Request for Proposal

 

Assignment Content

  1. This week you take on the role of the Senior IT Project Manager for the organization you chose in Week 1. As a Senior IT Project Manager, your responsibilities may include proficiently working with a variety of technologies, conduct meetings with stakeholders, create and forecast budgets, and design project plans.

    The CFO of your chosen organization wants the organization to purchase and integrate six new web servers. The CIO envisions more business travelers using the Web to purchase airline tickets and reserve rental cars and hotel rooms for business trips. Expansion of your company’s web capacity is needed.

    Research information about your chosen organization to complete this week’s assignment.

    Create a 3- to 5-page (does not include title or reference pages) Request for Proposal (RFP) in Microsoft® Word for the CIO, which will minimize procurement related risks for this project. The RFP should contain the following components: 

    • Purpose of the RFP
    • Organization’s background as it applies to the use of the request for new web servers
    • Analysis of procurement risks
    • Methods for managing procurement risks
    • Basic requirements for the current and new hardware and software
    • Software and hardware environment 
    • Statement of work/Requirements and schedule information 
    • Process for evaluating the RFP 
    • Include APA-formatted citations when necessary.

Create Concept Maps

 Create Concept maps for the topics below i am attaching book with this assignment.

  • Chapter 35 – Approximation Algorithms (skip proofs)
    • Content before 35.1
    • 35.1 The vertex-cover problem
    • 35.2 The traveling-salesman problem
    • 35.3 The set-covering problem

Making concept maps to summarize chapter lectures

How to make a concept map?
1. How to make the perfect mind map and study effectively? (Links to an external site.)
1. How to make a concept map? (Links to an external site.)

Online websites to make concept maps (which you don’t necessarily have to use):
1. Lucidchart (Links to an external site.)
1. Slatebox (Links to an external site.)

Building an AI machine/Deep learning application

Part 1 –

Following is the link of the Project 

1. Iris Data Set

24 Ultimate Data Science (Machine Learning) Projects to Boost Your Knowledge and Skills (& Can be Accessed Freely)

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide output for the following:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Part 2 – Updated Code…

Now that you have a working base of code, let’s apply it to a “real world” scenario…

Find an article or video that shows a potentially SIMILAR usage of the application you created in Part 1…

Update the original application so that it “works” for the NEW application…

In this “Movie Recommendation” project, you might find an article on “book recommendations” …you would then update the original program to handle the new scenario…

YOU MUST UPDATE THE ORIGINAL CODE…do not provide entirely new code base.

Run the code several times and show the intended output…you also need to EXPLAIN the output…

You will also need to provide the same output for THIS application, as you did for the ORIGINAL application…specifically:

Python file containing your code…

Dimensions of the data…

Sample of the data…

Statistical summary of the data…

Class distribution…

One univariate and one multivariate diagram…

Decision Tree…explain the best depth and why?…

Results of training and new data, 80%-20% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

Results of training and new data, 50%-50% split…

Accuracy report…what is it telling us?…

Confusion matrix…what is it telling us?…

Classification report…what is it telling us?…

dis_dba11

 While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.  

one and half page in apa formart, with 2 scholar references , no plagarism of any kind

Develop the C or C++ source code required to solve the following problem

CS 3361 | Fall 2020 | Assignment #3 Lexical Analyzer

Assignment #3

Lexical Analyzer

Develop the C or C++ source code required to solve the following problem.

Problem

Develop a lexical analyzer in C or C++ that can identify lexemes and tokens found in a source code file provided by the user. Once the analyzer has identified the lexemes of the language and matched them to a token group, the program should print each lexeme / token pair to the screen.

The source code file provided by the user will be written in a new programming language called “DanC” and is based upon the following grammar (in BNF):

P ::= S S ::= V:=E | read(V) | write(V) | while C do S od | S;S C ::= E < E | E > E | E = E | E <> E | E <= E | E >= E E ::= T | E + T | E – T T ::= F | T * F | T / F F ::= (E) | N | V V ::= a | b | … | y | z | aV | bV | … | yV | zV N ::= 0 | 1 | … | 8 | 9 | 0N | 1N | … | 8N | 9N

Your analyzer should accept the source code file as a required command line argument and display an appropriate error message if the argument is not provided or the file does not exist. The command to run your application will look something like this:

Form: danc_analyzer

Example: danc_analyzer test_file.danc

Lexeme formation is guided using the BNF rules / grammar above. Your application should output each lexeme and its associated token. Invalid lexemes should output UNKNOWN as their token group. The following token names should be used to identify each valid lexeme:

