cloud Risk and compliances Analysis

  

As an IT analyst for BallotOnline, a company providing voting solutions to a global client base, you are working to convince the organization to move the current infrastructure to the cloud.

Your supervisor and the director of IT, Sophia, has asked you to summarize for the company executives the potential risks and compliance issues that BallotOnline will have to contend with in the transition to the cloud.

The final report will be seven to 10 pages that convey your understanding and management of risks associated with cloud computing, as well as ensuring compliance with legal requirements involved in moving BallotOnline systems to the cloud.

Step 1: Research Risks Associated With Cloud Adoption

The first step in assessing risk in cloud computing will be to identify and describe risk concepts and cloud computing risk factors associated with cloud adoption. As a software as a service (SaaS) company considering an infrastructure as a service (IaaS) cloud service provider for your hosting needs, consider third party outsourcing issues and the generally accepted best practices for cloud adoption and review relevant cloud risk case studies. You should also consider best practices for cloud adoption.

As part of the risk management process, identify and describe other types of risk, such as risks associated with having a service-level agreement (SLA). An example of a potential risk could be if your company is obligated to protect personal information, and then the cloud provider that you use suffers a security breach exposing that personal information.

Here, identify and describe other types of risks or potential liability issues that apply to BallotOnline.

Step 2: Identify the Most Appropriate Guidelines for Managing Risks

In order to identify guidelines applicable to your company’s industry, you must have an understanding of the different types of risk management guidelines that exist and are frequently applicable in cloud environments.

There are several cybersecurity standards applicable to cloud computing environments such as the NIST Cybersecurity Framework, ISO standards, and US federal government standards (DoD/FIPS), as well as several major sets of risk guidelines for dealing with the risks involved. Also, there are organizations such as the Cloud Security Alliance (CSA) that recommend best practices for managing risks.

Review the different guidelines and determine which are most appropriate for BallotOnline. For example, NIST has responsibility for developing a number of elections industry guidelines within the United States.

Identify why those guidelines are most appropriate and compile these items into a brief (one page or less) recommendation and justification of your choice. Your recommendation will also be incorporated into your final report in the final step.

Submit your recommendation to Sophia to review before you present your final work.

Step 3: Identify Potential Privacy Issues and Mitigation Measures

Now that you have identified the guidelines most applicable to your organization, it is time to discuss privacy protections that may apply.

BallotOnline is now a global organization and may need to contend with several sets of privacy laws since these laws vary from country to country.

Sophia has recommended that you focus on European Union (EU) privacy requirements for now, including the General Data Protection Regulation (GDPR), since those are considered to be the most challenging for compliance. Many companies opt to host data for their European customers entirely within facilities in the European Union, and the companies implement restrictions to prevent data for EU citizens from crossing borders into non-EU zones. This is the approach that you have been asked to take and where you should focus your efforts. Note that some cloud providers, such as Amazon, have received special approval from EU authorities to permit data transfer outside of the EU.

Research EU privacy requirements, identify the requirements that apply to your project, and why they apply and compile your recommendations for complying with these requirements. These will be incorporated into your final report.

Before moving on to the next step, discuss privacy issues in one page or less, and submit it separately before you submit your final work.

Step 4: Create Risk Management Matrix

Now that you have identified and described the types of risks that may apply to your organization, create a risk management matrix to assess/analyze that risk, and make recommendations for risk mitigation measures.

This Sample Risk Assessment for Cloud Computing will give you an example of a completed risk matrix.

Use the risk management matrix template to identify risks and write a brief summary explaining how to understand the data. Submit it to Sophia for feedback before you present your final work.

Step 5: Describe Cloud Security Issues

Now that you have completed the risk analysis, you can start to identify cloud and network security issues that may apply in BallotOnline’s operating environment, including data in transit vulnerabilities and multifactor authentication.

Consider cloud computing risks, network security design, information security, data classifications, and identity management issues. Your findings will be incorporated into your final report.

Discuss these security issues in one page or less, and submit it separately before you submit your final work.

Step 6: Examine the US Legal System and Intellectual Property Laws

Now that you are familiar with security issues, examine and review the US legal and justice systems. Since BallotOnline is a software as a service (SaaS) company based in the United States and serving a customer base in the United States, you need to understand how the legal and justice systems work in the United States. Your basic understanding of these systems is crucial for understanding the complexities of the legal system in cyberspace, where cloud-based systems reside.

