Master Paper and Final
SC_AC16_CS8-10a
Access Database Assignment
7 questions
1) Read this Time article and view the video(https://time.com/5168202/russia-troll-internet-research-agency/) explaining how Russian trolls spread fake news. Discuss in 500 words whether the government should regulate Facebook more closely.
Use at least three sources. Use the Research Databases available from the Danforth Library(https://libguides.nec.edu/az.php), not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.
2) Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.
1. Describe Digital Literacy (how to know what is real on the web).
2. None of these people exist. What does this mean to you?
3. Why is Wikipedia more reliable than a paper encyclopedia?
4. How useful are crowd sources answers?
5. What are some drawbacks to crowd sourced answers?
6. Do people generally utilize the diversity of sources on the Internet effectively?
7. How reliant are we and how reliant should we be on getting our news from social media?
8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?
9. If models are simplifications or reality, why do we rely on them?
10. Why was this model, used by Amazon for hiring, wrong?
11. Why did Skynet declare war on the human race?
3) The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question.
Your Research Project will be a presentation on some aspect of the surveillance state. Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases
Use at least five sources.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Short excerpt on the Surveillance State :
4) Discuss in 500 words your opinion on what lessons should be learned from the 737 Max 8 crashes.
Use at least three sources. Use the Research Databases available from the Danforth Library(https://libguides.nec.edu/az.php), not Google. Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
5) Your Research Project on the surveillance state consists of two parts:
1 a Powerpoint presentation consisting of at least 12 slides not including title and references.
2. 750 word research paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.
Do not double space.
You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line.
There should be no lists – bulleted, numbered or otherwise.
Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.
The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.( https://www.nec.edu/students-faculty-staff/library-danforth/research-help/databases-help/)
6) Do a bit of research on penetration testing techniques. Investigate and document the following
· Five network penetration testing techniques
· Advantages and disadvantages of each
· One notable social engineering test
· Possible negative implications of penetration tesing
Please write between 300 words
7) Prepare a final project on a web application security topic. The primary deliverables for the project will be a paper and and also a presentation “Topic : White Hat Hacking”, Include a short paragraph describing your project and how you intend to research it.
· Week 11. Submit final project.
· Week 12. Submit a brief abstract describing your final project.
Week 13. Submit final project materials.
o 500-700 word, double spaced, written in APA format, showing sources and a bibliography
Assignment
Please work through the following tutorials located at the following locations:
Python is a great language for doing data analysis, primarily because of the fantastic ecosystem of data-centric Python packages. Pandas is one of those packages, and makes importing and analyzing data much easier. Pandas builds on packages like NumPy and matplotlib to give you a single, convenient, place to do most of your data analysis and visualization work. In this python data science tutorial, you’ll use Pandas to analyze data on video game reviews from IGN, a popular video game review site. The data was scraped by Eric Grinstein, and can be found here. As you analyze the video game reviews, you’ll learn key Pandas concepts like indexing.
Exercise 1 Link: https://www.dataquest.io/blog/pandas-python-tutorial/
You need basic Python knowledge for this tutorial. If you understand if-else statements, while and for loops, lists, and dictionaries, you’re set to make the most out of this tutorial. You also need a code editor like Visual Code Studio, PyCharm, or Atom. In addition, while we walk through every line of code so you never feel lost, knowing basic pandas would help. Check out our pandas tutorial if you need a refresher.
Exercise 2 Link: https://www.dataquest.io/blog/regular-expressions-data-scientists/
Please screenshot your results and upload them to this Assignment Link.
Computer archtecture paper
DUE: December 12th!!
Pick two topics among the following below topics. Write a research paper of five full content pages explaining the two topics, their importance to computer architecture, what makes them important, and why you chose these two topics and not the others. Support your research with scholarly references.
-computer systems architecture
–Computer Arithmetic and Digital Logic
-Architecture and Organization
-Instruction Set Architectures-Breadth and Depth
-Computer Architecture and Multimedia
-Performance—Meaning and Metrics
–Processor Control.
Week 2 Research Paper: Blockchain
Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?
Your paper should meet the following requirements:
- Be approximately four to six pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
Not a big fun of option though I do love Monte Carlo method. A bank has written a call option on one stock and a put option on another stock. Fo
Financial engineering problem…
Not a big fun of option though I do love Monte Carlo method. A bank has written a call option on one stock and a put option on another stock. For the first option the stock price is 50, the strike price is 51, the volatility is 28% per annum, and the time to maturity is 9 months. For the second option the stock price is 20, the strike price is 19, and the volatility is 25% per annum, and the time to maturity is 1 year. Neither stock pays a dividend. The risk-free rate is 6% per annum, and the correlation between stock price returns is 0.4.
1. Using C/C++ or Java or Matlab to calculate the 10-day 99% Monte Carlo Simulation based VaR for the portfolio. Set the number of simulation to 5000.
2. What else data is required to calculate the 10-day 99% Historical based VaR for the portfolio?
Data visualization assignment
Creat a dashboard
all assignments for professor foley
1.Prepare a one to two page paper on some of the various types of data mining and statistical software and the features thereof. Please double space your paper and cite your sources.
2. After observing the TED Talk on Big Data, prepare a one page paper on the TED Talk
https://www.ted.com/talks/tricia_wang_the_human_insights_missing_from_big_data/reading-list?rss
3. Prepare a one page paper on Data Mining Methods. You may research the internet for more information. Please double space your paper and cite your sources.
4.
After viewing the following Ted Talk on Big Data and privacy, prepare a one page paper on this Ted Talk topic “The Future of your Personal Data”.
What are some steps that you can do to protect yourself online?
Please double space your paper and cite your sources.