Computer Science IT 501-3 assignment

You are required to submit a 1,000-word, double-spaced on: 

Three applications of GIS (Geographic Information Systems).

You will use your textbook, the university digital library and online resources with proper citations.

You must have three parts:

  1. Review of source(s)
  2. Opinion and commentary
  3. Citations

Unit 5 Practical – Packet Filtering

  

United Helpers is a nonprofit organization that provides aid to people after natural disasters. Based on the following description of operations, create the appropriate fully labeled Crow’s Foot ERD.
Volunteer carry out the tasks of the organization. The name, address, and telephone number are tracked for each volunteer. Each volunteer may be assigned to several tasks, and some tasks require many volunteers. A volunteer might be in the system without having been assigned a task yet. It is possible to have tasks that no one has been assigned. When a volunteer is assigned to a task, the system should track the start time and end time of that assignment.
 

Each task as a task code, task description, task type, and task status. For example, there may be a task with task code “101” a description of “answer the telephone” a type of “recurring”, and a status of “ongoing.” Another task might have a code of “102” a description of “prepare 5,000 packages of basic medical supplies,” a type of “packing and a status of “open”.
 

For all tasks of type “packing,” there is a packing list that specifies the contents of the packages. There are many packing lists to product different packages, such as basic medical packages, child-care packages, and food packages. Each packing list has an ID number, a packing list name, and a packing list description, which describes the items that should make up the package. Every packing type is associated with only one packing list. A packing list my not be associated with any task, or it may be associated with many tasks. Tasks that are not packing tasks are not associated with any packing list.
 

Packing tasks result in the creation of packages. Each individual package of supplies produced by the organization is tracked, and each package is assigned an ID number. The date the package was created and it’s total weight are recorded… A given package is associated with only one task. Some tasks (such as “answer the phones”) will not produce any packages, while other tasks (such as “prepare 5,000 packages of basic medical supplies”) will be associated with many packages.
 

The packing list describes the ideal contents of each package, but it is not always possible to include the ideal number of each item. Therefore, the actual items included in each package should be tracked. A package can contain many different items, and a given item can be used in many different packages.
 

Each item that the organization provides has an item ID number, item description, item value, and item quantity on hand stored in the system. Along with tracking the actual items that are placed in each package, the quantity of each item placed in the package must be tracked as well. For example, a packing list may state that basic medical packages should include 100 bandages, 4 bottles of iodine, and 4 bottles of hydrogen peroxide. However, because of the limited supply of items, a given package may include only 10 bandages, 1 bottle of iodine, and no hydrogen peroxide. The fact that the package includes bandages and iodine needs to be recorded along with the quantity of each item included. It is possible for the organization to have item that have not been included in any package yet, but every package will contain at least one item.

HomeWork

Discuss how and why companies use cryptography.

Length, 2 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

All paper are checked for plagiarism using SafeAssign, you can review your score.

marketing strategies

  Company: AMAZON INC.

Based on mile stone 2 idea proposed for the product. 

Power point presentation

15 slides and each slide need to have your speaker’s notes in the event you do not present it LIVE 

· Think about how you would present the idea of your new or redefined product to your CEO. 

You have a limited amount of time and must hit on the high points. 

Company introduction

About Redefined product 

Ideas on how to present to ceo in deep.

Advertising

Please read the Scrum Primer and

  

Please read the Scrum Primer and analyze the Scrum process 

Write a paper 1. Comparing the RUP SCLC we discussed in class to the Scrum SDLC process 2. Identify in the Scrum SDLC Process a. What activities and tasks you would implement in the process to ensure that you are mitigating risk, and software security is “built in” though out the process. Please briefly describe the salient point of those activates and tasks. b. At what steps in the Scrum process would you implement the activities and tasks you have recommended § Please be brief and concise as possible, I suggest that the paper could be as brief as two (2) to three (3) page. Feel free write more than several pages if you need to, to ensure that you have adequately describe you software risk mitigation assurance activities and tasks. § Please follow the APA Template format.

