Data Analysis and Data Visualization

 “A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. 

Please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). 

Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. 

Provide a brief description of your choices and explain why you made your choices. 

Also, describe what advantage do your choices have over the others.  

Write it in a 500+ words (Just the content not including Title page/References) Needed in APA format document.

Instructions:

 Breakdown the topic using sub-headings when writing a paper.
Include in-text citations and references.APA format is expected. Please visit  http://ucumberlands.libguides.com/citations/apa  for APA guidelines.
When quoting a source, use the quote exactly the way it appears within quotation marks.
Make sure that you do not copy verbatim more than two words in a row from the text you have found in a resource. If you do use more than two words together, you will have to use quotation marks.
Review the rubrics before submission. 

Syncsession

 

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • What does the term intellectual property encompass, and why are organizations so concerned about protecting intellectual property?
  • What are the strengths and limitations of using copyrights, patents, and trade secret laws to protect intellectual property?
  • What is plagiarism, and what can be done to combat it?

Sync Sessions are held four times per term.  For the exact dates and times please check the course schedule under the Course Overview area.  To connect to a Sync Session, please click on the Sync Session Classroom area and select the appropriate session.

Due: Assignment is due Thursday of the second week in the module.

computer science

 

use android studio (java)

add some extra properties such as Item number in the stock. If there is not enough stock, then your app shouldn’t allow it put in to the basket. In this case, you need to add one more field to input number of total items etc.

write comments, and design user interface friendly

2 Assignments (Malware Attacks and Online Interactions)

 Assignment #1

Playbooks, sometimes known as Standing Operating Procedures (SOP) or runbooks, are used for troubleshooting common issues. They are often created by a team of employees who are trained to manage security issues. Playbooks often include bulleted lists, step-by-step instructions, or diagrams, all of which make it easy to follow troubleshooting instructions. 

Throughout the next 4 weeks, you will develop a playbook for a fictional company that hired you to write their playbooks and manage the team. The first portion of the playbook is a response to malware at the company.  

Outline a 2- to 3-page playbook in which a malware attack of your choice occurs.  

Complete the following in your outline: 

  • Provide details of the malware. 
  • Identify the exploited vulnerability and its attack vector. 
  • Analyze the vulnerability to determine 2 risks of this malware. 
  • Outline step-by-step instructions on how to resolve the malware attack. 

Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps and guidelines. 

Note: You will use content from this #1 assignment as part of the #2 Signature Assignment

Assignment #2

Online interactions pose a threat to all servers. Some risks can occur when employees use social networking, web browsing, and email. Playbooks typically cover a section related to threats and defenses of online interactions.  

In this next section of your playbook, outline steps to take when an employee reports clicking on a website that appeared in an email that was received.  

Include the following information in this section: 

  • Describe 2 threats this interaction poses on the company.
  • Provide step-by-step instructions on how to mitigate each interaction. 

Remember, numbered or bulleted steps or guidelines make the document easy to for others to follow under potential stressful situations. Paragraphs can be used to help support the steps or guidelines. 

Combine This assignment #2 with your revised assignment #1 – 

Apply: Malware Attacks sections of your Playbook

Cite at least 2 resources to support each assignment.

Format each assignment according to APA guidelines.

CS

 

This assignment provides you an opportunity to practice

  • writing programs using Button, FlowPane, Stage and Scene.
  • writing programs using Font and Text classes, Text methods, Stage and Scene.
  • writing programs using ImageView, Button, Pane, Stage and Scene classes, and how to create and register event handler.

Directions

Please solve three (3) programming problems related to the content presented in Chapters 14 and 15 in your text. You can find the programming problems in the attached file (Module 7 Programming Problems Worksheet.docx (Links to an external site.)). For Programming Problem 3, you will need the card files (card.zip (Links to an external site.)).

  • Download the worksheet and save it as Mod7-Worksheet-Programming-Last-First.docx. For example, Mod7-Worksheet-Programming-Smith-John.docx.
  • Consider the problem, design an algorithm (or algorithms) that would solve the problem, and then implement the algorithm in Java.
  • Create a new folder and name it as Mod7-Java-Programming-Last-First, for example, Mod7-Java-Programming-Smith-John.
  • Write the source code for each problem and save them as .java files in the folder you created. There are three programming problems for this module so you should have three .java files. Name your java files as Mod7Problem#.java, for example, Mod7Problem1.java.
  • Copy data file(s) used for your program and/or output file into the folder. In this module, make sure to include image files/folder in the folder.
  • Please insert the algorithm written in pseudocode as a comment in the beginning of your program.
  • Take screenshots of your running program – you can take screenshots using PrintScreen or any tool that you are familiar with, making sure that the console window in which you run the program appears on the screen.
  • Copy the screenshots in the worksheet. If your program has different outcomes, take screenshots of each variation.

Submission

  • Compress the folder that saves all of your java files as .zip file. Please note don’t save the worksheet in the same folder as they need to be submitted seperately.
  • Submit the following two files as attachments by clicking the Submit Assignment button above.
    • Mod7-Java-Programming-Last-First.zip (including .java files, data files, and image files/folder).
    • Mod7-Worksheet-Programming-Last-First.docx.

Assignment-Application Security

 

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.