5s week 10 assignment BS

In 300 Words

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Please include references, strictly no copy paste.

Giving useful direction: How to make cheesy baked mussels ?

My approved idea: 

Have you ever tried cheesy baked mussels at restaurants and wondered how they make it? 

Cheesy baked mussels dish is a juicy and tasty seafood appetizer and of course, you can easily make it at home without any cooking experience. 

I always use frozen mussels so I highly recommend using frozen mussels instead of fresh mussels since frozen mussels already come in half-shells, ready to use after thawing, and easy to find at any supermarket. The rest of the ingredients; mayonnaise, Cheddar cheese, oyster sauce, lime juice, and green onion; might be available in your kitchen or you can easily buy it. We also need to have an oven, any size, or an air fryer to bake. 

1. Write your completed directions.

  • Your directions must be written step-by-step directions. You cannot use images or diagrams, or direct people to other sets of directions. You must describe everything the reader needs to make sense of the task.
  • The directions should be between 1-3 pages in length, but you are not graded on length.
  • Use spacing and layout to help the reader. Do not just make a numbered list in Microsoft Word. Add titles and subtitles, group related steps, etc.
  • You will be graded on the quality of your directions. They should be clear, logical, and grammatical.

Notes on this assignment:

  • Do not plagiarize. The point of this assignment is for you to practice breaking a task into step-by-step components. Copying from another guide (either structure or phrases) is cheating, so don’t do it or you’ll get a 0 and be reported to the academic integrity office.
  • Recipes are a good example of these kinds of directions, as are how-to manuals. Examples: Google Earth, (Links to an external site.) Adobe Photoshop CC (Links to an external site.)
  • Bad directions merely give the “correct” way to do the task. Good directions help the users understand the task better and be able to make better choices. For example, bad directions simply give some options without explaining why one might choose them, or tell the user what to do without explaining why they need to do things in that way. Another way to say this is that bad directions merely help a user do a task, good directions help them understand a task.

DS-1

Write at least 500 words analyzing a subject you find in this  article related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Article: https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format. 

Enforcing copyright protections on the Internet.

Week 4 Written Assignment

Each assignment will be an essay written in APA format (see below). Each essay should be no less than 1500 words on the topic (s) noted below.

The title page and bibliography do not count towards the word count.

Complete the assignment in a Word document using APA formatting with your last name as part of the file name. Omit the abstract and outline. A Word APA template and APA sample paper are provided for reference

After completing the essay, save and upload the document in the Assignments section of the e-classroom.

Each essay will be checked by Turnitin automatically upon submission.You will have access to the originality reports.

Topic: After conducting independent research using at least three sources not used in the class write an essay that examines issues surrounding digital media and enforcing copyright protections on the Internet.

Python Programming Assignment

Update (10/24): 

  • The file hashtable.py has been updated and now includes some code to get started with unittest (go to MS Teams to download it).
  • You will want to download hashtable.py and add onto it, rather than importing it from a new file you create (since you won’t be able to extend the class across separate files).
  • Yes, there is some redundancy between unit tests and the file test_hashtable.py. I am using test_hashtable.py in order to both test and interact with your class (more easily). If your unit tests are thorough/comprehensive, then it will likely look similar to the final version of test_hashtable.py that I will use. 

The tasks in this assignment are to extend the HashTable class that is currently defined in the file “hashtable.py” (located in MS Teams -> General -> Files -> Code). 

By extending it we will increase the functionality of the HashTable class (by adding more methods) and will make it more flexible (e.g. can resize itself as needed) and robust (e.g. no issues/errors when it is full and an item is added). 

The ways to extend the class, and thus the requirements for this assignment are as follows. 

1. Override Python len() function to work with HashTable in a specific way – Using def __len__ will override the Python len() function. The way this is implemented should be to return the number of items stored in the hash table (note: this is *not* the same as HashTable’s “size” field). 

2. Override Python in operator – This will be done using def __contains__ and should be implemented so this operator will then return a boolean when used in statements of the form  54 in myhashtable. For this example, the function should return True if 54 is an existing key in the HashTable instance myhashtable, and False if it is not. 

3. Override Python del operator – This is done by  using def __delitem__ and should allow for a key/value pair to be removed from an instance of HashTable (e.g. del h[54]). Think about how you want to handle cases when deleting a key that was involved with collisions. Be sure to include in the documentation for this method any assumptions/restrictions on how this can be used. 