Analyze Mayo Clinic Primary Biliary Cirrhosis, sequential data

 

Use the pbc dataset (https://stat.ethz.ch/R-manual/R-devel/library/survival/html/pbcseq.html) to identify an important variable in a time to event context. 

First, assess the normality of each of the candidate variables and create a table showing the appropriate summary statistics ( e.g. mean +- sd or median)

Then, create a standard Cox regression model for survival using each of the variables. Then use LASSO regression to identify a parsimonious set of variables predictive of survival. Propose what you believe to be the best model for the prediction of survival.

Next, use an interesting R package you find online to identify any variables that may be non-linearly associated with the time to event outcome. 

Finally, create an interesting figure that you feel adequately displays and demonstrates the information that you have found.

Research paper review in detail

 

I need the following after reviewing the paper

Problem Statement – Issues discussed by the author

Approach & design – How the authors approach to the issue & what proposed ideas they mentioned

Strengths and Weakness – strengths & weakness of the proposed approach & design, and about the paper.  what are the key strengths of the authors proposed system and weakness of the system.

Evaluation(Performance) – How the authors evaluated the proposed system, what parameters they used to test the performance

Conclusion(In readers perspective)

Along with these, I need to have a detailed explanation of the paper section-wise:

sections are:

Abstract

Introduction

System environment

understanding durability

Improving repair time

Reducing transient cost

Implementing carbonite

Related work

Summary

Conclusion and future work

Comprehensive Cloud Plan 

 

The plan is for your client, a federal government agency, which is preparing for a Microsoft Azure cloud pilot. The Comprehensive Cloud Plan is the first of a two-part assignment for your client’s CIO. The plan should be submitted in a Word document. The Comprehensive Cloud Plan should be eight to 10 pages, including cover page, images or tables, and references.

Your plan should include the following information for the CIO:

  • an executive summary to describe the requirements
  • at least three benefits of using Azure
  • a detailed explanation of the Azure cloud types and deployment models
  • definition of common Azure terms: tenants, management groups, subscriptions, resource groups, and resources 
  • the significance of FedRAMP 
  • the Azure governance model

Project 2: Cloud Computing Assignment

 Now that you understand and have created a virtual machine, your Caduceus CTO, Eliza, has asked you to extend that application and provision infrastructure in the cloud. Specifically, you will provision a Windows operating system in the cloud. The provisioned infrastructure could be accessed by any end-user device client. This includes a desktop running Microsoft Windows, a Mac device running Apple MacOS, iPad, Android Tablet, and even a Google Chromebook. You will use any of the aforementioned end-user devices to access the provision infrastructure once this is set up.

Step 1: Log Into Your AWS Academy Account

You will use the same AWS Academy account used in Week1.

In project 1, you reviewed the following AWS Academy (Student Guide) to set up and log into your AWS Academy Account. Now login to access and use your Learner Lab for project 2. Be sure to read the guide carefully before proceeding:

Note: The AWS Academy Learner Lab (Student Guide) provides students with instructions for using AWS Academy Learner Labs. The Learner Lab offers a lab environment suitable for student projects over a period designated by the department. 

Step 2: Download the Week 2 Assignment Template

Download the template you will use to submit your project. (CMIT 495 Project 2)

When providing a detailed overview of the steps required to install the Windows operating system on the virtual machine, make sure to include screenshots of each step in the process. Specific details and instructions are included within the Week 2 Assignment Template.

Note, when completing the EFS configuration process, be sure to follow the hints in this document to save some time. (EFS Hints.docx)

Step 3: Install and Configure a Microsoft Windows Operating System

  • Provision cloud infrastructure via Amazon and an OS platform (PaaS) by installing and configuring a Microsoft Windows operating system that can be accessed on demand by any end-user device.  Note, installing a Windows O/S is similar to what you did for Ubuntu. Just select the Windows Server Free tier.
    • Research and use AWS documentation and tutorials for instructions and guidance to complete the assignment.
    • Consult the AWS Connection Documentation in order to connect to the Microsoft Windows operating system.