Discussion1

Answer the following the question:

We live in a world of data, perhaps too much data. Organizations continue to store data indefinitely. In fact, about 90% of the data stored on todays databases is deemed worthless within 3 months. Think about your email. How often do you ever go back to an email from six months ago. But you still keep it for what? How should organizations government personal data in a data warehouse? What are some best practices you might suggest to your organization if you were the CIO to ensure that the data in the system was maintained properly?

Instructions

  • This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 
  • You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.
  • Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.
  • Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.
  • Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

C language, CS.

 A postfix expression is an expression in which each operator follows its operands. Table 13.4 shows several examples of postfix expressions. The grouping marks under each expression should help you visualize the operands for each operator. The more familiar infix expression corresponding to each postfix expression is also shown. The advantage of the postfix form is that there is no need to group subexpressions in parentheses or to consider operator precedence. The grouping marks in Table 13.4 are only for our convenience and are not required. You may have used pocket calculators that require the entry of expressions in postfix form. Use an adaptation of your stack library from Project 3 to write a program that simulates the operation of a calculator by scanning an integer expression in postfix form and displaying its result. Your program should push each integer operand onto the stack. When an operator is encountered, the top two operands are popped, the operation is performed on its operands, and the result is pushed back onto the stack. The final result should be the only value remaining on the stack when the end of the expression is reached. 

QUALITATIVE Journal Submit Article Reviews Here

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References   

Discussion

Initial Post

There are countless graphs and charts to choose from when converting raw data into a visual format. For many, it can be difficult to decide whether to rely on a straightforward pie chart or bar graph or to opt for a more spatially complex chart type.

Two common questions we often hear are: “How do you know which graph to use?” and “How do you know which chart to use?” The answer, as always, depends on the nuances of your readership, including their experience level and familiarity with big data analytics.

Based upon your understanding of data visualizations, what are 5 Data Visualization pitfalls? What would you do to fix these pitfalls? How can you avoid making future mistakes in your own visualizations?

Discussion Length (word count): At least 250 words

References: At least two peer-reviewed, scholarly journal references.

Divya-OWASP Tools, Vulnerability Management

 For this assignment, download the GSA virtual appliance vulnerability assessment tool by clicking the link.   Install the GSA virtual appliance in your VirtualBox environment. Next review the video below about conducting a vulnerability scan using GSA/openvas.  Conduct a scan against the Linux Lamp Server virtual machine you created doing week 3.  Download the report in a PDF and submit.  Provide a summary about how this assignment represents securing the cloud.    

OPERATING SYSTEM

 

  • Explain the purpose of an operating system for a personal computer.
  • Give a brief description of the hardware components of a computer that the OS interfaces with. Motherboard, CPU, RAM, hard drive, sound controller, power supply, input and output devices, etc.

the cs

 

Please solve three (3) programming problems related to the content presented in Chapter 12 in your text. You can find the programming problems in the attached file (Module 5 Programming Problems Worksheet.docx (Links to an external site.)).

  • Download the worksheet and save it as Mod5-Worksheet-Programming-Last-First.docx. For example, Mod5-Worksheet-Programming-Smith-John.docx.
  • Consider the problem, design an algorithm (or algorithms) that would solve the problem, and then implement the algorithm in Java.
  • Create a new folder and name it as Mod5-Java-Programming-Last-First, for example, Mod5-Java-Programming-Smith-John.
  • Write the source code for each problem and save them as .java files in the folder you created. There are three programming problems for this module so you should have three .java files. Name your java files as Mod5Problem#.java, for example, Mod5Problem1.java.
  • Copy data file(s) used for your program and/or output file into the folder.
  • Please insert the algorithm written in pseudocode as a comment in the beginning of your program.
  • Take screenshots of your running program – you can take screenshots using PrintScreen or any tool that you are familiar with, making sure that the console window in which you run the program appears on the screen.
  • Copy the screenshots in the worksheet. If your program has different outcomes, take screenshots of each variation.

Submission

  • Compress the folder that saves all of your java files as .zip file. Please note don’t save the worksheet in the same folder as they need to be submitted separately.
  • Submit the following two files as attachments by clicking the Submit Assignment button above.
    • Mod5-Java-Programming-Last-First.zip (including .java files, data files, and .txt files).
    • Mod5-Worksheet-Programming-Last-First.docx.

Grading

This assignment is worth 20 points. You can find the grading rubric for each program in the worksheet attached above.

  • CycleThrowTryCatch (6 pts.).
  • CycleFileOutput (7 pts.).
  • CycleFileInput (7 pts.).

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Images

Excel 2019 In Practice – Ch 7 Independent Project 7-6

 

The Hamilton Civic Center is developing a template for member exercise and off-site seminars. You create the template, set validation, enter formulas, and insert a combo box control. You then create a new workbook from the template.

[Student Learning Outcomes 7.1, 7.2, 7.3, 7.4, 7.6]

File Needed: HamiltonCC-07.xlsx (Available from the Start File link.)

