I need an apa formatted research paper that has 10 pages. The topic is Developing algorithms for outlier detection and data cleaning. The report should include an abstract, introduction, conclusion, in-text citations, and references.
Unit 3 Lab I need it paraphrased
I need the below 280 words paraphrased so that it shows less than 10% match on turnitin.com report.
Please provide me with the report.
The purpose of this lab is about how to properly plan the steps of configuring the pfsense
firewall, and also how to navigate and use the tools provided within the firewall. Firewalls are an
exceptionally great tool that provides better internet security then your usual tools you have. As
an example, would be like using the host based firewall on your computer but on a higher end
scale. With the proper configuration you can prevent multiple cyber attacks, such as DoS, Hacks
and several others. At the beginning at of the lab it had us in the planning phase. Part of this was
how to properly layout the information needed to make sure we configure the firewall
accordingly. The excel spreadsheet provided was very useful in this phase because it laid out the
essential information needed such as Hostname, Primary DNS, Secondary DNS, Time Zone, IP
Address, subnet mask, and even password. After that the second spreadsheet had the actual
layout of fire wall rules. This was very useful because the way it was set up matched up with
how the firewall was configured. The spreadsheet layout had its setup by Action, whether its pass
or block, or reject. Next was which interface it was, for us we only had two options either the
WAN interface or the LAN. Followed by that was Family and protocol. For this lab we used
IPv4 with TCP and ICMP. Next was the Source IP and Destination IP followed by the Ports. In
this lab we used HTTP, SMTP, FTP, DNS, and ICMP.
Knowing how to configure firewall rules can be very instrumental and very beneficial. It
is one of the most effective way to secure a network and prevent unauthorized access.
update attached document
update attached document
Desktop Migration Proposal
This week, you will submit the second project, the Desktop Migration Proposal. Using the requirements analysis your manager provided and the Internet research you conducted, submit your recommendation to the assignment folder. As you are writing your recommendation, ensure your analysis and recommendations align with your manager’s priorities and concerns.
You should carefully document any assumptions made (e.g., how you analyzed the requirement for upgrading monitors, peripherals devices, etc.).
Refer to the HFA Desktop Migration: Corporate PC Refresh Documentation for the company’s needs (requirements). Your justification should clearly indicate how you bridge the gap between the existing desktop specifications and the new machines you recommend.
Discussion 12
Read the instructions carefully!
Exp22_Excel_Ch02_ML1 – Katherine's Coffee Shop Weekly Payroll
Exp22_Excel_Ch02_ML1 – Katherine’s Coffee Shop Weekly Payroll
Start Excel. Download and open the file named Exp22_Excel_Ch02_ML1_Payroll.xlsx. Grader has automatically added your last name to the beginning of the filename.
Use IF functions to calculate the regular pay and overtime pay in columns E and F based on a regular 40-hour workweek. Be sure to use the appropriate absolute or mixed cell references. Pay overtime only for overtime hours. Note employees receive 1.5 their hourly wage for overtime hours worked. Calculate the gross pay in cell G5 based on the regular and overtime pay. Spencer’s regular pay is $440. With five overtime hours, Spencer’s overtime pay is $82.50.
Create a formula in cell H5 to calculate the taxable pay. Multiply the number of dependents by the deduction per dependent and subtract that from the gross pay. With two dependents, Spencer’s taxable pay is $422.50.
Insert a VLOOKUP function in cell I5 to identify and calculate the federal withholding tax. With a taxable pay of $422.50, Spencer’s tax rate is 25% and the withholding tax is $105.63. The VLOOKUP function returns the applicable tax rate, which you must then multiply by the taxable pay.
Calculate FICA in cell J5 based on gross pay and the FICA rate, and calculate the net pay in cell K5. Copy all formulas down their respective columns. Be sure to preserve the existing formatting in the document. Based on the hours Spencer worked he paid $39.97 to FICA and had a weekly net pay of $376.90
Use Quick Analysis tools to calculate the total regular pay, overtime pay, gross pay, taxable pay, withholding tax, FICA, and net pay on row 17. (On a Mac, this step must be completed using the AutoSum feature on the ribbon.)
Apply Accounting Number Format to the range C5:C16. Apply Accounting Number Format to the first row of monetary data and to the total row. Apply the Comma style to the monetary values for the other employees.
Insert appropriate functions to calculate the average, highest, and lowest values in the Summary Statistics area (the range I24:K26) of the worksheet. Format the # of hours calculations as Number format with one decimal and the remaining calculations with Accounting Number Format.
Use the XLOOKUP function to look up the employee name in cell A20 (Wagner) in the payroll data and return the specified information in row 20. Ensure the return array includes overtime pay, gross pay, taxable pay, federal tax, FICA and net pay.
Save and close the workbook. Submit the file as directed.
Scripting
DUE IN 10 HOURS, APA, Programming
The code for this assignment should be compared to chapter one below
Python Programming 3.html
Python Programming 4.html
The assignment file is the python 1.docx
literature review
Overview: Using mentor or model texts is a strategy to improve your own writing. The New York Times describes mentor texts as, “Demystifying the writing process via examples students can learn from and emulate.” In this assignment, you will locate a mentor text in the form of a dissertation that may or may not be similar to your own topic to use as a model while you write your chapter 2. It is most helpful to find a dissertation with a literature review similar to your own, but if that is not possible, you may look for the next best option.
Topic :
The Smart Phone as a Dangerous Technology
Directions:
- Use ProQuest Dissertations & Theses Global database on the UC Library website to locate mentor text dissertation (preferably it would be related to your topic).
- You may need to use advanced search options to help narrow your search.
- Scan read the entire dissertation.
- Carefully read the literature review section.
- Provide a one-paragraph summary of the entire literature review.
- Write a second paragraph about what you learned through reviewing chapter 2
APA format with references needed
500 words
Business Intellegence
Questions and exercise:
1. Some people say that chatbots are inferior for chatting. Others disagree. Discuss.
2. Discuss the financial benefits of chatbots.
3. Discuss how IBM Watson will reach 1 billion people by 2018 and what the implications of that are.
Exercise:
1. Compare the chatbots of Facebook and WeChat. Which has more functionalities?
2. Research the role of chatbots in helping patients with dementia.
Discussion-OS
Questions first part:
1.Think about how you would feel if there were no rules regarding how your credit card information was stored on merchants’ websites. Consider whether you would purchase items online. Would the Internet be as big as it is today if we had no laws or information security policies regarding data that makes up an e-commerce transaction? Provide rationale for your answer.
2. Imagine that you work for an organization that has no Internet use policy. Employees use the Internet in whatever way they want using company-owned personal computers. Could this cause a problem for the organization? Why or why not?
Questions Second part:
3. What is an advantage of organizing IT security policies by domain?
4. What is a disadvantage of organizing IT security policies by domain?
5. Do you think one domain is more challenging than the others as far as applying security policies? Explain your answer.