math

an aqurium is 10m long, 5m wide and 6m deep 

what is the volume of the aquarium?

data analysis

 Find something that you are passionate about.  Find a dataset that speaks to that passion.  You can choose from:

– kaggle.com

– https://lionbridge.ai/datasets/10-open-datasets-for-linear-regression/

– https://careerfoundry.com/en/blog/data-analytics/where-to-find-free-datasets/

OR ANY REPUTABLE SOURCE OF DATA.

Write a 2 page (minimum) paper.  In the paper, define the problem that you are analyzing.  What is the question that you want to be answered from the data?  What is your hypothesis?

25%:  Analysis of the dataset (explain the data and also perform a statistical analysis).  Speak to which features you kept and why. 
25%: Use the techniques learned in this class and discover at least 1 “AHA” in the data.  By that, I mean that I expect you to discover a relationship between two variables or an INSIGHT into the data.  Explain your findings.
25%: Define which visualization(s) you choose to use and why you chose them.  I expect the visualizations to be professional and readable by themselves without references to anything else.  (I am not going to be looking through your data to try to understand your visual).  Attach your visuals to the end of the document.  Create a Tableau Story that combines your visuals and provide the link to it in the document.
15%: Summarize your work from a social or business perspective.  Why is this important?  How could this insight be used to make a difference?

CITE YOUR SOURCES and add them to the end of your paper.  (I recommend citefast.com.  You can cite all of your sources there and export to word and just add it to the end of your paper.)

In summary – you will turn in:

A 2-page Analysis

A page (or 2) of Visualizations

A list of your sources/references

5s week 2 assignment BS

in 300 words

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Include references, do not copy paste.

numerical computation project

This is simple project about numerical computation of Computer Science. It is going to be not heavy work. Read the Project.pdf and do the work and fill the Word Template and Lab report files what I attachePd. 

P.S Don’t need to make presentation.

Asg2

 

Hello,

i need this paper by  today 4pm cst.

Strictly No plagiarism please use your own words.

Requirements:

· Provide a 500 word (or 2 pages double spaced) minimum reflection.

· Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

· Share a personal connection that identifies specific knowledge and theories from this course.

· Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

How Network security and proxy related to cryptography.

this is my topic.

· You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Cyber Law

Assignment 1

 1. Using a Microsoft Word document, please post one federal and one state statute utilizing standard legal notation and a hyperlink to each statute.

2. In the same document, please post one federal and one state case using standard legal notation and a hyperlink to each case.

Assignment 2

 A. Social media platforms such as Facebook, Twitter, and even Tiktok have become very powerful and influential. Please give your thoughts on whether governments should regulate the content of content on these media. Minimum 250 words.

B. Respond to two classmates’ postings. Minimum 100 words per posting.