Lexeme

Token

Lexeme

Token

Lexeme

Token := ASSIGN_OP + ADD_OP do KEY_DO

<

LESSER_OP

SUB_OP

od

KEY_OD > GREATER_OP * MULT_OP IDENT

=

EQUAL_OP

/

DIV_OP

INT_LIT <> NEQUAL_OP read KEY_READ ( LEFT_PAREN

<=

LEQUAL_OP

write

KEY_WRITE

)

RIGHT_PAREN >= GEQUAL_OP while KEY_WHILE ; SEMICOLON

CS 3361 | Fall 2020 | Assignment #3 Lexical Analyzer

Additional Solution Rules

Your solution must conform to the following rules:

1) Your solution should be able to use whitespace, tabs, and end of line characters as delimiters between lexemes, however your solution should ignore these characters and not report them as lexemes nor should it require these characters to delimit lexemes of different types.

a. Example: “while i<=n do”

i. This line will generate 5 lexemes “while”, “i”, “<=”, “n”, and “do”.

ii. This means the space between “while” and “i” separated the two lexemes but wasn’t a lexeme itself.

iii. This also means that no space is required between the lexemes “i”, “<=”, and “n”.

2) Your solution should print out “DanC Analyzer :: R<#>” on the first line of output. The double colon “::” is required for correct grading of your submission.

3) Your solution must be tested to ensure compatibility with the GNU C/C++ compiler version 5.4.0.

4) Lexemes that do not match to a known token should be reported as an “UNKNOWN” token. This should not stop execution of your program or generate an error message.

Hints

1) Draw inspiration by looking at the lexical analyzer code discussed and distributed in class.

2) Start by focusing on writing the program in your usual C/C++ development environment.

3) Once your solution is correct, then work on testing it in Linux using the appropriate version of the GNU compiler (gcc).

4) Linux/Makefile tutorials:

a. Linux Video walkthrough: http://www.depts.ttu.edu/hpcc/about/training.php#intro_linux

b. Linux Text walkthrough: http://www.ee.surrey.ac.uk/Teaching/Unix/

c. Makefile tutorial: https://www.tutorialspoint.com/makefile/index.htm

What to turn in to BlackBoard

A zip archive (.zip) containing the following files:

___Assignment3.c / ___Assignment3.cpp

o C/C++ Source code file

o Example: Eric_Rees_R123456_Assignment3.c

• Makefile

o A makefile for compiling your C/C++ file.

o This makefile must work in the HPCC environment to compile your source code file and output an executable named danc_analyzer.

CS 3361 | Fall 2020 | Assignment #3 Lexical Analyzer

Example Execution

The example execution below was run on Quanah, one of the HPCC clusters. It shows all the commands used to compile and execute my analyzer. Bolded text is text from the Linux OS, text in red are the commands I typed and executed, and the text in blue represents the output from each step.

quanah:/assignment_3$ make clean

rm -f danc_analyzer

quanah:/assignment_3$ make

gcc -o danc_analyzer Eric_Rees_R123456_Assignment3.c

quanah:/assignment_3$ ./danc_analyzer test.danc

DanC Analyzer :: R123456

f IDENT

:= ASSIGN_OP

1 INT_LIT

; SEMICOLON

i IDENT

:= ASSIGN_OP

1 INT_LIT

; SEMICOLON

read KEY_READ

( LEFT_PAREN

n IDENT

) RIGHT_PAREN

; SEMICOLON

while KEY_WHILE

i IDENT

<= LEQUAL_OP

n IDENT

do KEY_DO

f IDENT

:= ASSIGN_OP

f IDENT

* MULT_OP

i IDENT

; SEMICOLON

i IDENT

:= ASSIGN_OP

i IDENT

+ ADD_OP

1 INT_LIT

od KEY_OD

; SEMICOLON

Spam Email

 Topic – Spam Email Detection

Research content (at least 1000 words and 6 references – 3 must be scholarly peer-reviewed articles)

Create visualizations using R Language as applicable, discuss findings

**Must be APA formatted** **College Level Writing****No grammar issues and no  spelling issues**

  • Title Page – Include Group number and names of all contributors from the group
  • No abstract is to be included
  • Document body with citations (rewrite all information used from sources)
  • Reference Page

cyber law – Discussion 3 response

 A. Explain why there are two types of legal systems in the United States: State and Federal systems. How are they similar and how are they different?

I am adding my classmate’s response for the above question. You will have to write response for each post in 250 words. No references needed.  

