Homework in R

 

In this homework, you will do some data analysis using R for the Forest Fire Data described https://archive.ics.uci.edu/ml/datasets/forest+fires (Links to an external site.) The dataset is used to find the relationship between the burned area of forest fires and meteorological data.

Please provide your output only in .HTML format. Do not send the .rmd file.

I have already downloaded the forest fires data and added it to the files section.

https://classroom.ucsc-extension.edu/files/1144259/download?download_frd=1

  1. Import the data into R.
  • How many observations are there in the dataset?
  • How many observations are there with a fire (i.e., area>0)
  • How many observations are there with a rain (i.e., rain>0)
  • How many observations are there with both a fire and a rain?

 2.Show the columns month, day, area of the all the observations.

 3. Show the columns month, day, area of the observations with a fire.

 4.How large are the five largest fires (i.e., having largest area)

 a.What are the corresponding month, temp, RH,wind, rain area?

 b.Add one column to the data indicating whether a fire occurred for each   observation (True for area >0 and False for area ==0) (Use Mutate function)

5.Create the following to display the outliers from the below vector.

    -plot 

   – boxplot

Also mention the numbers that are outliers in this vector.

(1,2,50,45,67,200,230,55,56,49)

6. Using the dplyr approach, perform the following actions from ‘iris’

  a) select the columns  Sepal.Length, Sepal.Width, Petal.Length,Petal.Width

 b) filter the iris data for Species = “setosa” or “virginica”

ms08-067 exploit using metasploit

Based on the vulnerabilities found via nmap, use Metasploit to compromise the Windows XP machine. Gain shell access and transfer a file of your choice from the target machine to your Kali machine. Also, perform a remote screen capture using Metasploit of the compromised machine. You will need to use an auxiliary module to do this. Finally, install the persistence Meterpreter service. Be sure to document each step you take with both screen shots and descriptions of the commands employed. Tip: In metasploit you can use “search” keyword to find the exact vulnerability and payload you want to use Tip 2: You can exploit any vulnerability on the WinXP machine, but MS08-067 works very well.

 What to Submit: Provide a report of your work. For each task, give a complete description of your steps, include all commands used, the reason why each command was used, and screenshots of the steps employed during your attack using the Metasploit framework. Perform screen captures of both the Metasploit and target machine, show the commands used and results to prove that you have accomplished each of the following steps:  PAGE 3 OF 3 [20 pts] Obtain shell access to the Windows XP machine using the Meterpreter payload and set all necessary Metasploit options correctly. [10 pts] Transfer a file of your choice from the target machine to your Kali machine. [10 pts] Perform a remote screen capture of the compromised machine using Metasploit. This can be done in various ways; one way is to using an auxiliary module. [20 pts] Install the persistence Meterpreter service on the Windows XP machine that will automatically connect back when the system boots. Reboot the Windows XP machine and show that it automatically connects back to the Kali machine.

Operating System (Computer Science)

You need to have set up your Class DevBox Environment (see the Getting Started section) before starting this assignment.

The assignment description is attached and is also available in your repository subdirectory named assg03. Follow the assignment instructions and submit the required tar.gz submission file to this MyLeoOnline dropbox by the due date. You should only submit the assg03.tar.gz for this assignment, no other files should be submitted. Use the make submit target to create the correct submission file:

$ make submit

For this assignment you should have git, vagrant and virtual box setup in your computer. Please visit the following link provided by my professor for these setup.

https://bitbucket.org/dharter/csci430-os-sims

And the assignment is attached below.

5-1 Discussion: E-Commerce

 In this module, we have explored the surge of e-commerce and the escalation of online contracts. How has the evolution of the internet piloted the growth of e-contracts? With the implementation of legislation, the Electronic Signatures in Global and National Commerce Act (E-SIGN Act) and the Uniform Electronic Transactions Act (UETA), what is the impact and significance of digital signatures in cyberspace?

Finally, in responding to your peers’ posts, discuss the validity of e-contracts within an information technology business model. What are the boundaries of e-contracts? Offer suggestions on how your peers can protect contracts that fall outside the boundaries. 

Business Stratergy

 1) 350 words – Why is it critical for company managers to have a clear strategic vision regarding their organization? 

2) 1 reply of 150 words

main paper

 

Define “Anything-as-a-Service (AaaS) and discuss in detail at least one example AaaS category or implementation. For examples see  https://timesofcloud.com/cloud-tutorial/xaas/.

Apply APA Edition 6 formatting. You do not need an abstract or Table of Contents but include an introduction and summary.

Use at least three properly documented references (do NOT use wikis). Correctly cite your references using APA Edition 6 formatting.

Your paper should be at least 500 words in length using good grammar. Use complete sentences and paragraphs. Do not use bullets.

Be sure and use a spelling and grammar checker.

Your paper should be at least 500 words in length.

There is a Word template in week 1 with default font and spacing.

Your paper will checked by SafeAssign for originality. With the exception of quoted material, all writing should be your own.

Aspect Oriented programming project

 

I need assistance on this Aspect Oriented Programming project. The first requirement for this project is that the programming must use AspectJ on Eclipse java IDE.

The project details description in attached.

This program must run please.

You only need to turn in the actual software by exporting the project from Eclipse. You do not need to turn in any type of design document.

To export a project in Eclipse, follow these steps.

1. Right click on the project and select Export

2. In the General folder select Archive File

3. Click the Browse button

4. Give is a file name with a .zip extension

5. Click the Save button

6. Click the Use Zip button

7. Click the Finish button

Please, this program must run on Eclipse Java IDE.

Order # 12527

Title: Network Installation

Paper type Essay

Paper format APA

Course level Undegraduate

Subject Area Other (Not listed)

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, imagine your cousin, Frank, just bought a small hardware store. He wants to install a network that will include 14 PCs; a printer, scanner, and fax combination; and a cable modem line that are all currently configured as a P2P network. Frank is on a tight budget, so he would like to do the work himself. He has been conducting research and cannot decide if he should install Cat5, Cat6, or fiber. He has asked you to help with his decision.

To prepare to make recommendations, complete the practice labs provided in the Virtual Resource Portal activity for this assessment.

Then, using research you conduct on the Internet and the lab activity as references, write a 3–5-page report in which you make recommendations to Frank. Address the following:

•Compare and contrast the different cabling standards.

•Discuss the cost benefits of client/server networks.

•Define the basic concepts of network cabling.

•Recommend a network to Frank based on your research.

•Apply the concepts from the practice lab activity for this assessment.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.