9 – Imoprtance of strategic IT planning

 

Discussion: Physical Security

Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.

At least two scholarly sources should be used in the initial discussion thread. Use proper citations and references in your post. The answer should be a minimum of 250 – 300 words.

Order # 13501

Title: Programming in C: Getting Started

Paper type Other (Not listed)

Paper format APA

Course level Undergraduate

Subject Area Technology

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

This assessment consists of four short programs. Use Code::Blocks to complete your work. You will submit the four C source code files for this assignment. Please zip the files and include your name in the name of the compressed file.

Part 1: Commenting Code

Including comments in source code that explains what the code does and how it does it are an important professional best practice. Code that is well-commented and well-formatted facilitates communication between programmers and others needing to work with the code. Commenting your code needs to be a habit from the beginning. Adding comments to code will also help reinforce important C programming concepts in your own mind.

Type in the code provided in the assignment Resources, build/compile the program, and run it. Typing the code in yourself rather than copying and pasting will help you get to know the C language. When you have the code running, go through the code and add comments to explain what the code does and how it does it. Be sure to add a header like the following to all code files (with your name and the date).

/* Ann Smith – IT-FP2240 – u01a1 – Part 1

* 10/01/2015 Rev. 1

*/

You should add at least five comments to the code provided. Be sure to recompile and test the code after you have added your comments to make sure you have not introduced any syntax errors.

Part 2: About You

Create a program that prints three lines of text about yourself. Be sure to include appropriate spacing and new line characters to make the output in the terminal window readable. As with all programming code, but sure to format the program correctly and include comments and a header for the file, such as shown above.

Part 3: Integer and Floating Point Arithmetic

Write a single program that prints the results of two arithmetic expressions using integers and the results of two floating-point calculations. Print out both the arithmetic expressions and the answers calculated by the code. For this program, it is fine to use “hard-coded” values (the numbers used in the calculations are provided in the code) rather than user input. Be sure to format the code correctly and include relevant comments in the source code (including the comment at the top of the file with your name and identification of the program).

Part 4: User Input

Write a program that prompts the user to enter a character, an integer, and floating point number. After reading the input, the program should print out the values entered. Be sure to format the code correctly and include relevant comments.

When you are ready to turn in your assignment, download your .c source code files and zip them together for submission.

Requirements

Include a title page and reference page, if necessary.

•APA format.

•Times New Roman font, 12 pt.

•Double-spaced.

Final Presentation

The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  

The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.

Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.

Conclude your paper with a detailed conclusion section that discusses both limitations and emerging concepts. 

The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Policy and legal_Project

Abstract for the project

Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.

Submit all documents at on time. Do not zip or otherwise compress them. Do not use .rar. Use .doc and .ppt extensions

DAta mining week 8 assignment

Imagine a Clustering problem where the educational researchers would like to find clusters of students (group of students) who have similar correlation patterns when it comes to correlation of their GPA vs Income of their parents. And you are hired as the Data Scientist to do this job. 

What kind of Objective Function would you design?

Why?

Please use your own reasoning and explain in details.

Review Article

 review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. 

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.