Discussion 1: (Khushbu Patel)

The United States has two individual court systems which are state court and federal courts because of federalism. This concept is introduced by the U.S constitution where every single system has its unique sort of regulations.  Many factors such as structure, establishment, cases heard, and the jurisdiction involved with existing of both courts. The term federalism describes how governmental authority and powers are distributed between the state government and federal government systems. However, the constitution decisively provides the assured powers to the federal administration.  For example, copyright is exclusively managed by federal law constitution rights not chosen to federal government comes under separate state governments. This instance is showing each state accountable for creating personal laws therefore, those laws are crucial for that picky state. Certainly, federalism ensures that the U.S constitution should not be disobeyed or violated by any State law.  To support this statement, state laws should not rule or overshadow federal laws. United States constitution issues laws and regulations for the federal system of government in which influence and authority shared between the state government and federal governments. As we stated earlier, federalism provides systems according to respective courts (O’Connor,1980).

Appointing process of judges

Federal judges are appointed according to Article 3 of our constitution. When hiring judges, the federal court system that judges are to be selected by the U.S president and declared by the council of law. They will be continued by good and appropriate behavior otherwise judges may be dismissed from the position. While state court judges have been chosen by many approaches including hired for a decided number of years, general election, and appointment for life, combination of both methods.

Establishment of courts

The U.S holds the authority to declare the final arbiter of federal constitutional subjects when a party asked the U.S Supreme Court to re-evaluate a conclusion of the court petition however the Supreme Court is under no commitment to give a final verdict. In the case of the state court system, the laws of every state create the state court. A supreme court is basically the highest court in the state that will handle cases from below courts can be a district court of state trial court for the verdict by the supremacy of state supreme court.  States also have an authority that deals with precise legal issues include, including will and estate, family court, juvenile court, etc,. On the other hand, some certain cases are appropriate for review by the U.S Supreme court(Koh,1998).

Sort of hearing cases

The federal court system cases that hold with the law constitutionality. Those Cases involved representatives and civic ministers, admiralty law, bankruptcy, habeas quantity issues. Some of the federal courts hearing cases are bankruptcy, maritime law case, patent, violations.  In the instance of the state court system, criminal cases, contract cases, tort cases, family issues, personal injuries. State courts are the final negotiators of state laws and constitutions. Their explanation of U.S federal law can be pleaded to the U.S Supreme Court. The Supreme Court can decide to hear or not to hear similar cases. Some of such cases family law cases, contract disagreement,  personal injury, criminal cases, traffic violations (Koh,1998).

—————————————————————-

Discussion 2: (Rakshith)

The Federal government has the power to regulate trade between the states. Another important power that the Federal government has is the power to declare war. The State governments have powers too. The state has their own laws and their own police. States generally run their own schools. Now some powers are shared between the two. Both the Federal and the State government have the power to tax. And because of Federalism there are both Federal and State Legal systems in the United States (Stephen, 2019).

How is the State and the Federal Legal systems similar:

Although they are both two different Legal/Judicial system, they have a number of courts of the Original Jurisdiction where in the cases are filed and tried originally. Both the Courts jurisdiction can be based on geographical and subject matter. In order to hear the appeals from the trial courts both the State and the Federal legal systems has a b number of intermediate appellate courts. Both the court system has a Supreme court where in the appeals from the appellate courts are heard (Bowman, 2017).

Now let us have a look how the State and the Federal Legal system differ from each other.

1. What they deal in

Federal courts deal with the disputes about laws that apply to the United States such as cases that deal with the constitution and the Federal Law or Dispute between the States. The federal court also hears the case if it is a legal dispute between citizens of different states, and if the case is about a copyright, patent or maritime law case. Federal courts does hear the Criminal cases if the matter is listed in the US code of conduct (Bowman, 2017). 

State courts Deals with the disputes about the state laws such as cases that deal with the State law, family cases (divorce, custody) and Criminal cases (Bowman, 2017).

2. Structure

Federal court starts with US District court > US courts of Appeals > Supreme Courts.

State courts system starts with Circuit court > Court of Appeals > Highest court (Bowman, 2017).

3. Selection of the Judges

In case of the Federal legal system Judges are appointed and typically hold office for life but can be removed or impeached for misbehavior (Bowman, 2017).

In case of the State government Judges are usually elected and appointed for a number of years and in some cases Judges do hold the position for life (Bowman, 2017).

ERM Management

What are the business Opportunities that can be leveraged in the wildfire crisis, and what are the business risks ?

How can you Mitigate/Reduce the business risks?

Support Your analysis with academic references .

Mitre ATT&CK framework

I need a 5 page in-depth review of the Mitre ATT&CK framework. This paper must include a  description of the framework, how it is used, its advantages and disadvantages, and how it could be improved.