4. Modify exiting put method to resize an instance as needed – The current HashTable implementation is limited in that it is not able to gracefully handle the case when an item is added to already full HashTable instance. This method should be modified to deal with this more gracefully, and should resize the instance for the user. Be sure to include documentation here describing exactly when you choose to resize and how you select an appropriate new size (remember that prime numbers are preferred for sizes, in order to avoid clustering, or an even more severe but subtle issue). 

All of those methods should be clearly documented to describe how and why the implementation is defined as it is. You will also want to use unittest on this assignment. One good use case for unittest will be to add a few items (and maybe even delete) one, and then to use unittest to verify that the slots and data fields are equal to what you expect. All of the extensions that you’ve added should be tested as well.  

Lastly, for grading, you will want to ensure that you’re program can be run through a test script. The test script will look like the code shown at bottom of this assignment description. When it is run we should expect output similar to what is shown in this screenshot.

test_hashtable.py (the final test script will vary slightly from this):

from <> import HashTable

# instantiate a HashTable object
h = HashTable(7)

# store keys and values in the object
h[6] = ‘cat’
h[11] = ‘dog’
h[21] = ‘bird’
h[27] = ‘horse’

print(“-“*10, “keys and values”, “-“*10)
print(h.slots)
print(h.data)

# check that data was stored correctly
print(“-“*10, “data check”, “-“*10)
if h.data == [‘bird’, ‘horse’, None, None, ‘dog’, None, ‘cat’]:
    print(”    + HashTable ‘put’ all items in correctly”)
else:
    print(”    – items NOT ‘put’ in correctly”)

# check that ‘in’ operator works correctly
print(“-“*10, “in operator”, “-“*10)
if 27 in h:
    print(”    + ‘in’ operator correctly implemented”)
else:
    print(”    – ‘in’ operator NOT working”)

# delete operator
del h[11]

# check that len() function is implemented and works
print(“-“*10, “len() function”, “-“*10)
if len(h) == 3:
    print(”    + ‘len’ function works properly”)
else:
    print(”    – ‘len’ function NOT working”)

# “in” operator (returns a boolean)
print(“-“*10, “len() after deletion”, “-“*10)
if 11 not in h:
    print(”    + ‘in’ operator works correctly after 11 was removed”)
else:
    print(”    – ‘in’ operator OR ‘del’ NOT working”)

# check that data was also removed
print(“-“*10, “data after deletion”, “-“*10)
if h.data == [‘bird’, ‘horse’, None, None, None, None, ‘cat’]:
    print(”    + data is correct after deletion”)
else:
    print(”    – data not correctly removed after deletion”)

Assignment

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Youtube link:  https://www.youtube.com/watch?v=ehRCA8eYJzk 

Managerial Economics D-1

using the link below write the discussion 350 words

Free Markets Didn’t Create the Great Recession

Read the attached opinion piece where the author indicates that the Great Recession of 2009 was not caused by the Free Market, but was instead caused by US Government policies.   

Locate two JOURNAL articles that discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology. 

2) 2 replies each 150 words

Project Assignment

 

Write a 6-8 page paper (deliverable length does not include the title and reference pages)

  • What are the principles and limitations to an individual’s right to privacy?
  • What are the trade offs between security and privacy?
  • What is the issue of freedom of speech versus the protection of children online?

Due: Assignment is due on the day stated in  the Course Schedule

  • Provide three articles to substantiate the above three questions.
  • Use APA format to provide a citation for each of the articles you read.
  • Suggestion: Use a search engine (Google) and keywords.

Information systems infrastructure Research Paper

 Summary:

Select a topic from the following list on which you would like to conduct an in-depth investigation:

  • Information systems infrastructure: evolution and trends 
  • Strategic importance of cloud computing in business organizations 
  • Big data and its business impacts 
  • Managerial issues of a networked organization 
  • Emerging enterprise network applications 
  • Mobile computing and its business implications 

Note: The above topics are also the basis of the discussion questions. You may use up to three resources found by yourself or your peers as peers as resources for the paper. 

Research paper basics: 

  • 8-10 pages in length 
  • APA formatted 
  • Minimum six (6) sources – at least two (2) from peer reviewed journals 
  • Include an abstract, introduction, and conclusion 
  • See rubric for more detailed grading criteria 

Some good questions to ask yourself before turning in your research paper: 

  • Is the paper of optimal length? 
  • Is the paper well organized? 
  • Is the paper clear and concise? 
  • Is the title appropriate? 
  • Does the abstract summarize well? 
  • Are individual ideas assimilated well? 
  • Are wording, punctuation, etc. correct? 
  • Is the paper well motivated? 
  • Is interesting problem/issue addressed? 
  • Is knowledge of the area demonstrated? 
  • Have all key reference been cited? 
  • Are conclusions valid and appropriate?