Completed Project File Names: [your name]-HamiltonCC-07.xlsx

Skills Covered in This Project

  • Set data validation to use a list.
  • Set validation to restrict dates.
  • Create an error alert message.
  • Insert a combo box control.
  • Check accessibility and add alt text.
  • Protect a worksheet.
  1. Open the HamiltonCC-07 workbook and click the Enable Editing button. The file will be renamed automatically to include your name.
  2. Select cell D2 on the Data sheet and review the formula. The formula divides calories by time and rounds the results to three decimal places.ImagesFigure 7-69 Custom format for values
  3. Select cells D2:D10 and open the Format Cells dialog box.
  4. Select the Custom category on the Number tab and build a format to display three decimal places (Figure 7-69).
  5. Select cell D2 and click the Format Painter button [Home tab, Clipboard group]. Click the Calorie Tracking tab and paint the format to cells E3:E33.ImagesFigure 7-70 VLOOKUP formula
  6. Select cell E3 on the Calorie Tracking sheet. Start a VLOOKUP function to lookup the label in cell C3. For the array, use an absolute reference to cells A2:D10 on the Data sheet. The Col_index_num is 4 for the calories per minute column. Leave the Range_lookup argument empty; the array (A2:D10) is sorted in ascending order. The result of the VLOOKUP formula is calories per minute for the exercise (Figure 7-70).
  7. Edit the formula in cell E3 to multiply the results by the number of minutes in cell D3.
  8. Copy the formula in cell E3 to cells E4:E33. The #N/A error message displays in rows where no data displays.
  9. Select cells C3:C33 and set data validation to use the list of activity names on the Data sheet. Do not use an input message or an error alert.
  10. Select the Calorie Tracking sheet and delete the data in cells A3:D23.ImagesFigure 7-71 Data validation for dates
  11. Select cells B3:B33 and set data validation to use a Date that is less than or equal to TODAY (Figure 7-71). Include a Stop error alert with a title of Check Date and a message of Date must be today or in the past. including the period.
  12. Select cells A3:D33 and remove the Locked cell property. Select cell A3 to position the insertion point.
  13. Display the Developer tab on the Ribbon and click the Data worksheet tab.ImagesFigure 7-72 Combo box settings
  14. Draw a combo box control to cover cell F8 and open its Format Control dialog box. Select cells G8:G11 for the Input range and type f8 in the Cell link box (Figure 7-72).
  15. Deselect the control and then select Second from the control. The linked cell is under the control and hidden from view.
  16. Click the Hospital Seminars tab and select cell D4. This cell has Center Across Selection alignment applied.
  17. Select cell D4 and use CONCAT and INDEX to display the result from the combo box, concatenating the Index results to the word “Quarter.”
    1. Start a CONCAT function [Text group].
    2. Use the INDEX function with the first arguments list as the Text1 argument.ImagesFigure 7-73 INDEX is nested within CONCAT
    3. Choose cells G8:G11 on the Data sheet for the Array argument and cell F8 for the Row_num argument. You can select the combo box control or type f8 after the sheet name (Figure 7-73). When the array is one column, a Column_num argument is not necessary.
    4. Click between the two ending parentheses in the Formula bar to return to the CONCAT arguments and type a comma (,) to move to the Text2 argument. (If you accidentally click OK, click the Insert Function button to re-open the Function Arguments dialog box.)ImagesFigure 7-74 Space character is included with Text2 argument
    5. Click the Text2 box, press Spacebar, type Quarter, and click OK. (Figure 7-74).
    6. Format cell D4 as bold italic 16 pt.
  18. Select the Data sheet, select Third from the combo box control, and return to the Hospital Seminars sheet to see the results.
  19. Select cell D4 and cells D6:G10 on the Hospital Seminars sheet and remove the Locked property.
  20. Delete the contents of cells D6:G10 and select cell D6.
  21. Check accessibility and add the alternative text Hamilton Civic Center Logo to both pictures in the workbook.
  22. Select cell D6 on the Hospital Seminars sheet and cell A3 on the Calorie Tracking sheet.
  23. Protect the Hospital Seminars sheet and the Calorie Tracking sheet, both without passwords.
  24. Save and close the workbook (Figure 7-75).
  25. Upload and save your project file.
  26. Submit project for grading.

Research Based postition Paper

 

Prepare an 8 page APA style paper using the resources you have read in this course and at least 3 additional peer reviewed resources. Follow the writing requirements for this course. Include an introduction and conclusion in the paper. This paper should address the following questions:

(1) Does Blockchain technology have the potential to cause a shift in financial business practices that many experts are predicting? Explain why or why not. Support your answer with research.

(2) Is there evidence to suggest that Blockchain technology will change the way finance is applied and practiced? If there is, discuss that evidence. If there is not, what issues exist that impede its adoption?

(3) Which functions of financial management could be most impacted by Blockchain technology? How might the financial functions change? Support your answer with research.

Course writing requirements:

  • References must be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions (even initial discussion posts)
  • Provide the exact web link on the reference page citations for all online sources – do not provide just the home page, but the exact link – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write more than the minimum requirement of the word count assigned
  • As always, the word count is only for the body of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a Power Point is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.