Assignment

intro to sql data

 

  • Exercise 1: HistogramExercise 1 in the text: You may use any spreadsheet program. Submit a Word document with a screenshot from your computer showing the histogram. Comment your images with  a sentence or so of description in your  own words  of what you are doing.   Please make sure that your images are large enough and high  enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExecise 2: Calculating QuartilesExercise 2 from the text: Use any spreadsheet program. Submit a Word document showing a screen shot from your computer with the quartiles underlined or highlighted.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExercise 3: Central TendencyExercise 3: Use any spreadsheet program. Submit a Word document with a screen shot from your computer showing the highlighted median.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentExercise 4: DispersionExercise 4: Use any spreadsheet program. Using the data provided in the text, submit a Word document with a screen shot from your computer highlighting the range, standard deviation, IQR, and outliers of Add-on Sales.  Comment your images so the viewer knows what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.
  • AssignmentExercise 5: Pearson CorrelationExercise 5: Use any spreadsheet program. Using the data provided in the text, create a scatter plot and calculate the Pearson Correlation Coefficient. Comment your images with  a sentence or so of description in your  own words  of what you are doing.   Please make sure that your images are large enough and high  enough resolution for the reader to see the text in your queries and the results. 
  • AssignmentActivity 2: Exploring Sales DataThere is no activity 1.Activity 2: Use the attached dealerships.csv file and any spreadsheet program. Submit a Word document with a screen shot from your computer of your solutions to questions 2 – 7 in the text. Highlight your results.  Comment your images with a sentence or so of description in your own words of what you are doing.  Please make sure that your images are large enough and high enough resolution for the reader to see the text in your queries and the results.  dealerships.csv

Constraint satisfaction problem

## Problem 2 – CSP

Consider the following constraint satisfaction problem. A linear graph has nodes of the following colors:

– Red

– Yellow

– Green

– Blue

– Violet

Each node has a domain of {1, 2, …, 9}.

Each node type has the following constraints on its value:

– Red – No contraints

– Yellow – equals the rightmost digit of of the product of all its neighbors

– Green – equals the rightmost digit of the sum of all its neighbors 

– Blue – equals the leftmost digit of the sum of all its neighbors

– Violet – equals the leftmost digit of the product of all of its neighbors

As a reminder here is the pseudo code for the Min-Conflicts search algorithm:

![minconflicts](https://images2017.cnblogs.com/blog/1126979/201712/1126979-20171224140802287-1871895433.png)

**Notes:**

– It’s possible that you won’t converge to a solution in a single run. Try a few runs to see if you get to a solution.

– The example is to show you what a problem looks like, we will test/grade your program on different examples

Complete the function *solve_csp* defined below. You may find some helper functions useful.

Discussion 55

 

Mr. Bradley Willman Against Superior Court Judge C. Kline

  • The Law enforcement officers are excessively zealous, striving retrospectively to justify their interest in vulnerable, innocent children and imploring the judiciary system’s sympathy.
  • Yet again, most police officers have been convicted for possessing child pornography despite pretense claims as undercover investigators. Masquerading and demonstration to justify the overzealous interest in innocent children, the victim of sex offenders can be counterproductive, as verified in the case against Superior Court Judge Ronald C. Kline.

Preamble

  • Bradley Willman, Canadian vigilante sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual fantasies involving children and approximately 100 images alleged to be child pornography. 
  • Judge Kline’s defense team. At first, the team suggested that the intruder may have planted the evidence.
  • Judge Ronald C. Kline. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.
  • Judge Kline’s Defense Team. As the case remains in litigation, the defense team argued that all evidence obtained by Mr. Willman must be suppressed because his actions were criminal and was acting as an agent of law enforcement when he broke into Judge Kline’s computer. 
  • On behalf of Mr. Willman, the prosecuting team denied the allegation that Mr. Willman acted as a police agent but was a cooperative suspect in the case and accused as potential suspect in at least three U.S. Customs Service investigations of child pornography. 
  • Ruling and Consequence.  A federal judge ruled that Mr. Willman acted as a police informant, corrupted all evidence he obtained from Judge Kline’s computer. It is worth noting that the outcome of Mr. Willman’s case against Judge Kline can put forth an across-the-board implication for Judge Kline Defense team and the prosecuting team in the encounter with online informants.
  • Lesson Learned. Before conducting an undercover investigation, investigators must take steps to protect their identity and assumed the position of anonymity, if possible. Also, investigators must use expressly designate computers and mobile devices used in the process of undercover investigations. Investigator Must do so to avoid commingling of evidence, possible allegations of personal pedophilic interests, and permanently circumvent far-reaching implications, shame, and humiliation in court.
    1. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.

Question 1. Describe in detail the plan of action, amplifying steps to submit court appeal on behalf of Judge Ronald C. Kline.

  1. Bradley Willman sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual illusions and imaginations involving children and approximately 100 images alleged to be child pornography. However, Judge Kline’s defense team alleged that the evidence was planted by (the Intruder) Mr. Bradley William.

Question 2. Describe in detail the plan of action, amplifying steps to submit court petition on behalf of Mr. Bradley Willman.

Research Paper

 “There should be no plagiarism. Attach a plagiarism report with 0 % similarity index

 Task 1:

 Any one of the below topics

 1. Cloud Computing 

2. Big Data Analytics

 3. Database Security 

4. Enterprise Architecture 

5. Data Warehouses

 6. Ethics in IT 

7. Web 2.0 

8. E-Commerce 

 The research paper must be at least 10 pages but no more than 12 pages.

 • The paper needs to be supported by evidence (citations from peer-reviewed sources). 

• A minimum of four (4) peer-reviewed journal citations are required. 

• No references should be more than 5 years old.  

Task 2:

  • Your PPT should reflect a summary of your Individual Research Report.
  • You should have 12-15 slides.

 

Network

Identify a network that you are familiar with at home or at work. List at least 3 hardware components. What do they each do? You do not need to cite and reference but you do need to explain how they are used.  

500 words.

EH week12 Lab

 

Hello,

i need this paper by 11/11 afternoon.

Strictly No plagiarism please use your own words.

you were introduced to Wireshark and GlassWire, two free network monitor & security tools. Compare and contrast these two tools. explaining the benefits and features of each, then decide which of these two choices you would prefer to use if you were the Network Manager. Explain why you made your decision.

https://www.glasswire.com/

https://www.wireshark.org/

300 words needed

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Hacking

Search the Internet and locate an article that relates to the topic of HACKING and summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

BSWA week2 P2

 

Hello,

i need this paper by 1/21 afternoon.

Strictly No plagiarism please use your own words.

Visit the OWASP website. 

https://www.youtube.com/watch?v=RGA5kLO9vjs

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism