Follow instructions on the file for my coding projects in C++ language
Application Security in software development
Discuss the following, supplying citations to support any information that you provide. Do not include your opinion, only what you can support with a citation. Address the following topics.
- How does Application Security relate to software development?
- Define application and software development
- Briefly describe the role of application security in software development
- Discuss two software development approaches
- For each briefly discuss the high-level principles/approach
- Discuss how Application Security should be included in each phase/step of the approaches
- Discuss what elements of the application should be addressed and how. Examples: data at rest, data in motion, identity management, etc.
- Discuss the potential downfalls that can occur if Application Security is not integrated with application development
For all writing assignments ensure that you do the following:
- Write 1000 to 1500 words in APA format.
- Utilize at least five scholarly references.
- Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources.
- Utilize Google Scholar and/or the university library.
- Do not copy and paste bulleted lists. Instead, read the material and in your words, describe the recommendation citing the source.
- Review the rubric to see how you will be graded.
- Plagiarism will result in a zero for the assignment.
- The second instance of plagiarism will result in your failure of this class.
- If you use a source, cite it. If you do not, it is plagiarism.
review the corresponding data set and use it to answer questions and complete an exploratory data analysis. You will use R and Excel to complete the assignment.
The second data set includes data about the customers of a telecom company, the services they subscribed to, and whether they left the company’s services. Multiple aspects of the customer’s behaviors could be analyzed using this dataset.
The data and the variable descriptions can be found at:
https://www.kaggle.com/blastchar/telco-customer-churn
Requirements:
Part I: Contextualization
In the Introductory section for Part 1 of your 4-5-page report, provide a contextualization of the dataset by doing the following:
Download the selected data set and review its description. Specify the selected dataset.
Summarize the story behind the data. Provide in-text and reference list citations of any outside sources that you consulted to contextualize the data collection efforts.
Explore the dataset. Explain the attributes of the entities.
Describe the data captured in the data set.
Summarize three observations from a cursory visual inspection of the data.
Part II: Research Questions
When data is collected, or even before collection starts, we have the purpose of the analysis in mind and plan accordingly. For an analysis to provide us with meaningful insight, we must plan it well and have a clear research question or questions in mind. The term “research” can sound scary, but it refers to a path to satisfying curiosity or resolving a problem. For Part II, which should be 2-3 pages, provide an analysis based on the background of the data sets:
Write three questions that this dataset can help answer.
Explain the importance of these questions in a business or other relevant context.
Identify the variables from the data set that are relevant to the questions.
Write a sample statement of outcome that your analysis may reveal.
Underline the words in these statements that refer to the variables identified in task prompt H.
Part III. Data Preparation and Distribution Analysis. Using an R script, please perform the following:
Identify the columns that hold the values of the variables you previously identified in the analysis of the research questions. Write R script to generate a subset of the given data. If the variable is categorical and the values are not numerical, transform the values into numerical values. For example, if the values of a column are ‘Y’ and ‘N’, use SQL to convert them to “0” and “1” respectively when generating the subset. That includes only the values for the selected variables and translate categorical values into numeric codes.
Write an R script for a query that provides insights into your research question.
Part IV. Reporting
Write a 250-word executive summary for members of the general public outlining the findings from your analysis.
Your well-written report should be 10-12 pages in length, not including the title or reference pages. Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings.
You will upload a zipped file that includes your 10-12-page report and all supporting files, including Word, R code and Excel files, and screenshots that support the presentation of the findings in the report.
You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.
Web Analytics Discussion: 300 Words Minimum
300 Words Minimum
Please read the article ( https://searchengineland.com/fishing-success-use-adwords-land-big-one-b2b-company-251714 )
Discussion Point:
Is there a right way and a wrong way to use AdWords? What would you recommend to the business that you are working with to correctly implement this? No one wants to go down a rabbit hole without proper financial return. How can you ensure an appropriate return?
assignment
Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.
I.T. to Facilitate Change
Pick one “Big 4” community development topic
- Not the entire broad topic…narrow it down to one or two aspects of the topic
- Which one and why this one?
- Where and why this location? Not N. America.
(You need to have some personal knowledge of the location.) - How can IT professional field/experiences inform how you can address that topic in making a difference?
- It may be you starting an organization
- It may be you doing it in addition to your job – like a CSR initiative
- It may be a service activity you do outside your job
- What can you, as an I.T. professional, do about it to make a difference?
- Education
- Work experiences
- Your nature as an I.T. professional
- What ICT-related technology(ies) can you use to facilitate addressing the topic?
- Information technologies
- Communications technologies
- Which one(s) and how will they be used?
- You will create a Powerpoint to share with the class!
- Cover slide with your name and topic you chose
- One slide for at least each of the major bullets on this list
- That means at least four content slides
- You may find that you need up to ten slides
- References slide if you use content from anywhere on the Internet, in a book, or from a person
- The slides will be run through a plagiarism check
- Most presentations end up being 6-10 slides in length
Computer Science
Risk assessing importance
Exp19_Excel_Ch02_ML2_SmartPhone
Project Description:
You have just graduated from college and before beginning your first professional job, you would like to purchase a new smartphone. You have the option to purchase the new phone in one payment or make monthly payments by taking advantage of a 36 month flex payment plan. The payment plan charges an APR of 1.75% for the service. Prior to making your payment decision, you would like to make a worksheet to calculate the monthly payment for consumer reports top three smartphones for young professionals.
batch shell script processing.
THE CODE MUST BE IN C ONLY. Every shell needs to support a number of built-in commands, which are functions in the shell itself, not external programs. Shells directly make system calls to execute built-in commands, instead of forking a child process to handle them.
Add a new built-in exit command that exits from your shell with the exit() system call. Also add support for signal handling and terminal control (Ctrl-C, Ctrl-Z). You do not want those signals to terminate your shell. Instead, you need to handle them and terminate processes that your shell started if any. Be aware that forked processes will inherit the signal handlers of the original process.
Cloud Discussion 13
Discuss in 500 words or more best practices for incident response in the cloud. Refer to at least one incidence response framework.
Use at least three sources. Do not Use Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.