As a practitioner working in the cloud computing field, you should also have an understanding of the complexities of intellectual property law and cyberspace law, including how to identify different venues and methods for resolving disputes (such as the court system, arbitration, mediation), how to define and negotiate cloud hosting agreements to avoid potential cyberspace law issues, how to discuss the regulation of cyberspace, and how to handle electronic agreements and digital signatures.

To gain a better understanding of how cyberspace laws are applied to real issues, participate in the analysis of a relevant legal case with your colleagues in a forum titled Discussion: US Legal System and Cyberspace Law.

In addition to the discussion board, your findings will also be incorporated into your Final Risk and Compliance Report for the BallotOnline executives.

Step 7: Use Frameworks to Analyze Complex Legal and Compliance Issues

In the previous step, you examined the US legal and justice systems as a building block for understanding the complexities of the legal system in cyberspace, where cloud-based systems reside.

There are several frameworks for analyzing compliance issues used to analyze these complex issues. To provide a manageable set of recommendations to the executives, review the frameworks and select the one that is most helpful to use for analyzing these complex issues.

Step 8: Analyze General, Industry, Geographic, Data, and Cloud-Specific Compliance Issues

In the previous step, you examined the complexities of law in cyberspace. In this step, you will expand your understanding of legal and compliance issues related to the cloud by investigating industry-specific compliance issues, geographic-specific compliance issues such as privacy, and cloud-specific compliance issues to determine which are applicable to BallotOnline.

You will also need to analyze data compliance issues applicable to companies operating in the European Union, including the recent GDPR regulations, and determine how BallotOnline can be compliant. The organization is concerned about EU compliance issues because the laws there are the most restrictive that BallotOnline will encounter.

Prepare a two- to three-page summary of the data compliance issues that are applicable to BallotOnline and determine how BallotOnline can be compliant. This will be part of your final risk and compliance assessment report.

Step 9: Create a Proposal for a Compliance Program

In previous steps, you have identified potential legal and compliance requirements that BallotOnline may face in migrating to a cloud computing model. Now, you need to determine how BallotOnline can comply with those requirements.

Create a high-level proposal for a compliance program for BallotOnline that enables the organization and its employees to conduct itself in a manner that is in compliance with legal and regulatory requirements. Management has asked you to model the proposal on existing compliance programs for other companies that have migrated to the cloud.

Use the Proposal for Compliance Program template to record your work and upload it to the class folder for feedback before you submit your final work.

Step 10: Write the Final Risk Assessment and Compliance Report

As you have learned, there are a number of legal and compliance requirements associated with shifting to a cloud computing model.

It’s time to put everything together in a seven- to 10-page report for BallotOnline executives: summarizing the risk assessment and mitigation as well as legal and compliance requirements associated with moving to the cloud, outlining your recommended action plans for meeting those requirements, and developing a high-level proposal for a compliance program to avoid breaches of the requirements.

Use the final risk and compliance report template to complete your report.

Use the following criteria to respond to the questions.

1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.

2.1: Identify and clearly explain the issue, question, or problem under critical consideration.

7.1: Examine legal and regulatory requirements.

7.2: Examine industry best-practices and standards.

8.1: Assess liability issues associated with cloud adoption.

8.2: Assess network security and privacy risks associated with cloud infrastructure.

8.3: Assess management and operational risks associated with cloud.

Please add references.

presentation

 Requirement (Presentation/Demonstration):

  • Prepare a PowerPoint presentation based on your paper
  • Time limit 20 minutes
  • No more than 20 slides – at a minimum covering your paper’s research.

At minimum discuss your paper’s research and including: 

  • Purpose
  • Background Info
  • Conclusions 

C# static class values and methods

Research static class variables and methods. Provide as much information about both that you can find and provide at least one simple code example for both that explains how they are constructed/work.

350 words

SE week 4 assignment

300 words and use the following link and citations 

Why is project scope management so challenging in IT projects? And What suggestions do you have for preventing scope creep in projects? Go to following PMI site  and review top 5 causes of Scope Creep for more information.

https://www.pmi.org/learning/library/top-five-causes-scope-creep-6675