ADT

Set up your project with the given starting code. The files should compile and run, but either no tests will be run, or tests will run but be failing. 2. For this project, start by uncommenting the first TEST_CASE in the assg10-tests.cpp file. These are the unit tests to test the functionality of your PriorityQueue enqueue() function, the class and overridden member function you are to implement. 3. Add the PriorityQueue class to the Queue.hpp header file. The class should inherit from LQueue and override the enqueue() method as described in more detail below. 4. Add a stub for your enqueue() member function to the assg07-stackfun.cpp implementation file. You could start by doing nothing, or by copying the code of the enqueue() function from the LQueue class. 5. Your code should compile and run now. Make sure after adding the class and your stub method your code compiles and runs. However, your unit tests will be failing initially. 6. Incrementally implement the functionality of your enqueue() member function. You should try to add no more than 2 or 3 lines of code, and then make sure your program still compiles and runs. Start by adding code to get the first failing test to pass. Then once that test passes, move on to the next failing tests until you have all tests passing. If you write something that causes a previously passing test to fail, you should stop and figure out why, and either fix it so that the original test still passes, or remove what you did and try a new approach. 7. Once you have the enqueue() member function implemented and all unit tests passing, you should then move on to the other functions in the order suggested. Some functions use previous ones in this assignment, so do them in the order given for you in the tasks below.

CC-12

 
Discuss  500 words or more discuss why Security as a Service is a good investment. 

Twitter Data Analysis

 

 

NF 160 Introduction to Data Science

Twitter Data Analysis

Due Date: Nov 5, 2020

Points: 22

Objective:

Examine students’ ability to create Twitter applications in order to download tweets by using the R platform for data science projects.

Tasks:

Students will create a Twitter application for scraping tweets by using the R platform. They will use this application to download a total of 200 tweets by searching with their chosen hashtag and from a user profile. The first 100 tweets will be collected by using a student-chosen hashtag/keyword and the rest 100 tweets will be collected from a student-chosen Twitter user profile.

Deliverables:

Two files:

  • One word processing/PDF file explaining the steps of Twitter application creation
  • The RStudio file that contains codes for Twitter data collection 

Submission:

Upload both of these files in Canvas Assignment section.

Points and Rubrics:

Word Processing/PDF file:

  • The word processing/PDF file explaining the steps of Twitter application creation will get a maximum of 5 points
  • Inclusion of comprehensive application creation steps will get a maximum of 5 points
  • Inclusion of minimal application creation steps will get a maximum of 3 points
  • No explanation of Twitter application creation will get 0 point

RStudio File:

  • The RStudio file will get a maximum of 6 points
  • 150-199 tweets comprising of a hashtag and user profile will get 5 points
  • 50-149 tweets comprising of a hashtag and use profile will get 3 points
  • Less than 50 tweets comprising of a hashtag and user profile will get 2 points
  • No tweet will get 0 points

Name Lengths

Introduction

Do people with long last names also tend to have long first names? In this assignment, you will analyze data to investigate this question, construct and analyze a linear regression model based on the relationship between the length of the first and last names in the dataset that you collected, and draw insights into the phenomenon within the limitations of the model. You will count the alphabet letters used to write the name of 100 individuals from this dataset   arabic_first_last_name _1_.csv

e  .

Part I: Exploratory Analysis

a) Download the arabic_first_last_name.csv file which contains Arabic first and last name columns.

b) Construct a dot plot of the last name lengths and comment on any interesting features of this plot.

c) Construct a dot plot of the first name lengths and comment on any interesting features. Describe how the distribution of first name lengths compares to that of last name lengths.

Part II: Regression Model

a) Construct a scatterplot of x and y.

b) Explain if this is the plot consistent with the theory that people with long last names tend to also have long first names?

c) What is the value of the correlation coefficient for this data set?

Part III: Reporting

a) Discuss if your first and last name are included in the context of the model.

b) Discuss the limitations of the data, the model, and the analysis.

c) Write a 100-200 words meaningful paragraph summarizing the findings from the analysis.

Once you have developed responses to the task prompts, you will organize them in a professional 3-5-page report, not including the title and reference pages, that summarizes your actions, calculations, and findings. You will upload a zipped file that includes your response and all supporting files.

Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

wk 14

Prepare a 4 page paper on the implications for voting, lotteries, certificate issuance, security auditing and enterprise. Discuss the impact on blockchain finance and how these functions will accelerate basic functions.

Your paper should be 4 pages long (excluding the title and reference pages) and formatted according to APA.

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 4 page essay, you must include an APA-style title page and reference page.

Contracting & Service Level Agreements

 

Discuss in 400 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

frameworks

 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43.

 The required article readings of above articles give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches. For research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.